Nothing Special   »   [go: up one dir, main page]

CN116761167B - Data encryption transmission method, system, electronic equipment and storage medium - Google Patents

Data encryption transmission method, system, electronic equipment and storage medium Download PDF

Info

Publication number
CN116761167B
CN116761167B CN202311053480.3A CN202311053480A CN116761167B CN 116761167 B CN116761167 B CN 116761167B CN 202311053480 A CN202311053480 A CN 202311053480A CN 116761167 B CN116761167 B CN 116761167B
Authority
CN
China
Prior art keywords
terminal
key
array
data
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311053480.3A
Other languages
Chinese (zh)
Other versions
CN116761167A (en
Inventor
徐天睿
王涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Lingchuang Yigu Technology Development Co ltd
Original Assignee
Beijing Lingchuang Yigu Technology Development Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Lingchuang Yigu Technology Development Co ltd filed Critical Beijing Lingchuang Yigu Technology Development Co ltd
Priority to CN202311053480.3A priority Critical patent/CN116761167B/en
Publication of CN116761167A publication Critical patent/CN116761167A/en
Application granted granted Critical
Publication of CN116761167B publication Critical patent/CN116761167B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0433Key management protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/71Hardware identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application relates to a data encryption transmission method, a system, electronic equipment and a storage medium, which belong to the technical field of data encryption transmission. Acquiring identity verification information sent by a second terminal; when the identity verification information is determined, the second terminal is marked as a target terminal; randomly generating a first array, and generating a first key according to the first array; receiving a second array sent by a target terminal, and generating a second key according to the second array; according to the first key and the second key, a communication key is generated, and the first terminal and the target terminal encrypt the transmitted data by adopting the communication key, so that the application has the effect of improving the safety of data transmission when the first terminal and the second terminal adopt Bluetooth communication.

Description

Data encryption transmission method, system, electronic equipment and storage medium
Technical Field
The present application relates to the field of data encryption transmission technologies, and in particular, to a data encryption transmission method, system, electronic device, and storage medium.
Background
The Bluetooth communication has the advantages of wide coverage, high signal strength, high transmission rate and the like, but communication signals of the Bluetooth communication also have the risks of being monitored, data being stolen and the like, so that the Bluetooth communication is difficult to apply to financial under-line scenes with extremely high security requirements, such as environments of payment, transfer, bill checking and the like.
In order to ensure the safety of Bluetooth communication, currently adopted encryption means comprise two modes of manual connection and automatic connection. The manual connection means that before two devices communicating by using bluetooth communicate, the two devices need to manually input passwords, values or out-of-band data of a BLE protocol stack agreed in advance to perform identity verification. When the identity authentication is performed through the self-carried password of the BLE protocol stack, the adopted password is generally fixed, is easily cracked by network hackers, and has low security. In addition, when the authentication is performed by adopting the encryption mode of the self-carried password, the numerical comparison and the out-of-band data of the BLE protocol stack, the requirements are met on the equipment of the two parties, such as whether the input (such as a key or touch) can be supported or not, because the input equipment is needed to input the authenticated data; and whether there is output (such as a screen) etc., and different BLE protocol versions are required for different authentication modes. In general, three means in the manual connection mode are all used for pairing the devices of the two parties, and the devices can be directly connected after the first connection, so that secret transmission of data is not really realized.
The automatic connection is an intelligent encryption mode adopted when two parties are in communication, as disclosed in patent application No. CN106817220A, the method mainly comprises the steps of randomly generating a plurality of random numbers, generating a first secret key according to the plurality of random numbers, and encrypting the first secret key to obtain a final communication secret key. Since the encryption process is performed only in the encryption device, when the encryption device is attacked, leakage of the resulting communication key may be caused. In another example, a patent application with a patent number of CN113067699B provides a data sharing method based on a quantum key, where the method is mainly based on authenticating the quantum key to perform identity authentication, and when the identity authentication passes, target storage ciphertext data obtained by encrypting target data with the storage quantum key is obtained, ciphertext conversion is performed on the target storage ciphertext data with a transmission quantum key corresponding to the terminal, and the obtained transmission ciphertext data is sent to the terminal, so that the terminal decrypts the transmission ciphertext data according to the transmission quantum key to obtain the target data. The encryption process also comprises ciphertext conversion, and for complex key conversion, the problems of more flow and long time consumption may exist.
Therefore, the existing Bluetooth communication encryption method is difficult to ensure the safety of data during data transmission.
Disclosure of Invention
The application provides a data encryption transmission method, a system, electronic equipment and a storage medium, which have the characteristic of improving the safety of data transmission when Bluetooth communication is adopted.
The application aims at providing a data encryption transmission method.
The first object of the present application is achieved by the following technical solutions:
a data encryption transmission method is applied to a first terminal and comprises the following steps:
acquiring identity verification information sent by a second terminal;
when the identity verification information is determined, the second terminal is marked as a target terminal;
randomly generating a first array, and generating a first key according to the first array;
receiving a second array sent by a target terminal, and generating a second key according to the second array;
and generating a communication key according to the first key and the second key.
By adopting the technical scheme, before the first terminal and the target terminal perform data interaction, the first terminal verifies the identity verification information sent by the plurality of second terminals, and then the target terminal is determined from the plurality of second terminals according to the identity verification information. Then, the first terminal performs information transmission with the target terminal: generating a first key according to a first array randomly generated by the terminal, generating a second key according to a second array randomly generated by the target terminal, and finally combining the first key and the second key to obtain a communication key. Therefore, when the first terminal and the target terminal perform data interaction, the communication key can be adopted to encrypt the transmitted data, and the communication key is formed by combining the first key and the second key, so that the purpose of replacing the communication key in real time or periodically replacing the communication key can be achieved, and the safety of the data when the first terminal and the target terminal perform data interaction is improved.
The present application may be further configured in a preferred example to: the determining the authentication information includes:
analyzing the identity verification information to obtain a first random value and a device code;
and when the equipment code is determined to be consistent with the code of the first terminal, determining the identity verification information.
By adopting the technical scheme, whether the equipment codes in the authentication information are consistent with the codes of the first terminal or not is verified, and the authentication information is determined only when the equipment codes are consistent with the codes of the first terminal. Therefore, the network bandwidth of the first terminal can be reduced from being maliciously occupied by the second terminal.
The present application may be further configured in a preferred example to: the generating a first key from the first array includes:
the first array comprises a byte index group and a byte value group, wherein the byte index group consists of m serial numbers, and the byte value group consists of m random numbers, wherein m is N * And m is more than or equal to 8, one random number corresponding to one serial number is unique, and the serial number and the random number corresponding to the serial number are used as a data pair;
extracting p serial numbers from the byte index group by adopting an extraction model, searching corresponding actual byte values for each extracted serial number, wherein the actual byte values are random numbers in the byte value group, and p is E N * And p is more than or equal to 2 and less than or equal to m;
and carrying out sequencing combination on the p actual byte values by adopting a sequencing model to obtain a first key.
The present application may be further configured in a preferred example to: the calling relation between the byte index group and the byte numerical value group is as follows:
determining an initial data pair, taking a serial number in the initial data pair as an initial serial number, and taking a random number in the initial data pair as an initial random number, wherein the initial data pair is any one of the data pairs;
querying the target sequence number according to the initial random number, including: taking the serial number with the same size as the initial random number as a target serial number;
locating a target random number according to the target sequence number, wherein the target sequence number and the target random number are positioned in the same data pair; the target random number is taken as the actual byte value of the initial sequence number.
The present application may be further configured in a preferred example to: the extraction method of the extraction model comprises the following steps: the extraction is performed continuously or at equal intervals.
By adopting the technical scheme, the calling relation of the byte index group and the byte numerical value group, the parameters of the extraction model and the parameters of the ordering model are configured in the first terminal, so that when the first array is generated, the first secret key can be generated from the first array according to the calling relation of the byte index group and the byte numerical value group, the parameters of the extraction model and the parameters of the ordering model.
The present application may be further configured in a preferred example to: before the authentication information sent by the second terminal is acquired, the method further comprises the steps of:
broadcasting a Bluetooth broadcasting packet;
and establishing a connection channel between the second terminal and the first terminal, wherein the second terminal returns a connection request instruction after receiving the Bluetooth broadcast packet.
By adopting the technical scheme, the first terminal determines a plurality of second terminals connected with the first terminal in a mode of broadcasting Bluetooth broadcast packets, so that technical support is provided for determining a target terminal from the plurality of second terminals.
The application also provides a data encryption transmission method applied to the second terminal, which comprises the following steps:
after sending the request connection instruction, sending identity verification information;
receiving a first array returned by a first terminal after the identity verification information is determined, and generating a first key according to the first array;
randomly generating a second array comprising a byte index set consisting of N sequence numbers and a byte value set consisting of N random numbers, wherein N e N * And n isMore than or equal to 8, wherein one random number corresponding to one serial number is unique, and the serial number and the random number corresponding to the serial number are used as a data pair; extracting q serial numbers from the byte index group by adopting an extraction model, searching a corresponding actual byte value for each extracted serial number, wherein the actual byte value is a random number in the byte value group, and q is E N * Q is more than or equal to 2 and is less than or equal to n; adopting a sequencing model to sequence and combine q actual byte values to obtain a second key;
and generating a communication key according to the first key and the second key.
By adopting the technical scheme, before the second terminal and the first terminal carry out data interaction, the second terminal firstly sends the authentication information, then the first terminal verifies the authentication information sent by the plurality of second terminals, and then the target terminal is determined from the plurality of second terminals according to the authentication information. Then, the second terminal performs information transmission with the first terminal: generating a second key according to a second array randomly generated by the first terminal, generating a first key according to a first array randomly generated by the first terminal, and finally combining the first key and the second key to obtain a communication key. Therefore, when the second terminal and the first terminal perform data interaction, the communication key can be adopted to encrypt the transmitted data, and the communication key is formed by combining the first key and the second key, so that the purpose of replacing the communication key in real time or periodically replacing the communication key can be realized, and the data security of the first terminal and the first terminal during data interaction is improved.
The application also aims to provide a data encryption transmission system.
The second object of the present application is achieved by the following technical solutions:
a data encryption transmission system comprises a first terminal and a plurality of second terminals, wherein the first terminal is used for executing any data encryption transmission method applied to the first terminal, and any one of the plurality of second terminals is used for executing a data encryption transmission method applied to the second terminal.
The application aims at providing an electronic device.
The third object of the present application is achieved by the following technical solutions:
an electronic device comprising a memory and a processor, the memory having stored thereon a computer program, the processor implementing any one of the above described data encryption transmission methods when executing the program.
A fourth object of the present application is to provide a computer-readable storage medium capable of storing a corresponding program.
The fourth object of the present application is achieved by the following technical solutions:
a computer readable storage medium having stored thereon a computer program which when executed by a processor implements any of the data encryption transmission methods described above.
In summary, the present application includes at least one of the following beneficial technical effects:
before data interaction is carried out between a first terminal and a target terminal, the first terminal firstly verifies the identity verification information sent by a plurality of second terminals, and then determines the target terminal from the plurality of second terminals according to the identity verification information so as to reduce the malicious occupation of the second terminals on the network bandwidth of the first terminal;
in the process of information transmission with a target terminal, the first terminal of the application: generating a first key according to a first array randomly generated by the target terminal, generating a second key according to a second array randomly generated by the target terminal, and finally combining the first key and the second key to obtain a communication key; similarly, the second terminal performs information transmission with the first terminal: generating a second key according to a second array randomly generated by the first terminal, generating a first key according to a first array randomly generated by the first terminal, and finally combining the first key and the second key to obtain a communication key. When the first terminal and the target terminal perform data interaction, the communication key is adopted to encrypt the transmitted data, and the communication key is formed by combining the first key and the second key, so that the purpose of replacing the communication key in real time or periodically replacing the communication key can be achieved, and the safety of the data when the first terminal and the target terminal perform data interaction is improved.
Drawings
FIG. 1 is a schematic diagram of an exemplary operating environment for an embodiment of the present application.
Fig. 2 is a flowchart of a data encryption transmission method according to an embodiment of the present application.
FIG. 3 is an exemplary diagram of a call relationship between a byte index set and a byte value set of a first array in an embodiment of the method of the present application.
Fig. 4 is a block diagram of a first terminal in an embodiment of the system of the present application.
Fig. 5 is a block diagram of a second terminal in an embodiment of the system of the present application.
Reference numerals illustrate: 100. a first terminal; 101. a first acquisition module; 102. a first determination module; 103. a first processing module; 104. a first computing module; 105. a first generation module; 200. a second terminal; 201. a second transmitting module; 202. a second processing module; 203. a second computing module; 204. and a second generation module.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments of the present application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
FIG. 1 is a schematic diagram of an exemplary operating environment for an embodiment of the present application. Referring to fig. 1, the operation environment includes a first terminal 100 and a plurality of second terminals 200, and wireless communication connection may be performed between the first terminal 100 and each of the second terminals 200 by using bluetooth, wifi, zigBee, or the like, and wired communication connection may be further used, such as ethernet.
In a specific example, the first terminal 100 may be a server, and the second terminal 200 may be an intelligent terminal, such as a mobile phone, a tablet, a computer, etc., that performs data interaction with the server. Of course, in other examples, the first terminal 100 and the second terminal 200 may also be the same kind of intelligent terminal or different kinds of intelligent terminals, for example, the first terminal 100 and the second terminal 200 may be computers or tablet computers, or the first terminal 100 may be a computer and the second terminal 200 may be a tablet computer, etc., and the present application is not limited to the first terminal 100 and the second terminal 200, so as to enable data transmission therebetween.
In order to improve the security of data transmitted by the first terminal 100 and the second terminal 200 during communication, the present application proposes a data encryption transmission method, which is described by taking wireless communication between the first terminal 100 and the second terminal 200 by using bluetooth technology as an example. Referring to fig. 2, the main flow of the data encryption transmission method is described as follows.
Step S1: the first terminal 100 establishes a connection channel with a target terminal, which is one of the plurality of second terminals 200.
First, the first terminal 100 and the plurality of second terminals 200 agree on an authentication Key in advance, where the authentication Key includes a primary Key0 and a secondary Key1, and both parties having the authentication Key may encrypt the transmitted authentication information by using the authentication Key, or decrypt the received authentication information by using the authentication Key, where the authentication information is information for authenticating the identity of both party devices, and is information transmitted before the both party devices perform formal data interaction. In this example, the authentication information includes a bluetooth broadcast packet, a request connection instruction, and authentication information. The application is discussed below with respect to bluetooth broadcast packets, request connection instructions, and authentication information.
Before the first terminal 100 and the second terminals 200 perform data interaction, bluetooth broadcast packets are broadcast by the first terminal 100 to the plurality of second terminals 200. The specific broadcasting process is as follows: first, a set of data is randomly generated by a random number generator provided in the first terminal 100, then the first terminal 100 encrypts the set of data into a ciphertext by using a primary Key0, the ciphertext is put into manufacturer data of the first terminal 100 to generate a bluetooth broadcast packet, and then the bluetooth broadcast packet is respectively transmitted to each second terminal 200 by broadcasting. When the first terminal 100 broadcasts the bluetooth broadcast packet, a real-time broadcast method, a periodic broadcast method, or a random broadcast method may be used, and which broadcast method is specifically used may be set as needed.
The manufacturer data is configured when the first terminal 100 leaves the factory, and mainly includes basic information such as a device code, a source, a manufacturer, and the like of the first terminal 100.
After receiving the bluetooth broadcast packet, the plurality of second terminals 200 may return a connection request command to the first terminal 100 if there is a need for data interaction with the first terminal 100, and the first terminal 100 recognizes the connection request command and determines whether to establish a connection with the second terminal 200. In this example, the first terminal 100 may support a request connection instruction in a text format, such as a text in which the request connection instruction is "request connection"; the first terminal 100 also supports a request connection instruction in an audio format, such as a voice of "request connection" for the request connection instruction; the first terminal 100 also supports a connection request instruction in a picture format, for example, the connection request instruction is a picture including one or more keywords such as "Join", "connect", and the like. In practical applications, an adaptive identification manner may be selected for the first terminal 100 according to needs, which is not limited by the present application.
When the first terminal 100 receives the connection request instruction and confirms that the connection request instruction includes the content that the second terminal 200 needs to perform data interaction with the first terminal 100, a connection channel with the second terminal 200 is set up. For example, the first terminal 100 only supports a connection request instruction in a text format, where the second terminal a returns a text of "connection request", the second terminal b returns a text of "connection discard", and the second terminal c returns a voice of "connection request", where the connection request instruction sent by the second terminal a includes a content that the second terminal a needs to perform data interaction with the first terminal 100, and the first terminal 100 establishes a connection channel with the second terminal a, where the second terminal b and the second terminal c do not successfully establish a connection channel with the first terminal 100. As can be seen from the above, the present application can prevent the second terminal 200, which does not have the data interaction requirement with the first terminal 100, from maliciously occupying the network bandwidth of the first terminal 100.
On the first terminal 100, for the second terminal 200 that has established a connection path with the first terminal 100, the first terminal 100 adjusts the state of the connection path to a ready state. In the state that the connection channel belongs to the ready state, the corresponding second terminal 200 first needs to extract the device code of the first terminal 100, also called cMAC, from the bluetooth broadcast packet, and then randomly generates a set of data by a random number generator configured in the second terminal 200, and in order to distinguish the set of data herein from the set of data randomly generated by the first terminal 100 in the bluetooth broadcast packet, the set of data herein is called a first random value. In one specific example, the first random value is 16 bytes of data, and in other examples, the first random value may be 32 bytes of data. Finally, the first random value and the device code are combined into a section of plaintext data, namely, the first random value is placed in front and the device code is placed behind, or the first random value is placed behind and the device code is placed in front and combined into a section of plaintext data, the section of plaintext data is converted into authentication information in the form of ciphertext through a secondary Key Key1, and the second terminal 200 transmits the authentication information to the first terminal 100 through a connecting channel in a ready state. After receiving the authentication information, the first terminal 100 invokes the secondary Key1, analyzes the first random value and the device code in the authentication information by using the secondary Key1, and then judges whether the device code is consistent with the own code. If the authentication information is consistent, the authentication is passed, and the second terminal 200 which transmits the authenticated authentication information is marked as a target terminal. If the network bandwidth of the first terminal 100 is not consistent with the network bandwidth of the second terminal 200, the connection channel with the second terminal 200 is disconnected, so that the second terminal 200 is further prevented from maliciously occupying the network bandwidth of the first terminal 100.
In addition, at the time when the first terminal 100 and the second terminal 200 successfully establish the connection channel, that is, at the time when the first terminal 100 adjusts the state of the connection channel to the ready state, a start time stamp is generated in the first terminal 100, and if the second terminal 200 is marked as the target terminal, the start time stamp corresponding to the target terminal is reserved; if the second terminal 200 is not marked with an untargeted terminal, the start timestamp corresponding to the untargeted second terminal 200 is deleted to reduce the amount of data redundancy in the first terminal 100.
Step S2: the first terminal 100 is configured to randomly generate a first array, and generate a first key according to the first array; the first terminal 100 is further configured to receive a second array sent by the target terminal, and generate a second key according to the second array; and generating a communication key according to the first key and the second key.
After determining the target terminal, the processing flow of the first terminal 100 includes:
first, the first terminal 100 configures a calling relationship of data in the first array, extracts parameters of a model and parameters of a ranking model in advance, and synchronizes the configured result to a target terminal.
Then, a first array including a byte index set and a byte value set is randomly generated by a random number generator in the first terminal 100. Wherein the byte index group consists of m serial numbers arranged in an ascending order, m is E N * And m is more than or equal to 8. For example, if there are 16 sequence numbers in the byte index group, the byte index group may be 16 sequence numbers arranged in ascending order, such as 0-15, 1-16, or 2-17. Of course, in other examples, the byte index group may also be m sequence numbers arranged in a descending order. The byte value group consists of m random numbers, one random number corresponds to a unique random number, and the serial number and the random number corresponding to the serial number are determined as a data pair. It should be noted that, m is at least equal to 8, so that p serial numbers can be obtained from enough serial numbers, so as to increase the difficulty of tracking and cracking the p serial numbers.
In one specific example, the call relationship of the byte index group and the byte value group is: determining an initial data pair, taking a serial number in the initial data pair as an initial serial number, and taking a random number in the initial data pair as an initial random number; inquiring the target sequence number according to the initial random number, positioning the target random number according to the target sequence number, and positioning the target sequence number and the target random number in the same data pair; the target random number is taken as the actual byte value of the initial sequence number. The method for inquiring the target sequence number according to the initial random number comprises the following steps: and taking the serial number with the same size as the initial random number as a target serial number, normalizing the initial random number if the initial random number is larger than the maximum value of the serial number, and taking the serial number with the same size as the value obtained by normalizing the initial random number as the target serial number. For the purpose of illustrating specific calling relationships, for example, as shown in fig. 3, if there are a byte index group and a byte value group as shown in fig. 3, they are denoted by a and B, respectively. When the actual byte value of the serial number "0" needs to be found, the data pair where the serial number "0" is located is used as an initial data pair, and the initial data pair is: the sequence number "0" is an initial sequence number, and the random number "4" is an initial random number. Since the initial random number "4" has the same size as the sequence number "4", the sequence number "4" is set as the target sequence number, the data pair in which the target sequence number "4" is located is set as the target data pair, and the random number "43" in the target data pair is set as the target random number, and the target random number "43" is the actual byte value of the initial sequence number "0". Similarly, when the actual byte value of the sequence number "1" needs to be found, the data pair where the sequence number "1" is located is taken as an initial data pair, and the initial data pair is: the sequence number "1" is an initial sequence number, and the random number "51" is an initial random number. Since the initial random number "51" is larger than the maximum value 23 of the serial number, the initial random number "51" is normalized: that is, the remainder of "51%24" is calculated to obtain 3, that is, the initial random number "51" is normalized to have the same size as the sequence number "2", so that the sequence number "2" is taken as the target sequence number, the data pair where the target sequence number "2" is located is taken as the target data pair, the random number "9" in the target data pair is taken as the target random number, and the target random number "9" is the actual byte value of the initial sequence number "1". By analogy, the actual byte value "11" of the initial sequence number "2", the actual byte value "76" of the sequence number "3", … …, the actual byte value "51" of the sequence number "23".
After the first array is generated, the first terminal 100 uses an extraction model to extract p serial numbers continuously or at equal intervals from the byte index array, where p∈n * And p is more than or equal to 2 and less than or equal to m; then, inquiring the actual byte value corresponding to each extracted serial number according to the calling relation of the byte index group and the byte value group; and finally, carrying out sequencing combination on the p actual byte values by adopting a sequencing model to obtain a first key. The method comprises the steps of determining p serial numbers by an extraction model, taking a data pair where the extracted serial numbers are located as an initial data pair, determining actual byte values of each serial number in the p serial numbers according to the calling relation of the byte index group and the byte value group, and finally sorting according to the sequence of inquiring the actual byte values or sorting according to the size relation of the actual byte values to obtain a first key. To facilitate the description of the process of generating the first key, take the first array in fig. 3 as an example: if there are a byte index set and a byte value set as shown in fig. 3, the extraction model extracts 4 serial numbers in fig. 3 by extracting one serial number from two serial numbers, the initial serial numbers are "0", "3", "6" and "9", and determines that the actual byte values of the initial serial numbers "0" are "43" and "3" are "76" and the actual byte values of the initial serial numbers "6" are "1" and "9" are "2" according to the calling relations between the byte index set and the byte value set. At this time, if the first key is obtained by sorting according to the sequence of inquiring the actual byte values, the first key is [43 76 1 2 ] ]If the first key is obtained by sorting according to the size relation of the actual byte values, the first key is [76 43 2 1 ]]. In practical applications, which ordering is specifically adopted is not limited herein. It should also be noted that, in order to increase the difficulty of cracking the first key, p of the present application is at least equal to 2.
In addition, the first terminal 100 also receives the second array sent by the second terminal 200, and generates a second key according to the second array. It should be noted that, before the first terminal 100 generates the second key according to the second array, it also needs to know the calling relationship between the byte index set and the byte value set in the second array, the parameters of the extraction model for processing the second array, and the parameters of the sorting model, and then generate the second key according to the second array according to the calling relationship between the byte index set and the byte value set in the second array, the parameters of the extraction model for processing the second array, and the parameters of the sorting model. The second array is randomly generated in the target terminal, and the calling relationship between the byte index group and the byte value group in the first array, the parameters of the extraction model for processing the second array, and the parameters of the ordering model are also configured in advance by the target terminal, and in this example, the target terminal synchronizes the result of the advance configuration to the first terminal 100.
Similar to the first array, the second array also includes a byte index set and a byte value set. Wherein the byte index group consists of N serial numbers arranged in an ascending manner, N is N * And n is more than or equal to 8. For example, if 16 sequence numbers exist in the byte index group, the byte index group may be 16 sequence numbers arranged in ascending order, such as 0-15, 1-16, or 2-17. Of course, in other examples, the byte index group may be n sequence numbers arranged in a descending order. The byte value group consists of n random numbers, one sequence number corresponds to one unique random number, and the sequence number and the random number corresponding to the sequence number are determined as one data pair. In this example, the call relationship between the byte index set and the byte value set in the second array is consistent with the call relationship between the byte index set and the byte value set in the first array, so that the description thereof will not be repeated here. In other examples, the calling relationship between the byte index group and the byte value group in the second array may be set to be inconsistent with the calling relationship between the byte index group and the byte value group in the first array as required.
In this example, the parameters of the extraction model that process the second array are consistent with the parameters of the extraction model that process the first array, and the parameters of the ordering model that process the second array are consistent with the ordering of the first array The parameters of the sequence model are consistent. Therefore, after the first terminal 100 receives the second array, q sequence numbers are continuously extracted from the byte index array or q sequence numbers are extracted at equal intervals by adopting an extraction model, wherein q is equal to N * Q is more than or equal to 2 and is less than or equal to n; then, inquiring the corresponding actual byte value for each extracted serial number according to the calling relation of the byte index group and the byte value group; and finally, adopting a sequencing model to sequence and combine the q actual byte values to obtain a first key. It should be noted that, in this example, since the parameters of the extraction model for processing the second array and the parameters of the extraction model for processing the first array are consistent, and the parameters of the sorting model for processing the second array and the parameters of the sorting model for processing the first array are consistent, the process of generating the second key according to the second array in the first terminal 100 can be analogized to the process of generating the first key according to the first array, and the process of generating the second key according to the second array is not repeated in the present application.
After the first terminal 100 obtains the first key and the second key, the first key and the second key are combined to obtain a communication key, so that the first terminal 100 and the target terminal encrypt the transmitted data by adopting the communication key in subsequent data interaction. In one specific example, the first key is ordered before and the second key is ordered after to obtain the communication key. In other examples, it may also be arranged that the first key is ordered later and the second key is ordered earlier to obtain the communication key.
Step S3: the target terminal is used for randomly generating a second group and generating a second key according to the second group; the target terminal is further configured to receive the first array sent by the first terminal 100, and generate a first key according to the first array; and generating a communication key according to the first key and the second key.
The target terminal can firstly generate a second key according to the second array generated randomly, and then generate a first key according to the received first array; the second key can be generated according to the second array generated randomly and the first key can be generated according to the first array received simultaneously; of course, the first key may be generated according to the received first array, and the second key may be generated according to the randomly generated second array.
The step S2 can know that the target terminal configures the calling relationship between the byte index group and the byte value group in the second array in advance, and configures the parameters of the extraction model and the parameters of the ordering model. And then when the second array is randomly generated, generating a second key from the second array according to the calling relation of the byte index group and the byte value group, the configured extraction model and the configured ordering model.
In this example, the call relationship between the byte index group and the byte value group established by the target terminal in the second array is the same as the call relationship between the byte index group and the byte value group established by the first terminal 100 in the first array, and the parameters of the configuration extraction model are consistent with the parameters of the configuration extraction model in the first terminal 100, and the parameters of the configuration ordering model are consistent with the parameters of the configuration ordering model in the first terminal 100. Therefore, the process of generating the second key by the target terminal according to the second array is the same as the process of generating the first key by the first terminal 100 according to the first array, and therefore, the present application does not describe the process of generating the second key by the target terminal according to the second array in detail.
After the target terminal obtains the first key and the second key, the communication key is generated in the same manner as the first terminal 100 generates the communication key, such as a first key ordered before and a second key ordered after, or a first key ordered after and a second key ordered before. The method for generating the communication key by the target terminal according to the first key and the second key is the same as the method for generating the communication key by the first terminal 100 according to the first key and the second key, so as to ensure that: the communication key generated in the first terminal 100 and the communication key generated in the target terminal are kept identical. Thus, the first terminal 100 and the target terminal are able to encrypt the transmitted data using the communication key at one end and decrypt the received data using the communication key at the other end at the time of data interaction.
Step S4: the first terminal 100 and the target terminal perform information interaction in the connection channel using the communication key.
Generating an end time stamp in the first terminal 100 at the moment the first terminal 100 generates the communication key; meanwhile, at the moment when the target terminal generates the communication key, an end timestamp is also generated in the target terminal, the target terminal synchronizes the end timestamp generated by the target terminal to the first terminal 100, and the first terminal 100 compares the end timestamp generated by the target terminal with the end timestamp sent by the target terminal and keeps a larger end timestamp. Then, the actual time consumption t=end timestamp-start timestamp is calculated from the reserved end timestamp and start timestamp. Finally, judging whether the actual time consumption exceeds the preset time consumption, and if the actual time consumption reaches the preset time consumption or more, automatically disconnecting the connection channel with the target terminal by the first terminal 100; if the actual time consumption does not reach the preset time consumption, the first terminal 100 and the target terminal keep normal communication, and the communication key is adopted to encrypt the interaction data.
The preset time-consuming setting may be obtained by calculating a rate at which the first terminal 100 processes data, a rate at which the target terminal processes data, and a time delay when the first terminal 100 and the target terminal transmit data, for example, a time at which the first terminal 100 processes data transmitted by the target terminal is 0.5S, a time at which the target terminal processes data returned by the first terminal 100 is 0.8S, a time at which data is transmitted from the target terminal to the second terminal 200 is 1S, and a time at which data returned by the first terminal 100 is transmitted from the first terminal 100 to the target terminal is 1S, and the preset time-consuming is 3.3S (0.5s+0.8s+1s+1s). Of course, in order to ensure the rationality of the preset time consumption of the setting, the preset time consumption may also be calculated by acquiring test data of multiple transmissions between the first terminal 100 and the target terminal, and using the test data.
In addition, after the first terminal 100 and the target terminal generate the communication key, the communication key may be replaced once for each data interaction, that is, the step S2 and the step S3 may be repeated, or the communication key may be periodically replaced, so as to improve the difficulty of cracking the communication key, and further improve the security of the data when the first terminal 100 and the target terminal interact with data.
The implementation principle of the data encryption transmission method in the embodiment of the application is as follows: first, the first terminal 100 selects one target terminal from the plurality of second terminals 200. Then, the first terminal 100 randomly generates a first array and generates a first key according to the first array; the target terminal randomly generates a second array and generates a second key according to the second array. Then, the first terminal 100 transmits the first array to the target terminal, the target terminal generates the first key from the first array in the same manner as the first terminal 100 generates the first key, and similarly, the target terminal transmits the second array to the first terminal 100, and the first terminal 100 generates the second key from the second array in the same manner as the target terminal generates the second key. Finally, the first terminal 100 and the target terminal combine the first key and the second key in the same combination mode to obtain a communication key, and encrypt the transmitted data by using the communication key during subsequent data interaction, so as to improve the data security of the first terminal 100 and the target terminal during data interaction.
The application provides a data encryption transmission system, which comprises a first terminal 100 and a target terminal in an operation environment.
Referring to fig. 4, the first terminal 100 includes a first acquisition module 101, a first determination module 102, a first processing module 103, a first calculation module 104, and a first generation module 105. The first obtaining module 101 is configured to obtain authentication information sent by the plurality of second terminals 200. The first determining module 102 is configured to determine a target terminal from a plurality of target terminals. The first processing module 103 is configured to randomly generate a first array according to the random number generator, and generate a first key according to the first array. The first computing module 104 is configured to receive a second array sent by the target terminal, and generate a second key according to the second array. The first generation module 105 is configured to generate a communication key according to the first key and the second key.
Referring to fig. 5, the target terminal includes a second transmitting module 201, a second processing module 202, a second calculating module 203, and a second generating module 204. The second sending module 201 is configured to send the authentication information after sending the connection request instruction. The second processing module 202 is configured to receive a first array returned by the first terminal 100 after determining the authentication information, and generate a first key according to the first data. The second computing module 203 is configured to randomly generate a second set according to the random number generator, and generate a second key according to the second set. The second generation module 204 is configured to generate a communication key according to the first key and the second key.
In order to better execute the program of the method, the application also provides electronic equipment, which comprises a memory and a processor.
Wherein the memory may be used to store instructions, programs, code, sets of codes, or sets of instructions. The memory may include a storage program area and a storage data area, wherein the storage program area may store instructions for implementing an operating system, instructions for at least one function, instructions for implementing the above-described data encryption transmission method, and the like; the storage data area may store data and the like involved in the above-described data encryption transmission method.
The processor may include one or more processing cores. The processor performs the various functions of the application and processes the data by executing or executing instructions, programs, code sets, or instruction sets stored in memory, calling data stored in memory. The processor may be at least one of an application specific integrated circuit, a digital signal processor, a digital signal processing device, a programmable logic device, a field programmable gate array, a central processing unit, a controller, a microcontroller, and a microprocessor. It will be appreciated that the electronics for implementing the above-described processor functions may be other for different devices, and embodiments of the present application are not particularly limited.
The present application also provides a computer-readable storage medium, for example, comprising: a U-disk, a removable hard disk, a Read Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes. The computer readable storage medium stores a computer program that can be loaded by a processor and that performs the above-described data encryption transmission method.
The above description is only illustrative of the preferred embodiments of the present application and of the principles of the technology employed. It will be appreciated by persons skilled in the art that the scope of the disclosure referred to in the present application is not limited to the specific combinations of technical features described above, but also covers other technical features which may be formed by any combination of the technical features described above or their equivalents without departing from the spirit of the disclosure. Such as the above-mentioned features and the technical features disclosed in the present application (but not limited to) having similar functions are replaced with each other.

Claims (9)

1. A data encryption transmission method applied to a first terminal (100), characterized by comprising:
acquiring authentication information sent by a second terminal (200);
When the identity verification information is determined, marking the second terminal (200) as a target terminal;
randomly generating a first array, generating a first key according to the first array, including: the first array comprises a byte index group and a byte value group, wherein the byte index group consists of m serial numbers, and the byte value group consists of m random numbers, wherein m is N * And m is more than or equal to 8, one random number corresponding to one serial number is unique, and the serial number and the random number corresponding to the serial number are used as a data pair; extracting p serial numbers from the byte index group by adopting an extraction model, searching corresponding actual byte values for each extracted serial number, wherein the actual byte values are random numbers in the byte value group, and p is E N * And p is more than or equal to 2 and less than or equal to m; sorting and combining the p actual byte values by adopting a sorting model to obtain a first key;
receiving a second array sent by a target terminal, and generating a second key according to the second array;
and generating a communication key according to the first key and the second key.
2. The data encryption transmission method according to claim 1, wherein the determining the authentication information includes:
Analyzing the identity verification information to obtain a first random value and a device code;
-determining said authentication information when said device code is determined to be consistent with the code of the first terminal (100).
3. The data encryption transmission method according to claim 1, wherein the calling relationship between the byte index group and the byte value group is:
determining an initial data pair, taking a serial number in the initial data pair as an initial serial number, and taking a random number in the initial data pair as an initial random number, wherein the initial data pair is any one of the data pairs;
querying the target sequence number according to the initial random number, including: taking the serial number with the same size as the initial random number as a target serial number;
locating a target random number according to the target sequence number, wherein the target sequence number and the target random number are positioned in the same data pair; the target random number is taken as the actual byte value of the initial sequence number.
4. The data encryption transmission method according to claim 1, wherein the extraction method of the extraction model includes: the extraction is performed continuously or at equal intervals.
5. The data encryption transmission method according to claim 1, wherein before acquiring the authentication information transmitted by the second terminal (200), the method further comprises:
Broadcasting a Bluetooth broadcasting packet;
a connection channel is established between a second terminal (200) which returns a request connection instruction after receiving a Bluetooth broadcast packet and a first terminal (100).
6. A data encryption transmission method applied to a second terminal (200), characterized by comprising:
after sending the request connection instruction, sending identity verification information;
receiving a first array returned by a first terminal (100) after the identity verification information is determined, and generating a first key according to the first array;
randomly generating a second array comprising a byte index set consisting of N sequence numbers and a byte value set consisting of N random numbers, wherein N e N * And n is more than or equal to 8, one random number corresponding to one serial number is unique, and the serial number and the random number corresponding to the serial number are used as a data pair; extracting q serial numbers from the byte index group by adopting an extraction model, searching a corresponding actual byte value for each extracted serial number, wherein the actual byte value is a random number in the byte value group, and q is E N * Q is more than or equal to 2 and is less than or equal to n; adopting a sequencing model to sequence and combine q actual byte values to obtain a second key;
And generating a communication key according to the first key and the second key.
7. A data encryption transmission system comprising a first terminal (100) and a plurality of second terminals (200), the first terminal (100) being adapted to perform the method according to any one of claims 1-5, and any one of the plurality of second terminals (200) being adapted to perform the method according to claim 6.
8. An electronic device comprising a memory and a processor, the memory having stored thereon a computer program, the processor implementing the method according to any of claims 1-6 when executing the program.
9. A computer readable storage medium, characterized in that a computer program is stored thereon, which program, when being executed by a processor, implements the method according to any of claims 1-6.
CN202311053480.3A 2023-08-21 2023-08-21 Data encryption transmission method, system, electronic equipment and storage medium Active CN116761167B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311053480.3A CN116761167B (en) 2023-08-21 2023-08-21 Data encryption transmission method, system, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311053480.3A CN116761167B (en) 2023-08-21 2023-08-21 Data encryption transmission method, system, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN116761167A CN116761167A (en) 2023-09-15
CN116761167B true CN116761167B (en) 2023-11-03

Family

ID=87953745

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311053480.3A Active CN116761167B (en) 2023-08-21 2023-08-21 Data encryption transmission method, system, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116761167B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104158567A (en) * 2014-07-25 2014-11-19 天地融科技股份有限公司 Pairing method and system and data interaction method and system for Bluetooth equipment
CN105933039A (en) * 2016-06-24 2016-09-07 飞天诚信科技股份有限公司 Bluetooth device and working method of the Bluetooth device
CN108270554A (en) * 2016-12-30 2018-07-10 国民技术股份有限公司 A kind of terminal matching method and system
CN110611905A (en) * 2019-08-09 2019-12-24 华为技术有限公司 Information sharing method, terminal device, storage medium, and computer program product
CN111815816A (en) * 2020-06-22 2020-10-23 北京智辉空间科技有限责任公司 Electronic lock security system and key distribution method thereof
KR102195931B1 (en) * 2019-08-27 2020-12-28 주식회사 피앤링크 Method and system for smartphone payment based on bluetooth communication
CN112740733A (en) * 2020-12-24 2021-04-30 华为技术有限公司 Secure access method and device
WO2022142874A1 (en) * 2020-12-31 2022-07-07 飞天诚信科技股份有限公司 Method and system for communicating with authenticator
CN114938265A (en) * 2022-05-20 2022-08-23 南京航空航天大学 CAN bus safety protection method, device and storage medium
CN115104282A (en) * 2020-02-29 2022-09-23 华为技术有限公司 Key updating method and related device
CN115348579A (en) * 2022-10-18 2022-11-15 长江量子(武汉)科技有限公司 Voice encryption method applied to wireless earphone and encryption type wireless earphone

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11057204B2 (en) * 2017-10-04 2021-07-06 Amir Keyvan Khandani Methods for encrypted data communications
CN112733107B (en) * 2021-04-02 2021-06-22 腾讯科技(深圳)有限公司 Information verification method, related device, equipment and storage medium

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104158567A (en) * 2014-07-25 2014-11-19 天地融科技股份有限公司 Pairing method and system and data interaction method and system for Bluetooth equipment
CN105933039A (en) * 2016-06-24 2016-09-07 飞天诚信科技股份有限公司 Bluetooth device and working method of the Bluetooth device
CN108270554A (en) * 2016-12-30 2018-07-10 国民技术股份有限公司 A kind of terminal matching method and system
CN110611905A (en) * 2019-08-09 2019-12-24 华为技术有限公司 Information sharing method, terminal device, storage medium, and computer program product
KR102195931B1 (en) * 2019-08-27 2020-12-28 주식회사 피앤링크 Method and system for smartphone payment based on bluetooth communication
CN115104282A (en) * 2020-02-29 2022-09-23 华为技术有限公司 Key updating method and related device
CN111815816A (en) * 2020-06-22 2020-10-23 北京智辉空间科技有限责任公司 Electronic lock security system and key distribution method thereof
CN112740733A (en) * 2020-12-24 2021-04-30 华为技术有限公司 Secure access method and device
WO2022133949A1 (en) * 2020-12-24 2022-06-30 华为技术有限公司 Secure access method and device
WO2022142874A1 (en) * 2020-12-31 2022-07-07 飞天诚信科技股份有限公司 Method and system for communicating with authenticator
CN114938265A (en) * 2022-05-20 2022-08-23 南京航空航天大学 CAN bus safety protection method, device and storage medium
CN115348579A (en) * 2022-10-18 2022-11-15 长江量子(武汉)科技有限公司 Voice encryption method applied to wireless earphone and encryption type wireless earphone

Also Published As

Publication number Publication date
CN116761167A (en) 2023-09-15

Similar Documents

Publication Publication Date Title
KR101560416B1 (en) Secure channel establishment method and apparatus in short range communication
US12096207B2 (en) Network access authentication method and device
US7284123B2 (en) Secure communication system and method for integrated mobile communication terminals comprising a short-distance communication module
CN107006049A (en) A kind of smart machine and its set up the method for equipment room bluetooth connection, device
CN105682093A (en) Wireless network access method and access device, and client
US10484363B2 (en) Method and apparatus for authenticating a device using Bluetooth technology
CN104137618A (en) Shared network access via a peer-to-peer link
EP4099733A1 (en) Security authentication method and apparatus, and electronic device
CN109890029B (en) Automatic network distribution method of intelligent wireless equipment
CN110784865A (en) Network distribution method and terminal of Internet of things equipment, Internet of things equipment and network distribution system
EP2498469B1 (en) Authenticating method of communicating connection, gateway apparatus using authenticating method, and communication system using authenticating method
US20140286323A1 (en) Wireless network system and connecting method thereof
CN109729000B (en) Instant messaging method and device
CN111787514B (en) Method and device for acquiring equipment control data, storage medium and electronic device
CN113194476B (en) Equipment activation and authentication binding method
CN114615688A (en) Close-distance automatic configuration method between WiFi hotspot device and current access device
CN112512064B (en) Wireless distribution network method, wireless gateway and equipment to be accessed
CN104883682A (en) WIFI hotspot connecting and selecting method, communication terminal and system
CN112822216A (en) Authentication method for binding of Internet of things sub-equipment
CN116761167B (en) Data encryption transmission method, system, electronic equipment and storage medium
CN103763697A (en) Wireless access point multi-secret key support system and method
CN115988468A (en) Bluetooth transmission method and system based on linkage of software, terminal equipment and server
CN105636025A (en) Secure data transmission method and system
CN114501473B (en) Mesh network distribution method, electronic equipment and computer readable storage medium
CN107277935B (en) Bluetooth communication method, device and application system and equipment thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant