CN118741495B - Data communication encryption method for Internet of vehicles - Google Patents
Data communication encryption method for Internet of vehicles Download PDFInfo
- Publication number
- CN118741495B CN118741495B CN202411223400.9A CN202411223400A CN118741495B CN 118741495 B CN118741495 B CN 118741495B CN 202411223400 A CN202411223400 A CN 202411223400A CN 118741495 B CN118741495 B CN 118741495B
- Authority
- CN
- China
- Prior art keywords
- data
- encrypted
- numerical value
- encryption
- center
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 26
- 238000004891 communication Methods 0.000 title claims abstract description 17
- 239000011159 matrix material Substances 0.000 claims abstract description 76
- 230000009466 transformation Effects 0.000 claims abstract description 35
- 238000006243 chemical reaction Methods 0.000 claims description 7
- 229910002056 binary alloy Inorganic materials 0.000 claims description 3
- 230000008859 change Effects 0.000 abstract description 3
- 230000008569 process Effects 0.000 description 8
- 230000005540 biological transmission Effects 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/009—Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/40—Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a data communication encryption method of the Internet of vehicles, which belongs to the technical field of data communication encryption, wherein binary data to be encrypted is firstly converted into decimal data to be encrypted, then one-dimensional decimal data to be encrypted is converted into two-dimensional decimal data to be encrypted, the two-dimensional decimal data to be encrypted is subjected to transverse and longitudinal position transformation to realize the change of numerical positions, then a first key matrix and a second key matrix are generated according to the data distribution characteristic values of the data to be encrypted after the position transformation, the first key matrix and the second key matrix are adopted to encrypt the position transformed data to be encrypted to obtain encrypted data.
Description
Technical Field
The invention relates to the technical field of data communication encryption, in particular to a data communication encryption method of the Internet of vehicles.
Background
The internet of vehicles is an important component of an intelligent traffic system, and achieves the functions of intelligent traffic management, intelligent dynamic information service, intelligent vehicle control and the like through omnibearing connection and information exchange of vehicles and vehicles, vehicles and people, vehicles and road side facilities and vehicles and a network. With development and application of internet of vehicles technology, data security and privacy protection become a problem to be solved urgently. Since a large amount of sensitive data such as position information, vehicle speed, direction, etc. are generated and transmitted during the running of the vehicle, disclosure of such information may pose a threat to the privacy of the user and even be exploited.
In order to ensure the safety of data transmission in the Internet of vehicles, the encryption technology is an effective means for protecting the data. When the prior encryption technology encrypts data to be transmitted, a random sequence is adopted to encrypt the data to be transmitted to obtain encrypted data, and the problems of short key length and low safety exist.
Disclosure of Invention
Aiming at the defects in the prior art, the data communication encryption method of the Internet of vehicles solves the problems of short key length and low safety in the prior art.
In order to achieve the aim of the invention, the invention adopts the following technical scheme: a data communication encryption method of the Internet of vehicles comprises the following steps:
s1, converting binary data to be encrypted in the Internet of vehicles into decimal data to be encrypted;
s2, converting the one-dimensional decimal data to be encrypted into two-dimensional decimal data to be encrypted;
S3, carrying out horizontal and vertical position transformation on the two-dimensional decimal data to be encrypted to obtain position transformed data to be encrypted;
S4, generating a first key matrix and a second key matrix according to the data distribution characteristic value of the data to be encrypted by position transformation;
s5, encrypting the position conversion data to be encrypted by adopting a first key matrix and a second key matrix to obtain encrypted data;
S6, converting the encrypted data into binary system to obtain the encrypted data to be transmitted.
Further, the S1 specifically is: and converting binary data to be encrypted in the Internet of vehicles into a decimal value according to a byte unit.
Further, the step S2 includes the following sub-steps:
S21, segmenting one-dimensional decimal data to be encrypted according to a fixed length N to obtain a plurality of data sets, wherein the length of each data set is N, N is a positive integer, and filling is carried out by adopting 0 when the length of the data set is insufficient;
S22, forming each data group into two-dimensional decimal data to be encrypted, Wherein a is two-dimensional decimal data to be encrypted, a 1 is a 1 st row data set, a i is an i-th row data set, a M is an M-th row data set, M is the number of transverse data sets, and i is a positive integer.
Further, the step S3 includes the following sub-steps:
S31, carrying out numerical value exchange on an ith row data group and an Mth-i+1th row data group in two-dimensional decimal data to be encrypted, wherein i is more than or equal to 1 and less than or equal to M/2, and i is a positive integer, so as to obtain data to be encrypted after transverse transformation;
S32, carrying out numerical value exchange on the jth row data set and the K-i+1th row data set in the transversely transformed data to be encrypted, wherein j is more than or equal to 1 and less than or equal to K/2, j is a positive integer, and K is the number of the longitudinal data sets, so as to obtain the position transformed data to be encrypted.
Further, the step S4 includes the following sub-steps:
s41, centering on each numerical value in the data to be encrypted by position transformation;
s42, calculating a first data distribution characteristic value at the center according to the difference between the upper side and the lower side of the numerical value in the neighborhood range at the center, and replacing with 0 when the upper side or the lower side has no numerical value;
S43, calculating a second data distribution characteristic value at the center according to the difference between the left side and the right side of the numerical value in the neighborhood range at the center, and replacing with 0 when no numerical value exists at the left side or the right side;
s44, forming a first key matrix according to the first data distribution characteristic values;
s45, forming a second key matrix according to each second data distribution characteristic value.
Further, the formula for calculating the first data distribution characteristic value at the center in S42 is as follows:
Wherein ζ 1 is a first data distribution eigenvalue, e is a natural constant, x up is an upper numerical value in a neighborhood region at the center, x down is a lower numerical value in a neighborhood region at the center, and i is an absolute value.
Further, the formula for calculating the second data distribution characteristic value at the center in S43 is:
Where ζ 2 is a second data distribution eigenvalue, e is a natural constant, x right is the right-hand value in the neighborhood at the center, x left is the left-hand value in the neighborhood at the center, and i is the absolute value.
Further, the step S5 includes the following sub-steps:
s51, encrypting the data to be encrypted by adopting the first key matrix to perform position transformation to obtain a first encryption matrix;
S52, encrypting the position conversion data to be encrypted by adopting a second key matrix to obtain a second encryption matrix;
s53, subtracting the first encryption matrix from the first encryption matrix to obtain encrypted data.
Further, the encryption formula in S51 is: Wherein S 1 is a first encryption matrix, X 1 is a first key matrix, G is position-transformed data to be encrypted, Is Hadamard product;
the encryption formula in S52 is: Wherein S 2 is a second encryption matrix, and X 2 is a second key matrix;
The subtraction formula in S53 is: wherein Y is encrypted data.
In summary, the invention has the following beneficial effects:
1. The invention firstly converts binary data to be encrypted into decimal data to be encrypted, the encryption process is carried out on decimal, the encryption security is increased, then one-dimensional decimal data to be encrypted is converted into two-dimensional decimal data to be encrypted, the two-dimensional decimal data to be encrypted is subjected to transverse and longitudinal position transformation, the change of numerical value position is realized, then a first key matrix and a second key matrix are generated according to the data distribution characteristic value of the position transformation data to be encrypted, the position transformation data to be encrypted is encrypted by adopting the first key matrix and the second key matrix, the encrypted data is obtained, the encrypted data is converted into binary data for transmission, the two-dimensional data to be encrypted is subjected to position transformation to realize readjustment of numerical value distribution, the data distribution characteristic value is obtained on the basis, and the key matrix is constructed for encryption processing, so that the encryption process depends on the numerical value distribution condition, and the encryption security is increased.
2. Under the condition that the encrypted data is stolen, the stealer not only needs to construct a key matrix so as to crack the data to be encrypted by position transformation, but also needs to perform position inverse transformation to restore the positions of all the values, so that the transmission information can be accurately obtained, but the key matrix is constructed according to the neighborhood value distribution condition of all the values in the data to be encrypted by position transformation, so that the stealer cannot crack the data under the premise of not knowing the original data to be encrypted and the encryption process, and the method has high safety.
Drawings
Fig. 1 is a flowchart of a data communication encryption method of the internet of vehicles.
Detailed Description
The following description of the embodiments of the present invention is provided to facilitate understanding of the present invention by those skilled in the art, but it should be understood that the present invention is not limited to the scope of the embodiments, and all the inventions which make use of the inventive concept are protected by the spirit and scope of the present invention as defined and defined in the appended claims to those skilled in the art.
As shown in fig. 1, a data communication encryption method of the internet of vehicles comprises the following steps:
s1, converting binary data to be encrypted in the Internet of vehicles into decimal data to be encrypted;
s2, converting the one-dimensional decimal data to be encrypted into two-dimensional decimal data to be encrypted;
S3, carrying out horizontal and vertical position transformation on the two-dimensional decimal data to be encrypted to obtain position transformed data to be encrypted;
S4, generating a first key matrix and a second key matrix according to the data distribution characteristic value of the data to be encrypted by position transformation;
s5, encrypting the position conversion data to be encrypted by adopting a first key matrix and a second key matrix to obtain encrypted data;
S6, converting the encrypted data into binary system to obtain the encrypted data to be transmitted.
The S1 specifically comprises the following steps: and converting binary data to be encrypted in the Internet of vehicles into a decimal value according to a byte unit.
The step S2 comprises the following sub-steps:
S21, segmenting one-dimensional decimal data to be encrypted according to a fixed length N to obtain a plurality of data sets, wherein the length of each data set is N, N is a positive integer, and filling is carried out by adopting 0 when the length of the data set is insufficient;
S22, forming each data group into two-dimensional decimal data to be encrypted, Wherein a is two-dimensional decimal data to be encrypted, a 1 is a 1 st row data set, a i is an i-th row data set, a M is an M-th row data set, M is the number of transverse data sets, and i is a positive integer.
In this embodiment, N is 7, i.e., 7 values are divided into one group.
The step S3 comprises the following substeps:
S31, carrying out numerical value exchange on an ith row data group and an Mth-i+1th row data group in two-dimensional decimal data to be encrypted, wherein i is more than or equal to 1 and less than or equal to M/2, and i is a positive integer, so as to obtain data to be encrypted after transverse transformation;
S32, carrying out numerical value exchange on the jth row data set and the K-i+1th row data set in the transversely transformed data to be encrypted, wherein j is more than or equal to 1 and less than or equal to K/2, j is a positive integer, and K is the number of the longitudinal data sets, so as to obtain the position transformed data to be encrypted.
In the invention, the jth column data group is formed by all values in the jth column in the data to be encrypted after transverse transformation.
The invention firstly carries out numerical value exchange on the ith row data group and the Mth-i+1 row data group through S31, namely the ith row data group is exchanged to the Mth-i+1 row, the Mth-i+1 row data group is exchanged to the ith row, then carries out numerical value exchange on the two-dimensional data exchanged through S31 through S32, namely the jth column data group is exchanged to the Kth-i+1 column, and the Kth-i+1 column data group is exchanged to the jth column, thereby realizing the disturbance of transmission information.
The step S4 comprises the following substeps:
s41, centering on each numerical value in the data to be encrypted by position transformation;
s42, calculating a first data distribution characteristic value at the center according to the difference between the upper side and the lower side of the numerical value in the neighborhood range at the center, and replacing with 0 when the upper side or the lower side has no numerical value;
S43, calculating a second data distribution characteristic value at the center according to the difference between the left side and the right side of the numerical value in the neighborhood range at the center, and replacing with 0 when no numerical value exists at the left side or the right side;
s44, forming a first key matrix according to the first data distribution characteristic values;
s45, forming a second key matrix according to each second data distribution characteristic value.
The formula for calculating the first data distribution characteristic value at the center in S42 is as follows:
Wherein ζ 1 is a first data distribution eigenvalue, e is a natural constant, x up is an upper numerical value in a neighborhood region at the center, x down is a lower numerical value in a neighborhood region at the center, and i is an absolute value.
The formula for calculating the second data distribution characteristic value at the center in S43 is as follows:
Where ζ 2 is a second data distribution eigenvalue, e is a natural constant, x right is the right-hand value in the neighborhood at the center, x left is the left-hand value in the neighborhood at the center, and i is the absolute value.
The invention takes each numerical value in the data to be encrypted by position transformation as a center, calculates a first data distribution characteristic value at the center by taking the difference between the upper side numerical value and the lower side numerical value in the neighborhood range at the center, and calculates a second data distribution characteristic value at the center according to the difference between the left side numerical value and the right side numerical value, wherein the first data distribution characteristic value and the second data distribution characteristic value are closely related to the arrangement of the data to be encrypted by position transformation, so that the first key matrix and the second key matrix are difficult to crack under the condition that the construction process of the two-dimensional data of the invention cannot be known.
In this embodiment, the first data distribution feature value at each center replaces the value at the center to form a first key matrix, and the second data distribution feature value at each center replaces the value at the center to form a second key matrix.
In the present invention, the neighborhood range refers to a range in contact with the center.
The step S5 comprises the following substeps:
s51, encrypting the data to be encrypted by adopting the first key matrix to perform position transformation to obtain a first encryption matrix;
S52, encrypting the position conversion data to be encrypted by adopting a second key matrix to obtain a second encryption matrix;
s53, subtracting the first encryption matrix from the first encryption matrix to obtain encrypted data.
The encryption formula in S51 is: Wherein S 1 is a first encryption matrix, X 1 is a first key matrix, G is position-transformed data to be encrypted, Is Hadamard product;
the encryption formula in S52 is: Wherein S 2 is a second encryption matrix, and X 2 is a second key matrix;
The subtraction formula in S53 is: wherein Y is encrypted data.
The method comprises the steps of carrying out Hadamard product operation on first key matrix and position transformation data to be encrypted to obtain a first encryption matrix, carrying out Hadamard product operation on second key matrix and position transformation data to be encrypted to obtain a second encryption matrix, and subtracting the first encryption matrix and the first encryption matrix to obtain encrypted data, so that the encryption process of the encrypted data is integrated with the numerical value distribution condition of the upper side, the lower side, the left side and the right side, and encryption precision is improved.
The invention firstly converts binary data to be encrypted into decimal data to be encrypted, the encryption process is carried out on decimal, the encryption security is increased, then one-dimensional decimal data to be encrypted is converted into two-dimensional decimal data to be encrypted, the two-dimensional decimal data to be encrypted is subjected to transverse and longitudinal position transformation, the change of numerical value position is realized, then a first key matrix and a second key matrix are generated according to the data distribution characteristic value of the position transformation data to be encrypted, the position transformation data to be encrypted is encrypted by adopting the first key matrix and the second key matrix, the encrypted data is obtained, the encrypted data is converted into binary data for transmission, the two-dimensional data to be encrypted is subjected to position transformation to realize readjustment of numerical value distribution, the data distribution characteristic value is obtained on the basis, and the key matrix is constructed for encryption processing, so that the encryption process depends on the numerical value distribution condition, and the encryption security is increased.
Under the condition that the encrypted data is stolen, the stealer not only needs to construct a key matrix so as to crack the data to be encrypted by position transformation, but also needs to perform position inverse transformation to restore the positions of all the values, so that the transmission information can be accurately obtained, but the key matrix is constructed according to the neighborhood value distribution condition of all the values in the data to be encrypted by position transformation, so that the stealer cannot crack the data under the premise of not knowing the original data to be encrypted and the encryption process, and the method has high safety.
The above is only a preferred embodiment of the present invention, and is not intended to limit the present invention, but various modifications and variations can be made to the present invention by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (7)
1. The encryption method for the data communication of the Internet of vehicles is characterized by comprising the following steps of:
s1, converting binary data to be encrypted in the Internet of vehicles into decimal data to be encrypted;
s2, converting the one-dimensional decimal data to be encrypted into two-dimensional decimal data to be encrypted;
S3, carrying out horizontal and vertical position transformation on the two-dimensional decimal data to be encrypted to obtain position transformed data to be encrypted;
S4, generating a first key matrix and a second key matrix according to data distribution characteristic values of the data to be encrypted, wherein the data distribution characteristic values are obtained by taking each numerical value in the data to be encrypted in position conversion as a center, and calculating numerical value differences in the vertical and horizontal directions in the neighborhood range of the central point of each numerical value;
s5, encrypting the position conversion data to be encrypted by adopting a first key matrix and a second key matrix to obtain encrypted data;
S6, converting the encrypted data into binary system to obtain the encrypted data to be transmitted;
The step S3 comprises the following substeps:
S31, carrying out numerical value exchange on an ith row data group and an Mth-i+1th row data group in two-dimensional decimal data to be encrypted, wherein i is more than or equal to 1 and less than or equal to M/2, and i is a positive integer, so as to obtain data to be encrypted after transverse transformation;
S32, carrying out numerical value exchange on the jth row data set and the K-i+1th row data set in the transversely transformed data to be encrypted, wherein j is a positive integer and is more than or equal to 1 and less than or equal to K/2, and K is the number of longitudinal data sets to obtain position transformed data to be encrypted;
The step S4 comprises the following substeps:
s41, centering on each numerical value in the data to be encrypted by position transformation;
s42, calculating a first data distribution characteristic value at the center according to the difference between the upper side and the lower side of the numerical value in the neighborhood range at the center, and replacing with 0 when the upper side or the lower side has no numerical value;
S43, calculating a second data distribution characteristic value at the center according to the difference between the left side and the right side of the numerical value in the neighborhood range at the center, and replacing with 0 when no numerical value exists at the left side or the right side;
s44, forming a first key matrix according to the first data distribution characteristic values;
s45, forming a second key matrix according to each second data distribution characteristic value.
2. The method for encrypting data communication of internet of vehicles according to claim 1, wherein the S1 specifically comprises: and converting binary data to be encrypted in the Internet of vehicles into a decimal value according to a byte unit.
3. The method for encrypting data communication of internet of vehicles according to claim 1, wherein S2 comprises the following sub-steps:
S21, segmenting one-dimensional decimal data to be encrypted according to a fixed length N to obtain a plurality of data sets, wherein the length of each data set is N, N is a positive integer, and filling is carried out by adopting 0 when the length of the data set is insufficient;
S22, forming each data group into two-dimensional decimal data to be encrypted, Wherein a is two-dimensional decimal data to be encrypted, a 1 is a 1 st row data set, a i is an i-th row data set, a M is an M-th row data set, M is the number of transverse data sets, and i is a positive integer.
4. The encryption method for data communication of internet of vehicles according to claim 1, wherein the formula for calculating the first data distribution characteristic value at the center in S42 is:
Wherein ζ 1 is a first data distribution eigenvalue, e is a natural constant, x up is an upper numerical value in a neighborhood region at the center, x down is a lower numerical value in a neighborhood region at the center, and i is an absolute value.
5. The encryption method for data communication of internet of vehicles according to claim 1, wherein the formula for calculating the second data distribution characteristic value at the center in S43 is:
Where ζ 2 is a second data distribution eigenvalue, e is a natural constant, x right is the right-hand value in the neighborhood at the center, x left is the left-hand value in the neighborhood at the center, and i is the absolute value.
6. The method for encrypting data communication of internet of vehicles according to claim 1, wherein S5 comprises the following sub-steps:
s51, encrypting the data to be encrypted by adopting the first key matrix to perform position transformation to obtain a first encryption matrix;
S52, encrypting the position conversion data to be encrypted by adopting a second key matrix to obtain a second encryption matrix;
s53, subtracting the first encryption matrix from the first encryption matrix to obtain encrypted data.
7. The encryption method for data communication of internet of vehicles according to claim 6, wherein the encryption formula in S51 is: Wherein S 1 is a first encryption matrix, X 1 is a first key matrix, G is position-transformed data to be encrypted, Is Hadamard product;
the encryption formula in S52 is:
Wherein S 2 is a second encryption matrix, and X 2 is a second key matrix;
The subtraction formula in S53 is:
wherein Y is encrypted data.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202411223400.9A CN118741495B (en) | 2024-09-03 | 2024-09-03 | Data communication encryption method for Internet of vehicles |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202411223400.9A CN118741495B (en) | 2024-09-03 | 2024-09-03 | Data communication encryption method for Internet of vehicles |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN118741495A CN118741495A (en) | 2024-10-01 |
| CN118741495B true CN118741495B (en) | 2024-11-22 |
Family
ID=92849935
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202411223400.9A Active CN118741495B (en) | 2024-09-03 | 2024-09-03 | Data communication encryption method for Internet of vehicles |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN118741495B (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN119622783B (en) * | 2025-02-17 | 2025-05-02 | 四川职业技术学院 | Intelligent safety management system for engineering text |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108055654A (en) * | 2017-12-07 | 2018-05-18 | 锐捷网络股份有限公司 | A kind of classics bluetooth equipment authentication matching process and device |
| CN116595566A (en) * | 2023-07-17 | 2023-08-15 | 山东云天安全技术有限公司 | Data encryption system and electronic equipment |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2007159045A (en) * | 2005-12-08 | 2007-06-21 | Nagasaki Univ | Image data processing method and apparatus |
| EP2515499B1 (en) * | 2011-04-21 | 2015-10-28 | Wibu-Systems AG | Method for generating a cryptographic key for a secure digital data object on the basis of the current components of a computer |
| CN118138238B (en) * | 2024-05-10 | 2024-08-02 | 深圳市火蓝电子技术有限公司 | Data transmission system based on network memory |
-
2024
- 2024-09-03 CN CN202411223400.9A patent/CN118741495B/en active Active
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108055654A (en) * | 2017-12-07 | 2018-05-18 | 锐捷网络股份有限公司 | A kind of classics bluetooth equipment authentication matching process and device |
| CN116595566A (en) * | 2023-07-17 | 2023-08-15 | 山东云天安全技术有限公司 | Data encryption system and electronic equipment |
Also Published As
| Publication number | Publication date |
|---|---|
| CN118741495A (en) | 2024-10-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN118741495B (en) | Data communication encryption method for Internet of vehicles | |
| Cao et al. | Continuous-variable quantum secure direct communication based on Gaussian mapping | |
| CN101286837B (en) | Message encryption device and method oriented to storage area network | |
| CN113037486B (en) | An information encryption method for power distribution automation based on quantum reinforcement | |
| CN106952212B (en) | A HOG Image Feature Extraction Algorithm Based on Vector Homomorphic Encryption | |
| CN110933093A (en) | Block chain data sharing platform and method based on differential privacy protection technology | |
| CN110247767A (en) | Voidable attribute base outsourcing encryption method in mist calculating | |
| CN103780391B (en) | Hand-written electronic signature data protection method based on signature content | |
| CN103179319A (en) | Method for encrypting digital images of double-chaos system | |
| CN115426101A (en) | Data transmission method of cloud intercommunication platform | |
| CN119232488B (en) | Dynamic production management and control system and method based on data acquisition | |
| CN116915817A (en) | A lightweight zero-trust system and construction method based on channel information suitable for edge IoT environments | |
| CN107070642A (en) | Multi-brand cipher machine heterogeneous resource pond multiplexing technology | |
| CN118694864B (en) | Reversible information hiding and prediction recovery system and method for fully encrypted image | |
| CN118972038B (en) | An encryption management system and method based on communication security | |
| Liu et al. | A new image encryption scheme based on block compressive sensing and chaotic laser system for IoT | |
| CN111447174A (en) | Data encryption method based on block chain | |
| CN116170802B (en) | Internet of things communication method, system and computer readable storage medium | |
| Chen et al. | On the cryptanalysis of an image encryption algorithm with quantum chaotic map and DNA coding | |
| CN116645101B (en) | Cloud resource settlement method and system based on blockchain | |
| CN117240604A (en) | Cloud computing-based data safe storage and energy saving optimization method | |
| CN115665341A (en) | Encryption method and encryption system for image data | |
| CN115629783B (en) | Model updating method for protecting privacy and resisting abnormal data in mobile crowd sensing | |
| CN118612726B (en) | Event information encryption transmission method and system between road side unit and vehicle-mounted unit | |
| CN119921940B (en) | Multi-level data sharing fraud prevention method and system based on zero trust and blockchain |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |