[go: up one dir, main page]

CN118741495B - Data communication encryption method for Internet of vehicles - Google Patents

Data communication encryption method for Internet of vehicles Download PDF

Info

Publication number
CN118741495B
CN118741495B CN202411223400.9A CN202411223400A CN118741495B CN 118741495 B CN118741495 B CN 118741495B CN 202411223400 A CN202411223400 A CN 202411223400A CN 118741495 B CN118741495 B CN 118741495B
Authority
CN
China
Prior art keywords
data
encrypted
numerical value
encryption
center
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202411223400.9A
Other languages
Chinese (zh)
Other versions
CN118741495A (en
Inventor
周鑫
柏松
张帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yicheng Gaoke Dalian Technology Co ltd
Original Assignee
Yicheng Gaoke Dalian Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yicheng Gaoke Dalian Technology Co ltd filed Critical Yicheng Gaoke Dalian Technology Co ltd
Priority to CN202411223400.9A priority Critical patent/CN118741495B/en
Publication of CN118741495A publication Critical patent/CN118741495A/en
Application granted granted Critical
Publication of CN118741495B publication Critical patent/CN118741495B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/009Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a data communication encryption method of the Internet of vehicles, which belongs to the technical field of data communication encryption, wherein binary data to be encrypted is firstly converted into decimal data to be encrypted, then one-dimensional decimal data to be encrypted is converted into two-dimensional decimal data to be encrypted, the two-dimensional decimal data to be encrypted is subjected to transverse and longitudinal position transformation to realize the change of numerical positions, then a first key matrix and a second key matrix are generated according to the data distribution characteristic values of the data to be encrypted after the position transformation, the first key matrix and the second key matrix are adopted to encrypt the position transformed data to be encrypted to obtain encrypted data.

Description

Data communication encryption method for Internet of vehicles
Technical Field
The invention relates to the technical field of data communication encryption, in particular to a data communication encryption method of the Internet of vehicles.
Background
The internet of vehicles is an important component of an intelligent traffic system, and achieves the functions of intelligent traffic management, intelligent dynamic information service, intelligent vehicle control and the like through omnibearing connection and information exchange of vehicles and vehicles, vehicles and people, vehicles and road side facilities and vehicles and a network. With development and application of internet of vehicles technology, data security and privacy protection become a problem to be solved urgently. Since a large amount of sensitive data such as position information, vehicle speed, direction, etc. are generated and transmitted during the running of the vehicle, disclosure of such information may pose a threat to the privacy of the user and even be exploited.
In order to ensure the safety of data transmission in the Internet of vehicles, the encryption technology is an effective means for protecting the data. When the prior encryption technology encrypts data to be transmitted, a random sequence is adopted to encrypt the data to be transmitted to obtain encrypted data, and the problems of short key length and low safety exist.
Disclosure of Invention
Aiming at the defects in the prior art, the data communication encryption method of the Internet of vehicles solves the problems of short key length and low safety in the prior art.
In order to achieve the aim of the invention, the invention adopts the following technical scheme: a data communication encryption method of the Internet of vehicles comprises the following steps:
s1, converting binary data to be encrypted in the Internet of vehicles into decimal data to be encrypted;
s2, converting the one-dimensional decimal data to be encrypted into two-dimensional decimal data to be encrypted;
S3, carrying out horizontal and vertical position transformation on the two-dimensional decimal data to be encrypted to obtain position transformed data to be encrypted;
S4, generating a first key matrix and a second key matrix according to the data distribution characteristic value of the data to be encrypted by position transformation;
s5, encrypting the position conversion data to be encrypted by adopting a first key matrix and a second key matrix to obtain encrypted data;
S6, converting the encrypted data into binary system to obtain the encrypted data to be transmitted.
Further, the S1 specifically is: and converting binary data to be encrypted in the Internet of vehicles into a decimal value according to a byte unit.
Further, the step S2 includes the following sub-steps:
S21, segmenting one-dimensional decimal data to be encrypted according to a fixed length N to obtain a plurality of data sets, wherein the length of each data set is N, N is a positive integer, and filling is carried out by adopting 0 when the length of the data set is insufficient;
S22, forming each data group into two-dimensional decimal data to be encrypted, Wherein a is two-dimensional decimal data to be encrypted, a 1 is a 1 st row data set, a i is an i-th row data set, a M is an M-th row data set, M is the number of transverse data sets, and i is a positive integer.
Further, the step S3 includes the following sub-steps:
S31, carrying out numerical value exchange on an ith row data group and an Mth-i+1th row data group in two-dimensional decimal data to be encrypted, wherein i is more than or equal to 1 and less than or equal to M/2, and i is a positive integer, so as to obtain data to be encrypted after transverse transformation;
S32, carrying out numerical value exchange on the jth row data set and the K-i+1th row data set in the transversely transformed data to be encrypted, wherein j is more than or equal to 1 and less than or equal to K/2, j is a positive integer, and K is the number of the longitudinal data sets, so as to obtain the position transformed data to be encrypted.
Further, the step S4 includes the following sub-steps:
s41, centering on each numerical value in the data to be encrypted by position transformation;
s42, calculating a first data distribution characteristic value at the center according to the difference between the upper side and the lower side of the numerical value in the neighborhood range at the center, and replacing with 0 when the upper side or the lower side has no numerical value;
S43, calculating a second data distribution characteristic value at the center according to the difference between the left side and the right side of the numerical value in the neighborhood range at the center, and replacing with 0 when no numerical value exists at the left side or the right side;
s44, forming a first key matrix according to the first data distribution characteristic values;
s45, forming a second key matrix according to each second data distribution characteristic value.
Further, the formula for calculating the first data distribution characteristic value at the center in S42 is as follows:
Wherein ζ 1 is a first data distribution eigenvalue, e is a natural constant, x up is an upper numerical value in a neighborhood region at the center, x down is a lower numerical value in a neighborhood region at the center, and i is an absolute value.
Further, the formula for calculating the second data distribution characteristic value at the center in S43 is:
Where ζ 2 is a second data distribution eigenvalue, e is a natural constant, x right is the right-hand value in the neighborhood at the center, x left is the left-hand value in the neighborhood at the center, and i is the absolute value.
Further, the step S5 includes the following sub-steps:
s51, encrypting the data to be encrypted by adopting the first key matrix to perform position transformation to obtain a first encryption matrix;
S52, encrypting the position conversion data to be encrypted by adopting a second key matrix to obtain a second encryption matrix;
s53, subtracting the first encryption matrix from the first encryption matrix to obtain encrypted data.
Further, the encryption formula in S51 is: Wherein S 1 is a first encryption matrix, X 1 is a first key matrix, G is position-transformed data to be encrypted, Is Hadamard product;
the encryption formula in S52 is: Wherein S 2 is a second encryption matrix, and X 2 is a second key matrix;
The subtraction formula in S53 is: wherein Y is encrypted data.
In summary, the invention has the following beneficial effects:
1. The invention firstly converts binary data to be encrypted into decimal data to be encrypted, the encryption process is carried out on decimal, the encryption security is increased, then one-dimensional decimal data to be encrypted is converted into two-dimensional decimal data to be encrypted, the two-dimensional decimal data to be encrypted is subjected to transverse and longitudinal position transformation, the change of numerical value position is realized, then a first key matrix and a second key matrix are generated according to the data distribution characteristic value of the position transformation data to be encrypted, the position transformation data to be encrypted is encrypted by adopting the first key matrix and the second key matrix, the encrypted data is obtained, the encrypted data is converted into binary data for transmission, the two-dimensional data to be encrypted is subjected to position transformation to realize readjustment of numerical value distribution, the data distribution characteristic value is obtained on the basis, and the key matrix is constructed for encryption processing, so that the encryption process depends on the numerical value distribution condition, and the encryption security is increased.
2. Under the condition that the encrypted data is stolen, the stealer not only needs to construct a key matrix so as to crack the data to be encrypted by position transformation, but also needs to perform position inverse transformation to restore the positions of all the values, so that the transmission information can be accurately obtained, but the key matrix is constructed according to the neighborhood value distribution condition of all the values in the data to be encrypted by position transformation, so that the stealer cannot crack the data under the premise of not knowing the original data to be encrypted and the encryption process, and the method has high safety.
Drawings
Fig. 1 is a flowchart of a data communication encryption method of the internet of vehicles.
Detailed Description
The following description of the embodiments of the present invention is provided to facilitate understanding of the present invention by those skilled in the art, but it should be understood that the present invention is not limited to the scope of the embodiments, and all the inventions which make use of the inventive concept are protected by the spirit and scope of the present invention as defined and defined in the appended claims to those skilled in the art.
As shown in fig. 1, a data communication encryption method of the internet of vehicles comprises the following steps:
s1, converting binary data to be encrypted in the Internet of vehicles into decimal data to be encrypted;
s2, converting the one-dimensional decimal data to be encrypted into two-dimensional decimal data to be encrypted;
S3, carrying out horizontal and vertical position transformation on the two-dimensional decimal data to be encrypted to obtain position transformed data to be encrypted;
S4, generating a first key matrix and a second key matrix according to the data distribution characteristic value of the data to be encrypted by position transformation;
s5, encrypting the position conversion data to be encrypted by adopting a first key matrix and a second key matrix to obtain encrypted data;
S6, converting the encrypted data into binary system to obtain the encrypted data to be transmitted.
The S1 specifically comprises the following steps: and converting binary data to be encrypted in the Internet of vehicles into a decimal value according to a byte unit.
The step S2 comprises the following sub-steps:
S21, segmenting one-dimensional decimal data to be encrypted according to a fixed length N to obtain a plurality of data sets, wherein the length of each data set is N, N is a positive integer, and filling is carried out by adopting 0 when the length of the data set is insufficient;
S22, forming each data group into two-dimensional decimal data to be encrypted, Wherein a is two-dimensional decimal data to be encrypted, a 1 is a 1 st row data set, a i is an i-th row data set, a M is an M-th row data set, M is the number of transverse data sets, and i is a positive integer.
In this embodiment, N is 7, i.e., 7 values are divided into one group.
The step S3 comprises the following substeps:
S31, carrying out numerical value exchange on an ith row data group and an Mth-i+1th row data group in two-dimensional decimal data to be encrypted, wherein i is more than or equal to 1 and less than or equal to M/2, and i is a positive integer, so as to obtain data to be encrypted after transverse transformation;
S32, carrying out numerical value exchange on the jth row data set and the K-i+1th row data set in the transversely transformed data to be encrypted, wherein j is more than or equal to 1 and less than or equal to K/2, j is a positive integer, and K is the number of the longitudinal data sets, so as to obtain the position transformed data to be encrypted.
In the invention, the jth column data group is formed by all values in the jth column in the data to be encrypted after transverse transformation.
The invention firstly carries out numerical value exchange on the ith row data group and the Mth-i+1 row data group through S31, namely the ith row data group is exchanged to the Mth-i+1 row, the Mth-i+1 row data group is exchanged to the ith row, then carries out numerical value exchange on the two-dimensional data exchanged through S31 through S32, namely the jth column data group is exchanged to the Kth-i+1 column, and the Kth-i+1 column data group is exchanged to the jth column, thereby realizing the disturbance of transmission information.
The step S4 comprises the following substeps:
s41, centering on each numerical value in the data to be encrypted by position transformation;
s42, calculating a first data distribution characteristic value at the center according to the difference between the upper side and the lower side of the numerical value in the neighborhood range at the center, and replacing with 0 when the upper side or the lower side has no numerical value;
S43, calculating a second data distribution characteristic value at the center according to the difference between the left side and the right side of the numerical value in the neighborhood range at the center, and replacing with 0 when no numerical value exists at the left side or the right side;
s44, forming a first key matrix according to the first data distribution characteristic values;
s45, forming a second key matrix according to each second data distribution characteristic value.
The formula for calculating the first data distribution characteristic value at the center in S42 is as follows:
Wherein ζ 1 is a first data distribution eigenvalue, e is a natural constant, x up is an upper numerical value in a neighborhood region at the center, x down is a lower numerical value in a neighborhood region at the center, and i is an absolute value.
The formula for calculating the second data distribution characteristic value at the center in S43 is as follows:
Where ζ 2 is a second data distribution eigenvalue, e is a natural constant, x right is the right-hand value in the neighborhood at the center, x left is the left-hand value in the neighborhood at the center, and i is the absolute value.
The invention takes each numerical value in the data to be encrypted by position transformation as a center, calculates a first data distribution characteristic value at the center by taking the difference between the upper side numerical value and the lower side numerical value in the neighborhood range at the center, and calculates a second data distribution characteristic value at the center according to the difference between the left side numerical value and the right side numerical value, wherein the first data distribution characteristic value and the second data distribution characteristic value are closely related to the arrangement of the data to be encrypted by position transformation, so that the first key matrix and the second key matrix are difficult to crack under the condition that the construction process of the two-dimensional data of the invention cannot be known.
In this embodiment, the first data distribution feature value at each center replaces the value at the center to form a first key matrix, and the second data distribution feature value at each center replaces the value at the center to form a second key matrix.
In the present invention, the neighborhood range refers to a range in contact with the center.
The step S5 comprises the following substeps:
s51, encrypting the data to be encrypted by adopting the first key matrix to perform position transformation to obtain a first encryption matrix;
S52, encrypting the position conversion data to be encrypted by adopting a second key matrix to obtain a second encryption matrix;
s53, subtracting the first encryption matrix from the first encryption matrix to obtain encrypted data.
The encryption formula in S51 is: Wherein S 1 is a first encryption matrix, X 1 is a first key matrix, G is position-transformed data to be encrypted, Is Hadamard product;
the encryption formula in S52 is: Wherein S 2 is a second encryption matrix, and X 2 is a second key matrix;
The subtraction formula in S53 is: wherein Y is encrypted data.
The method comprises the steps of carrying out Hadamard product operation on first key matrix and position transformation data to be encrypted to obtain a first encryption matrix, carrying out Hadamard product operation on second key matrix and position transformation data to be encrypted to obtain a second encryption matrix, and subtracting the first encryption matrix and the first encryption matrix to obtain encrypted data, so that the encryption process of the encrypted data is integrated with the numerical value distribution condition of the upper side, the lower side, the left side and the right side, and encryption precision is improved.
The invention firstly converts binary data to be encrypted into decimal data to be encrypted, the encryption process is carried out on decimal, the encryption security is increased, then one-dimensional decimal data to be encrypted is converted into two-dimensional decimal data to be encrypted, the two-dimensional decimal data to be encrypted is subjected to transverse and longitudinal position transformation, the change of numerical value position is realized, then a first key matrix and a second key matrix are generated according to the data distribution characteristic value of the position transformation data to be encrypted, the position transformation data to be encrypted is encrypted by adopting the first key matrix and the second key matrix, the encrypted data is obtained, the encrypted data is converted into binary data for transmission, the two-dimensional data to be encrypted is subjected to position transformation to realize readjustment of numerical value distribution, the data distribution characteristic value is obtained on the basis, and the key matrix is constructed for encryption processing, so that the encryption process depends on the numerical value distribution condition, and the encryption security is increased.
Under the condition that the encrypted data is stolen, the stealer not only needs to construct a key matrix so as to crack the data to be encrypted by position transformation, but also needs to perform position inverse transformation to restore the positions of all the values, so that the transmission information can be accurately obtained, but the key matrix is constructed according to the neighborhood value distribution condition of all the values in the data to be encrypted by position transformation, so that the stealer cannot crack the data under the premise of not knowing the original data to be encrypted and the encryption process, and the method has high safety.
The above is only a preferred embodiment of the present invention, and is not intended to limit the present invention, but various modifications and variations can be made to the present invention by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (7)

1. The encryption method for the data communication of the Internet of vehicles is characterized by comprising the following steps of:
s1, converting binary data to be encrypted in the Internet of vehicles into decimal data to be encrypted;
s2, converting the one-dimensional decimal data to be encrypted into two-dimensional decimal data to be encrypted;
S3, carrying out horizontal and vertical position transformation on the two-dimensional decimal data to be encrypted to obtain position transformed data to be encrypted;
S4, generating a first key matrix and a second key matrix according to data distribution characteristic values of the data to be encrypted, wherein the data distribution characteristic values are obtained by taking each numerical value in the data to be encrypted in position conversion as a center, and calculating numerical value differences in the vertical and horizontal directions in the neighborhood range of the central point of each numerical value;
s5, encrypting the position conversion data to be encrypted by adopting a first key matrix and a second key matrix to obtain encrypted data;
S6, converting the encrypted data into binary system to obtain the encrypted data to be transmitted;
The step S3 comprises the following substeps:
S31, carrying out numerical value exchange on an ith row data group and an Mth-i+1th row data group in two-dimensional decimal data to be encrypted, wherein i is more than or equal to 1 and less than or equal to M/2, and i is a positive integer, so as to obtain data to be encrypted after transverse transformation;
S32, carrying out numerical value exchange on the jth row data set and the K-i+1th row data set in the transversely transformed data to be encrypted, wherein j is a positive integer and is more than or equal to 1 and less than or equal to K/2, and K is the number of longitudinal data sets to obtain position transformed data to be encrypted;
The step S4 comprises the following substeps:
s41, centering on each numerical value in the data to be encrypted by position transformation;
s42, calculating a first data distribution characteristic value at the center according to the difference between the upper side and the lower side of the numerical value in the neighborhood range at the center, and replacing with 0 when the upper side or the lower side has no numerical value;
S43, calculating a second data distribution characteristic value at the center according to the difference between the left side and the right side of the numerical value in the neighborhood range at the center, and replacing with 0 when no numerical value exists at the left side or the right side;
s44, forming a first key matrix according to the first data distribution characteristic values;
s45, forming a second key matrix according to each second data distribution characteristic value.
2. The method for encrypting data communication of internet of vehicles according to claim 1, wherein the S1 specifically comprises: and converting binary data to be encrypted in the Internet of vehicles into a decimal value according to a byte unit.
3. The method for encrypting data communication of internet of vehicles according to claim 1, wherein S2 comprises the following sub-steps:
S21, segmenting one-dimensional decimal data to be encrypted according to a fixed length N to obtain a plurality of data sets, wherein the length of each data set is N, N is a positive integer, and filling is carried out by adopting 0 when the length of the data set is insufficient;
S22, forming each data group into two-dimensional decimal data to be encrypted, Wherein a is two-dimensional decimal data to be encrypted, a 1 is a 1 st row data set, a i is an i-th row data set, a M is an M-th row data set, M is the number of transverse data sets, and i is a positive integer.
4. The encryption method for data communication of internet of vehicles according to claim 1, wherein the formula for calculating the first data distribution characteristic value at the center in S42 is:
Wherein ζ 1 is a first data distribution eigenvalue, e is a natural constant, x up is an upper numerical value in a neighborhood region at the center, x down is a lower numerical value in a neighborhood region at the center, and i is an absolute value.
5. The encryption method for data communication of internet of vehicles according to claim 1, wherein the formula for calculating the second data distribution characteristic value at the center in S43 is:
Where ζ 2 is a second data distribution eigenvalue, e is a natural constant, x right is the right-hand value in the neighborhood at the center, x left is the left-hand value in the neighborhood at the center, and i is the absolute value.
6. The method for encrypting data communication of internet of vehicles according to claim 1, wherein S5 comprises the following sub-steps:
s51, encrypting the data to be encrypted by adopting the first key matrix to perform position transformation to obtain a first encryption matrix;
S52, encrypting the position conversion data to be encrypted by adopting a second key matrix to obtain a second encryption matrix;
s53, subtracting the first encryption matrix from the first encryption matrix to obtain encrypted data.
7. The encryption method for data communication of internet of vehicles according to claim 6, wherein the encryption formula in S51 is: Wherein S 1 is a first encryption matrix, X 1 is a first key matrix, G is position-transformed data to be encrypted, Is Hadamard product;
the encryption formula in S52 is:
Wherein S 2 is a second encryption matrix, and X 2 is a second key matrix;
The subtraction formula in S53 is:
wherein Y is encrypted data.
CN202411223400.9A 2024-09-03 2024-09-03 Data communication encryption method for Internet of vehicles Active CN118741495B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202411223400.9A CN118741495B (en) 2024-09-03 2024-09-03 Data communication encryption method for Internet of vehicles

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202411223400.9A CN118741495B (en) 2024-09-03 2024-09-03 Data communication encryption method for Internet of vehicles

Publications (2)

Publication Number Publication Date
CN118741495A CN118741495A (en) 2024-10-01
CN118741495B true CN118741495B (en) 2024-11-22

Family

ID=92849935

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202411223400.9A Active CN118741495B (en) 2024-09-03 2024-09-03 Data communication encryption method for Internet of vehicles

Country Status (1)

Country Link
CN (1) CN118741495B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN119622783B (en) * 2025-02-17 2025-05-02 四川职业技术学院 Intelligent safety management system for engineering text

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108055654A (en) * 2017-12-07 2018-05-18 锐捷网络股份有限公司 A kind of classics bluetooth equipment authentication matching process and device
CN116595566A (en) * 2023-07-17 2023-08-15 山东云天安全技术有限公司 Data encryption system and electronic equipment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007159045A (en) * 2005-12-08 2007-06-21 Nagasaki Univ Image data processing method and apparatus
EP2515499B1 (en) * 2011-04-21 2015-10-28 Wibu-Systems AG Method for generating a cryptographic key for a secure digital data object on the basis of the current components of a computer
CN118138238B (en) * 2024-05-10 2024-08-02 深圳市火蓝电子技术有限公司 Data transmission system based on network memory

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108055654A (en) * 2017-12-07 2018-05-18 锐捷网络股份有限公司 A kind of classics bluetooth equipment authentication matching process and device
CN116595566A (en) * 2023-07-17 2023-08-15 山东云天安全技术有限公司 Data encryption system and electronic equipment

Also Published As

Publication number Publication date
CN118741495A (en) 2024-10-01

Similar Documents

Publication Publication Date Title
CN118741495B (en) Data communication encryption method for Internet of vehicles
Cao et al. Continuous-variable quantum secure direct communication based on Gaussian mapping
CN101286837B (en) Message encryption device and method oriented to storage area network
CN113037486B (en) An information encryption method for power distribution automation based on quantum reinforcement
CN106952212B (en) A HOG Image Feature Extraction Algorithm Based on Vector Homomorphic Encryption
CN110933093A (en) Block chain data sharing platform and method based on differential privacy protection technology
CN110247767A (en) Voidable attribute base outsourcing encryption method in mist calculating
CN103780391B (en) Hand-written electronic signature data protection method based on signature content
CN103179319A (en) Method for encrypting digital images of double-chaos system
CN115426101A (en) Data transmission method of cloud intercommunication platform
CN119232488B (en) Dynamic production management and control system and method based on data acquisition
CN116915817A (en) A lightweight zero-trust system and construction method based on channel information suitable for edge IoT environments
CN107070642A (en) Multi-brand cipher machine heterogeneous resource pond multiplexing technology
CN118694864B (en) Reversible information hiding and prediction recovery system and method for fully encrypted image
CN118972038B (en) An encryption management system and method based on communication security
Liu et al. A new image encryption scheme based on block compressive sensing and chaotic laser system for IoT
CN111447174A (en) Data encryption method based on block chain
CN116170802B (en) Internet of things communication method, system and computer readable storage medium
Chen et al. On the cryptanalysis of an image encryption algorithm with quantum chaotic map and DNA coding
CN116645101B (en) Cloud resource settlement method and system based on blockchain
CN117240604A (en) Cloud computing-based data safe storage and energy saving optimization method
CN115665341A (en) Encryption method and encryption system for image data
CN115629783B (en) Model updating method for protecting privacy and resisting abnormal data in mobile crowd sensing
CN118612726B (en) Event information encryption transmission method and system between road side unit and vehicle-mounted unit
CN119921940B (en) Multi-level data sharing fraud prevention method and system based on zero trust and blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant