Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data encryption method, apparatus and system

A technology of data encryption and encryption algorithm, applied in the field of data transmission, can solve problems such as low security, and achieve the effect of small amount of data and high efficiency

Inactive Publication Date: 2017-08-11
北京德威特电气科技股份有限公司
View PDF11 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The embodiment of the present invention provides a data encryption method, device and system to at least solve the technical problem of low security in the prior art that industrial switches and energy control equipment all use plain text transmission to transmit data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption method, apparatus and system
  • Data encryption method, apparatus and system
  • Data encryption method, apparatus and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] According to an embodiment of the present invention, an embodiment of a data encryption method is provided. It should be noted that the steps shown in the flowcharts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and, although A logical order is shown in the flowcharts, but in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0032] figure 1 is a flowchart of a data encryption method according to an embodiment of the present invention, such as figure 1 As shown, the method includes the following steps:

[0033] Step S102, sending one or more first data to the first receiving end, wherein the first data includes at least one first random number encrypted by an asymmetric algorithm.

[0034]Specifically, the above-mentioned first data may be sent by a device end, and the device end may be a device such as a smart switch. The above-me...

Embodiment 2

[0067] According to an embodiment of the present invention, an embodiment of a data encryption method is provided. It should be noted that the steps shown in the flowcharts of the drawings can be executed in a computer system such as a set of computer-executable instructions, and, although A logical order is shown in the flowcharts, but in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0068] figure 2 is a flowchart of another data encryption method according to an embodiment of the present invention, such as figure 2 As shown, the method includes the following steps:

[0069] Step S202, receiving one or more first data sent by the sender, wherein the first data includes at least one first random number encrypted by an asymmetric algorithm.

[0070] Specifically, the above-mentioned sending end may be a device end, for example, a device such as a smart switch.

[0071] Step S204, sending one or more seco...

Embodiment 3

[0094] According to an embodiment of the present invention, an embodiment of a data encryption system is provided, Figure 4 is a schematic structural diagram of an optional data encryption system according to an embodiment of the present application, combined with Figure 4 As shown, the system includes:

[0095] The sending end 40, sending one or more first data to the first receiving end, receiving one or more second data returned by the first receiving end, and according to the first random number included in the first data and the random number included in the second data The second random number constitutes a key, wherein the first data includes at least one first random number encrypted by an asymmetric algorithm, and both the first data and the second data include at least one second random number encrypted by an asymmetric algorithm. random number.

[0096] The first receiving end 42 communicates with the sending end for receiving one or more first data sent by the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data encryption method, apparatus and system. The data encryption method includes the steps: sending one or more first data to a first reception end, wherein the first data at least includes a first randomized number which is encrypted through an asymmetric algorithm; receiving one or more second data returned from the first reception end, wherein the second data at least includes a second randomized number which is encrypted through an asymmetric algorithm; and according to the first randomized number and the second randomized number, forming a secret key. The data encryption method, apparatus and system can solve the technical problem that in the prior art, industrial switches and energy control equipment transmit data through a plaintext transmission mode, so that safety is lower.

Description

technical field [0001] The present invention relates to the field of data transmission, in particular to a data encryption method, device and system. Background technique [0002] Under the framework of the existing technology, only switches and other industrial and energy control equipment usually do not have an encryption system, and the data transmission is completely transmitted in plain text. Therefore, as long as you understand the standard communication protocol, even as long as you can connect to the internal network, you can control the operation of the device, resulting in an unsafe state of the device. [0003] In order to solve the problem of data security of the above-mentioned equipment, the usual practice is to purchase an encrypted communication module produced by a third-party manufacturer on the basis of plaintext transmission to meet the requirements of communication encryption. The communication encryption modules of third-party manufacturers have differ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/08H04L9/06
CPCH04L9/0631H04L9/0869H04L63/0442
Inventor 翟凡刘国营赵长兵李慧勇李增利张鉴刘兴昌常亮王敬仁欧阳强高龙集常红旗郝立鹏蒋玉红薛利民侯红民康颖张嗣勇李利霞李兴
Owner 北京德威特电气科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products