Method and system for improving data transmission security

A technology for data transmission and security, applied in the field of network communication, can solve the problems of low security, easy cracking of data transmission methods, security loopholes, etc., to achieve the effect of improving security, ensuring security and effectiveness, and increasing the degree of protection

Active Publication Date: 2021-09-07
SUZHOU ZHIJIA SCI & TECH CO LTD
View PDF10 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The current method of data transmission is: the communication initiator (referred to as Master) sends the original data and the check value 1 of the data (CRC\MD5\parity check, etc.) to the receiver (referred to as Slave), and the slave Perform the same algorithm to calculate the check value 2, and compare it with the received check value 1. If they are consistent, the data transmission is considered successful and valid; Trigger the action strategy (such as retransmission) when the transmission fails; in the above-mentioned network communication process, the transmission check value and original data at both ends of the data generally interact through the same data communication bus, and the validity verification of data transmission is guaranteed through data interaction , and there are security loopholes in the above transmission verification process. For example, the cracker can actively send various test information to the cracked device continuously, and count the action rules of the sender. As long as the data communication bus is cracked, the original data can be obtained at the same time. Data and check value, so as to intercept the communication data, that is, the current data transmission method has the problems of easy cracking and low security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for improving data transmission security
  • Method and system for improving data transmission security
  • Method and system for improving data transmission security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] like figure 1 with figure 2 , The present embodiment discloses a method for improving the security of data transmission, comprising:

[0049] S100: The Master and Slave terminal end connected via a data communication bus and GPIO (General Purpose Input Output Interface), SPI bus (full-duplex synchronous serial bus);

[0050] SPI communication is a full duplex communication mode, the transmission rate is 10Mbps general application, SPI bus includes four signal lines, particularly for the MOSI (master out / slave input data lines), the MISO (Master In / Slave Out data line), the SCK (serial clock line) and CS (from the enable signal line device, chip select), an end of the communication master device must be set to both, from one end of the device, a master device from a plurality of devices can be docked, a plurality of slave devices can share the MOSI, MISO, SCK, but each CS pin is different from the device; All operations must be initiated by the master device, the master ...

Embodiment 2

[0085] like image 3 Shown, for improving the security of the data transmission system, comprising a module Master, Slave module, the GPIO (general purpose input output interface), the SPI bus (full-duplex synchronous serial bus) and the data communications bus; Master and Slave Modules module GPIO, SPI bus and data communication bus.

[0086]Means for Master Master initiates communication terminal, carries out the following operations:

[0087] The Master side down GPIO signal, sent via the MOSI SPI bus to a first check value Slave module, transmits data via a data communication bus to the interaction module and pulled Slave Master terminal GPIO signal;

[0088] Master module is further configured to, when an encryption algorithm to obtain Slave client request to initiate a communication calculating frequency based on the PWM signal received index number, and the clock signal SCK sent on SPI bus; Master index number corresponding to the terminal according to the encryption algorit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for improving data transmission security. The method comprises the following steps of: connecting a Master end and a Slave end through GPIO (General Purpose Input/Output) and SPI (Serial Peripheral Interface) buses and a data communication bus; pulling down a GPIO (General Purpose Input/Output) signal of the Master end, actively initiating communication by the Master end, and transmitting interaction data and a corresponding check value to the Slave end; transmitting interaction data through a data communication bus, and transmitting a verification value through an SPI bus; enabling the Slave end to judge a transmission result of the data based on the received interaction data and the verification value; and outputting a PWM (Pulse Width Modulation) signal on a GPIO (General Purpose Input/Output) interface of the Slave end, requesting to initiate communication by the Slave end, and informing the Master end of the transmission result. According to the method, the validity of communication data is verified through GPIO and SPI buses, so that the security of data transmission is improved; and meanwhile, the verification value and the interaction data are sent through different buses, so that the security of data transmission is improved.

Description

Technical field [0001] The present invention relates to network communication technology field, particularly relates to a method and system to improve data transmission security. Background technique [0002] The purpose is to network traffic data secure transmission to the receiver, communications security products more and more attention all manufacturers and users. [0003] Currently the data transfer mode is used: the communication originator (the Master) sends to the recipient (the Slave) the original data and a check value data 1 (CRC \ MD5 \ parity, etc.), the received data Slave carried out the same arithmetic operation check value 2, and compared with the received check value 1. If they are consistent, the data transmission is considered successful and effective; If not, the transmission is considered failed initiative to inform the Master, strategy triggers its operation (e.g., retransmission) of a transmission failure; said network data communication process ends, and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/12H04L63/0428
Inventor 刘海旗吴道龙于晨笛毛卫民
Owner SUZHOU ZHIJIA SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products