Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Upper computer communication encryption method and system

An encryption method and computer technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as easy forgery of industrial control upper computers, complicated encryption/decryption of encryption technology, and increased decryption time.

Pending Publication Date: 2021-05-11
SICHUAN HUSHAN ELECTRIC APPLIANCE
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is that when using unencrypted communication commands, the industrial control host computer is easy to be forged, and the use of the existing encryption method increases the decryption time, which directly affects the response speed of the device, and the purpose is to provide a host Computer communication encryption method and system, which solves the problems of complex encryption / decryption and slow response speed in existing encryption technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Upper computer communication encryption method and system
  • Upper computer communication encryption method and system
  • Upper computer communication encryption method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] In engineering, in order to protect the control instructions of the upper computer software from being deciphered, an encryption mechanism is used for protection, such as figure 1 As shown, the central control command sent on the basis of non-encryption is easy to be intercepted and analyzed. After the central control command is cracked, the upper computer can be counterfeited, such as Figure 7 shown. The device can be controlled according to the instructions sent by the host computer software. However, since the central control instructions are not encrypted, the central control instructions are easily leaked and the device is deciphered, thereby imitating a similar upper computer software control device. If the central control instructions are over-encrypted, the decryption process will take time, and it will be difficult for the device to achieve high real-time performance during the execution of the instructions. Especially in the audio industry, audio processing ...

Embodiment 2

[0041] Present embodiment 2 is on the basis of embodiment 1, a kind of host computer communication encryption method, comprises the following steps:

[0042] Step 1: Divide the central control instructions of the upper computer, specifically: frame header sa, function frame s1, function code s2, ..., function code sn, obfuscation code sv, data data, check code sx, frame tail se ,Such as Figure 6 shown. And calculate the obfuscation code sv=f{s1, s2,..., sn, data, sx} according to the data bits;

[0043] Step 2: encryption / decryption processing, the specific steps are as follows:

[0044] Asymmetric encryption is used to generate a pair of secret keys, public key PUB_R and private key PRI_R. The key information R{s1,s2,…,sn,sv,sx} is encrypted with the private key PRI_R to generate R_h; after encryption, the central control Command: M={sa,R,data,se}

[0045] Step 3: Distribute the public key PUB_R and the encrypted central control instruction M.

[0046] Step 4: After rec...

Embodiment 3

[0052] Embodiment 3 is based on Embodiment 2, a host computer communication encryption system, including an encryption and decryption unit and a hash operation unit, the encryption and decryption unit is used to encrypt and decrypt the central control instructions, and the hash operation unit is used to Generate obfuscated code.

[0053] The hash operation unit is responsible for collecting information and performing hash operations. The obfuscation code is generated by using a hash operation unit. The function code determines the command to be executed after the central control command is received by the device or the host computer. Mix the currently executed function codes with data and check codes into the hash operation unit. The hash operation unit receives and performs hash operations step by step to generate an initial obfuscation code with a length of n bytes, and the obfuscation code is obtained by adding an obfuscation flag to the obfuscation code. Such as Figur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an upper computer communication encryption method and system, and the method comprises the steps: carrying out the confusion processing of a communication instruction between an upper computer and equipment before the communication between the upper computer and the equipment, and obtaining a confusion signal, wherein the communication instruction comprises an obfuscation code and a plurality of function codes, the obfuscation code is randomly interspersed among part of the function codes, the function codes are used for indicating various functions of the equipment, and the equipment acquires execution data according to the indication of the function codes and executes the corresponding functions; encrypting the confusion signal by adopting an asymmetric encryption algorithm to obtain an encrypted signal; when the upper computer communicates with the equipment, performing communication through the encrypted signal; and after the encrypted signal is received, performing decryption firstly, then removing the confusion code, and obtaining and executing a communication instruction. The encryption strategy is flexible and difficult to crack, and the decryption speed is high; and therefore, instructions of the upper computer are not easy to crack, product equipment is not easy to control by a counterfeit upper computer, and important data are not illegally tampered or peeped.

Description

technical field [0001] The invention relates to the application field of computer communication encryption, in particular to a communication encryption method and system for a host computer. Background technique [0002] At present, there are a large number of encryption algorithms in the process of computer communication, but under the premise that the upper computer and the device need to send and receive instructions quickly, the security of encryption and the speed of decryption are particularly important here. Based on this purpose, due to the complexity of the application itself and the backwardness of technical means, the encryption and decryption speed of some devices is too slow, resulting in slow response of device control and extremely poor user experience. This has brought a lot of problems to social production practice. [0003] For example, in practical applications, it is often necessary to hang a string of line arrays indoors, and then use the industrial con...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0869H04L63/0442
Inventor 杨风宇钱兵蔡颖敏罗宇
Owner SICHUAN HUSHAN ELECTRIC APPLIANCE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products