CN116233767B - Cluster intercom communication method, device, equipment and storage medium - Google Patents
Cluster intercom communication method, device, equipment and storage medium Download PDFInfo
- Publication number
- CN116233767B CN116233767B CN202310272600.2A CN202310272600A CN116233767B CN 116233767 B CN116233767 B CN 116233767B CN 202310272600 A CN202310272600 A CN 202310272600A CN 116233767 B CN116233767 B CN 116233767B
- Authority
- CN
- China
- Prior art keywords
- key
- business data
- encrypted
- business
- quantum
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000006854 communication Effects 0.000 title claims abstract description 109
- 238000004891 communication Methods 0.000 title claims abstract description 106
- 238000000034 method Methods 0.000 title claims abstract description 94
- 238000012545 processing Methods 0.000 claims abstract description 15
- 230000004044 response Effects 0.000 claims description 37
- 230000008569 process Effects 0.000 description 16
- 230000005540 biological transmission Effects 0.000 description 11
- 238000010586 diagram Methods 0.000 description 10
- 230000006870 function Effects 0.000 description 8
- 238000004422 calculation algorithm Methods 0.000 description 7
- 238000004590 computer program Methods 0.000 description 6
- 238000005336 cracking Methods 0.000 description 5
- 230000004224 protection Effects 0.000 description 5
- 238000004364 calculation method Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 4
- 101000827703 Homo sapiens Polyphosphoinositide phosphatase Proteins 0.000 description 3
- 102100023591 Polyphosphoinositide phosphatase Human genes 0.000 description 3
- 101100382067 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) BUD14 gene Proteins 0.000 description 3
- 101100012902 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) FIG2 gene Proteins 0.000 description 3
- 101100233916 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) KAR5 gene Proteins 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 101001121408 Homo sapiens L-amino-acid oxidase Proteins 0.000 description 1
- 102100026388 L-amino-acid oxidase Human genes 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/06—Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
- H04W4/10—Push-to-Talk [PTT] or Push-On-Call services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/14—Systems for two-way working
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本公开提供一种集群对讲通信方法、装置、设备及存储介质。该方法包括:通过实时生成的业务数据密钥对业务数据进行加密,得到加密业务数据;并基于业务数据对应的加密密钥,通过加密密钥对业务数据密钥进行加密,得到加密业务数据密钥;将加密业务数据密钥发送到密钥平台进行解密和加密处理,并将加密业务数据发送到目标集群对讲设备,以使目标集群对讲设备基于密钥平台处理后的业务数据密钥对加密业务数据进行解密,得到业务数据。本公开解决了现有技术中大规模音视频通信的安全性不足的问题,最大限度保证了加密业务数据密钥的安全性、加密业务数据的安全性,进而最大限度的保证了用于通信的业务数据的安全性。
The present disclosure provides a cluster intercom communication method, device, equipment and storage medium. The method includes: encrypting business data by a business data key generated in real time to obtain encrypted business data; and encrypting the business data key by the encryption key based on the encryption key corresponding to the business data to obtain an encrypted business data key; sending the encrypted business data key to the key platform for decryption and encryption processing, and sending the encrypted business data to the target cluster intercom device, so that the target cluster intercom device decrypts the encrypted business data based on the business data key processed by the key platform to obtain the business data. The present disclosure solves the problem of insufficient security of large-scale audio and video communications in the prior art, and maximizes the security of the encrypted business data key and the encrypted business data, thereby maximizing the security of the business data used for communication.
Description
技术领域Technical Field
本公开涉及量子加密通信技术领域,尤其涉及一种集群对讲通信方法、装置、设备及存储介质。The present disclosure relates to the field of quantum encryption communication technology, and in particular to a cluster intercom communication method, device, equipment and storage medium.
背景技术Background technique
随着通信技术发展,传统的智能单对单语音传输的对讲机已发展成集音视频数字化功能的集群对讲系统,并得到了广泛应用。通过公网平台,可以同时支持公网集群中大规模音视频通信。此时需要确保集群对讲系统的稳定性、可靠性和高效性。With the development of communication technology, the traditional intelligent one-to-one voice transmission intercom has developed into a cluster intercom system with audio and video digitization functions, and has been widely used. Through the public network platform, large-scale audio and video communications in the public network cluster can be supported at the same time. At this time, it is necessary to ensure the stability, reliability and efficiency of the cluster intercom system.
但同时存在大规模音视频通信的情况下,集群对讲系统在通信时仍采用传统加密方法对传输的数据进行加密,安全性不足,密码容易泄漏或被计算破解,且用户难以察觉被窃听,由此容易造成严重的损失。However, when there is large-scale audio and video communication, the cluster intercom system still uses traditional encryption methods to encrypt the transmitted data during communication, which is not secure enough, the password is easily leaked or cracked by calculation, and it is difficult for users to detect that they are being eavesdropped, which can easily cause serious losses.
发明内容Summary of the invention
本公开提供了一种集群对讲通信方法、装置、设备及存储介质,以解决现有技术中大规模音视频通信的安全性不足的问题。The present invention provides a cluster intercom communication method, device, equipment and storage medium to solve the problem of insufficient security of large-scale audio and video communications in the prior art.
第一方面,本公开提供了一种集群对讲通信方法,应用于集群对讲设备,集群对讲通信方法包括:In a first aspect, the present disclosure provides a cluster intercom communication method, which is applied to a cluster intercom device. The cluster intercom communication method includes:
基于业务数据对应的加密密钥,对业务数据进行加密,得到加密业务数据,加密密钥包括业务数据密钥;Encrypting the business data based on an encryption key corresponding to the business data to obtain encrypted business data, wherein the encryption key includes a business data key;
对业务数据密钥进行加密,得到加密业务数据密钥;Encrypting the business data key to obtain an encrypted business data key;
将加密业务数据密钥发送到密钥平台进行解密和加密处理,并将加密业务数据发送到目标集群对讲设备,以使目标集群对讲设备基于密钥平台处理后的业务数据密钥对加密业务数据进行解密,得到业务数据。The encrypted business data key is sent to the key platform for decryption and encryption processing, and the encrypted business data is sent to the target cluster intercom device, so that the target cluster intercom device decrypts the encrypted business data based on the business data key processed by the key platform to obtain the business data.
第二方面,本公开提供了一种集群对讲通信方法,应用于目标集群对讲设备,集群对讲通信方法包括:In a second aspect, the present disclosure provides a cluster intercom communication method, which is applied to a target cluster intercom device. The cluster intercom communication method includes:
响应于接收到的加密业务数据,从密钥平台中获取对应的加密业务数据密钥;In response to the received encrypted business data, obtaining a corresponding encrypted business data key from the key platform;
基于预设的加密密钥和加密业务数据密钥,获得对应的业务数据密钥;Based on the preset encryption key and the encrypted business data key, obtain the corresponding business data key;
基于业务数据密钥,对加密业务数据进行解密,得到对应的业务数据。Based on the business data key, the encrypted business data is decrypted to obtain the corresponding business data.
第三方面,本公开提供了一种集群对讲通信方法,应用于密钥平台,集群对讲通信方法包括:In a third aspect, the present disclosure provides a cluster intercom communication method, which is applied to a key platform. The cluster intercom communication method includes:
响应于接收到的加密业务数据密钥,确定对应的业务数据密钥;In response to the received encrypted business data key, determining a corresponding business data key;
响应于接收到的目标集群对讲设备的申请,对业务数据密钥重新加密;In response to the received application of the target cluster intercom device, re-encrypt the service data key;
将重新加密后的加密业务数据密钥发送到加密业务数据密钥对应的集群对讲设备。The re-encrypted encrypted business data key is sent to the cluster intercom device corresponding to the encrypted business data key.
第四方面,本公开提供了一种集群对讲通信装置,应用于集群对讲设备,包括:In a fourth aspect, the present disclosure provides a cluster intercom communication device, which is applied to a cluster intercom device, including:
第一加密模块,用于基于业务数据对应的加密密钥,对业务数据进行加密,得到加密业务数据,加密密钥包括业务数据密钥;A first encryption module, used to encrypt the business data based on an encryption key corresponding to the business data to obtain encrypted business data, where the encryption key includes a business data key;
第二加密模块,用于对业务数据密钥进行加密,得到加密业务数据密钥;A second encryption module is used to encrypt the business data key to obtain an encrypted business data key;
发送模块,用于将加密业务数据密钥发送到密钥平台进行解密和加密处理,并将加密业务数据发送到目标集群对讲设备,以使目标集群对讲设备基于密钥平台处理后的业务数据密钥对加密业务数据进行解密,得到业务数据。The sending module is used to send the encrypted business data key to the key platform for decryption and encryption processing, and send the encrypted business data to the target cluster intercom device, so that the target cluster intercom device decrypts the encrypted business data based on the business data key processed by the key platform to obtain the business data.
第五方面,本公开提供了一种集群对讲通信装置,应用于目标集群对讲设备,包括:In a fifth aspect, the present disclosure provides a cluster intercom communication device, which is applied to a target cluster intercom device, including:
接收模块,用于响应于接收到的加密业务数据,从密钥平台中获取对应的加密业务数据密钥;A receiving module, configured to obtain a corresponding encrypted business data key from a key platform in response to received encrypted business data;
解密模块,用于基于预设的加密密钥和加密业务数据密钥,获得对应的业务数据密钥;A decryption module, used to obtain a corresponding business data key based on a preset encryption key and an encrypted business data key;
确定模块,用于基于业务数据密钥,对加密业务数据进行解密,得到对应的业务数据。The determination module is used to decrypt the encrypted business data based on the business data key to obtain the corresponding business data.
第六方面,本公开提供了一种集群对讲通信装置,应用于密钥平台,包括:In a sixth aspect, the present disclosure provides a cluster intercom communication device, applied to a key platform, comprising:
解密模块,用于响应于接收到的加密业务数据密钥,确定对应的业务数据密钥;a decryption module, configured to determine a corresponding business data key in response to the received encrypted business data key;
加密模块,用于响应于接收到的目标集群对讲设备的申请,对业务数据密钥重新加密;An encryption module, used for re-encrypting the service data key in response to a received application from a target cluster intercom device;
发送模块,用于将重新加密后的加密业务数据密钥发送到加密业务数据密钥对应的集群对讲设备。The sending module is used to send the re-encrypted encrypted business data key to the cluster intercom device corresponding to the encrypted business data key.
第七方面,本公开还提供了一种控制设备,该控制设备包括:In a seventh aspect, the present disclosure further provides a control device, the control device comprising:
至少一个处理器;at least one processor;
以及与至少一个处理器通信连接的存储器;and a memory communicatively coupled to the at least one processor;
其中,存储器存储有可被至少一个处理器执行的指令,指令被至少一个处理器执行,以使控制设备执行如本公开第一方面中任一实施例对应的集群对讲通信方法;和/或,以使控制设备执行如本公开第二方面中任一实施例对应的集群对讲通信方法;和/或,以使控制设备执行如本公开第三方面中任一实施例对应的集群对讲通信方法。Among them, the memory stores instructions that can be executed by at least one processor, and the instructions are executed by at least one processor to enable the control device to execute a cluster intercom communication method corresponding to any embodiment of the first aspect of the present disclosure; and/or to enable the control device to execute a cluster intercom communication method corresponding to any embodiment of the second aspect of the present disclosure; and/or to enable the control device to execute a cluster intercom communication method corresponding to any embodiment of the third aspect of the present disclosure.
第四方面,本公开还提供了一种计算机可读存储介质,计算机可读存储介质中存储有计算机执行指令,计算机执行指令被处理器执行时用于实现如本公开第一方面任一的集群对讲通信方法;和/或,计算机执行指令被处理器执行时用于实现如本公开第二方面任一的集群对讲通信方法;和/或,计算机执行指令被处理器执行时用于实现如本公开第三方面任一的集群对讲通信方法。In a fourth aspect, the present disclosure further provides a computer-readable storage medium, in which computer execution instructions are stored, and when the computer execution instructions are executed by a processor, they are used to implement any cluster intercom communication method as described in the first aspect of the present disclosure; and/or, when the computer execution instructions are executed by a processor, they are used to implement any cluster intercom communication method as described in the second aspect of the present disclosure; and/or, when the computer execution instructions are executed by a processor, they are used to implement any cluster intercom communication method as described in the third aspect of the present disclosure.
第五方面,本公开还提供了一种计算机程序产品,其包含计算机执行指令,该计算机执行指令被处理器执行时用于实现如本公开第一方面任一的集群对讲通信方法;和/或,该计算机执行指令被处理器执行时用于实现如本公开第二方面任一的集群对讲通信方法;和/或,该计算机执行指令被处理器执行时用于实现如本公开第三方面任一的集群对讲通信方法。In a fifth aspect, the present disclosure further provides a computer program product, which includes computer execution instructions, which, when executed by a processor, are used to implement a cluster intercom communication method as described in any of the first aspects of the present disclosure; and/or, when the computer execution instructions are executed by a processor, are used to implement a cluster intercom communication method as described in any of the second aspects of the present disclosure; and/or, when the computer execution instructions are executed by a processor, are used to implement a cluster intercom communication method as described in any of the third aspects of the present disclosure.
本公开提供的集群对讲通信方法、装置、设备及存储介质,通过基于业务数据对应的加密密钥,对业务数据进行加密,得到加密业务数据,加密密钥包括业务数据密钥;并对业务数据密钥进行加密,得到加密业务数据密钥;再将加密业务数据密钥发送到密钥平台进行解密和加密处理,并将加密业务数据发送到目标集群对讲设备,以使目标集群对讲设备基于密钥平台处理后的业务数据密钥对加密业务数据进行解密,得到业务数据。由此,通过量子加密对需要传输的语音视频短信等业务数据进行加密,保证每次通讯时的密钥均不相同;同时对业务数据的密钥也进行加密,并且加密业务数据密钥也通过密钥平台进行中转而不是直接发送到目标集群对讲设备,实现对加密业务数据密钥的保护;同时,密钥平台会对接收到的加密业务数据密钥解密并重新加密,使得在不同传输阶段的加密业务数据密钥也互不相同,从而最大限度保证了加密业务数据密钥的安全性、加密业务数据的安全性,进而最大限度的保证了用于通信的业务数据的安全性。The cluster intercom communication method, device, equipment and storage medium provided by the present disclosure encrypts the business data based on the encryption key corresponding to the business data to obtain encrypted business data, and the encryption key includes the business data key; and encrypts the business data key to obtain the encrypted business data key; then sends the encrypted business data key to the key platform for decryption and encryption processing, and sends the encrypted business data to the target cluster intercom device, so that the target cluster intercom device decrypts the encrypted business data based on the business data key processed by the key platform to obtain the business data. Thus, the business data such as voice, video and text messages to be transmitted are encrypted by quantum encryption to ensure that the key is different for each communication; at the same time, the key of the business data is also encrypted, and the encrypted business data key is also transferred through the key platform instead of being sent directly to the target cluster intercom device, so as to protect the encrypted business data key; at the same time, the key platform will decrypt and re-encrypt the received encrypted business data key, so that the encrypted business data keys at different transmission stages are also different from each other, thereby maximizing the security of the encrypted business data key and the encrypted business data, and then maximizing the security of the business data used for communication.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本公开的实施例,并与说明书一起用于解释本公开的原理。The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and, together with the description, serve to explain the principles of the present disclosure.
图1为本公开实施例提供的集群对讲通信方法的一种应用场景图;FIG1 is a diagram of an application scenario of a cluster intercom communication method provided by an embodiment of the present disclosure;
图2为本公开一个实施例提供的集群对讲通信方法的流程图;FIG2 is a flow chart of a cluster intercom communication method provided by an embodiment of the present disclosure;
图3为本公开又一个实施例提供的集群对讲通信方法的流程图;FIG3 is a flow chart of a cluster intercom communication method provided by another embodiment of the present disclosure;
图4为本公开又一个实施例提供的集群对讲通信方法的流程图;FIG4 is a flow chart of a cluster intercom communication method provided by another embodiment of the present disclosure;
图5为本公开又一个实施例提供的集群对讲通信方法的流程图;FIG5 is a flow chart of a cluster intercom communication method provided by another embodiment of the present disclosure;
图6为本公开又一个实施例提供的集群对讲通信方法的流程图;FIG6 is a flow chart of a cluster intercom communication method provided by another embodiment of the present disclosure;
图7为本公开又一个实施例提供的集群对讲通信方法的流程图;FIG7 is a flow chart of a cluster intercom communication method provided by another embodiment of the present disclosure;
图8为本公开又一个实施例提供的集群对讲通信装置的结构示意图;FIG8 is a schematic diagram of the structure of a cluster intercom communication device provided by another embodiment of the present disclosure;
图9为本公开又一个实施例提供的集群对讲通信装置的结构示意图;FIG9 is a schematic diagram of the structure of a cluster intercom communication device provided by another embodiment of the present disclosure;
图10为本公开又一个实施例提供的集群对讲通信装置的结构示意图;FIG10 is a schematic diagram of the structure of a cluster intercom communication device provided by another embodiment of the present disclosure;
图11为本公开又一个实施例提供的控制设备的结构示意图。FIG. 11 is a schematic diagram of the structure of a control device provided in yet another embodiment of the present disclosure.
通过上述附图,已示出本公开明确的实施例,后文中将有更详细的描述。这些附图和文字描述并不是为了通过任何方式限制本公开构思的范围,而是通过参考特定实施例为本领域技术人员说明本公开的概念。The above drawings have shown clear embodiments of the present disclosure, which will be described in more detail below. These drawings and text descriptions are not intended to limit the scope of the present disclosure in any way, but to illustrate the concepts of the present disclosure to those skilled in the art by referring to specific embodiments.
具体实施方式Detailed ways
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本公开相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本公开的一些方面相一致的装置和方法的例子。Exemplary embodiments will be described in detail herein, examples of which are shown in the accompanying drawings. When the following description refers to the drawings, the same numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present disclosure. Instead, they are merely examples of devices and methods consistent with some aspects of the present disclosure as detailed in the appended claims.
下面以具体地实施例对本公开的技术方案以及本公开的技术方案如何解决上述技术问题进行详细说明。下面这几个具体的实施例可以相互结合,对于相同或相似的概念或过程可能在某些实施例中不再赘述。下面将结合附图,对本公开的实施例进行描述。The following specific embodiments are used to describe in detail the technical solution of the present invention and how the technical solution of the present invention solves the above-mentioned technical problems. The following specific embodiments can be combined with each other, and the same or similar concepts or processes may not be repeated in some embodiments. The embodiments of the present invention will be described below in conjunction with the accompanying drawings.
随着通信技术发展,传统的智能单对单语音传输的对讲机已发展成集音视频数字化功能的集群对讲系统(包含集群对讲终端、对讲平台等集群对讲设备),并得到了广泛应用。通过公网平台,可以同时支持公网集群中大规模音视频通信。此时需要确保集群对讲系统的稳定性、可靠性和高效性。With the development of communication technology, the traditional intelligent one-to-one voice transmission intercom has developed into a cluster intercom system (including cluster intercom terminals, intercom platforms and other cluster intercom equipment) with audio and video digitization functions, and has been widely used. Through the public network platform, large-scale audio and video communications in the public network cluster can be supported at the same time. At this time, it is necessary to ensure the stability, reliability and efficiency of the cluster intercom system.
现有的集群对讲系统,通常是由一个集群对讲设备通过预设的加密算法将待传输的音视频通信数据等业务数据加密后,直接发送到目标集群对讲设备,由目标集群对讲设备基于预设的解密算法,对加密的业务数据进行解密,得到业务数据明文。但同时存在大规模音视频通信的情况下,这种传统的加密算法安全性严重不足,密码容易泄漏或被计算破解;即使更改预设的加密算法和解密算法,在集群对讲系统这一通信频次极高的场景下,也非常容易被破解,且用户难以察觉被窃听,由此容易造成严重的损失。In the existing cluster intercom system, a cluster intercom device usually encrypts the audio and video communication data and other business data to be transmitted through a preset encryption algorithm, and then sends it directly to the target cluster intercom device, which decrypts the encrypted business data based on the preset decryption algorithm to obtain the business data in plain text. However, in the case of large-scale audio and video communications, the security of this traditional encryption algorithm is seriously insufficient, and the password is easily leaked or cracked by calculation; even if the preset encryption and decryption algorithms are changed, it is very easy to be cracked in the cluster intercom system, which has an extremely high communication frequency, and it is difficult for users to detect eavesdropping, which can easily cause serious losses.
为了解决上述问题,本公开实施例提供一种集群对讲通信方法,通过加密密钥对业务数据加密后发送,对加密用的业务数据密钥再加密,并单独发送到密钥平台,由密钥平台转发。由此,实现对业务数据密钥的加密和与业务数据发送通道的分离,最大限度提升破解难度,提高通信安全性。In order to solve the above problems, the embodiment of the present disclosure provides a cluster intercom communication method, which uses an encryption key to encrypt the business data and then sends it, and then encrypts the business data key used for encryption and sends it separately to the key platform, which is forwarded by the key platform. In this way, the encryption of the business data key and the separation from the business data transmission channel are achieved, which maximizes the difficulty of cracking and improves the communication security.
下面对本公开实施例的应用场景进行解释:The application scenarios of the embodiments of the present disclosure are explained below:
图1为本公开实施例提供的集群对讲通信方法的一种应用场景图。如图1所示,在进行集群对讲通信流程中,集群对讲设备100对需要发送的业务数据加密后,再对业务数据密钥加密,并将加密业务数据直接发送给目标集群对讲设备110,将加密业务数据密钥发送给密钥平台120,由密钥平台120解密并重新加密后再发送到目标集群对讲设备,以目标集群对讲设备完成加密业务数据密钥和加密业务数据的解密,从而实现业务数据的传输。Fig. 1 is an application scenario diagram of the cluster intercom communication method provided by an embodiment of the present disclosure. As shown in Fig. 1, in the cluster intercom communication process, the cluster intercom device 100 encrypts the business data to be sent, and then encrypts the business data key, and directly sends the encrypted business data to the target cluster intercom device 110, and sends the encrypted business data key to the key platform 120, which is decrypted and re-encrypted by the key platform 120 and then sent to the target cluster intercom device, and the target cluster intercom device completes the decryption of the encrypted business data key and the encrypted business data, thereby realizing the transmission of business data.
需说明的是,图1所示场景中集群对讲设备、目标集群对讲设备、密钥平台仅以一个为例进行示例说明,但本公开不以此为限制,也就是说,集群对讲设备、目标集群对讲设备、密钥平台的个数可以是任意的。It should be noted that in the scenario shown in Figure 1, only one cluster intercom device, target cluster intercom device, and key platform are used as an example for illustration, but the present disclosure is not limited to this, that is, the number of cluster intercom devices, target cluster intercom devices, and key platforms can be arbitrary.
以下通过具体实施例详细说明本公开提供的集群对讲通信方法。需要说明的是,下面这几个具体的实施例可以相互结合,对于相同或相似的概念或过程可能在某些实施例中不再赘述。The cluster intercom communication method provided by the present disclosure is described in detail below through specific embodiments. It should be noted that the following specific embodiments can be combined with each other, and the same or similar concepts or processes may not be described in detail in some embodiments.
图2为本公开一个实施例提供的集群对讲通信方法的流程图。集群对讲通信方法应用于集群对讲设备,如图2所示,包括以下步骤:FIG2 is a flow chart of a cluster intercom communication method provided by an embodiment of the present disclosure. The cluster intercom communication method is applied to a cluster intercom device, as shown in FIG2 , and includes the following steps:
步骤S201、基于业务数据对应的加密密钥,对业务数据进行加密,得到加密业务数据。Step S201: Encrypt the business data based on the encryption key corresponding to the business data to obtain encrypted business data.
其中,加密密钥包括业务数据密钥。The encryption key includes the business data key.
具体的,集群对讲是指大量设备同时接入通信网络中,通过多个不同信道相互通信,相对于常规对讲系统,通信的数据量和通信效率都能显著提升。且能够支持多个设备间进行音频、视频等数据的通信,而非常规对讲机只能支持语音通信的单一功能。Specifically, cluster intercom means that a large number of devices are connected to the communication network at the same time and communicate with each other through multiple different channels. Compared with conventional intercom systems, the amount of communication data and communication efficiency can be significantly improved. It can also support the communication of audio, video and other data between multiple devices, while conventional intercoms can only support the single function of voice communication.
集群对讲设备可以是支持集群对讲功能的终端,也可以是支持集群对讲功能且能够接收和群发业务数据的平台。The cluster intercom device can be a terminal that supports the cluster intercom function, or a platform that supports the cluster intercom function and can receive and send group business data.
业务数据指需要集群对讲设备发送的包含音频、视频、程序文本等的数据,而不限于特定业务种类的数据。与业务数据相对的是通过集群对讲设备发出的还有密钥、定位信息等非业务数据。Business data refers to data including audio, video, program text, etc. that needs to be sent by the cluster intercom equipment, and is not limited to data of a specific business type. In contrast to business data, non-business data such as keys and positioning information are also sent by the cluster intercom equipment.
集群对讲设备内内置有多种类型的加密密钥或加密密钥的生成模块,其中就包含业务数据密钥的生成模块,通过实时生成的业务数据密钥,避免采用固定密钥造成的易被破解、安全性低的问题。The cluster intercom equipment has built-in various types of encryption keys or encryption key generation modules, including a business data key generation module. By generating business data keys in real time, the problem of easy cracking and low security caused by using fixed keys can be avoided.
通过对业务数据加密,实现对业务数据保密,避免业务数据内容泄漏的作用。By encrypting business data, the confidentiality of business data can be achieved and the leakage of business data content can be avoided.
步骤S202、对业务数据密钥进行加密,得到加密业务数据密钥。Step S202: Encrypt the business data key to obtain an encrypted business data key.
具体的,除了对业务数据进行加密,还需要对加密业务数据的业务数据密钥进行加密,以便将加密业务数据传输到目标集群对讲设备时,将加密的业务数据密钥(即加密业务数据密钥)通过密钥平台发送给目标集群设备,使目标集群设备基于实时接收到的加密业务数据密钥进行本地解密,在通过解密得到的业务数据密钥对加密业务数据进行解密,由此,目标集群对讲设备在得到业务数据明文时,需要进行两次解密(对加密业务数据密钥进行解密,和对加密业务数据进行解密),相对于现有的集群对讲通信方法,能够显著提高业务数据的保密性和安全性。Specifically, in addition to encrypting the business data, the business data key of the encrypted business data also needs to be encrypted, so that when the encrypted business data is transmitted to the target cluster intercom device, the encrypted business data key (i.e., the encrypted business data key) is sent to the target cluster device through the key platform, so that the target cluster device performs local decryption based on the encrypted business data key received in real time, and decrypts the encrypted business data with the business data key obtained by decryption. Therefore, when the target cluster intercom device obtains the business data plaintext, it needs to perform two decryptions (decrypting the encrypted business data key, and decrypting the encrypted business data). Compared with the existing cluster intercom communication method, it can significantly improve the confidentiality and security of business data.
步骤S203、将加密业务数据密钥发送到密钥平台进行解密和加密处理,并将加密业务数据发送到目标集群对讲设备,以使目标集群对讲设备基于密钥平台处理后的业务数据密钥对加密业务数据进行解密,得到业务数据。Step S203: Send the encrypted business data key to the key platform for decryption and encryption processing, and send the encrypted business data to the target cluster intercom device, so that the target cluster intercom device decrypts the encrypted business data based on the business data key processed by the key platform to obtain the business data.
具体的,加密业务数据密钥不会直接发送给目标集群对讲设备,而是发送到密钥平台进行处理后再转发,由此,使加密业务数据和加密业务数据密钥的发送通道相互分离,避免通过相同通道发送加密业务数据和加密业务数据密钥时,被同时拦截并破解的情况;密钥平台会对加密业务数据密钥进行解密和再加密,使得从集群对讲平台发送到密钥平台的加密业务数据密钥、从密钥平台发送到目标集群对讲设备的加密业务数据密钥互不相同,进一步降低了加密业务数据密钥被拦截和破解的概率,进而极大程度提升了业务数据的安全性。Specifically, the encrypted business data key will not be sent directly to the target cluster intercom device, but will be sent to the key platform for processing and then forwarded. In this way, the sending channels of the encrypted business data and the encrypted business data key are separated from each other, avoiding the situation where the encrypted business data and the encrypted business data key are intercepted and cracked at the same time when they are sent through the same channel; the key platform will decrypt and re-encrypt the encrypted business data key, so that the encrypted business data key sent from the cluster intercom platform to the key platform and the encrypted business data key sent from the key platform to the target cluster intercom device are different from each other, further reducing the probability of the encrypted business data key being intercepted and cracked, thereby greatly improving the security of business data.
本公开实施例提供的集群对讲通信方法,通过基于业务数据对应的加密密钥,对业务数据进行加密,得到加密业务数据,加密密钥包括业务数据密钥;并对业务数据密钥进行加密,得到加密业务数据密钥;再将加密业务数据密钥发送到密钥平台进行解密和加密处理,并将加密业务数据发送到目标集群对讲设备,以使目标集群对讲设备基于密钥平台处理后的业务数据密钥对加密业务数据进行解密,得到业务数据。由此,通过量子加密对需要传输的语音视频短信等业务数据进行加密,保证每次通讯时的密钥均不相同;同时对业务数据的密钥也进行加密,并且加密业务数据密钥也通过密钥平台进行中转而不是直接发送到目标集群对讲设备,实现对加密业务数据密钥的保护;同时,密钥平台会对接收到的加密业务数据密钥解密并重新加密,使得在不同传输阶段的加密业务数据密钥也互不相同,从而最大限度保证了加密业务数据密钥的安全性、加密业务数据的安全性,进而最大限度的保证了用于通信的业务数据的安全性。The cluster intercom communication method provided by the embodiment of the present disclosure encrypts the business data based on the encryption key corresponding to the business data to obtain encrypted business data, and the encryption key includes the business data key; and encrypts the business data key to obtain the encrypted business data key; then sends the encrypted business data key to the key platform for decryption and encryption processing, and sends the encrypted business data to the target cluster intercom device, so that the target cluster intercom device decrypts the encrypted business data based on the business data key processed by the key platform to obtain the business data. Thus, the business data such as voice, video and text messages to be transmitted are encrypted by quantum encryption to ensure that the key is different for each communication; at the same time, the key of the business data is also encrypted, and the encrypted business data key is also transferred through the key platform instead of being directly sent to the target cluster intercom device, so as to protect the encrypted business data key; at the same time, the key platform will decrypt and re-encrypt the received encrypted business data key, so that the encrypted business data keys at different transmission stages are also different from each other, thereby maximizing the security of the encrypted business data key and the encrypted business data, and then maximizing the security of the business data used for communication.
图3为本公开提供的一个集群对讲通信方法的流程图。如图3所示,本实施例提供的集群对讲通信方法应用于集群对讲设备,包括以下步骤:FIG3 is a flow chart of a cluster intercom communication method provided by the present disclosure. As shown in FIG3, the cluster intercom communication method provided by this embodiment is applied to a cluster intercom device, and includes the following steps:
步骤S301、基于业务数据对应的加密密钥,对业务数据进行加密,得到加密业务数据。Step S301: Encrypt the business data based on the encryption key corresponding to the business data to obtain encrypted business data.
其中,加密密钥包括业务数据密钥。The encryption key includes the business data key.
具体的,当集群对讲设备中生成或接收到需要发送的业务数据时,会自动生成用于对业务数据进行加密的加密密钥,即业务数据密钥。Specifically, when the cluster intercom device generates or receives service data to be sent, an encryption key for encrypting the service data, ie, a service data key, is automatically generated.
一些实施例中,业务数据密钥可以通过如下方式得到:In some embodiments, the service data key may be obtained by:
通过量子加密模块,将生成的量子真随机数作为业务数据密钥。Through the quantum encryption module, the generated quantum true random number is used as the business data key.
具体的,集群对讲设备中预先配置有量子加密模块,可以自动生成用于作为业务数据密钥的量子真随机数,以保证每次对业务数据加密时所使用的业务数据密钥均不相同,以保证业务数据的安全性。Specifically, the cluster intercom device is pre-configured with a quantum encryption module, which can automatically generate quantum true random numbers used as business data keys to ensure that the business data keys used to encrypt business data each time are different, thereby ensuring the security of business data.
示例性的,在实际应用中,通过量子加密模块生成量子真随机数后,在现有的集群对讲业务报文的基础上,基于量子真随机数生成信息安全协议层报文,实现对业务数据进行量子加密。其中,量子加密采用的算法可以是SM4加密算法,此时,量子加密得到的安全协议层的报文格式如下表1所示:For example, in practical applications, after a quantum true random number is generated by a quantum encryption module, an information security protocol layer message is generated based on the quantum true random number on the basis of the existing cluster intercom service message, so as to implement quantum encryption of service data. Among them, the algorithm used for quantum encryption can be the SM4 encryption algorithm. At this time, the message format of the security protocol layer obtained by quantum encryption is shown in Table 1 below:
表1量子加密得到的安全协议层的报文格式Table 1 Message format of the security protocol layer obtained by quantum encryption
其中:起始标识长度一般为固定4字节,并采用固定格式EAE0E1EA;报文长度一般为2字节且高位在前,和校验和都是指从报文类型开始(包括报文类型)到校验和之前的数据(阴影部分);报文类型长度一般为2字节且高位在前,用于定义进行数据交互的对象,并定义封装数据域的保密措施;量子加密封装数据域即加密后的密文,其中包括量子加密头(长为16字节),量子加密数据域,以及长度为4字节的加密MAC(全称为Messageauthentication code,即消息认证码)。Among them: the length of the starting identifier is generally fixed at 4 bytes, and uses a fixed format of EAE0E1EA; the message length is generally 2 bytes with the high bit in front, and the checksum refers to the data from the beginning of the message type (including the message type) to the checksum before the data (shaded part); the message type length is generally 2 bytes with the high bit in front, which is used to define the object for data interaction and define the confidentiality measures of the encapsulated data field; the quantum encryption encapsulated data field is the encrypted ciphertext, which includes the quantum encryption header (16 bytes long), the quantum encryption data field, and the encrypted MAC with a length of 4 bytes (the full name is Message authentication code).
其中,报文类型通过高位的1字节表示,具体类型如下表2所示:The message type is represented by the high-order 1 byte, and the specific types are shown in Table 2 below:
表2量子加密得到的安全协议层的报文格式Table 2 Message format of the security protocol layer obtained by quantum encryption
由此,通过该字节可以表示不同种类的报文类型。Therefore, different types of message types can be represented by this byte.
一些实施例中,报文类型的低位1字节可以用于表示业务种类。In some embodiments, the lower byte of the message type can be used to indicate the service type.
进一步地,加密密钥还包括:与业务种类对应业务量子密钥,和与设备对应的设备量子密钥;设备量子密钥包括:用于表明集群对讲设备身份的设备身份密钥,和用于与业务量子密钥配合共同实现加密的密钥加密密钥。Furthermore, the encryption key also includes: a business quantum key corresponding to the business type, and a device quantum key corresponding to the device; the device quantum key includes: a device identity key used to indicate the identity of the cluster intercom device, and a key encryption key used to cooperate with the business quantum key to jointly implement encryption.
具体的,加密密钥中还包括对业务数据密钥进行加密的业务量子密钥、密钥加密密钥,以及用于表明设备身份的设备身份密钥。通过业务量子密钥与密钥加密密钥结合后再对业务数据密钥加密,有效提高加密强度和加密业务数据密钥的复杂度,提高破解难度,进而提高加密业务数据密钥、业务数据密钥和业务数据的安全性。Specifically, the encryption key also includes a business quantum key for encrypting the business data key, a key encryption key, and a device identity key for indicating the identity of the device. By combining the business quantum key with the key encryption key and then encrypting the business data key, the encryption strength and complexity of the encrypted business data key are effectively improved, the difficulty of cracking is increased, and the security of the encrypted business data key, business data key and business data is thereby improved.
其中,业务量子密钥和设备量子密钥都是预先配置在每个集群对讲设备和密钥平台上的。且除了这些加密密钥,通常每个集群对讲设备还配置了用于证明设备身份的设备证书,集群对讲设备间通信时通过各自的设备身份密钥和设备证书完成与密钥平台的双向身份认证,且量子密钥采用“一证一密”的方式(即对应每个设备的身份认证,其设备身份密钥唯一)。Among them, the business quantum key and the device quantum key are pre-configured on each cluster intercom device and key platform. In addition to these encryption keys, each cluster intercom device is usually also configured with a device certificate for proving the identity of the device. When cluster intercom devices communicate with each other, they complete the two-way identity authentication with the key platform through their respective device identity keys and device certificates, and the quantum key adopts the "one certificate and one key" method (that is, corresponding to the identity authentication of each device, its device identity key is unique).
业务量子密钥根据业务种类预先确定,且各个集群对讲设备和密钥平台间的业务量子密钥相互通用。The business quantum key is predetermined according to the business type, and the business quantum keys between each cluster intercom device and the key platform are mutually interchangeable.
每个集群对讲设备上的设备量子密钥固定且唯一(设备量子密钥可以定期更新,但更新后的设备量子密钥仍然与集群对讲设备相对应)。The device quantum key on each cluster intercom device is fixed and unique (the device quantum key can be updated periodically, but the updated device quantum key still corresponds to the cluster intercom device).
密钥加密密钥也是预先确定,且各个设备上的密钥加密密钥也是互不相同,通过业务量子密钥与密钥加密密钥共同结合后再对业务数据密钥加密,有效保证每个设备对应的加密后的密钥都唯一,且不会出现重复的情况。The key encryption key is also predetermined, and the key encryption keys on each device are also different. The business data key is encrypted by combining the business quantum key with the key encryption key, effectively ensuring that the encrypted key corresponding to each device is unique and there will be no duplication.
一些实施例中,设备量子密钥和业务量子密钥可以根据策略进行在线更新。常用的策略有根据时间周期进行定期更新,或密钥使用达到设置的阈值触发在线更新;也可以采用集群对讲设备主动进行更新的方式。In some embodiments, the device quantum key and the service quantum key can be updated online according to the policy. Common policies include regular updates based on time periods, or triggering online updates when key usage reaches a set threshold; or actively updating cluster intercom devices.
示例性的,业务量子密钥通过密钥加密密钥和业务量子密钥保护进行在线更新,首先集群对讲设备通过量子加密模块获取业务量子密钥更新参数,发送报文,报文内容主要包含量子加密模块标识、密钥请求参数,报文到达量子密码服务平台侧(也即是密钥平台),平台会解析报文,并生成待更新的业务量子密钥,待更新业务量子密钥与业务量子密钥异或,再用密钥加密密钥对其进行加密,然后构造响应报文返回集群对讲设备,使集群对讲设备再与量子加密模块交互完成量子密钥更新。Exemplarily, the business quantum key is updated online through the key encryption key and business quantum key protection. First, the cluster intercom device obtains the business quantum key update parameters through the quantum encryption module and sends a message. The message content mainly includes the quantum encryption module identifier and the key request parameter. The message arrives at the quantum cryptography service platform side (that is, the key platform). The platform will parse the message and generate the business quantum key to be updated. The business quantum key to be updated is XORed with the business quantum key, and then encrypted with the key encryption key. Then, a response message is constructed and returned to the cluster intercom device, so that the cluster intercom device interacts with the quantum encryption module to complete the quantum key update.
其中,业务量子密钥更新报文格式如下表3和表4所示:The formats of the service quantum key update messages are shown in Tables 3 and 4 below:
表3业务量子密钥更新请求报文格式Table 3 Service quantum key update request message format
表4业务量子密钥更新响应报文格式Table 4 Service quantum key update response message format
其中,身份认证协议报文根据报文类型发送三帧的数据报文,报文类型相应值为0xE070,0xE071,0xE072。其中量子加密头主要包括加密方式,采用的密钥加密密钥的KID(即密钥标识),以及与业务数据密钥进行异或的业务量子密钥的KID。Among them, the identity authentication protocol message sends three frames of data messages according to the message type, and the corresponding values of the message type are 0xE070, 0xE071, and 0xE072. The quantum encryption header mainly includes the encryption method, the KID (key identifier) of the key encryption key used, and the KID of the business quantum key that is XORed with the business data key.
另外,设备量子密钥通过密钥加密密钥加密保护进行在线更新。首先集群对讲设备通过量子加密模块获取设备量子密钥更新参数,发送报文,报文内容主要包含量子加密模块标识、密钥请求参数,报文到达密钥平台侧,密钥平台会解析报文,生成待更新的设备量子密钥,并将待更新设备量子密钥用密钥加密密钥对其进行加密,然后构造响应报文返回集群对讲设备,后者再与量子加密模块交互完成量子密钥更新。In addition, the device quantum key is updated online through key encryption key encryption protection. First, the cluster intercom device obtains the device quantum key update parameters through the quantum encryption module and sends a message. The message content mainly includes the quantum encryption module identification and key request parameters. When the message arrives at the key platform side, the key platform will parse the message, generate the device quantum key to be updated, and encrypt the device quantum key to be updated with the key encryption key, and then construct a response message to return to the cluster intercom device, which then interacts with the quantum encryption module to complete the quantum key update.
设备量子密钥更新报文格式如下所示:The device quantum key update message format is as follows:
表5设备量子密钥更新请求报文格式Table 5 Device quantum key update request message format
表6设备量子密钥更新响应报文格式Table 6 Device quantum key update response message format
身份认证协议报文根据报文类型发送三帧的数据报文,报文类型相应值为0xE075、0xE076、0xE077。其中量子加密头主要包括加密方式,采用的密钥加密密钥的KID。The identity authentication protocol message sends three frames of data messages according to the message type, and the corresponding values of the message type are 0xE075, 0xE076, and 0xE077. The quantum encryption header mainly includes the encryption method and the KID of the key encryption key used.
步骤S302、确定业务数据的业务种类对应,且用于对业务数据密钥加密的业务量子密钥。Step S302: Determine the business quantum key corresponding to the business type of the business data and used to encrypt the business data key.
具体的,根据业务数据的业务种类的不同(如具体是音频类数据、视频数据、非音视频文件数据等),集群对讲设备中的对应可选业务量子密钥不同(每个业务种类对应的业务量子密钥至少一种),从而对不同性质的报文采用不同的处理方式,实现数据的动态加密。实际应用中,集群对讲设备在确定要发送的业务数据后,会自动确定业务数据的业务种类,进而自动确定对应的业务量子密钥。Specifically, according to the different types of business data (such as audio data, video data, non-audio and video file data, etc.), the corresponding optional business quantum keys in the cluster intercom device are different (at least one business quantum key corresponding to each business type), so that different types of messages are processed in different ways to achieve dynamic encryption of data. In actual applications, after determining the business data to be sent, the cluster intercom device will automatically determine the business type of the business data, and then automatically determine the corresponding business quantum key.
步骤S303、将业务数据密钥与业务量子密钥结合。Step S303: Combine the business data key with the business quantum key.
具体的,通过将业务数据密钥和业务量子密钥结合,能够提升业务数据密钥的复杂度,降低破解率,进而提升业务数据密钥的安全性。Specifically, by combining the business data key and the business quantum key, the complexity of the business data key can be increased, the cracking rate can be reduced, and the security of the business data key can be improved.
一些实施例中,对业务数据密钥的加密方法可以采用布尔算法,例如将业务数据密钥和业务量子密钥异或处理,以实现两者的结合。In some embodiments, the encryption method for the business data key may use a Boolean algorithm, such as performing an XOR operation on the business data key and the business quantum key to achieve a combination of the two.
步骤S304、通过密钥加密密钥对业务数据密钥与业务量子密钥的结合进行加密处理,得到加密业务数据密钥。Step S304: Encrypt the combination of the business data key and the business quantum key using the key encryption key to obtain an encrypted business data key.
具体的,在通过业务量子密钥与业务数据密钥结合的基础上,在通过密钥加密密钥对结合的结果进行加密,实现对业务数据的三重加密(业务数据密钥加密、业务量子密钥与业务数据密钥结合的加密、密钥加密密钥的加密),最大限度的保护业务数据的安全性。Specifically, on the basis of combining the business quantum key with the business data key, the combined result is encrypted by the key encryption key to achieve triple encryption of business data (business data key encryption, encryption combined with the business quantum key and business data key, and encryption with the key encryption key), thereby maximizing the security of business data.
步骤S305、将加密业务数据发送到目标集群对讲设备。Step S305: Send the encrypted business data to the target cluster intercom device.
具体的,对业务数据一次加密后,就可以直接传输到目标的集群对讲设备(也即是目标集群对讲设备),而不需要对业务数据多次加密。Specifically, after the business data is encrypted once, it can be directly transmitted to the target cluster intercom device (that is, the target cluster intercom device) without the need to encrypt the business data multiple times.
因为业务数据的内容长度通常远长于业务数据密钥,对业务数据多次加密的话,解密需要的时间长度远大于对业务数据密钥多次解密所需的时间长度,因此,通过对业务数据一次加密,然后对业务数据密钥进行两重加密(业务量子密钥与业务数据密钥结合的加密、密钥加密密钥的加密),既能实现对业务数据的三重加密,保证业务数据的安全性,又能保证解密效率,最大限度提升对业务数据的保护效果。Because the content length of business data is usually much longer than the business data key, if the business data is encrypted multiple times, the time required for decryption is much longer than the time required for multiple decryption of the business data key. Therefore, by encrypting the business data once and then doubly encrypting the business data key (encryption of the business quantum key combined with the business data key, and encryption of the key encryption key), we can achieve triple encryption of the business data to ensure the security of the business data, and ensure the decryption efficiency, thereby maximizing the protection of the business data.
步骤S306、将加密业务数据密钥发送到密钥平台,以使密钥平台基于集群对讲设备的设备量子密钥和业务量子密钥对加密业务数据密钥进行解密处理,并基于目标集群对讲设备的设备量子密钥和业务量子密钥,对解密处理后的加密业务数据密钥进行加密处理。Step S306: Send the encrypted business data key to the key platform, so that the key platform decrypts the encrypted business data key based on the device quantum key and the business quantum key of the cluster intercom device, and encrypts the decrypted encrypted business data key based on the device quantum key and the business quantum key of the target cluster intercom device.
具体的,加密业务数据密钥不直接与加密业务数据一起发送给集群对讲设备,使得加密业务数据和加密业务数据密钥通过不同通道分别发送,目标集群对讲设备也会通过不同方式获取到加密业务数据密钥和加密业务数据,通过不同通道传输,避免通过相同通道发送加密业务数据和加密业务数据密钥时,被同时拦截并破解的情况,进一步提升了业务数据的安全性。Specifically, the encrypted business data key is not directly sent to the cluster intercom device together with the encrypted business data, so that the encrypted business data and the encrypted business data key are sent separately through different channels. The target cluster intercom device will also obtain the encrypted business data key and encrypted business data in different ways and transmit them through different channels, thereby avoiding the situation where the encrypted business data and the encrypted business data key are intercepted and cracked at the same time when they are sent through the same channel, thereby further improving the security of the business data.
本公开实施例提供的集群对讲通信方法,通过基于业务数据对应的加密密钥,对业务数据进行加密,得到加密业务数据,然后确定业务数据的业务种类对应,且用于对业务数据密钥加密的业务量子密钥,在将业务数据密钥与业务量子密钥结合后,再通过密钥加密密钥进行加密处理,得到加密业务数据密钥,最后分别将加密业务数据发送到目标集群对讲设备、将加密业务数据密钥和设备量子密钥发送到密钥平台。由此,实现量子密钥与分业务种类、设备的密钥相结合,对业务数据实现多重保护,且能根据业务数据的变化实现动态保护;并通过加密业务数据和加密业务数据密钥分通道分发,最大限度地保证了业务数据的安全性。The cluster intercom communication method provided by the embodiment of the present disclosure encrypts the business data based on the encryption key corresponding to the business data to obtain encrypted business data, then determines the business type corresponding to the business data, and the business quantum key used to encrypt the business data key, after combining the business data key with the business quantum key, encrypts it through the key encryption key to obtain the encrypted business data key, and finally sends the encrypted business data to the target cluster intercom device, and sends the encrypted business data key and the device quantum key to the key platform. In this way, the quantum key is combined with the key of the business type and device, and multiple protections are implemented for the business data, and dynamic protection can be implemented according to the changes in the business data; and the encrypted business data and the encrypted business data key are distributed in different channels, which maximizes the security of the business data.
图4为本公开提供的一个集群对讲通信方法的流程图。如图4所示,本实施例提供的集群对讲通信方法应用于目标集群对讲设备,其包括以下步骤:FIG4 is a flow chart of a cluster intercom communication method provided by the present disclosure. As shown in FIG4, the cluster intercom communication method provided by this embodiment is applied to a target cluster intercom device, and includes the following steps:
步骤S401、响应于接收到的加密业务数据,从密钥平台中获取对应的加密业务数据密钥。Step S401: In response to the received encrypted business data, obtain the corresponding encrypted business data key from the key platform.
具体的,目标集群对讲设备即图2和图3所示实施例中的集群对讲设备生成的加密业务数据所发送的接收目标。目标集群对讲设备内的配置与集群对讲设备内相同,也具有业务量子密钥、设备量子密钥等配置,并可以据此对加密业务数据进行解密。Specifically, the target cluster intercom device is the receiving target to which the encrypted business data generated by the cluster intercom device in the embodiments shown in Figures 2 and 3 is sent. The configuration in the target cluster intercom device is the same as that in the cluster intercom device, and also has configurations such as business quantum keys and device quantum keys, and can decrypt the encrypted business data accordingly.
同时,目标集群对讲设备在收到其他集群对讲设备发送来的加密业务数据时,会根据密文信息,从密钥平台获取相应的加密业务数据密钥。At the same time, when the target cluster intercom device receives the encrypted business data sent by other cluster intercom devices, it will obtain the corresponding encrypted business data key from the key platform according to the ciphertext information.
密文信息可以是集群对讲设备发送的加密业务数据的一部分,也可以是同步时发送的认证信息(即设备证书、设备身份密钥等信息)。The ciphertext information may be a part of the encrypted business data sent by the cluster intercom device, or may be the authentication information (i.e., device certificate, device identity key, etc.) sent during synchronization.
步骤S402、基于预设的加密密钥和加密业务数据密钥,获得对应的业务数据密钥。Step S402: Based on the preset encryption key and the encrypted business data key, obtain the corresponding business data key.
具体的,目标集群对讲设备在接收到密钥平台发送的加密业务数据密钥后,会基于预先配置的业务量子密钥、设备量子密钥(中的密钥加密密钥)对加密业务数据密钥进行解密,得到对应的业务数据密钥。Specifically, after receiving the encrypted business data key sent by the key platform, the target cluster intercom device will decrypt the encrypted business data key based on the pre-configured business quantum key and device quantum key (the key encryption key in it) to obtain the corresponding business data key.
步骤S403、基于业务数据密钥,对加密业务数据进行解密,得到对应的业务数据。Step S403: decrypt the encrypted business data based on the business data key to obtain corresponding business data.
具体的,通过用业务数据密钥对业务数据解密,得到最终的业务数据。由此,能够有效保证业务数据传输过程的安全性。Specifically, the service data is decrypted using the service data key to obtain the final service data, thereby effectively ensuring the security of the service data transmission process.
本公开实施例提供的集群对讲通信方法,通过响应于接收到的加密业务数据,从密钥平台中获取对应的加密业务数据密钥,然后基于预设的加密密钥和加密业务数据密钥,对加密业务数据进行解密,得到对应的业务数据。由此,实现对多重加密的业务数据的解密和接收,且接收加密业务数据和加密业务数据密钥分别从不同的通道得到,有效保证接收业务数据及相关信息过程的安全性,进而保证业务数据的安全性。The cluster intercom communication method provided by the embodiment of the present disclosure obtains the corresponding encrypted business data key from the key platform in response to the received encrypted business data, and then decrypts the encrypted business data based on the preset encryption key and the encrypted business data key to obtain the corresponding business data. Thus, the decryption and reception of multiple encrypted business data are realized, and the received encrypted business data and the encrypted business data key are obtained from different channels respectively, which effectively ensures the security of the process of receiving business data and related information, thereby ensuring the security of business data.
图5为本公开提供的一个集群对讲通信方法的流程图。如图5所示,本实施例提供的集群对讲通信方法应用于目标集群对讲设备,其包括以下步骤:FIG5 is a flow chart of a cluster intercom communication method provided by the present disclosure. As shown in FIG5, the cluster intercom communication method provided by this embodiment is applied to a target cluster intercom device, and includes the following steps:
步骤S501、响应于接收到的加密业务数据,确定加密业务数据对应密文标识。Step S501: In response to the received encrypted business data, determine the ciphertext identifier corresponding to the encrypted business data.
其中,业务数据密钥包括密钥标识。The business data key includes a key identifier.
具体的,本实施例中涉及的业务数据密钥、加密密钥等均属于量子密钥。每个量子密钥都包含两个组成部分,密钥标识KID和密钥值KV,由此可以将量子密钥表示为K=<KID,KV>。每个集群对讲设备都有各自的设备信息(也即是设备证书等信息)。Specifically, the business data keys, encryption keys, etc. involved in this embodiment are all quantum keys. Each quantum key consists of two components, a key identifier KID and a key value KV, so the quantum key can be represented as K=<KID, KV>. Each cluster intercom device has its own device information (that is, device certificate and other information).
由此,一组量子密钥可表示为D={<KIDi,KVi>,0≤i≤表个数},其中表个数用于需要的密钥个数(因为同时需要使用的密钥可能有多个,如同时需要设备量子密钥、业务量子密钥,或预先准备的业务量子密钥有多个)。Therefore, a set of quantum keys can be expressed as D = {<KID i , KV i >, 0≤i≤number of tables}, where the number of tables is used for the number of keys required (because there may be multiple keys that need to be used at the same time, such as requiring device quantum keys, business quantum keys, or multiple pre-prepared business quantum keys).
当目标集群对讲设备接收到加密业务数据后,由于加密业务数据中包含有对应的密钥标识(即表1中的量子加密头和加密MAC),根据密钥标识可以从密钥平台中获取用于对加密业务数据解密的加密业务数据密钥,以在对加密业务数据密钥解密后得到的业务数据密钥解密加密业务数据,得到业务数据明文。When the target cluster intercom device receives the encrypted business data, since the encrypted business data contains the corresponding key identifier (i.e., the quantum encryption header and encryption MAC in Table 1), the encrypted business data key used to decrypt the encrypted business data can be obtained from the key platform according to the key identifier, and the encrypted business data can be decrypted with the business data key obtained after decrypting the encrypted business data key to obtain the business data plaintext.
进一步地,图4所示实施例中提到的预设的加密密钥包括:Furthermore, the preset encryption key mentioned in the embodiment shown in FIG. 4 includes:
与业务种类对应业务量子密钥,和与目标集群对讲设备对应的设备量子密钥;设备量子密钥包括:用于与业务量子密钥配合共同实现加密的密钥加密密钥。A business quantum key corresponding to the business type, and a device quantum key corresponding to the target cluster intercom device; the device quantum key includes: a key encryption key used to cooperate with the business quantum key to jointly implement encryption.
具体的,加密密钥相关描述参考图3所示实施例中步骤S301中的描述,目标集群对讲设备与集群对讲设备相同(但具体设备身份密钥等与设备本身相对应的密钥的内容不同),此处不再赘述。Specifically, the encryption key-related description refers to the description in step S301 in the embodiment shown in Figure 3. The target cluster intercom device is the same as the cluster intercom device (but the content of the key corresponding to the specific device identity key, etc. is different from that of the device itself), which will not be repeated here.
步骤S502、基于密文标识,向密钥平台发送申请,以获取加密业务数据对应的加密业务数据密钥。Step S502: Based on the ciphertext identifier, an application is sent to the key platform to obtain the encrypted business data key corresponding to the encrypted business data.
具体的,将包含密文标识的申请发送到密钥平台后,密钥平台会基于密文标识确定对应的加密业务数据密钥,并根据申请确定目标集群对讲设备的设备量子密钥,以基于设备量子密钥对解密的加密业务数据密钥进行重加密,以便目标集群对讲设备可以通过自身的设备量子密钥和业务量子密钥对加密业务数据密钥进行解密,得到业务数据密钥本身。Specifically, after the application containing the ciphertext identifier is sent to the key platform, the key platform will determine the corresponding encrypted business data key based on the ciphertext identifier, and determine the device quantum key of the target cluster intercom device based on the application, so as to re-encrypt the decrypted encrypted business data key based on the device quantum key, so that the target cluster intercom device can decrypt the encrypted business data key through its own device quantum key and business quantum key to obtain the business data key itself.
步骤S503、确定与加密业务数据密钥的业务种类对应,且用于对加密业务数据密钥进行解密的业务量子密钥。Step S503: Determine a business quantum key corresponding to the business type of the encrypted business data key and used to decrypt the encrypted business data key.
具体的,目标集群对讲设备在接收到加密业务数据密钥后,会基于报文类型等信息确定加密业务数据中的业务种类,确定与加密业务数据密钥对应的业务种类,并基于该业务种类确定用于对齐解密的业务量子密钥。Specifically, after receiving the encrypted business data key, the target cluster intercom device will determine the business type in the encrypted business data based on information such as the message type, determine the business type corresponding to the encrypted business data key, and determine the business quantum key used for alignment decryption based on the business type.
步骤S504、通过密钥加密密钥和业务量子密钥结合后,对加密业务数据密钥进行解密,得到业务数据密钥。Step S504: After combining the key encryption key and the business quantum key, the encrypted business data key is decrypted to obtain the business data key.
具体的,通过密钥加密密钥对加密业务数据密钥解密后,再用业务量子密钥进行异或,就可以得到业务数据密钥的明文。各密钥间的相对关系可以参考图3所示实施例中步骤S303至步骤S304相关内容,此处不再赘述。Specifically, after decrypting the encrypted business data key with the key encryption key, XORing it with the business quantum key can obtain the plain text of the business data key. The relative relationship between the keys can refer to the relevant contents of step S303 to step S304 in the embodiment shown in Figure 3, which will not be repeated here.
步骤S505、基于业务数据密钥,对加密业务数据进行解密,得到对应的业务数据。Step S505: decrypt the encrypted business data based on the business data key to obtain corresponding business data.
具体的,通过业务数据密钥明文,可以直接对加密业务数据进行解密,得到业务数据明文,完成业务数据的通信过程。Specifically, the encrypted business data can be directly decrypted through the business data key plaintext to obtain the business data plaintext, thus completing the business data communication process.
本公开实施例提供的集群对讲通信方法,通过响应于接收到的加密业务数据,确定加密业务数据对应密文标识,然后基于密文标识,向密钥平台发送设备量子密钥,以获取加密业务数据对应的加密业务数据密钥,再通过密钥加密密钥和业务量子密钥结合后,对加密业务数据密钥进行解密,得到业务数据密钥,最后通过业务数据密钥,对加密业务数据进行解密,得到对应的业务数据。由此,实现目标集群对讲设备一侧对多重加密的业务数据的接收和解密,有效保证业务数据传输过程中的安全性。The cluster intercom communication method provided by the embodiment of the present disclosure determines the ciphertext identifier corresponding to the encrypted business data in response to the received encrypted business data, and then sends the device quantum key to the key platform based on the ciphertext identifier to obtain the encrypted business data key corresponding to the encrypted business data, and then decrypts the encrypted business data key by combining the key encryption key and the business quantum key to obtain the business data key, and finally decrypts the encrypted business data by the business data key to obtain the corresponding business data. In this way, the reception and decryption of the multi-encrypted business data on the target cluster intercom device side is realized, and the security of the business data transmission process is effectively guaranteed.
图6为本公开提供的一个集群对讲通信方法的流程图。如图6所示,本实施例提供的集群对讲通信方法应用于密钥平台,其包括以下步骤:FIG6 is a flow chart of a cluster intercom communication method provided by the present disclosure. As shown in FIG6, the cluster intercom communication method provided by this embodiment is applied to a key platform, and includes the following steps:
步骤S601、响应于接收到的加密业务数据密钥,确定对应的业务数据密钥。Step S601: In response to the received encrypted business data key, determine the corresponding business data key.
具体的,密钥平台即量子密钥服务平台,用于接收集群对讲设备发送的加密业务数据密钥并进行中转处理(即解密和再加密处理),再发送到对应的目标集群对讲设备。Specifically, the key platform, namely the quantum key service platform, is used to receive the encrypted business data keys sent by the cluster intercom device and perform transit processing (i.e. decryption and re-encryption processing), and then send them to the corresponding target cluster intercom device.
这一过程中涉及与集群对讲设备/目标集群对讲设备的通信和相互认证过程,以及在密钥平台内的中转处理过程。This process involves communication and mutual authentication with the cluster intercom device/target cluster intercom device, as well as a transit processing process within the key platform.
其中,认证过程基于集群对讲设备发送的认证信息(即设备证书、设备身份密钥等信息)实现。The authentication process is implemented based on the authentication information (i.e., device certificate, device identity key, etc.) sent by the cluster intercom device.
示例性的,分别记集群对讲设备为实体A,密钥平台为实体B。则TokenBA为从实体B发往实体A的认证信息,TokenAB是从实体A发往实体B的认证信息。此时,其具体流程如下:For example, the cluster intercom device is referred to as entity A and the key platform is referred to as entity B. Then TokenBA is the authentication information sent from entity B to entity A, and TokenAB is the authentication information sent from entity A to entity B. At this time, the specific process is as follows:
步骤一(未示出)、实体A通过本地量子加密模块生成量子随机数Ra,同时拼接Text1,作为认证数据,发送给实体B。Step 1 (not shown): Entity A generates a quantum random number Ra through a local quantum encryption module, and simultaneously concatenates Text1 as authentication data and sends it to entity B.
其中Text1=IDa||Ta,IDa是实体A中的量子加密模块的标识,Ta是时间戳信息,||即布尔运算中的“或”运算符号。Among them, Text1=IDa||Ta, IDa is the identifier of the quantum encryption module in entity A, Ta is the timestamp information, and || is the "or" operator in Boolean operation.
步骤二(未示出)、实体B收到A发送过来的认证数据,计算生成TokenBA,TokenBA=Rb||Text3||FUN1(Kba,Ra||Rb||Text2)||FUN2(Sa,Ra||Rb||Text2)。Step 2 (not shown): Entity B receives the authentication data sent by A and calculates and generates TokenBA, TokenBA = Rb||Text3||FUN1(Kba,Ra||Rb||Text2)||FUN2(Sa,Ra||Rb||Text2).
其中Text2=IDa||IDb||Ta||Tb,Text3=IDb||Tb。Rb是通过实体B中的量子加密模块生成量子随机数,Tb是量子密码服务平台的时间戳信息,Sa是设备证书对应的私钥。FUN1(Kba,X)是使用单向共享密钥Kba(后简称单向密钥)对指定数据X进行分组对称密钥加密的运算的函数,例如GCM分组的SM4密码运算。FUN2(Sa,X)是使用私钥对指定数据X先摘要运算再进行签名运算的函数。Where Text2=IDa||IDb||Ta||Tb, Text3=IDb||Tb. Rb is the quantum random number generated by the quantum encryption module in entity B, Tb is the timestamp information of the quantum cryptography service platform, and Sa is the private key corresponding to the device certificate. FUN1(Kba,X) is a function that uses the one-way shared key Kba (hereinafter referred to as the one-way key) to perform group symmetric key encryption on the specified data X, such as the SM4 cryptographic operation of the GCM group. FUN2(Sa,X) is a function that uses the private key to perform a summary operation and then a signature operation on the specified data X.
步骤三(未示出)、实体A收到实体B发送过来的数据TokenBA,计算FUN1(Kab,Ra||Rb||IDa||IDb||Ta||Tb),验证计算结果是否与收到的TokenBA中的数据一致;并验证收到实体B的证书是否有效,有效则获取出有效公钥,同时对收到的签名数据进行验签,确保签名的数据是真实有效且包含了随机数Ra。Step three (not shown), entity A receives the data TokenBA sent by entity B, calculates FUN1 (Kab, Ra||Rb||IDa||IDb||Ta||Tb), verifies whether the calculation result is consistent with the data in the received TokenBA; and verifies whether the certificate received from entity B is valid. If valid, obtains the valid public key, and verifies the received signature data to ensure that the signed data is authentic and valid and contains the random number Ra.
上述验证通过时,则会计算生成TokenAB并返回给实体B,其中,TokenAB=Text5||FUN1(Kab,Rb||Ra||Text4)||FUN2(Sb,Ra||Rb||Text4)。When the above verification passes, TokenAB will be calculated and returned to entity B, where TokenAB = Text5||FUN1(Kab,Rb||Ra||Text4)||FUN2(Sb,Ra||Rb||Text4).
其中Text4=IDb||IDa||Tb||Ta。并将TokenAB发送到B。本示例中采用预置的共享密钥,单向密钥Kba和单向密钥Kab相同。Where Text4 = IDb||IDa||Tb||Ta. And TokenAB is sent to B. In this example, the preset shared key is used, and the one-way key Kba is the same as the one-way key Kab.
步骤四(未示出)、实体B接收到实体A发送的TokenAB后,计算FUN1(K,Rb||Ra||IDb||IDa||Tb||Ta),验证计算结果是否与收到的TokenAB收到的数据一致,验证收到的实体A的证书是否有效。有效则获取出有效公钥,同时对收到的签名数据进行验签,确保签名的数据是真实有效且包含了随机数Rb。一致则双向身份认证成功。Step 4 (not shown), after entity B receives TokenAB sent by entity A, it calculates FUN1(K,Rb||Ra||IDb||IDa||Tb||Ta), verifies whether the calculation result is consistent with the data received by TokenAB, and verifies whether the received certificate of entity A is valid. If it is valid, the valid public key is obtained, and the received signature data is verified to ensure that the signed data is authentic and valid and contains the random number Rb. If they are consistent, the two-way identity authentication is successful.
身份认证协议层报文格式如表7所示:The identity authentication protocol layer message format is shown in Table 7:
表7身份认证协议层报文Table 7 Identity authentication protocol layer message
其中,身份认证协议报文根据报文类型发送三帧的数据报文,报文类型相应值为0xE080、0xE081、0xE082。The identity authentication protocol message sends three frames of data messages according to the message type, and the corresponding values of the message type are 0xE080, 0xE081, and 0xE082.
进一步地,在密钥平台中的中转过程包括基于内置的集群对讲设备的设备量子密钥和业务量子密钥对加密业务数据密钥解密,得到业务数据密钥的过程。这一过程与在目标集群对讲设备中对接收到的加密业务数据密钥进行解密的过程原理相同,此处不再赘述。Furthermore, the transfer process in the key platform includes the process of decrypting the encrypted business data key based on the device quantum key and the business quantum key of the built-in cluster intercom device to obtain the business data key. This process is the same as the process principle of decrypting the received encrypted business data key in the target cluster intercom device, and will not be repeated here.
步骤S602、响应于接收到的目标集群对讲设备的申请,对业务数据密钥重新加密。Step S602: Re-encrypt the service data key in response to the received request from the target cluster intercom device.
具体的,为了保证目标集群对讲设备能在其设备本地对加密业务数据密钥进行解密,因此,需要将业务数据密钥基于内置的目标对讲设备的设备量子密钥进行重新加密,得到新的加密业务数据密钥。对业务数据密钥的重新加密过程可以参见图3所示实施例中步骤S303至步骤S304相关内容,其原理相同,因此此处不再赘述。Specifically, in order to ensure that the target cluster intercom device can decrypt the encrypted business data key locally on its device, it is necessary to re-encrypt the business data key based on the device quantum key of the built-in target intercom device to obtain a new encrypted business data key. The re-encryption process of the business data key can refer to the relevant contents of steps S303 to S304 in the embodiment shown in Figure 3. The principle is the same, so it will not be repeated here.
示例性的,加密业务数据密钥的报文格式如表8所示:Exemplarily, the message format of the encrypted service data key is shown in Table 8:
表8加密业务数据密钥的报文格式Table 8 Message format of encrypted service data key
其中,加密业务数据密钥的报文根据报文类型发送三帧的数据报文,报文类型相应值为0xE090、0xE091、0xE092。其中量子加密头主要包括加密方式,采用的密钥加密密钥的KID,以及与业务数据密钥进行结合的业务量子密钥的KID。Among them, the message of the encrypted business data key sends three frames of data messages according to the message type, and the corresponding values of the message type are 0xE090, 0xE091, and 0xE092. The quantum encryption header mainly includes the encryption method, the KID of the key encryption key used, and the KID of the business quantum key combined with the business data key.
步骤S603、将重新加密后的加密业务数据密钥发送到加密业务数据密钥对应的集群对讲设备。Step S603: Send the re-encrypted encrypted service data key to the cluster intercom device corresponding to the encrypted service data key.
具体的,重新加密后的加密业务数据就可以直接发送给目标集群对讲设备(即加密业务数据密钥对应的集群对讲设备),从而完成集群对讲中业务数据通信过程在密钥平台上的部分。Specifically, the re-encrypted encrypted business data can be directly sent to the target cluster intercom device (ie, the cluster intercom device corresponding to the encrypted business data key), thereby completing the part of the business data communication process in the cluster intercom on the key platform.
本公开实施例提供的集群对讲通信方法,通过响应于接收到的加密业务数据密钥,确定对应的业务数据密钥,然后响应于接收到的目标集群对讲设备的申请,对业务数据密钥重新加密,再将重新加密后的加密业务数据密钥发送到加密业务数据密钥对应的集群对讲设备。由此,实现在密钥平台一侧,完成加密业务数据密钥的接收、中转处理和发送,使得加密业务数据密钥与加密业务数据通过不同通道传输,且加密业务数据密钥的解密、加密业务数据的解密都可以在目标集群对讲设备本地完成,最大限度保证了业务数据传输过程的安全性。The cluster intercom communication method provided by the embodiment of the present disclosure determines the corresponding business data key by responding to the received encrypted business data key, and then re-encrypts the business data key in response to the application of the received target cluster intercom device, and then sends the re-encrypted encrypted business data key to the cluster intercom device corresponding to the encrypted business data key. In this way, the receiving, transit processing and sending of the encrypted business data key are completed on the key platform side, so that the encrypted business data key and the encrypted business data are transmitted through different channels, and the decryption of the encrypted business data key and the decryption of the encrypted business data can be completed locally on the target cluster intercom device, which maximizes the security of the business data transmission process.
图7为本公开提供的一个集群对讲通信方法的流程图。如图7所示,本实施例提供的集群对讲通信方法应用于密钥平台,其包括以下步骤:FIG7 is a flow chart of a cluster intercom communication method provided by the present disclosure. As shown in FIG7 , the cluster intercom communication method provided by this embodiment is applied to a key platform, and includes the following steps:
步骤S701、响应于接收到的加密业务数据密钥,基于加密业务数据密钥的业务种类,确定用于对加密业务数据密钥进行解密的业务量子密钥。Step S701: In response to the received encrypted business data key, based on the business type of the encrypted business data key, determine a business quantum key for decrypting the encrypted business data key.
具体的,参考表8中所示的加密业务数据密钥的结构和图3所示实施例中的步骤S301,密钥平台在接收到加密业务数据密钥时,就可以基于其报文确定其业务类型。Specifically, referring to the structure of the encrypted service data key shown in Table 8 and step S301 in the embodiment shown in FIG. 3 , when the key platform receives the encrypted service data key, it can determine its service type based on its message.
密钥平台中内置有与集群对讲设备/目标集群对讲设备相同的业务量子密钥和与集群对讲设备、目标集群对讲设备对应的设备量子密钥,在确定接收到的加密业务数据密钥的业务类型之后,就可以从预制的业务量子密钥中找出用于解密的业务量子密钥,并与相应设备量子密钥结合,实现业务数据密钥的解密和再加密。The key platform has built-in business quantum keys that are the same as the cluster intercom device/target cluster intercom device and device quantum keys corresponding to the cluster intercom device and target cluster intercom device. After determining the business type of the received encrypted business data key, the business quantum key used for decryption can be found from the pre-made business quantum keys and combined with the corresponding device quantum key to achieve decryption and re-encryption of the business data key.
步骤S702、通过密钥加密密钥和与集群对讲设备对应的业务量子密钥,对加密业务数据密钥进行解密,得到业务数据密钥。Step S702: decrypt the encrypted business data key using the key encryption key and the business quantum key corresponding to the cluster intercom device to obtain the business data key.
具体的,由于接收到加密业务数据密钥时,可以通过报文确定对应的集群对讲设备,进而确定内置的集群对讲设备对应的设备量子密钥,此时就可以基于设备量子密钥中的密钥加密密钥与业务量子密钥结合,完成对加密业务数据密钥的解密,得到业务数据密钥的明文。Specifically, when the encrypted business data key is received, the corresponding cluster intercom device can be determined through the message, and then the device quantum key corresponding to the built-in cluster intercom device can be determined. At this time, the key encryption key in the device quantum key can be combined with the business quantum key to complete the decryption of the encrypted business data key and obtain the plaintext of the business data key.
具体解密过程可以参考图5所示实施例中的相关描述,此处不再赘述。For the specific decryption process, please refer to the relevant description in the embodiment shown in FIG5 , which will not be repeated here.
步骤S703、确定与业务数据密钥的业务种类对应,且用于对业务数据密钥进行加密的业务量子密钥。Step S703: Determine a business quantum key that corresponds to the business type of the business data key and is used to encrypt the business data key.
具体的,在接收到集群对讲设备发送的加密业务数据密钥后,密钥平台也会收到目标集群对讲设备发送的获取加密业务数据密钥的申请,此时密钥平台可以基于内置的业务量子密钥和设备量子密钥,对解密后的业务数据密钥进行再加密。Specifically, after receiving the encrypted business data key sent by the cluster intercom device, the key platform will also receive an application for obtaining the encrypted business data key sent by the target cluster intercom device. At this time, the key platform can re-encrypt the decrypted business data key based on the built-in business quantum key and device quantum key.
首先仍需要确定用于对业务数据密钥进行加密的业务量子密钥。First, it is still necessary to determine the business quantum key used to encrypt the business data key.
一些实施例中,可以直接选择步骤S701中的业务量子密钥对业务数据密钥进行再加密,不影响业务数据的安全性(因为得到的加密业务数据密钥会发生变化,即加密业务数据密钥在不同设备/密钥平台之间传输时不同,无法降低破解难度)。In some embodiments, the business quantum key in step S701 can be directly selected to re-encrypt the business data key without affecting the security of the business data (because the obtained encrypted business data key will change, that is, the encrypted business data key is different when transmitted between different devices/key platforms, and the difficulty of cracking cannot be reduced).
本步骤所涉及的再加密的过程可以参考图3所示实施例中的步骤S303中的描述,此处不再赘述、The re-encryption process involved in this step can refer to the description of step S303 in the embodiment shown in FIG. 3 , and will not be described in detail here.
步骤S704、将业务量子密钥和与目标集群对讲设备对应的设备量子密钥结合,对业务数据密钥进行重新加密。Step S704: Combine the service quantum key with the device quantum key corresponding to the target cluster intercom device to re-encrypt the service data key.
具体的,基于业务量子密钥和设备量子密钥中的密钥加密密钥对业务数据密钥明文再加密的过程,可以参考图3所示实施例中的步骤S304中的描述,此处不再赘述。Specifically, the process of re-encrypting the business data key plaintext based on the key encryption key in the business quantum key and the device quantum key can refer to the description in step S304 in the embodiment shown in Figure 3, and will not be repeated here.
步骤S705、将重新加密后的加密业务数据密钥发送到加密业务数据密钥对应的集群对讲设备。Step S705: Send the re-encrypted encrypted service data key to the cluster intercom device corresponding to the encrypted service data key.
具体的,本步骤与图6所示实施例中的步骤S603内容相同,此处不再赘述。Specifically, this step is the same as step S603 in the embodiment shown in FIG. 6 , and will not be described in detail here.
本公开实施例提供的集群对讲通信方法,通过响应于接收到的加密业务数据密钥,基于加密业务数据密钥的业务种类,确定用于对加密业务数据密钥进行解密的业务量子密钥,然后通过密钥加密密钥和业务量子密钥,对加密业务数据密钥进行解密,得到业务数据密钥,再确定与业务数据密钥的业务种类对应,且用于对业务数据密钥进行加密的业务量子密钥,并将业务量子密钥和目标集群对讲设备的设备量子密钥结合,对业务数据密钥进行重新加密,最后将重新加密后的加密业务数据密钥发送到加密业务数据密钥对应的集群对讲设备。由此,实现在密钥平台一侧,基于集群对讲设备发送的设备量子密钥和加密业务数据密钥,对加密业务数据密钥进行接收和解密,并基于目标集群对讲设备,对解密后的业务数据密钥进行再次加密和发送,使得加密业务数据密钥与加密业务数据通过不同通道传输,在不同传输阶段的加密业务数据密钥芜湖相同,并使得加密业务数据密钥的解密、加密业务数据的解密都可以在目标集群对讲设备本地完成,有效保证了业务数据传输过程和解密过程的安全性。The cluster intercom communication method provided by the embodiment of the present disclosure determines the business quantum key for decrypting the encrypted business data key based on the business type of the encrypted business data key in response to the received encrypted business data key, and then decrypts the encrypted business data key through the key encryption key and the business quantum key to obtain the business data key, and then determines the business quantum key corresponding to the business type of the business data key and used to encrypt the business data key, and combines the business quantum key with the device quantum key of the target cluster intercom device to re-encrypt the business data key, and finally sends the re-encrypted encrypted business data key to the cluster intercom device corresponding to the encrypted business data key. Thus, on the key platform side, the encrypted business data key is received and decrypted based on the device quantum key and the encrypted business data key sent by the cluster intercom device, and the decrypted business data key is encrypted and sent again based on the target cluster intercom device, so that the encrypted business data key and the encrypted business data are transmitted through different channels, and the encrypted business data key in different transmission stages is the same, and the decryption of the encrypted business data key and the decryption of the encrypted business data can be completed locally on the target cluster intercom device, effectively ensuring the security of the business data transmission process and the decryption process.
图8为本公开提供的一个集群对讲通信装置的结构示意图。如图8所示,该集群对讲通信装置800应用于集群对讲设备,其实现原理和技术效果已在前述实施例中充分描述,在此不再赘述。Fig. 8 is a schematic diagram of the structure of a cluster intercom communication device provided by the present disclosure. As shown in Fig. 8, the cluster intercom communication device 800 is applied to a cluster intercom device, and its implementation principle and technical effects have been fully described in the above embodiments, which will not be repeated here.
集群对讲通信装置800包括:第一加密模块810、第二加密模块820和发送模块830。其中:The cluster intercom communication device 800 includes: a first encryption module 810, a second encryption module 820 and a sending module 830. Among them:
第一加密模块810,用于基于业务数据对应的加密密钥,对业务数据进行加密,得到加密业务数据,加密密钥包括业务数据密钥;A first encryption module 810, configured to encrypt the business data based on an encryption key corresponding to the business data to obtain encrypted business data, wherein the encryption key includes a business data key;
第二加密模块820,用于对业务数据密钥进行加密,得到加密业务数据密钥;The second encryption module 820 is used to encrypt the business data key to obtain an encrypted business data key;
发送模块830,用于将加密业务数据密钥发送到密钥平台进行解密和加密处理,并将加密业务数据发送到目标集群对讲设备,以使目标集群对讲设备基于密钥平台处理后的业务数据密钥对加密业务数据进行解密,得到业务数据。The sending module 830 is used to send the encrypted business data key to the key platform for decryption and encryption processing, and send the encrypted business data to the target cluster intercom device, so that the target cluster intercom device decrypts the encrypted business data based on the business data key processed by the key platform to obtain the business data.
可选地,第一加密模块810具体用于,在集群对讲设备内设置有量子加密模块时,通过如下方式得到业务数据密钥:通过量子加密模块,将生成的量子真随机数作为业务数据密钥。Optionally, the first encryption module 810 is specifically used to obtain the business data key in the following manner when a quantum encryption module is provided in the cluster intercom device: using the generated quantum true random number as the business data key through the quantum encryption module.
可选地,第一加密模块810具体包括,加密密钥还包括:与业务种类对应业务量子密钥,和与设备对应的设备量子密钥;设备量子密钥包括:用于表明集群对讲设备身份的设备身份密钥,和用于与业务量子密钥配合共同实现加密的密钥加密密钥。Optionally, the first encryption module 810 specifically includes: the encryption key also includes: a business quantum key corresponding to the business type, and a device quantum key corresponding to the device; the device quantum key includes: a device identity key used to indicate the identity of the cluster intercom device, and a key encryption key used to cooperate with the business quantum key to jointly implement encryption.
可选地,第二加密模块820具体用于,确定业务数据的业务种类对应,且用于对业务数据密钥加密的业务量子密钥;将业务数据密钥与业务量子密钥结合;通过密钥加密密钥对业务数据密钥与业务量子密钥的结合进行加密处理,得到加密业务数据密钥。Optionally, the second encryption module 820 is specifically used to determine the business type corresponding to the business data and the business quantum key used to encrypt the business data key; combine the business data key with the business quantum key; encrypt the combination of the business data key and the business quantum key by using the key encryption key to obtain an encrypted business data key.
可选地,发送模块830具体用于,在密钥平台内配置有业务量子密钥时,将加密业务数据密钥发送到密钥平台,以使密钥平台基于集群对讲设备的设备量子密钥和业务量子密钥对加密业务数据密钥进行解密处理,并基于目标集群对讲设备的设备量子密钥和业务量子密钥,对解密处理后的加密业务数据密钥进行加密处理。Optionally, the sending module 830 is specifically used to send the encrypted business data key to the key platform when a business quantum key is configured in the key platform, so that the key platform decrypts the encrypted business data key based on the device quantum key and the business quantum key of the cluster intercom device, and encrypts the decrypted encrypted business data key based on the device quantum key and the business quantum key of the target cluster intercom device.
图9为本公开提供的一个集群对讲通信装置的结构示意图。如图9所示,该集群对讲通信装置900应用于目标集群对讲设备,其实现原理和技术效果已在前述实施例中充分描述,在此不再赘述。Fig. 9 is a schematic diagram of the structure of a cluster intercom communication device provided by the present disclosure. As shown in Fig. 9, the cluster intercom communication device 900 is applied to a target cluster intercom device, and its implementation principle and technical effects have been fully described in the above embodiments, which will not be repeated here.
集群对讲通信装置900包括:接收模块910、解密模块920和确定模块930。其中:The cluster intercom communication device 900 includes: a receiving module 910, a decryption module 920 and a determination module 930. Among them:
接收模块910,用于响应于接收到的加密业务数据,从密钥平台中获取对应的加密业务数据密钥;The receiving module 910 is used to obtain the corresponding encrypted business data key from the key platform in response to the received encrypted business data;
解密模块920,用于基于预设的加密密钥和加密业务数据密钥,获得对应的业务数据密钥;The decryption module 920 is used to obtain the corresponding business data key based on the preset encryption key and the encrypted business data key;
确定模块930,用于基于业务数据密钥,对加密业务数据进行解密,得到对应的业务数据。The determination module 930 is used to decrypt the encrypted business data based on the business data key to obtain corresponding business data.
可选地,解密模块920具体包括,预设的加密密钥包括:与业务种类对应业务量子密钥,和与目标集群对讲设备对应的设备量子密钥;设备量子密钥包括:用于与业务量子密钥配合共同实现加密的密钥加密密钥。Optionally, the decryption module 920 specifically includes: the preset encryption key includes: a business quantum key corresponding to the business type, and a device quantum key corresponding to the target cluster intercom device; the device quantum key includes: a key encryption key used to cooperate with the business quantum key to jointly implement encryption.
可选地,接收模块910具体用于,在业务数据密钥包括密钥标识时,响应于接收到的加密业务数据,确定加密业务数据对应密文标识;基于密文标识,向密钥平台发送设备量子密钥,以获取加密业务数据对应的加密业务数据密钥。Optionally, the receiving module 910 is specifically used to, when the business data key includes a key identifier, determine a ciphertext identifier corresponding to the encrypted business data in response to the received encrypted business data; based on the ciphertext identifier, send a device quantum key to the key platform to obtain an encrypted business data key corresponding to the encrypted business data.
可选地,解密模块920具体用于,确定与加密业务数据密钥的业务种类对应,且用于对加密业务数据密钥进行解密的业务量子密钥;通过密钥加密密钥和业务量子密钥结合后,对加密业务数据密钥进行解密,得到业务数据密钥;通过业务数据密钥,对加密业务数据进行解密,得到对应的业务数据。Optionally, the decryption module 920 is specifically used to determine a business quantum key corresponding to the business type of the encrypted business data key and used to decrypt the encrypted business data key; after combining the key encryption key and the business quantum key, the encrypted business data key is decrypted to obtain the business data key; and the encrypted business data is decrypted using the business data key to obtain the corresponding business data.
图10为本公开提供的一个集群对讲通信装置的结构示意图。如图10所示,该集群对讲通信装置1000应用于密钥平台,其实现原理和技术效果已在前述实施例中充分描述,在此不再赘述。Fig. 10 is a schematic diagram of the structure of a cluster intercom communication device provided by the present disclosure. As shown in Fig. 10, the cluster intercom communication device 1000 is applied to the key platform, and its implementation principle and technical effects have been fully described in the above embodiments, which will not be repeated here.
集群对讲通信装置1000包括:解密模块1010、加密模块1020和发送模块1030。其中:The cluster intercom communication device 1000 includes: a decryption module 1010, an encryption module 1020 and a sending module 1030. Among them:
解密模块1010,用于响应于接收到的加密业务数据密钥,确定对应的业务数据密钥;The decryption module 1010 is used to determine the corresponding business data key in response to the received encrypted business data key;
加密模块1020,用于响应于接收到的目标集群对讲设备的申请,对业务数据密钥重新加密;The encryption module 1020 is used to re-encrypt the service data key in response to the received application of the target cluster intercom device;
发送模块1030,用于将重新加密后的加密业务数据密钥发送到加密业务数据密钥对应的集群对讲设备。The sending module 1030 is used to send the re-encrypted encrypted service data key to the cluster intercom device corresponding to the encrypted service data key.
可选地,解密模块1010具体包括,密钥平台内配置有与业务种类对应业务量子密钥和与集群对讲设备、目标集群对讲设备对应的设备量子密钥,设备量子密钥包括用于与业务量子密钥配合共同实现加密的密钥加密密钥。Optionally, the decryption module 1010 specifically includes that a business quantum key corresponding to the business type and a device quantum key corresponding to the cluster intercom device and the target cluster intercom device are configured in the key platform, and the device quantum key includes a key encryption key used to cooperate with the business quantum key to jointly implement encryption.
可选地,解密模块1010具体用于,响应于接收到的加密业务数据密钥,基于加密业务数据密钥的业务种类,确定用于对加密业务数据密钥进行解密的业务量子密钥;通过密钥加密密钥和与集群对讲设备对应的业务量子密钥,对加密业务数据密钥进行解密,得到业务数据密钥。Optionally, the decryption module 1010 is specifically used to, in response to the received encrypted business data key, determine a business quantum key used to decrypt the encrypted business data key based on the business type of the encrypted business data key; decrypt the encrypted business data key using the key encryption key and the business quantum key corresponding to the cluster intercom device to obtain the business data key.
可选地,加密模块1020具体用于,确定与业务数据密钥的业务种类对应,且用于对业务数据密钥进行加密的业务量子密钥;将业务量子密钥和与目标集群对讲设备对应的设备量子密钥结合,对业务数据密钥进行重新加密。Optionally, the encryption module 1020 is specifically used to determine a business quantum key corresponding to the business type of the business data key and used to encrypt the business data key; combine the business quantum key with the device quantum key corresponding to the target cluster intercom device, and re-encrypt the business data key.
图11为本公开提供的一个控制设备的结构示意图,如图11所示,该控制设备1100包括:存储器1110和处理器1120。FIG11 is a schematic diagram of the structure of a control device provided by the present disclosure. As shown in FIG11 , the control device 1100 includes: a memory 1110 and a processor 1120 .
其中,存储器1110存储有可被至少一个处理器1120执行的计算机程序。该算机程序被至少一个处理器1120执行,以使控制设备实现如上任一实施例中提供的集群对讲通信方法。The memory 1110 stores a computer program that can be executed by at least one processor 1120. The computer program is executed by at least one processor 1120 to enable the control device to implement the cluster intercom communication method provided in any of the above embodiments.
其中,存储器1110和处理器1120可以通过总线1130连接。The memory 1110 and the processor 1120 may be connected via a bus 1130 .
相关说明可以对应参见方法实施例所对应的相关描述和效果进行理解,此处不予赘述。The relevant instructions can be understood by referring to the relevant descriptions and effects corresponding to the method embodiments, which will not be repeated here.
本公开一个实施例提供一种计算机可读存储介质,其上存储有计算机程序,计算机程序被处理器执行以实现如图2至图7对应的任意实施例的集群对讲通信方法。An embodiment of the present disclosure provides a computer-readable storage medium having a computer program stored thereon. The computer program is executed by a processor to implement the cluster intercom communication method of any embodiment corresponding to FIG. 2 to FIG. 7 .
其中,计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。Among them, the computer-readable storage medium may be a ROM, a random access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
本公开一个实施例提供了一种计算机程序产品,其包含计算机执行指令,该计算机执行指令被处理器执行时用于实现如图2至图7对应的任意实施例的集群对讲通信方法。An embodiment of the present disclosure provides a computer program product, which includes computer-executable instructions. When the computer-executable instructions are executed by a processor, they are used to implement the cluster intercom communication method of any embodiment corresponding to FIG. 2 to FIG. 7 .
在本公开所提供的几个实施例中,应该理解到,所揭露的装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,模块的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个模块或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或模块的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided in the present disclosure, it should be understood that the disclosed devices and methods can be implemented in other ways. For example, the device embodiments described above are only schematic, for example, the division of modules is only a logical function division, and there may be other division methods in actual implementation, such as multiple modules or components can be combined or integrated into another system, or some features can be ignored or not executed. Another point is that the mutual coupling or direct coupling or communication connection shown or discussed can be through some interfaces, indirect coupling or communication connection of devices or modules, which can be electrical, mechanical or other forms.
本领域技术人员在考虑说明书及实践这里公开的公开后,将容易想到本公开的其它实施方案。本公开旨在涵盖本公开的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本公开的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本公开的真正范围和精神由下面的权利要求书指出。Those skilled in the art will readily appreciate other embodiments of the present disclosure after considering the specification and practicing the disclosure disclosed herein. The present disclosure is intended to cover any variations, uses, or adaptations of the present disclosure that follow the general principles of the present disclosure and include common knowledge or customary techniques in the art that are not disclosed in the present disclosure. The description and examples are intended to be exemplary only, and the true scope and spirit of the present disclosure are indicated by the following claims.
应当理解的是,本公开并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本公开的范围仅由所附的权利要求书来限制。It should be understood that the present disclosure is not limited to the exact structures that have been described above and shown in the drawings, and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.
Claims (9)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202310272600.2A CN116233767B (en) | 2023-03-20 | 2023-03-20 | Cluster intercom communication method, device, equipment and storage medium |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202310272600.2A CN116233767B (en) | 2023-03-20 | 2023-03-20 | Cluster intercom communication method, device, equipment and storage medium |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN116233767A CN116233767A (en) | 2023-06-06 |
| CN116233767B true CN116233767B (en) | 2024-04-30 |
Family
ID=86575102
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202310272600.2A Active CN116233767B (en) | 2023-03-20 | 2023-03-20 | Cluster intercom communication method, device, equipment and storage medium |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN116233767B (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN120150950A (en) * | 2025-05-09 | 2025-06-13 | 量子科技长三角产业创新中心 | A quantum encryption communication method, communication system, storage medium and electronic device |
Citations (17)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101137123A (en) * | 2007-04-09 | 2008-03-05 | 中兴通讯股份有限公司 | Encrypted group calling, individual calling, and dynamic restructuring call implementing method of cluster system |
| WO2012129929A1 (en) * | 2011-03-31 | 2012-10-04 | 中兴通讯股份有限公司 | Method, system and appararus for secure transmission of media message |
| CN103986723A (en) * | 2014-05-28 | 2014-08-13 | 大唐移动通信设备有限公司 | Secret communication control and secret communication method and device |
| CN104144049A (en) * | 2014-03-11 | 2014-11-12 | 腾讯科技(深圳)有限公司 | Encryption communication method, system and device |
| CN106790281A (en) * | 2017-02-23 | 2017-05-31 | 深圳市沃阳精密科技有限公司 | A kind of end-to-end voice encryption device and encryption method towards intercom system |
| CN108075890A (en) * | 2016-11-16 | 2018-05-25 | 中兴通讯股份有限公司 | Data sending terminal, data receiver, data transmission method and system |
| CN109088810A (en) * | 2017-06-14 | 2018-12-25 | 北京信威通信技术股份有限公司 | Communication means, device, relevant device, system and the storage medium of group message |
| CN110620650A (en) * | 2018-06-20 | 2019-12-27 | 中国电信股份有限公司 | Communication method, system, device and computer readable storage medium |
| CN110799941A (en) * | 2017-06-30 | 2020-02-14 | 微软技术许可有限责任公司 | Data protection against theft and tampering |
| CN111901553A (en) * | 2020-07-16 | 2020-11-06 | 南京百家云科技有限公司 | Data encryption and decryption method, device, equipment, server and storage medium |
| CN112260832A (en) * | 2020-12-17 | 2021-01-22 | 南京易科腾信息技术有限公司 | Information encryption, decryption and control method and device and electronic equipment |
| CN112600836A (en) * | 2020-12-10 | 2021-04-02 | 北京字节跳动网络技术有限公司 | Form data processing method, equipment and storage medium |
| CN113612608A (en) * | 2021-08-13 | 2021-11-05 | 中电信量子科技有限公司 | Method and system for realizing cluster encryption of dual-mode interphone based on public network |
| CN114598462A (en) * | 2022-02-28 | 2022-06-07 | 西安电子科技大学 | End-to-end key generation method based on dynamic adjustment in quantum metropolitan area network |
| CN114765546A (en) * | 2020-12-30 | 2022-07-19 | 海能达通信股份有限公司 | End-to-end hard encryption method, system, encryption equipment and key management server |
| CN114980089A (en) * | 2021-02-22 | 2022-08-30 | 华为技术有限公司 | Security protection method and device for multicast or broadcast service data |
| CN115529130A (en) * | 2022-11-25 | 2022-12-27 | 无锡沐创集成电路设计有限公司 | Data processing method, terminal, server, system, device, medium and product |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6393127B2 (en) * | 1998-03-02 | 2002-05-21 | Motorola, Inc. | Method for transferring an encryption key |
| US11356423B2 (en) * | 2020-01-14 | 2022-06-07 | Cisco Technology, Inc. | Managing encrypted server-name-indication (ESNI) at proxy devices |
-
2023
- 2023-03-20 CN CN202310272600.2A patent/CN116233767B/en active Active
Patent Citations (17)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101137123A (en) * | 2007-04-09 | 2008-03-05 | 中兴通讯股份有限公司 | Encrypted group calling, individual calling, and dynamic restructuring call implementing method of cluster system |
| WO2012129929A1 (en) * | 2011-03-31 | 2012-10-04 | 中兴通讯股份有限公司 | Method, system and appararus for secure transmission of media message |
| CN104144049A (en) * | 2014-03-11 | 2014-11-12 | 腾讯科技(深圳)有限公司 | Encryption communication method, system and device |
| CN103986723A (en) * | 2014-05-28 | 2014-08-13 | 大唐移动通信设备有限公司 | Secret communication control and secret communication method and device |
| CN108075890A (en) * | 2016-11-16 | 2018-05-25 | 中兴通讯股份有限公司 | Data sending terminal, data receiver, data transmission method and system |
| CN106790281A (en) * | 2017-02-23 | 2017-05-31 | 深圳市沃阳精密科技有限公司 | A kind of end-to-end voice encryption device and encryption method towards intercom system |
| CN109088810A (en) * | 2017-06-14 | 2018-12-25 | 北京信威通信技术股份有限公司 | Communication means, device, relevant device, system and the storage medium of group message |
| CN110799941A (en) * | 2017-06-30 | 2020-02-14 | 微软技术许可有限责任公司 | Data protection against theft and tampering |
| CN110620650A (en) * | 2018-06-20 | 2019-12-27 | 中国电信股份有限公司 | Communication method, system, device and computer readable storage medium |
| CN111901553A (en) * | 2020-07-16 | 2020-11-06 | 南京百家云科技有限公司 | Data encryption and decryption method, device, equipment, server and storage medium |
| CN112600836A (en) * | 2020-12-10 | 2021-04-02 | 北京字节跳动网络技术有限公司 | Form data processing method, equipment and storage medium |
| CN112260832A (en) * | 2020-12-17 | 2021-01-22 | 南京易科腾信息技术有限公司 | Information encryption, decryption and control method and device and electronic equipment |
| CN114765546A (en) * | 2020-12-30 | 2022-07-19 | 海能达通信股份有限公司 | End-to-end hard encryption method, system, encryption equipment and key management server |
| CN114980089A (en) * | 2021-02-22 | 2022-08-30 | 华为技术有限公司 | Security protection method and device for multicast or broadcast service data |
| CN113612608A (en) * | 2021-08-13 | 2021-11-05 | 中电信量子科技有限公司 | Method and system for realizing cluster encryption of dual-mode interphone based on public network |
| CN114598462A (en) * | 2022-02-28 | 2022-06-07 | 西安电子科技大学 | End-to-end key generation method based on dynamic adjustment in quantum metropolitan area network |
| CN115529130A (en) * | 2022-11-25 | 2022-12-27 | 无锡沐创集成电路设计有限公司 | Data processing method, terminal, server, system, device, medium and product |
Non-Patent Citations (1)
| Title |
|---|
| 电力量子保密通信研究与应用进展;刘磊;曲延盛;李明;朱尤祥;王云霄;;山东电力技术;20180825(08);全文 * |
Also Published As
| Publication number | Publication date |
|---|---|
| CN116233767A (en) | 2023-06-06 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN108599925B (en) | Improved AKA identity authentication system and method based on quantum communication network | |
| EP2416524B1 (en) | System and method for secure transaction of data between wireless communication device and server | |
| US7542569B1 (en) | Security of data connections | |
| EP3676987B1 (en) | Secure key transmission protocol without certificates or pre-shared symmetrical keys | |
| US20070083766A1 (en) | Data transmission links | |
| CN101600204B (en) | File transmission method and system | |
| WO2017185999A1 (en) | Method, apparatus and system for encryption key distribution and authentication | |
| JP2005515701A6 (en) | Data transmission link | |
| JP2005515701A (en) | Data transmission link | |
| CN101340443A (en) | Session key negotiating method, system and server in communication network | |
| CN114553420B (en) | Digital envelope packaging method based on quantum key and data secret communication network | |
| KR20130096320A (en) | Switch equipment and data processing method for supporting link layer security transmission | |
| US20020199102A1 (en) | Method and apparatus for establishing a shared cryptographic key between energy-limited nodes in a network | |
| WO2014090130A1 (en) | Method, device and system for message processing | |
| CN118540165B (en) | Anti-quantum security enhancement method for national secret IPSec VPN protocol | |
| CN118540163A (en) | Quantum security enhancement method for national security SSL VPN protocol | |
| CN107249002B (en) | Method, system and device for improving safety of intelligent electric energy meter | |
| CN116233767B (en) | Cluster intercom communication method, device, equipment and storage medium | |
| CN112637145B (en) | Network equipment interconnection authentication method and system | |
| CN118157859B (en) | A device security communication method and device based on national secret security chip | |
| CN102739660B (en) | Key exchange method for single sign on system | |
| CN108809656A (en) | A kind of Key Exchange Protocol building method based on double authentication protection signature | |
| CN116094845B (en) | Efficient revocation conditional proxy re-encryption method and system | |
| CN116233843B (en) | B5G/6G network slice authentication method for industrial Internet | |
| WO2008004174A2 (en) | Establishing a secure authenticated channel |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |