Nothing Special   »   [go: up one dir, main page]

CN118300672B - Beidou satellite-based data transmission method and system - Google Patents

Beidou satellite-based data transmission method and system Download PDF

Info

Publication number
CN118300672B
CN118300672B CN202410719410.5A CN202410719410A CN118300672B CN 118300672 B CN118300672 B CN 118300672B CN 202410719410 A CN202410719410 A CN 202410719410A CN 118300672 B CN118300672 B CN 118300672B
Authority
CN
China
Prior art keywords
data
encryption
encrypted
key
character
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410719410.5A
Other languages
Chinese (zh)
Other versions
CN118300672A (en
Inventor
张强强
李砚杰
陈杰
孙荐
王兆燕
李振辉
张通
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Tongchang Telecom Planning And Design Institute Co ltd
Original Assignee
Beijing Tongchang Telecom Planning And Design Institute Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Tongchang Telecom Planning And Design Institute Co ltd filed Critical Beijing Tongchang Telecom Planning And Design Institute Co ltd
Priority to CN202410719410.5A priority Critical patent/CN118300672B/en
Publication of CN118300672A publication Critical patent/CN118300672A/en
Application granted granted Critical
Publication of CN118300672B publication Critical patent/CN118300672B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems
    • H04B7/185Space-based or airborne stations; Stations for satellite systems
    • H04B7/1851Systems using a satellite or space-based relay
    • H04B7/18513Transmission in a satellite or space-based system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/06Airborne or Satellite Networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Astronomy & Astrophysics (AREA)
  • Aviation & Aerospace Engineering (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a data transmission method and a system based on Beidou satellite, which relate to the technical field of satellite data transmission and comprise the following steps: randomly extracting an encryption key from the random coding pool and judging whether the encryption key is valid or not; obtaining data to be transmitted, and carrying out data encryption on the data to be transmitted to obtain encrypted data; generating a data reduction code based on the encrypted data; the encrypted data and the data reducing code are transmitted respectively through the double channels; verifying whether the decrypted data is tampered with; the invention is used for solving the problems that the prior satellite data transmission technology is difficult to ensure that the transmission data is not hijacked and tampered, and the transmission data is difficult to retrieve after tampering, so that the satellite data transmission is failed.

Description

Beidou satellite-based data transmission method and system
Technical Field
The invention relates to the technical field of satellite data transmission, in particular to a data transmission method and system based on Beidou satellites.
Background
The satellite data transmission technology is a technology for transmitting and communicating data by using a satellite system, and the satellite is used as a repeater to transmit data from a sender to a receiver so as to realize long-distance and wide-area data transmission and communication connection.
The conventional satellite data transmission technology generally needs to pay attention to the security of the transmission data, but the security can be improved by encrypting the transmission data, but the encryption of the transmission data only can ensure that the transmission data is not leaked, cannot ensure that the transmission data is not hijacked and tampered, and the conventional satellite data transmission technology generally adopts single-channel transmission or double-channel transmission when the transmission data is encrypted and transmitted, but the common transmission contents are the same when the double-channel transmission is carried out, are extremely easy to hijack and tamper, and cannot be recovered after the data is tampered, for example, in the patent application with the application publication number of CN117062062A, the scheme discloses a method, equipment and a system for encrypting the transmission data by a mixed-editing multichannel satellite communication link.
Disclosure of Invention
The invention aims to solve at least one of the technical problems in the prior art to a certain extent, and the encryption key is randomly extracted from a random coding pool and the validity of the encryption key is verified, so that the data to be transmitted is encrypted when the encryption key is valid, and encrypted data is obtained; and generating a data reduction code based on the encrypted data, respectively transmitting the encrypted data and the data reduction code through two channels, decrypting the encrypted data after receiving the encrypted data by a receiver to obtain decrypted data, verifying whether the decrypted data is tampered, and if the decrypted data is tampered, restoring the encrypted data through the data reduction code and decrypting the data again to solve the problems that the conventional satellite data transmission technology still has difficulty in ensuring that the transmitted data is not hijacked and tampered, and in retrieving the transmitted data after tampering, so that satellite data transmission fails.
In order to achieve the above object, in a first aspect, the present application provides a data transmission method based on a beidou satellite, including the following steps:
randomly extracting an encryption key from the random coding pool and judging whether the encryption key is valid or not;
Obtaining data to be transmitted, and carrying out data encryption on the data to be transmitted to obtain encrypted data;
generating a data reduction code based on the encrypted data;
The encrypted data and the data recovery code are transmitted respectively through the two channels, and the receiving party receives the encrypted data and then decrypts the encrypted data to obtain decrypted data;
And verifying whether the decrypted data is tampered, and if the decrypted data is tampered, recovering the decrypted data through the data recovery code to obtain encrypted data and decrypting the data again.
Further, randomly extracting the encryption key from the random encoding pool and judging whether the encryption key is valid or not comprises the following sub-steps:
Randomly extracting a six-to-eighteen-bit encryption key from a random coding pool, naming each character in the encryption key as a key character, acquiring a decimal number corresponding to the key character based on ASCII coding, and marking the decimal number as a character number;
obtaining the minimum value and the maximum value in the character numbers, respectively marking the minimum character and the maximum character, subtracting the minimum character from the first character threshold value, and obtaining a first comparison threshold value;
adding the maximum character with the first comparison threshold value, and outputting a key invalidation signal if the calculation result is larger than the second character threshold value; if the calculated result is smaller than or equal to the second character threshold value, outputting a key valid signal;
if the key invalidation signal is output, the encryption key is extracted again; if the key valid signal is output, the digits of the characters in the encryption key are all increased by a first comparison threshold value and converted into characters based on ASCII codes, so that a converted key is obtained.
Further, obtaining data to be transmitted, and performing data encryption on the data to be transmitted to obtain encrypted data, wherein the method comprises the following sub-steps:
acquiring data to be transmitted, converting the data to be transmitted into first coded data based on UTF-8 coding, and converting the first coded data into hexadecimal second coded data based on ASCII coding;
Numbering each character in the second coded data according to the sequence from left to right, and representing the number by a symbol D n, wherein n is a non-zero natural number and n is a serial number of D;
Extracting the characters with the n being an odd number, and arranging the characters in the sequence from the small n to the large n to obtain a first character string; extracting the characters with even n, and arranging the characters in the sequence from small n to large n to obtain a second character string;
and carrying out encryption operation on the first character string and the second character string to obtain encrypted data.
Further, the encryption operation on the first character string and the second character string comprises the following sub-steps:
Acquiring an encryption key, and converting the encryption key into hexadecimal encryption codes based on ASCII codes; extracting numbers in the encryption codes according to the sequence from left to right, marking the numbers as encryption numbers, extracting the rest letters according to the sequence from left to right, and marking the rest letters as encryption letters;
numbering each digit in the encrypted digits, denoted N k, wherein k is a non-zero natural number and k is a sequence number of N;
Adding N k with odd k to obtain a first digital sum, and adding N k with even k to obtain a second digital sum;
Calculating the greatest common divisor and the least common multiple of the first digital sum and the second digital sum, adding the greatest common divisor and the least common multiple, and marking the single digit of the calculated result as an encryption common number;
Numbering the characters in the first character string, and marking the characters as DY i, wherein i is a non-zero natural number and i is a sequence number of DY;
comparing DY i with the encryption public number, and outputting a decimal signal if DY i is smaller than or equal to the encryption public number; if DY i is larger than the encryption public number, outputting a large number signal;
If the decimal signal is output, calculating an encryption male number minus DY i, if the decimal signal is output, calculating DY i minus the encryption male number, and marking the calculation result of each time as Dy i, wherein i is the sequence number of Dy and Dy i corresponds to DY i;
Dy i is combined according to the sequence from i to i, so that a first encrypted character string is obtained;
and carrying out encryption operation on the second character string based on the encryption letters to obtain a second encryption character string, and then combining the first encryption character string with the second encryption character string to obtain encrypted data.
Further, the encryption operation on the second character string based on the encryption letter comprises the following sub-steps:
assigning letters to 1 to 26 in the order of letters A to Z, and naming the letters as letter assignment;
The method comprises the steps of obtaining encrypted letters, adding letter assignments corresponding to all letters in the encrypted letters, marking a calculation result as an assignment operation value, calculating an assignment operation value module 26, and marking a remainder as an operation remainder;
Numbering the characters in the second character string, and marking the characters as DE j, wherein j is a non-zero natural number and j is a serial number of DE;
For DE j, judging that DE j is a number or a letter, and outputting a digital processing signal if DE j is a number; if DE j is a letter, outputting a letter processing signal;
Calculating DE j minus the remainder of the operation, and marking the calculation result as De j, wherein j is the serial number of De and De j corresponds to DE j;
If the digital processing signal is output, adding 10 to De j when De j is negative, and continuing adding 10 when De j is non-negative; if the letter processing signal is output, when the De j is a negative number, adding the De j to 26, and converting the De j into letters according to letter assignment;
Dej is combined according to the sequence from j to j, so that a second encrypted character string is obtained;
The method comprises the steps of obtaining a converted key, randomly inserting characters in the converted key into a first encryption character string, and splicing a second encryption character string into the first encryption character string to obtain encrypted data.
Further, generating the data reduction code based on the encrypted data includes the sub-steps of:
numbering the encrypted data, and marking the encrypted data as G p, wherein p is a non-zero natural number and p is a sequence number of G;
Converting G p into hexadecimal numbers according to ASCII codes, then calculating G p+Gp+1, and marking the calculation result as F p, wherein F p corresponds to G p;
obtaining the maximum value of p, marking the maximum value as max (p), and stopping calculation when F max(p)-1 is obtained by calculation;
Comparing F p with a first coding threshold, and outputting a coding reduction signal if F p is larger than the first coding threshold; if F p is smaller than or equal to the first coding threshold, outputting a coding normal signal;
If the code reduction signal is output, F p is reduced by a second code threshold;
And (3) sequencing and combining F p in the order of p from small to large, and adding G max(p) at the tail to obtain the data reduction code.
Further, the encrypted data and the data recovery code are respectively transmitted through the two channels, the encrypted data is decrypted by the receiving party after the receiving party receives the encrypted data, and the decrypted data is obtained, which comprises the following substeps:
Transmitting the encrypted data to a receiver through a first channel, and simultaneously transmitting a data reduction code to a reduction code database through a second channel;
And verifying the identity information of the receiver, and performing data decryption on the encrypted data based on a decryption program after verification is passed to obtain decrypted data.
Further, verifying whether the decrypted data is tampered, if so, recovering the encrypted data through the data recovery code and decrypting the data again, wherein the method comprises the following sub-steps:
Obtaining decryption data;
judging whether the decrypted data has messy codes or not, and if so, outputting a data restoring signal; if not, outputting a data normal signal;
And if the data restoring signal is output, restoring the data restoring code.
Further, the reduction of the data reduction code comprises the following sub-steps:
Requesting a data reduction code from a reduction code database;
Grouping numbering is carried out on the data reduction codes according to a group of every two characters, and the grouping number is represented by a symbol R u, wherein u is a non-zero natural number and u is a serial number of R;
Obtaining the maximum value of u, marking as max (u), sequentially calculating R u-1-Ru according to the sequence from the large to the small of u, updating the calculation result into R u-1, subtracting u for one to continue calculation until u=1, stopping calculation, sequencing and combining the updated R u according to the sequence from the small to the large of u, and converting the updated R u into characters based on ASCII codes to obtain reduction data;
and decrypting the restored data through a decryption program again to obtain decrypted data.
In a second aspect, the application provides a Beidou satellite-based data transmission system, which comprises a random key module, a data encryption module, a reduction code generation module, a data transmission module and a data verification module; the random key module, the data encryption module, the restoring code generation module and the data verification module are respectively connected with the data transmission module in a data mode;
the random key module is used for randomly extracting the encryption key from the random coding pool and judging whether the encryption key is effective or not;
the data encryption module is used for obtaining data to be transmitted, and carrying out data encryption on the data to be transmitted to obtain encrypted data;
the restoring code generating module is used for generating a data restoring code based on the encrypted data;
The data transmission module is used for respectively transmitting the encrypted data and the data recovery code through two channels, and the receiving party receives the encrypted data and then decrypts the encrypted data to obtain decrypted data;
the data verification module is used for verifying whether the decrypted data is tampered or not, and if the decrypted data is tampered, the encrypted data is restored through the data restoring code and the data decryption is carried out again.
The invention has the beneficial effects that: the method and the device have the advantages that the encryption key is randomly extracted from the random coding pool and the validity of the encryption key is verified, so that the encryption key can be ensured not to be stolen by randomly extracting the encryption key, the validity of the encryption key is verified, the subsequent encryption process can be ensured to run smoothly, and the safety of satellite data transmission is improved;
the invention encrypts the data to be transmitted through the encryption key and finally obtains the encrypted data through a series of encryption operations, and has the advantages that the multi-coding operation mode in the encryption process can ensure that the encrypted data is not broken, thereby further improving the security of satellite data transmission;
The invention generates the data reducing code based on the encrypted data and then respectively transmits the encrypted data and the data reducing code through the double channels, and has the advantages that the encrypted data can be sent to the receiving end, the data reducing code can not be directly sent to the receiving end, the data reducing code can be applied only when the encrypted data of the receiving end is tampered, the hijacked and tampered risk of the data transmitted by the satellite is reduced, and the safety of the satellite data transmission is improved;
The invention restores the encrypted data based on the data reducing code when the encrypted data is tampered, obtains the correct encrypted data and decrypts the data, and has the advantages that the transmission channels and the receivers of the encrypted data and the data reducing code are different, other people can not intercept and tamper the encrypted data at the same time, the method can hijack the encrypted data and tamper the encrypted data, and restore the encrypted data through the data reducing code after tampering, so that the encrypted data can be recovered after tampering, and the safety and the effectiveness of satellite data transmission are improved.
Drawings
FIG. 1 is a flow chart of the steps of the method of the present invention.
FIG. 2 is a flowchart illustrating steps for generating a data reduction code according to the present invention.
Fig. 3 is a schematic diagram of the transmission of encrypted data and data recovery codes through two channels according to the present invention.
Fig. 4 is a functional block diagram of the system of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
In embodiment 1, referring to fig. 1, in a first aspect, the present application provides a data transmission method based on a beidou satellite, including the following steps:
step S1, randomly extracting an encryption key from a random coding pool and judging whether the encryption key is effective or not; step S1 comprises the following sub-steps:
Step S101, randomly extracting an encryption key with six to eighteen bits from a random coding pool, naming each character in the encryption key as a key character, acquiring a decimal number corresponding to the key character based on ASCII coding, and marking the decimal number as a character number;
step S102, obtaining the minimum value and the maximum value in the alphanumeric, respectively marking the minimum character and the maximum character, subtracting the minimum character from the first character threshold value, and obtaining a first comparison threshold value;
Step S103, adding the maximum character to the first comparison threshold, and outputting a key invalidation signal if the calculation result is greater than the second character threshold; if the calculated result is smaller than or equal to the second character threshold value, outputting a key valid signal;
Step S104, if the key invalidation signal is output, the encryption key is extracted again; if the key effective signal is output, all the character numbers in the encryption key are increased by a first comparison threshold value and are converted into characters based on ASCII codes, so that a converted key is obtained;
In a specific implementation, the random encoding pool comprises all characters from 33 th bit to 96 th bit of decimal in ASCII encoding; extracting to obtain an encryption key as PAS 99= ", wherein the encryption key does not comprise quotation marks, key characters in the encryption key comprise ' P ', ' A ', ' B ', ' 9 ' and ' =", corresponding character numbers are respectively 80, 65, 66, 57 and 61, searching to obtain a minimum character of 57, and a maximum character of 80; the first character threshold and the second character threshold are set so that the key characters of the encryption key can be in a lower case section when the same number is increased, wherein the first character threshold is a decimal number corresponding to a, and the second character threshold is a decimal number corresponding to z, which are 97 and 122 respectively; the first comparison threshold value is calculated as 40, the calculation result obtained by adding the largest character 80 and the first comparison threshold value 40 is 120, the calculation result obtained by comparing is 120 smaller than the second character threshold value, a key valid signal is output, the character numbers are all increased by the first comparison threshold value to obtain character numbers which are 120, 105, 106, 97 and 101 in sequence, and the character numbers are converted into characters which are respectively 'x', 'i', 'j', 'a' and 'e', namely the converted key is 'xijaae'.
Step S2, obtaining data to be transmitted, and carrying out data encryption on the data to be transmitted to obtain encrypted data; step S2 comprises the following sub-steps:
Step S201, obtaining data to be transmitted, converting the data to be transmitted into first encoded data based on UTF-8 encoding, and converting the first encoded data into hexadecimal second encoded data based on ASCII encoding;
Step S202, numbering each character in the second coded data according to the sequence from left to right, and representing by a symbol D n, wherein n is a non-zero natural number and n is a serial number of D;
step S203, extracting the characters with the n being an odd number, and arranging the characters in the order from the small n to the large n to obtain a first character string; extracting the characters with even n, and arranging the characters in the sequence from small n to large n to obtain a second character string;
In specific implementation, the embodiment is only to specifically exemplify the process of encrypting the data, so that the data to be transmitted in the embodiment is only demonstrated by using shorter sentences; the data to be transmitted is obtained to be forward straight going, and the first coded data is obtained based on UTF-8 code conversion Obtaining second coded data of 26237835343131262378353234442623783736463426237838383443 based on ASCII code conversion, numbering to obtain D 1 to D 56, extracting to obtain a first character string of 2273333227333422733432273334 and a second character string of 6385411638524463876646388843;
step S204, performing encryption operation on the first character string and the second character string to obtain encrypted data;
Step S204 includes the following sub-steps:
Step S204.1, obtaining an encryption key, and converting the encryption key into hexadecimal encryption codes based on ASCII codes; extracting numbers in the encryption codes according to the sequence from left to right, marking the numbers as encryption numbers, extracting the rest letters according to the sequence from left to right, and marking the rest letters as encryption letters;
Step S204.2, numbering each digit in the encrypted digits, denoted N k, wherein k is a non-zero natural number and k is a sequence number of N;
Step S204.3, adding N k with odd k to obtain a first digital sum, and adding N k with even k to obtain a second digital sum;
Step S204.4, calculating the greatest common divisor and the least common multiple of the first digital sum and the second digital sum, adding the greatest common divisor and the least common multiple, and marking the single digit of the calculated result as the encryption common number;
In specific implementation, the encryption key is PAS 99= ", encryption code is obtained by conversion to be 50415339393D, encryption number is obtained by extraction to be 50415339393, and encryption letter is D; numbering to obtain N 1 to N 11, calculating to obtain a first digital sum of 23, a second digital sum of 22, further calculating to obtain a greatest common divisor and a least common divisor of 1 and 506 respectively, adding to obtain a calculation result of 507, and extracting to obtain an encryption common divisor of 7;
Step S204.5, numbering the characters in the first character string, and marking the characters as DY i, wherein i is a non-zero natural number and i is a sequence number of DY;
Step S204.6, comparing DY i with the encryption public number, and outputting a decimal signal if DY i is smaller than or equal to the encryption public number; if DY i is larger than the encryption public number, outputting a large number signal;
Step S204.7, if a decimal signal is output, calculating an encryption male number minus DY i, if a decimal signal is output, calculating DY i minus the encryption male number, and marking the calculation result of each time as Dy i, wherein i is the sequence number of Dy and Dy i corresponds to DY i;
step S204.8, combining Dy i according to the sequence from i to obtain a first encryption character string;
in specific implementation, the first character string is '2273333227333422733432273334', numbers are from DY 1 to DY 28,DY1 which are 2, the decimal signal is output when DY 1 is smaller than the encryption decimal, dy 1 is obtained by subtracting DY 1 from the encryption decimal, namely 7-2=5, dy i is obtained by calculating all DY i in the same way, and the first encrypted character string is '5504444550444355044345504443';
Step S204.9, carrying out encryption operation on the second character string based on the encryption letters to obtain a second encryption character string, and then combining the first encryption character string with the second encryption character string to obtain encrypted data;
step S204.9 comprises the following sub-steps:
step S204.9.A, assigning the letters to be 1 to 26 according to the sequence of letters A to Z, and naming the letters to be assigned;
step S204.9.B, obtaining an encrypted letter, adding letter assignments corresponding to all letters in the encrypted letter, marking a calculation result as an assignment operation value, calculating an assignment operation value module 26, and marking a remainder as an operation remainder;
step S204.9.C, numbering the characters in the second character string, namely DE j, wherein j is a non-zero natural number and j is the serial number of DE;
Step S204.9.D, aiming at DE j, judging DE j as a number or a letter, and if DE j is a number, outputting a digital processing signal; if DE j is a letter, outputting a letter processing signal;
Step S204.9.E, calculating DE j minus the remainder of the operation, and marking the calculation result as De j, wherein j is the serial number of De and De j corresponds to DE j;
Step S204.9.F, if the digital processing signal is output, adding 10 to De j when De j is negative, and continuing adding 10 when De j is non-negative; if the letter processing signal is output, when the De j is a negative number, adding the De j to 26, and converting the De j into letters according to letter assignment;
S204.9.G, combining Dej according to the sequence from j to obtain a second encrypted character string;
S204.9.H, obtaining a converted key, randomly inserting characters in the converted key into a first encryption character string, and splicing a second encryption character string into the first encryption character string to obtain encrypted data;
In the specific implementation, the encrypted letter is D, the corresponding letter is assigned 4, the assigned operation value is obtained by adding, and the operation remainder is obtained by further calculation; the second character string is 6385411638524463876646388843, the numbers of the second character strings are DE 1 to DE 28, and the second character string has no letters, so that all the second character strings output digital processing signals; for DE 1,DE1 of 6, subtracting the operation remainder 4 to obtain De 1 of 2, and if the operation remainder is not negative, then De 1 is 2; DE 2 is 3, and the result obtained by subtracting the operation remainder 4 is De 2 as minus 1, so that De 2 is increased by 10, de 2 is 9, and the result is non-minus, so that De 2 is 9, and De i is obtained by similar calculation and analysis and combined to obtain a second encrypted character string of '2941077294180029432202944409'; the converted key is 'xijaae', the converted key is randomly inserted into the first encrypted character string to obtain a first character string of '550 x4444i5504j44355a0443a4550e 4443', and the encrypted data is spliced to obtain '550 x4444i5504j44355a0443a4550e 44436385411638524463876646388843'.
Referring to fig. 2, step S3 is to generate a data reducing code based on the encrypted data; step S3 comprises the following sub-steps:
step S301, numbering the encrypted data, and marking the encrypted data as G p, wherein p is a non-zero natural number and p is a sequence number of G;
Step S302, converting G p into hexadecimal numbers according to ASCII codes, then calculating G p+Gp+1, and marking the calculation result as F p, wherein F p corresponds to G p;
Step S303, obtaining the maximum value of p, namely max (p), and stopping calculation when F max(p)-1 is obtained by calculation;
In specific implementation, the encrypted data are numbered to obtain G 1 to G 62, converted into hexadecimal numbers to obtain "353530783434343469353530346A343433353561303434336134353530653434343336333835343131363338353234343633383736363436333838383433",, wherein G 1 is 35, G 2 is 35, and so on, G 1+G2 is calculated to obtain F 1 as 6A, G 2+G3 is calculated to obtain F 2 as 65, and F 3 to F 61 are calculated to obtain F A8、AC、68、68、68、9D、9E、6A、65、64、9E、9E、68、67、68、6A、96、91、64、68、67、94、95、69、6A、65、95、99、68、68、67、69、69、6B、6D、69、65、62、67、69、6B、6D、67、66、68、6A、69、6B、6F、6D、6C、6A、6A、69、6B、70、70、6C and F67 in sequence; max (p) is 62, so after F 61 is calculated, the calculation is stopped;
Step S304, comparing F p with a first coding threshold, and outputting a coding reduction signal if F p is larger than the first coding threshold; if F p is smaller than or equal to the first coding threshold, outputting a coding normal signal;
step S305, if the code decreasing signal is output, F p is decreased by the second code threshold;
Step S306, sorting and combining F p according to the order of p from small to large, and adding G max(p) at the end to obtain a data reduction code;
In particular, the first coding threshold is set to 100 for keeping F p at two digits, and the second coding threshold is set to 90, wherein 108, 122, 103 and 104 are all over 100, so they are reduced by 90, and no three digits F p exist, so that all encoded normal signals are output, and the data reduction codes are obtained in sequence "6A65A8AC6868689D9E6A65649E9E6867686A96916468679495696A65959968686769696B6D69656267696B6D6766686A696B6F6D6C6A6A696B70706C6733".
Referring to fig. 3, step S4 is to transmit the encrypted data and the data recovery code through two channels, and the receiving party receives the encrypted data and then decrypts the encrypted data to obtain decrypted data; step S4 comprises the following sub-steps:
Step S401, transmitting the encrypted data to a receiver through a first channel, and simultaneously transmitting a data reducing code to a reducing code database through a second channel;
Step S402, verifying the identity information of the receiver, and performing data decryption on the encrypted data based on a decryption program after verification is passed to obtain decrypted data;
In the implementation, the first channel adopts a radio frequency band, and the second channel adopts a microwave frequency band; the identity information of the verification receiver adopts the existing login verification mode, and the decryption program is the inverse operation of data encryption, so that specific display is not performed in the embodiment.
Step S5, verifying whether the decrypted data is tampered, if so, restoring the decrypted data through a data restoring code to obtain encrypted data and decrypting the data again; step S5 comprises the following sub-steps:
Step S501, obtaining decryption data;
step S502, judging whether the decrypted data has a messy code, if so, outputting a data restoring signal; if not, outputting a data normal signal;
In the implementation, if the decryption data has a messy code, the representative data is tampered, and in the embodiment, the effect of the data reduction code is specifically displayed, and a data reduction signal is directly output;
Step S503, if the data restoring signal is output, restoring the data restoring code;
Step S503 includes the following sub-steps:
step S503.1, requesting a data reduction code from a reduction code database;
step S503.2, grouping numbering is carried out on the data reduction codes according to a group of every two characters, and the grouping numbering is represented by a symbol R u, wherein u is a non-zero natural number and u is a serial number of R;
In specific implementation, the request to obtain the data reduction code is "6A65A8AC6868689D9E6A65649E9E6867686A96916468679495696A65959968686769696B6D69656267696B6D6766686A696B6F6D6C6A6A696B70706C6733", groups to obtain R 1 to R 62 which are 6A、65、A8、AC、68、68、68、9D、9E、6A、65、64、9E、9E、68、67、68、6A、96、91、64、68、67、94、95、69、6A、65、95、99、68、68、67、69、69、6B、6D、69、65、62、67、69、6B、6D、67、66、68、6A、69、6B、6F、6D、6C、6A、6A、69、6B、70、70、6C、67 and 33 respectively;
Step S503.3, obtaining the maximum value of u, marking as max (u), sequentially calculating R u-1-Ru according to the sequence from the large to the small of u, updating the calculation result to R u-1, subtracting one from u, continuing to calculate until u=1, stopping calculating, sequencing and combining the updated R u according to the sequence from the small to the large of u, and converting the updated R u into characters based on ASCII codes to obtain reduction data;
step S503.4, decrypting the restored data again through a decryption program to obtain decrypted data;
In a specific implementation, the maximum value max (u) =62 of u is calculated preferentially, R 61-R62 is calculated and updated to obtain R 61 as 34, R 60-R61 is calculated and updated to obtain R 60 as 38, if the updated R u is smaller than two digits, the updated R u is increased by 90, the R is combined into "353530783434343469353530346A343433353561303434336134353530653434343336333835343131363338353234343633383736363436333838383433", by analysis in the same way and converted into characters to obtain reduced data as "550x4444i5504j44355a0443a4550e44436385411638524463876646388843", and the reduced data is decrypted based on a decryption program to obtain "forward straight running".
Embodiment 2, referring to fig. 4, in a second aspect, the present application provides a data transmission system based on a beidou satellite, which includes a random key module, a data encryption module, a recovery code generation module, a data transmission module and a data verification module; the random key module, the data encryption module, the restoring code generation module and the data verification module are respectively connected with the data transmission module in a data mode;
The random key module is used for randomly extracting the encryption key from the random coding pool and judging whether the encryption key is effective or not;
The random key module is configured with a random key policy comprising:
Randomly extracting a six-to-eighteen-bit encryption key from a random coding pool, naming each character in the encryption key as a key character, acquiring a decimal number corresponding to the key character based on ASCII coding, and marking the decimal number as a character number;
obtaining the minimum value and the maximum value in the character numbers, respectively marking the minimum character and the maximum character, subtracting the minimum character from the first character threshold value, and obtaining a first comparison threshold value;
adding the maximum character with the first comparison threshold value, and outputting a key invalidation signal if the calculation result is larger than the second character threshold value; if the calculated result is smaller than or equal to the second character threshold value, outputting a key valid signal;
if the key invalidation signal is output, the encryption key is extracted again; if the key effective signal is output, all the character numbers in the encryption key are increased by a first comparison threshold value and are converted into characters based on ASCII codes, so that a converted key is obtained;
The data encryption module is used for obtaining data to be transmitted, and carrying out data encryption on the data to be transmitted to obtain encrypted data; the data encryption module comprises a character string extraction unit, a first character string encryption unit and a second character string encryption unit;
the character string extraction unit is configured with a character string extraction policy including:
acquiring data to be transmitted, converting the data to be transmitted into first coded data based on UTF-8 coding, and converting the first coded data into hexadecimal second coded data based on ASCII coding;
Numbering each character in the second coded data according to the sequence from left to right, and representing the number by a symbol D n, wherein n is a non-zero natural number and n is a serial number of D;
Extracting the characters with the n being an odd number, and arranging the characters in the sequence from the small n to the large n to obtain a first character string; extracting the characters with even n, and arranging the characters in the sequence from small n to large n to obtain a second character string;
performing encryption operation on the first character string and the second character string to obtain encrypted data;
the first string encryption unit is configured with a first string encryption policy including:
Acquiring an encryption key, and converting the encryption key into hexadecimal encryption codes based on ASCII codes; extracting numbers in the encryption codes according to the sequence from left to right, marking the numbers as encryption numbers, extracting the rest letters according to the sequence from left to right, and marking the rest letters as encryption letters;
numbering each digit in the encrypted digits, denoted N k, wherein k is a non-zero natural number and k is a sequence number of N;
Adding N k with odd k to obtain a first digital sum, and adding N k with even k to obtain a second digital sum;
Calculating the greatest common divisor and the least common multiple of the first digital sum and the second digital sum, adding the greatest common divisor and the least common multiple, and marking the single digit of the calculated result as an encryption common number;
Numbering the characters in the first character string, and marking the characters as DY i, wherein i is a non-zero natural number and i is a sequence number of DY;
comparing DY i with the encryption public number, and outputting a decimal signal if DY i is smaller than or equal to the encryption public number; if DY i is larger than the encryption public number, outputting a large number signal;
If the decimal signal is output, calculating an encryption male number minus DY i, if the decimal signal is output, calculating DY i minus the encryption male number, and marking the calculation result of each time as Dy i, wherein i is the sequence number of Dy and Dy i corresponds to DY i;
Dy i is combined according to the sequence from i to i, so that a first encrypted character string is obtained;
Performing encryption operation on the second character string based on the encryption letters to obtain a second encryption character string, and then combining the first encryption character string with the second encryption character string to obtain encrypted data;
The second string encryption unit is configured with a second string encryption policy including:
assigning letters to 1 to 26 in the order of letters A to Z, and naming the letters as letter assignment;
The method comprises the steps of obtaining encrypted letters, adding letter assignments corresponding to all letters in the encrypted letters, marking a calculation result as an assignment operation value, calculating an assignment operation value module 26, and marking a remainder as an operation remainder;
Numbering the characters in the second character string, and marking the characters as DE j, wherein j is a non-zero natural number and j is a serial number of DE;
For DE j, judging that DE j is a number or a letter, and outputting a digital processing signal if DE j is a number; if DE j is a letter, outputting a letter processing signal;
Calculating DE j minus the remainder of the operation, and marking the calculation result as De j, wherein j is the serial number of De and De j corresponds to DE j;
If the digital processing signal is output, adding 10 to De j when De j is negative, and continuing adding 10 when De j is non-negative; if the letter processing signal is output, when the De j is a negative number, adding the De j to 26, and converting the De j into letters according to letter assignment;
Dej is combined according to the sequence from j to j, so that a second encrypted character string is obtained;
The method comprises the steps of obtaining a converted secret key, randomly inserting characters in the converted secret key into a first encryption character string, and splicing a second encryption character string into the first encryption character string to obtain encrypted data;
the restoring code generating module is used for generating a data restoring code based on the encrypted data;
The restoring code generating module is configured with a restoring code generating strategy, and the restoring code generating strategy comprises:
numbering the encrypted data, and marking the encrypted data as G p, wherein p is a non-zero natural number and p is a sequence number of G;
Converting G p into hexadecimal numbers according to ASCII codes, then calculating G p+Gp+1, and marking the calculation result as F p, wherein F p corresponds to G p;
obtaining the maximum value of p, marking the maximum value as max (p), and stopping calculation when F max(p)-1 is obtained by calculation;
Comparing F p with a first coding threshold, and outputting a coding reduction signal if F p is larger than the first coding threshold; if F p is smaller than or equal to the first coding threshold, outputting a coding normal signal;
If the code reduction signal is output, F p is reduced by a second code threshold;
Sequencing and combining F p according to the order of p from small to large, and adding G max(p) at the tail to obtain a data reduction code;
The data transmission module is used for respectively transmitting the encrypted data and the data recovery code through the two channels, and the receiving party receives the encrypted data and then decrypts the encrypted data to obtain decrypted data;
The data transmission module is configured with a data transmission policy comprising:
Transmitting the encrypted data to a receiver through a first channel, and simultaneously transmitting a data reduction code to a reduction code database through a second channel;
verifying the identity information of the receiver, and performing data decryption on the encrypted data based on a decryption program after verification is passed to obtain decrypted data;
The data verification module is used for verifying whether the decrypted data is tampered, and if the decrypted data is tampered, the encrypted data is restored through the data restoring code and the data decryption is carried out again; the data verification module comprises a tampering analysis unit and a data restoration unit;
the tamper analysis unit is configured with a tamper analysis policy, the tamper analysis policy comprising:
Obtaining decryption data;
judging whether the decrypted data has messy codes or not, and if so, outputting a data restoring signal; if not, outputting a data normal signal;
If the data restoring signal is output, restoring the data restoring code;
the data recovery unit is configured with a data recovery policy, the data recovery policy comprising:
Requesting a data reduction code from a reduction code database;
Grouping numbering is carried out on the data reduction codes according to a group of every two characters, and the grouping number is represented by a symbol R u, wherein u is a non-zero natural number and u is a serial number of R;
Obtaining the maximum value of u, marking as max (u), sequentially calculating R u-1-Ru according to the sequence from the large to the small of u, updating the calculation result into R u-1, subtracting u for one to continue calculation until u=1, stopping calculation, sequencing and combining the updated R u according to the sequence from the small to the large of u, and converting the updated R u into characters based on ASCII codes to obtain reduction data;
and decrypting the restored data through a decryption program again to obtain decrypted data.
In an embodiment 3, the application provides, in a third aspect, an electronic device comprising a processor and a memory storing computer readable instructions that, when executed by the processor, perform the steps of any of the methods described above. Through the above technical solution, the processor and the memory are interconnected and communicate with each other through a communication bus and/or other form of connection mechanism, the memory stores a computer program executable by the processor, which when executed by the electronic device, performs the method in any of the alternative implementations of the above embodiments to realize the following functions: randomly extracting an encryption key from the random coding pool and judging whether the encryption key is valid or not; obtaining data to be transmitted, and carrying out data encryption on the data to be transmitted to obtain encrypted data; generating a data reduction code based on the encrypted data; the encrypted data and the data reducing code are transmitted respectively through the double channels; verifying whether the decrypted data has been tampered with.
In an embodiment 4, a fourth aspect, the present application provides a storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of any of the methods described above. By the above technical solution, the computer program, when executed by the processor, performs the method in any of the alternative implementations of the above embodiments to implement the following functions: randomly extracting an encryption key from the random coding pool and judging whether the encryption key is valid or not; obtaining data to be transmitted, and carrying out data encryption on the data to be transmitted to obtain encrypted data; generating a data reduction code based on the encrypted data; the encrypted data and the data reducing code are transmitted respectively through the double channels; verifying whether the decrypted data has been tampered with.
In the foregoing embodiments of the present application, the descriptions of the embodiments are emphasized, and for a portion of this disclosure that is not described in detail in this embodiment, reference is made to the related descriptions of other embodiments.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media having computer-usable program code embodied therein. The storage medium may be implemented by any type or combination of volatile or nonvolatile Memory devices, such as static random access Memory (Static Random Access Memory, SRAM), electrically erasable programmable Read-Only Memory (ELECTRICALLY ERASABLE PROGRAMMABLE READ-Only Memory, EEPROM), erasable programmable Read-Only Memory (Erasable Programmable Read Only Memory, EPROM), programmable Read-Only Memory (Programmable Read-Only Memory, PROM), read-Only Memory (ROM), magnetic Memory, flash Memory, magnetic disk, or optical disk. These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. The above-described apparatus embodiments are merely illustrative, for example, the division of the units is merely a logical function division, and there may be other manners of division in actual implementation, and for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some communication interface, device or unit indirect coupling or communication connection, which may be in electrical, mechanical or other form.

Claims (4)

1. The data transmission method based on the Beidou satellite is characterized by comprising the following steps of:
randomly extracting an encryption key from the random coding pool and judging whether the encryption key is valid or not;
Obtaining data to be transmitted, and carrying out data encryption on the data to be transmitted to obtain encrypted data;
generating a data reduction code based on the encrypted data;
The encrypted data and the data recovery code are transmitted respectively through the two channels, and the receiving party receives the encrypted data and then decrypts the encrypted data to obtain decrypted data;
Verifying whether the decrypted data is tampered, if so, recovering the decrypted data through the data recovery code to obtain encrypted data and decrypting the data again;
Randomly extracting the encryption key from the random coding pool and judging whether the encryption key is valid or not comprises the following substeps:
Randomly extracting a six-to-eighteen-bit encryption key from a random coding pool, naming each character in the encryption key as a key character, acquiring a decimal number corresponding to the key character based on ASCII coding, and marking the decimal number as a character number;
obtaining the minimum value and the maximum value in the character numbers, respectively marking the minimum character and the maximum character, subtracting the minimum character from the first character threshold value, and obtaining a first comparison threshold value;
adding the maximum character with the first comparison threshold value, and outputting a key invalidation signal if the calculation result is larger than the second character threshold value; if the calculated result is smaller than or equal to the second character threshold value, outputting a key valid signal;
if the key invalidation signal is output, the encryption key is extracted again; if the key effective signal is output, all the character numbers in the encryption key are increased by a first comparison threshold value and are converted into characters based on ASCII codes, so that a converted key is obtained;
Obtaining data to be transmitted, and carrying out data encryption on the data to be transmitted to obtain encrypted data, wherein the method comprises the following substeps:
acquiring data to be transmitted, converting the data to be transmitted into first coded data based on UTF-8 coding, and converting the first coded data into hexadecimal second coded data based on ASCII coding;
Numbering each character in the second coded data according to the sequence from left to right, and representing the number by a symbol D n, wherein n is a non-zero natural number and n is a serial number of D;
Extracting the characters with the n being an odd number, and arranging the characters in the sequence from the small n to the large n to obtain a first character string; extracting the characters with even n, and arranging the characters in the sequence from small n to large n to obtain a second character string;
performing encryption operation on the first character string and the second character string to obtain encrypted data;
the encryption operation on the first character string and the second character string comprises the following substeps:
Acquiring an encryption key, and converting the encryption key into hexadecimal encryption codes based on ASCII codes; extracting numbers in the encryption codes according to the sequence from left to right, marking the numbers as encryption numbers, extracting the rest letters according to the sequence from left to right, and marking the rest letters as encryption letters;
numbering each digit in the encrypted digits, denoted N k, wherein k is a non-zero natural number and k is a sequence number of N;
Adding N k with odd k to obtain a first digital sum, and adding N k with even k to obtain a second digital sum;
Calculating the greatest common divisor and the least common multiple of the first digital sum and the second digital sum, adding the greatest common divisor and the least common multiple, and marking the single digit of the calculated result as an encryption common number;
Numbering the characters in the first character string, and marking the characters as DY i, wherein i is a non-zero natural number and i is a sequence number of DY;
comparing DY i with the encryption public number, and outputting a decimal signal if DY i is smaller than or equal to the encryption public number; if DY i is larger than the encryption public number, outputting a large number signal;
If the decimal signal is output, calculating an encryption male number minus DY i, if the decimal signal is output, calculating DY i minus the encryption male number, and marking the calculation result of each time as Dy i, wherein i is the sequence number of Dy and Dy i corresponds to DY i;
Dy i is combined according to the sequence from i to i, so that a first encrypted character string is obtained;
Performing encryption operation on the second character string based on the encryption letters to obtain a second encryption character string, and then combining the first encryption character string with the second encryption character string to obtain encrypted data;
The encryption operation on the second character string based on the encryption letter comprises the following sub-steps:
assigning letters to 1 to 26 in the order of letters A to Z, and naming the letters as letter assignment;
The method comprises the steps of obtaining encrypted letters, adding letter assignments corresponding to all letters in the encrypted letters, marking a calculation result as an assignment operation value, calculating an assignment operation value module 26, and marking a remainder as an operation remainder;
Numbering the characters in the second character string, and marking the characters as DE j, wherein j is a non-zero natural number and j is a serial number of DE;
For DE j, judging that DE j is a number or a letter, and outputting a digital processing signal if DE j is a number; if DE j is a letter, outputting a letter processing signal;
Calculating DE j minus the remainder of the operation, and marking the calculation result as De j, wherein j is the serial number of De and De j corresponds to DE j;
If the digital processing signal is output, adding 10 to De j when De j is negative, and continuing adding 10 when De j is non-negative; if the letter processing signal is output, when the De j is a negative number, adding the De j to 26, and converting the De j into letters according to letter assignment;
Dej is combined according to the sequence from j to j, so that a second encrypted character string is obtained;
The method comprises the steps of obtaining a converted secret key, randomly inserting characters in the converted secret key into a first encryption character string, and splicing a second encryption character string into the first encryption character string to obtain encrypted data;
generating a data reduction code based on the encrypted data includes the sub-steps of:
numbering the encrypted data, and marking the encrypted data as G p, wherein p is a non-zero natural number and p is a sequence number of G;
Converting G p into hexadecimal numbers according to ASCII codes, then calculating G p+Gp+1, and marking the calculation result as F p, wherein F p corresponds to G p;
obtaining the maximum value of p, marking the maximum value as max (p), and stopping calculation when F max(p)-1 is obtained by calculation;
Comparing F p with a first coding threshold, and outputting a coding reduction signal if F p is larger than the first coding threshold; if F p is smaller than or equal to the first coding threshold, outputting a coding normal signal;
If the code reduction signal is output, F p is reduced by a second code threshold;
Sequencing and combining F p according to the order of p from small to large, and adding G max(p) at the tail to obtain a data reduction code;
The method comprises the following sub-steps that encrypted data and a data recovery code are respectively transmitted through two channels, a receiver receives the encrypted data and then decrypts the encrypted data, and decrypted data are obtained:
Transmitting the encrypted data to a receiver through a first channel, and simultaneously transmitting a data reduction code to a reduction code database through a second channel;
And verifying the identity information of the receiver, and performing data decryption on the encrypted data based on a decryption program after verification is passed to obtain decrypted data.
2. The data transmission method based on the Beidou satellite according to claim 1, wherein verifying whether the decrypted data is tampered, if the decrypted data is tampered, recovering the encrypted data through the data recovery code and decrypting the data again comprises the following sub-steps:
Obtaining decryption data;
judging whether the decrypted data has messy codes or not, and if so, outputting a data restoring signal; if not, outputting a data normal signal;
And if the data restoring signal is output, restoring the data restoring code.
3. The data transmission method based on the Beidou satellite according to claim 2, wherein the step of restoring the data reduction code comprises the following sub-steps:
Requesting a data reduction code from a reduction code database;
Grouping numbering is carried out on the data reduction codes according to a group of every two characters, and the grouping number is represented by a symbol R u, wherein u is a non-zero natural number and u is a serial number of R;
Obtaining the maximum value of u, marking as max (u), sequentially calculating R u-1-Ru according to the sequence from the large to the small of u, updating the calculation result into R u-1, subtracting u for one to continue calculation until u=1, stopping calculation, sequencing and combining the updated R u according to the sequence from the small to the large of u, and converting the updated R u into characters based on ASCII codes to obtain reduction data;
and decrypting the restored data through a decryption program again to obtain decrypted data.
4. A Beidou satellite-based data transmission system suitable for the Beidou satellite-based data transmission method of any one of claims 1-3 and characterized by comprising a random key module, a data encryption module, a recovery code generation module, a data transmission module and a data verification module; the random key module, the data encryption module, the restoring code generation module and the data verification module are respectively connected with the data transmission module in a data mode;
the random key module is used for randomly extracting the encryption key from the random coding pool and judging whether the encryption key is effective or not;
the data encryption module is used for obtaining data to be transmitted, and carrying out data encryption on the data to be transmitted to obtain encrypted data;
the restoring code generating module is used for generating a data restoring code based on the encrypted data;
The data transmission module is used for respectively transmitting the encrypted data and the data recovery code through two channels, and the receiving party receives the encrypted data and then decrypts the encrypted data to obtain decrypted data;
the data verification module is used for verifying whether the decrypted data is tampered or not, and if the decrypted data is tampered, the encrypted data is restored through the data restoring code and the data decryption is carried out again.
CN202410719410.5A 2024-06-05 2024-06-05 Beidou satellite-based data transmission method and system Active CN118300672B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410719410.5A CN118300672B (en) 2024-06-05 2024-06-05 Beidou satellite-based data transmission method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410719410.5A CN118300672B (en) 2024-06-05 2024-06-05 Beidou satellite-based data transmission method and system

Publications (2)

Publication Number Publication Date
CN118300672A CN118300672A (en) 2024-07-05
CN118300672B true CN118300672B (en) 2024-08-20

Family

ID=91684737

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410719410.5A Active CN118300672B (en) 2024-06-05 2024-06-05 Beidou satellite-based data transmission method and system

Country Status (1)

Country Link
CN (1) CN118300672B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118487865B (en) * 2024-07-09 2024-09-20 富维本特勒汽车零部件(天津)有限公司 Production signal encryption transmission method, system and medium based on password hash function

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114189854A (en) * 2021-04-13 2022-03-15 贵阳永青仪电科技有限公司 Tower footing safety monitoring terminal based on Beidou communication and 4G communication and data transmission method
CN117098120A (en) * 2023-10-19 2023-11-21 国网山西省电力公司晋城供电公司 Beidou short message data encryption and decryption method, equipment and storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0851628A1 (en) * 1996-12-23 1998-07-01 ICO Services Ltd. Key distribution for mobile network
KR101491818B1 (en) * 2012-04-20 2015-02-11 아주대학교산학협력단 Method and apparatus for communicating with satellite based on physical layer network coding using data encryption and decryption
CN117294429B (en) * 2023-09-23 2024-04-19 南京市公共资源交易中心江北新区分中心 Public resource transaction data encryption and decryption method, system and medium based on blockchain

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114189854A (en) * 2021-04-13 2022-03-15 贵阳永青仪电科技有限公司 Tower footing safety monitoring terminal based on Beidou communication and 4G communication and data transmission method
CN117098120A (en) * 2023-10-19 2023-11-21 国网山西省电力公司晋城供电公司 Beidou short message data encryption and decryption method, equipment and storage medium

Also Published As

Publication number Publication date
CN118300672A (en) 2024-07-05

Similar Documents

Publication Publication Date Title
CN118300672B (en) Beidou satellite-based data transmission method and system
CN101610088B (en) System and method for encoding data based on a compression technique with security features
CN100576227C (en) A kind of software encrypting registration piracy-preventing method
EP1041767B1 (en) Authentication of electronic data
CN116032474B (en) Safety protection system based on big data computer network
CN106506487A (en) A kind of information Encrypt and Decrypt method and device
CN106612172A (en) Data change recovery algorithm capable of restoring data authenticity in cloud storage
CN107105324B (en) Method and client for protecting bullet screen information
CN115842621B (en) Intelligent medical system based on big data and cloud edge cooperation
CN116208420B (en) Monitoring information safety transmission method, system, equipment and storage medium
US20020018561A1 (en) Data encryption and decryption using error correction methodologies
CN117640256B (en) Data encryption method, recommendation device and storage medium of wireless network card
CN110505049A (en) A kind of text information transmission method, apparatus and system
CN114051006A (en) Data transmission method, data transmission device, computer equipment and storage medium
CN103117850B (en) A kind of method for building up of the cryptographic system based on random sequence database
CN116108410A (en) Identity credential generation method and device
CN114253484B (en) Big data cloud storage server
CN117294429B (en) Public resource transaction data encryption and decryption method, system and medium based on blockchain
KR101584127B1 (en) System and method for deniable encryption
CN109995531A (en) The anti-deception measures of Beidou II system protected based on domestic password and spread spectrum information
CN117714613A (en) Image encryption method and device, electronic equipment and storage medium
US20150067870A1 (en) Secret communication method with self-authentication capability
CN116664123A (en) Digital wallet design method based on blockchain technology
CN113518244B (en) Digital television signal data transmission method and device based on substitute text combination
CN115834163A (en) Method, device, equipment and storage medium for generating secret key of encrypted data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant