[go: up one dir, main page]

CN120316800A - A method for protecting data transmission during POS personalization - Google Patents

A method for protecting data transmission during POS personalization

Info

Publication number
CN120316800A
CN120316800A CN202510482084.5A CN202510482084A CN120316800A CN 120316800 A CN120316800 A CN 120316800A CN 202510482084 A CN202510482084 A CN 202510482084A CN 120316800 A CN120316800 A CN 120316800A
Authority
CN
China
Prior art keywords
pos
data
sensitive data
personalization
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202510482084.5A
Other languages
Chinese (zh)
Inventor
徐春晖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Kumi Information Technology Co ltd
Original Assignee
Shandong Kumi Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Kumi Information Technology Co ltd filed Critical Shandong Kumi Information Technology Co ltd
Priority to CN202510482084.5A priority Critical patent/CN120316800A/en
Publication of CN120316800A publication Critical patent/CN120316800A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

本发明涉及信息技术领域,尤其涉及一种POS个性化时保护数据传递的方法。包括以下步骤:在POS设备生产过程中,由POS设备内部的安全区域自动生成非对称密钥对;上位机软件读取POS设备的公钥,并将公钥传递至生产后台;生产后台通过加密机对数据库中存储的敏感数据进行解密,得到明文敏感数据;生产后台使用POS设备的公钥对明文敏感数据进行加密,生成二次加密数据;将二次加密数据通过上位机软件传输至POS设备;POS设备利用其安全区域中存储的私钥对二次加密数据进行解密,获取明文敏感数据并完成个性化配置。本发明通过非对称密钥技术、二次加密机制及完整性校验,实现从生产后台到POS设备的数据全程密文传输,显著提升个性化过程的安全性。

The present invention relates to the field of information technology, and in particular to a method for protecting data transmission during POS personalization. The method comprises the following steps: in the production process of POS equipment, an asymmetric key pair is automatically generated by a secure area inside the POS equipment; the upper computer software reads the public key of the POS equipment and transmits the public key to the production background; the production background decrypts the sensitive data stored in the database through an encryption machine to obtain plaintext sensitive data; the production background encrypts the plaintext sensitive data using the public key of the POS equipment to generate secondary encrypted data; the secondary encrypted data is transmitted to the POS equipment through the upper computer software; the POS equipment decrypts the secondary encrypted data using the private key stored in its secure area, obtains the plaintext sensitive data and completes the personalized configuration. The present invention realizes the full ciphertext transmission of data from the production background to the POS equipment through asymmetric key technology, secondary encryption mechanism and integrity verification, and significantly improves the security of the personalization process.

Description

Method for protecting data transmission during POS individuation
Technical Field
The invention relates to the technical field of information, in particular to a method for protecting data transmission during POS personalization.
Background
POS (point of sale) devices are used as core tools for financial transactions, and personalized configuration links in the production and manufacturing process involve the transfer of sensitive data, such as Serial Numbers (SN), encryption keys, and the like. In the traditional personalized process, sensitive data is usually stored in an encryption database of a production background, and encryption protection is carried out by depending on an encryption machine. In the personalized process, the production background needs to decrypt the sensitive data through the encryption machine, and then the decrypted plaintext data is transmitted to the upper computer software through a network, a serial port or a USB interface, and finally written into the POS equipment. Although the method has the convenience of operation, the data transmission link has obvious potential safety hazard that sensitive data is exposed to the transmission link in a plaintext form after being decrypted by an encryption machine, and is easy to be intercepted maliciously or stolen, and particularly, the data leakage risk is extremely high in the network transmission or physical interface communication process.
In the prior art, although the problem of data security is partially alleviated by encrypting the storage and transmission link (such as SSL/TLS), the core problem is that the decrypted sensitive data still needs to be transmitted in a plaintext form for the second time. For example, the encrypted data may be stored in the production background memory briefly or may flow through an incompletely protected communication channel before being transferred to the POS device, which provides a multiplicative opportunity for threats such as man-in-the-middle attacks, memory theft, etc. In addition, the traditional method relies on a single encryption level, lacks a dynamic protection mechanism for a transmission link, and is difficult to adapt to a financial equipment production scene with high security requirements.
Disclosure of Invention
The invention provides an innovative data transmission protection scheme, which realizes the whole-course ciphertext transmission of data from a production background to POS equipment through an asymmetric key technology, a secondary encryption mechanism and integrity verification, and remarkably improves the security of a personalized process.
The technical scheme adopted by the invention is that the method for protecting data transmission during POS individuation comprises the following steps:
in the production process of the POS equipment, an asymmetric key pair is automatically generated by a safety area inside the POS equipment, wherein the asymmetric key pair comprises a public key and a private key, and the private key is only stored in the safety area of the POS equipment and is not leaked outside;
Reading a public key of the POS equipment by upper computer software, and transmitting the public key to a production background;
Decrypting the sensitive data stored in the database by the production background through the encryption machine to obtain plaintext sensitive data;
Encrypting the plaintext sensitive data by using a public key of the POS equipment by a production background to generate secondary encrypted data;
step five, transmitting the secondary encryption data to the POS equipment through upper computer software;
Step six, the POS equipment decrypts the secondary encrypted data by utilizing a private key stored in a safe area of the POS equipment to obtain plaintext sensitive data and complete personalized configuration;
The sensitive data always exist in a ciphertext form in the transmission process of the third step to the sixth step.
As a further improvement of the present invention, the asymmetric key algorithm is selected from one of RSA, ECC, DSA, and the key length satisfies RSA2048 and ECC256 strength.
In the fourth step, the production background generates a HASH digest value for the plaintext sensitive data and transmits the HASH digest value and the secondarily encrypted data to the POS device, and after the POS device decrypts, the POS device regenerates the digest value for the plaintext sensitive data by the same HASH algorithm and compares the digest value with the received HASH digest value to verify the integrity of the data.
As a further improvement of the present invention, the HASH algorithm is selected from one of SHA1, SHA256, SM 3.
As a further improvement of the invention, the asymmetric key pair is dynamically generated by the POS device in an initialization phase and automatically destroyed after the personalized configuration is completed.
As a further improvement of the present invention, the secure area is a Hardware Security Module (HSM), a Trusted Execution Environment (TEE), for ensuring physical isolation and tamper resistance of the private key.
As a further improvement of the invention, the transmission path of the secondary encryption data comprises one or more of a network, a serial port and a USB interface, and the data is kept in a ciphertext state in the transmission process.
As a further improvement of the invention, an isolated communication protocol is adopted between the encryptor and the production background, and the key management of the encryptor accords with the financial-level security standard.
In the third step, the decryption operation of the encryptor on the sensitive data and the encryption transferring operation in the fourth step are continuously executed in the secure sandbox, so that the exposure of the plaintext sensitive data to the memory in the production background is avoided.
As a further improvement of the invention, the method is suitable for the mass production scene of POS equipment, and supports the parallel execution of personalized configuration of a plurality of POS equipment.
The invention has the beneficial effects that by means of an asymmetric encryption technology, dynamic key management and a whole-course ciphertext transmission mechanism, the security of the whole link of sensitive data in the personalized POS process is ensured, meanwhile, the efficient production and the cost optimization are considered, the risk of data leakage caused by plaintext exposure in the traditional method is thoroughly eliminated, the parallel processing and flexible adaptation of multiple devices are supported, and a solution with high security and high reliability is provided for the manufacture of financial equipment.
Drawings
Fig. 1 is a block diagram of a method of protecting data transfer during POS personalization in accordance with the present invention.
Detailed Description
In order to make the technical problems, technical schemes and beneficial effects to be solved more clear, the application is further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The invention provides a method for protecting data transmission during POS individuation, which comprises the following steps:
In the production process of the POS equipment, an asymmetric key pair is automatically generated by a safety area inside the POS equipment, wherein the asymmetric key pair comprises a public key and a private key, and the private key is only stored in the safety area of the POS equipment and is not leaked;
Step two, the upper computer software reads the public key of the POS equipment and transmits the public key to the production background;
Decrypting the sensitive data stored in the database by the production background through the encryption machine to obtain plaintext sensitive data;
encrypting the plaintext sensitive data by using a public key of the POS equipment at the production background to generate secondary encrypted data;
step five, the secondary encryption data are transmitted to POS equipment through upper computer software;
The POS equipment decrypts the secondary encrypted data by utilizing a private key stored in a safe area of the POS equipment to obtain plaintext sensitive data and complete personalized configuration;
the sensitive data always exist in the form of ciphertext in the transmission process of the third step to the sixth step.
The asymmetric key algorithm is selected from RSA, ECC, DSA, and the key length meets RSA2048 and ECC256 strength.
In the fourth step of the invention, the production background generates the HASH digest value for the plaintext sensitive data and transmits the HASH digest value and the secondary encrypted data to the POS equipment, and after the POS equipment decrypts, the HASH digest value is regenerated for the plaintext sensitive data by the same HASH algorithm and is compared with the received HASH digest value so as to verify the integrity of the data.
The HASH algorithm is selected from one of SHA1, SHA256 and SM 3.
The asymmetric key pair is dynamically generated by the POS equipment in an initialization stage, and is automatically destroyed after personalized configuration is completed.
The security area is a Hardware Security Module (HSM) and a Trusted Execution Environment (TEE) and is used for ensuring the physical isolation and tamper resistance of the private key.
The transmission path of the secondary encryption data comprises one or more of a network, a serial port and a USB interface, and the data is kept in a ciphertext state in the transmission process.
In the invention, an isolated communication protocol is adopted between the encryption machine and the production background, and the key management of the encryption machine accords with the financial security standard.
In the third step of the invention, the decryption operation of the encryption machine on the sensitive data and the encryption transferring operation in the fourth step are continuously executed in the safe sandbox, so that the exposure of the plaintext sensitive data to the memory of the production background is avoided.
The method is suitable for the mass production scene of the POS equipment, and supports the parallel execution of personalized configuration of a plurality of POS equipment.
Examples:
The implementation scenario is that a financial device manufacturing enterprise needs to perform personalized configuration on a batch of POS devices, wherein the personalized configuration comprises sensitive data such as a written device Serial Number (SN), a transaction key and the like. The conventional method has the risk of data leakage, so the secure transmission method is adopted.
The specific implementation steps are as follows:
Step one (generation and storage of asymmetric Key pair)
When the production line is started, each POS device is automatically called a Hardware Security Module (HSM) in an initialization stage, and RSA2048 asymmetric key pairs (a public key PK and a private key SK) are dynamically generated.
The private key SK is permanently stored in a secure storage area of the HSM and external access is forbidden, and the public key PK is read by upper computer software through serial communication.
Step two (public key transfer to production background)
The upper computer software transmits the public key PK to the production background server through the encrypted USB channel, and records the unique identifier (such as the MAC address) of the corresponding POS equipment.
Step three, step four (decryption and encryption of sensitive data)
The production background extracts the sensitive data (such as SN and master key MK) to be written into the POS device from the encryption database, and decrypts the sensitive data into plaintext data by using an AES-256 key through a financial-grade encryptor (conforming to PCIDSS standard).
Immediately in a secure sandbox environment, RSA encryption is carried out on the plaintext data by using the public key PK of the POS equipment, and secondary encrypted data C1 is generated.
Meanwhile, the SHA256 digest value H1 is calculated for the plaintext data and C1 and H1 are bound to the data packet.
Step five (secure transmission of encrypted data)
The data packet (c1+h1) is transmitted to the host software via the isolated network (using TLS1.3 protocol) and then sent to the corresponding POS device via the USB interface.
Step six (data decryption and integrity verification)
The HSM of the POS device decrypts the C1 by using the private key SK and restores the C1 into plaintext data.
The SHA256 digest value H2 is recalculated for the decrypted plaintext data and compared to the received H1. If H1 = H2, the verification is passed, the plaintext data is written into the safe storage area of the equipment, if not, an alarm is triggered and the configuration flow is terminated.
Key destruction and batch processing (extended implementation)
After personalized configuration is completed, the HSM of the POS equipment automatically destroys the dynamically generated private key SK, so that the temporary property of the key is ensured.
And a plurality of POS devices on the production line execute the flow in parallel, and the upper computer software manages public key transmission and data packet distribution of each device through a task queue, so that high-efficiency mass production is realized.
Key parameters and configuration examples:
(1) Asymmetric encryption algorithm RSA2048 (default) or ECC256 (applicable to low power devices)
(2) HASH algorithm SHA256 (default) or SM3 (adapting to domestic password standard scenario).
(3) The security area is realized by adopting an Infrax SLM97 series HSM chip to support physical tamper resistance and side channel attack protection.
(4) Encryptor protocol the encryptor communicates with the hardware encryption channel authenticated by the FIPS140-2 in the production background.
And (3) effect verification:
(1) The security is that the sensitive data in the transmission link is ciphertext in the whole course, even if the network is monitored or the USB interface is intercepted, an attacker can only acquire RSA encrypted data and HASH abstract and cannot restore plaintext.
(2) The efficiency is that the parallel processing capacity of 100 stations/hour is supported, and the key management bottleneck is avoided by a key dynamic generation and destruction mechanism.
(3) Compliance, meeting the requirements of the financial industry PCIPIN Security and GM/T0054-2018 standard.
Summarizing, the embodiment shows the application of the invention in POS equipment mass production through a specific operation flow, verifies the advantages of the POS equipment mass production in the aspects of high safety, high efficiency and compliance, and provides a reliable solution for financial equipment manufacture.
In summary, the method for protecting data transmission during POS personalization of the present invention fully considers production efficiency and cost effectiveness while ensuring data transmission security. By adopting the asymmetric key technology, the invention not only realizes the whole ciphertext transmission of the sensitive data, but also further enhances the safety and reliability of the data transmission through a dynamic key management and integrity checking mechanism. In addition, the method also supports the parallel execution of personalized configuration of a plurality of POS devices, and the production efficiency is obviously improved. In the aspect of cost, although some advanced security technologies and hardware modules are introduced, the overall cost is effectively reduced by optimizing key management and transmission flow, so that the scheme has wide application prospect in the field of financial equipment manufacturing. In a word, the invention provides an innovative data transmission protection scheme, provides a solution with high safety, high efficiency and compliance for the manufacture of financial equipment, and has great practical significance and popularization value.
The foregoing embodiments are merely for illustrating the technical solution of the present invention, but not for limiting the same, and although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those skilled in the art that modifications may be made to the technical solution described in the foregoing embodiments or equivalents may be substituted for parts of the technical features thereof, and such modifications or substitutions do not depart from the spirit and scope of the technical solution of the embodiments of the present invention.

Claims (10)

1.一种POS个性化时保护数据传递的方法,其特征在于,包括以下步骤:1. A method for protecting data transmission during POS personalization, characterized by comprising the following steps: 步骤一:在POS设备生产过程中,由POS设备内部的安全区域自动生成非对称密钥对,所述非对称密钥对包括公钥和私钥,且所述私钥仅存储于POS设备的安全区域中,不对外泄露;Step 1: During the production process of the POS device, an asymmetric key pair is automatically generated by the secure area inside the POS device. The asymmetric key pair includes a public key and a private key, and the private key is only stored in the secure area of the POS device and is not disclosed to the outside. 步骤二:上位机软件读取所述POS设备的公钥,并将所述公钥传递至生产后台;Step 2: The host computer software reads the public key of the POS device and transmits the public key to the production background; 步骤三:生产后台通过加密机对数据库中存储的敏感数据进行解密,得到明文敏感数据;Step 3: The production backend uses an encryption machine to decrypt the sensitive data stored in the database to obtain the plaintext sensitive data; 步骤四:生产后台使用所述POS设备的公钥对所述明文敏感数据进行加密,生成二次加密数据;Step 4: The production backend uses the public key of the POS device to encrypt the plaintext sensitive data to generate secondary encrypted data; 步骤五:将所述二次加密数据通过上位机软件传输至所述POS设备;Step 5: Transmitting the secondary encrypted data to the POS device via the host computer software; 步骤六:所述POS设备利用其安全区域中存储的私钥对所述二次加密数据进行解密,获取明文敏感数据并完成个性化配置;Step 6: The POS device uses the private key stored in its secure area to decrypt the secondary encrypted data, obtains the plaintext sensitive data and completes the personalized configuration; 其中,所述敏感数据在步骤三至步骤六的传输过程中始终以密文形式存在。The sensitive data always exists in ciphertext form during the transmission process from step three to step six. 2.根据权利要求1所述的一种POS个性化时保护数据传递的方法,其特征在于,所述非对称密钥算法选自RSA、ECC、DSA中的一种,且密钥长度满足RSA2048以及ECC256强度。2. The method for protecting data transmission during personalization of a POS according to claim 1, wherein the asymmetric key algorithm is selected from one of RSA, ECC, and DSA, and the key length meets the strength of RSA2048 and ECC256. 3.根据权利要求1所述的一种POS个性化时保护数据传递的方法,其特征在于,所述步骤四中,生产后台对所述明文敏感数据生成HASH摘要值,并将所述HASH摘要值与所述二次加密数据一并传输至所述POS设备;所述POS设备解密后,通过相同的HASH算法对明文敏感数据重新生成摘要值,并与接收的HASH摘要值进行比对,以验证数据完整性。3. According to the method for protecting data transmission during POS personalization described in claim 1, it is characterized in that in the step 4, the production background generates a HASH summary value for the plaintext sensitive data, and transmits the HASH summary value and the secondary encrypted data to the POS device together; after the POS device decrypts, the summary value of the plaintext sensitive data is regenerated through the same HASH algorithm, and compared with the received HASH summary value to verify the data integrity. 4.根据权利要求3所述的一种POS个性化时保护数据传递的方法,其特征在于,所述HASH算法选自SHA1、SHA256、SM3中的一种。4. A method for protecting data transmission during POS personalization according to claim 3, characterized in that the HASH algorithm is selected from one of SHA1, SHA256, and SM3. 5.根据权利要求1所述的一种POS个性化时保护数据传递的方法,其特征在于,所述非对称密钥对由POS设备在初始化阶段动态生成,且在完成个性化配置后自动销毁。5. The method for protecting data transmission during POS personalization according to claim 1, characterized in that the asymmetric key pair is dynamically generated by the POS device during the initialization phase and is automatically destroyed after the personalized configuration is completed. 6.根据权利要求1所述的一种POS个性化时保护数据传递的方法,其特征在于,所述安全区域为硬件安全模块(HSM)、可信执行环境(TEE),用于确保私钥的物理隔离和防篡改。6. A method for protecting data transmission during POS personalization according to claim 1, characterized in that the security area is a hardware security module (HSM) and a trusted execution environment (TEE) for ensuring physical isolation and tamper-proofing of private keys. 7.根据权利要求1所述的一种POS个性化时保护数据传递的方法,其特征在于,所述二次加密数据的传输途径包括网络、串口、USB接口中的一种或多种,且传输过程中数据保持密文状态。7. A method for protecting data transmission during POS personalization according to claim 1, characterized in that the transmission path of the secondary encrypted data includes one or more of the network, serial port, and USB interface, and the data remains in a ciphertext state during the transmission process. 8.根据权利要求1所述的一种POS个性化时保护数据传递的方法,其特征在于,所述加密机与生产后台之间采用隔离通信协议,且加密机的密钥管理符合金融级安全标准。8. A method for protecting data transmission during POS personalization according to claim 1, characterized in that an isolated communication protocol is used between the encryption machine and the production background, and the key management of the encryption machine complies with financial-grade security standards. 9.根据权利要求1所述的一种POS个性化时保护数据传递的方法,其特征在于,所述步骤三中,所述加密机对敏感数据的解密操作与步骤四的转加密操作在安全沙箱内连续执行,避免明文敏感数据暴露于生产后台的内存中。9. A method for protecting data transmission during POS personalization according to claim 1, characterized in that in the step 3, the decryption operation of the encryption machine on the sensitive data and the encryption operation in step 4 are continuously performed in a secure sandbox to prevent the plaintext sensitive data from being exposed to the memory of the production background. 10.根据权利要求1所述的一种POS个性化时保护数据传递的方法,其特征在于,所述方法适用于POS设备的批量生产场景,且支持多台POS设备并行执行个性化配置。10. A method for protecting data transmission during POS personalization according to claim 1, characterized in that the method is applicable to mass production scenarios of POS devices and supports multiple POS devices to execute personalized configuration in parallel.
CN202510482084.5A 2025-04-17 2025-04-17 A method for protecting data transmission during POS personalization Pending CN120316800A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202510482084.5A CN120316800A (en) 2025-04-17 2025-04-17 A method for protecting data transmission during POS personalization

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202510482084.5A CN120316800A (en) 2025-04-17 2025-04-17 A method for protecting data transmission during POS personalization

Publications (1)

Publication Number Publication Date
CN120316800A true CN120316800A (en) 2025-07-15

Family

ID=96326474

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202510482084.5A Pending CN120316800A (en) 2025-04-17 2025-04-17 A method for protecting data transmission during POS personalization

Country Status (1)

Country Link
CN (1) CN120316800A (en)

Similar Documents

Publication Publication Date Title
US9722977B2 (en) Secure host authentication using symmetric key crytography
US8909932B2 (en) Method and apparatus for security over multiple interfaces
CN109921902B (en) Key management method, security chip, service server and information system
US7693286B2 (en) Method of delivering direct proof private keys in signed groups to devices using a distribution CD
US20060013402A1 (en) Method of delivering Direct Proof private keys to devices using an on-line service
CN102986161B (en) Method and system for password protecting an application
CN116633530A (en) Quantum key transmission method, device and system
WO2023151427A1 (en) Quantum key transmission method, device and system
US9893882B1 (en) Apparatus, system, and method for detecting device tampering
CN106603487A (en) Method for safe improvement of TLS protocol processing based on CPU space-time isolation mechanism
CN105991569A (en) Safe transmission method of TLS communication data
US11126567B1 (en) Combined integrity protection, encryption and authentication
US20240259196A1 (en) Timestamp generation method and apparatus, and electronic device and storage medium
CN101019368B (en) Method of delivering direct proof private keys to devices using a distribution CD
CN114553557B (en) Key calling method, device, computer equipment and storage medium
US11997192B2 (en) Technologies for establishing device locality
CN115242392B (en) Method and system for realizing industrial information safety transmission based on safety transmission protocol
CN114942729A (en) Data safety storage and reading method for computer system
CN120316800A (en) A method for protecting data transmission during POS personalization
CN115001744B (en) Cloud platform data integrity verification method and system
CN117714185A (en) Bank counter data processing method and system based on cryptographic algorithm
CN117519900A (en) Data encryption protection method based on trusted virtualization environment
CN212305665U (en) A domestic communication encryption device suitable for rail transit
CN111510918B (en) Communication method, system, apparatus, electronic device, and readable storage medium
CN111431846A (en) Method, device and system for data transmission

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination