CN116743504B - Safe transmission method and system for digital data in network cable - Google Patents

Safe transmission method and system for digital data in network cable Download PDF

Info

Publication number
CN116743504B
CN116743504B CN202311013723.0A CN202311013723A CN116743504B CN 116743504 B CN116743504 B CN 116743504B CN 202311013723 A CN202311013723 A CN 202311013723A CN 116743504 B CN116743504 B CN 116743504B
Authority
CN
China
Prior art keywords
packet
data
transmission
network cable
power
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311013723.0A
Other languages
Chinese (zh)
Other versions
CN116743504A (en
Inventor
杨胜
赵保国
曾海波
袁平
唐必成
黄瑛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiaying Technology Co ltd
Original Assignee
Jiaying Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiaying Technology Co ltd filed Critical Jiaying Technology Co ltd
Priority to CN202311013723.0A priority Critical patent/CN116743504B/en
Publication of CN116743504A publication Critical patent/CN116743504A/en
Application granted granted Critical
Publication of CN116743504B publication Critical patent/CN116743504B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B3/00Line transmission systems
    • H04B3/02Details
    • H04B3/04Control of transmission; Equalising
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Small-Scale Networks (AREA)
  • Dc Digital Transmission (AREA)

Abstract

The invention provides a safe transmission method and a system for digital data in a network cable, which relate to the field of data transmission, and transmit a transmission packet to an output end of the network cable through N data lines in the network cable, wherein the method comprises the following steps: the data line is distributed with a power-on rule which changes in real time, and the working state of the data line is adjusted based on the power-on rule; the power-on rule comprises power-on time and power-off time; in the process of transmitting the transmission packet by the network cable, the data line changes the potential signal corresponding to the transmission packet into a zero potential signal in the power-off time. On one hand, the related information of the transmission packet can be directionally eliminated by utilizing the power-off time, a data transmission mode which is favorable for improving the data transmission safety can be developed on the basis of the related information, and on the other hand, the variability of the working state of the data line is endowed by utilizing the variability of the power-on rule, so that the safety of the data in transmission is further improved.

Description

Safe transmission method and system for digital data in network cable
Technical Field
The invention relates to the field of data transmission, in particular to a method and a system for safely transmitting digital data in a network cable.
Background
In the process of data transmission through a network, the security of data transmission means that the data cannot be stolen, tampered or destroyed in the transmission process. In order to ensure the security in data transmission, encryption processing is generally adopted for the data, including a symmetric encryption algorithm, an asymmetric encryption algorithm, a virtualized network encryption technology, an SSL protocol encryption and verification technology, a link encryption technology, a quantum encryption technology and the like, and the network data can be well ensured in the transmission process through the data encryption transmission, so that the security of the user data is ensured to the greatest extent.
However, it is well known that each of the data encryption techniques of the prior art that provide data transmission security has its own limitations. How to improve and increase the transmission security of digital data in network cables is still one of the technical problems that technicians are urgently required to solve.
Disclosure of Invention
In order to improve the transmission safety of digital data in a network cable, the embodiment of the invention provides a transmission method and a transmission system in the digital data network cable.
Correspondingly, the invention also provides a safe transmission method of the digital data in the network cable, which comprises the steps that the first equipment packages the original digital data into a transmission package, the first equipment inputs the transmission package from the input end of the network cable, and the transmission package passes through the network cableThe data wire is transmitted to the output end of the network cable, the second device receives the transmission package from the output end of the network cable and analyzes the original digital data from the transmission package, and the transmission package passes through the network cableThe output end of the data cable transmitted to the network cable comprises:
first, theA power-on rule with real-time change is distributed on the root data line, the firstThe root data line adjusts the working state based on the power-on rule, wherein the power-on rule comprises power-on time and power-off time;
said firstThe first data line normally transmits high-level electric signals and low-level electric signals in the power-on timeThe root data line continuously transmits a zero potential signal during the power-off time,
said firstThe root data line works according to the power-on rule, and the transmission packet passes through the network cableTransmitting the data wire to the output end of the network cable;
during the process of the network cable transmitting the transmission packet, the first stepThe root data line changes the corresponding potential signal in the transmission packet into a zero potential signal in the power-off time.
In an alternative embodiment, the power-on rule is implemented based on the following steps:
a corresponding driving source is arranged corresponding to each data line, the driving source is provided with a driving input end, a driving control end and a driving output end, the driving input end is used for being connected with a voltage-stabilizing power supply, the driving control end is used for receiving driving signals, and the driving output end is used for being connected with the input end of the corresponding data line;
for the firstThe driving output end of the driving source is connected with the input end of the corresponding data line, and the driving source outputs a corresponding high-level signal or low-level signal at the driving output end according to the driving signal received by the driving control end;
for the firstA first data line, wherein in the power-off time, the driving input end of the corresponding driving source is disconnected with the corresponding stabilized voltage power supply and/or the driving output end is disconnected with the input end of the corresponding data lineThe input end of the root data line has no level signal input, the firstThe data line transmits a zero potential signal.
In an alternative embodiment, the first device packaging the raw digital data into a transmission packet includes:
the first device packages the original digital data into a first package according to a first protocol corresponding to the network cable, the first package comprisingFirst data, theThe first data includes packet positions sequentially orderedBit first information, each bit first information is of high potential information or low potential information, the firstFirst data and second dataThe root data lines correspond to each other, wherein,andis a preset positive integer which is used for the control of the power supply,
adjusting the structure of the first packet according to the power-on rule corresponding to the real-time, and setting the first packetIn the first dataThe first information is arranged on the packet position corresponding to the power-on time in sequence, and random redundant information is added on the packet position corresponding to the power-off time, the first information is arranged on the packet position corresponding to the power-off time in sequenceConversion of the first data into the firstSecond data, said firstThe second data comprises sequentially arrangedBit first information interspersed with theRedundancy information of the first information is bit, and all the first packets are converted into second packets;
in the first placeIn the second data, the set of packet positions of the redundant information in the second packet is used for expressing a corresponding encryption rule, and the second data is used for storing the dataThe packet includesAn encryption rule, wherein each encryption rule in the second packet corresponds to one second data in the second packet;
will be the firstIn the second dataConversion of bit first information based on corresponding encryption rulesBit second information, the firstConversion of the second data into the firstAnd third data, wherein the second packet is converted into a transmission packet.
In an alternative embodiment, the encryption rule includes inverting the digital signal.
In an alternative embodiment, the firstThe first data comprises a packet header part, a content part and a packet tail part, wherein the packet header part and the packet tail part respectively have preset fixed lengths;
the power-on rule is power-on time at the time corresponding to the packet head part and the time corresponding to the packet tail part.
In an alternative embodiment, the second device analyzing the original digital data from the transmission packet includes:
the second device performs binary analog-to-digital conversion on the transmission packet according to the high-low level distinguishing voltage to obtain a first transmission packet, and performs binary analog-to-digital conversion on the transmission packet according to the zero-level distinguishing voltage to obtain a second transmission packet;
the second device obtains the packet position of each bit of redundant information in the second transmission packet through the second transmission packet, and obtains the corresponding packet position according to the set of all the redundant information in the second transmission packetA bar encryption rule;
the second device is based on theThe first transmission packet is restored to a third packet by a stripe encryption rule, and the rest data except redundant information of the third packet is identical to the second packet;
the second device removes redundant information in the third packet according to the packet position distribution condition of the redundant information in the second transmission packet, and restores the third packet to be a first packet;
the second device parses the original digital data from the first packet through a first protocol corresponding to the network cable.
In an alternative embodiment, the high-low level distinguishing voltage is one of voltage values between 3V and 3.3V.
In an alternative embodiment, the second device receiving the transmission packet from the output end of the network cable includes:
amplifying a level signal at the output end of the network cable based on a signal amplifying circuit and outputting the amplified level signal to the second equipment, wherein the second equipment receives a signal amplifying transmission packet from the output end of the network cable;
the second device performing binary analog-to-digital conversion on the transmission packet according to the zero level discrimination voltage to obtain a second transmission packet includes:
and the second equipment performs binary analog-to-digital conversion on the signal amplification transmission packet according to the high-low level distinguishing voltage to obtain the second transmission packet.
As a need exists for a system that,the invention also provides a safe transmission system of the digital data in the network cable, which is used for realizing the safe transmission method of the digital data in the network cable, and comprises the network cable and a controller, wherein the network cable comprisesEach data line is correspondingly provided with one controller;
the controller is used for controlling the working state of a corresponding data line, when the data line is in a normal state, the data line can transmit a high-level signal and a low-level signal, and when the data line is in an abnormal state, the data line can transmit a zero-level signal.
An alternative embodiment, further comprising:
the first device is used for packaging the original digital data into a transmission packet and inputting the transmission packet to the input end of the network cable;
and the second device is used for receiving the transmission package from the output end of the network cable and analyzing the original digital data from the transmission package.
In summary, the invention provides a method and a system for safely transmitting digital data in a network cable, which are used for distributing a power-on rule for each data line in the network cable in real time and endowing the working state of the data line with the variability of the power-on rule; on the basis, a transmission package can be generated by using a package mode matched with a power-on rule, and the transmission package has no readability and no hackability due to redundant information before being transmitted through a network cable, so that the data can be prevented from being hacked; the transmission package can only have readability after being transmitted through the corresponding network cable, so that the transmission package is prevented from being transmitted by the non-corresponding network cable, and the time for stealing the transmission package is prevented from occurring; after the transmission package is transmitted through the corresponding network cable, the operation characteristics of the network cable can be removed in the transmission package, only the information position of the redundant information is reserved, and the relevant encryption rule of the data can be obtained by utilizing the information position of the redundant information, so that the decryption and analysis functions of the data are realized, the encryption rule does not need to be transmitted through plaintext data, and the network cable has good safety and practicability in practical application.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart of a method for secure transmission of digital data in a network cable according to an embodiment of the present invention.
Fig. 2 is a block diagram of a secure transmission system of digital data in a network cable according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Fig. 1 is a flowchart of a method for secure transmission of digital data in a network cable according to an embodiment of the present invention.
Specifically, the embodiment of the invention provides a secure transmission method of digital data in a network cable, which basically comprises the following steps:
s1, the first device packages original digital data into a transmission package;
s2, the first equipment inputs the transmission packet from the input end of the network cable;
the transmission packet passes through the network cableTransmitting the data wire to the output end of the network cable;
s3, the second equipment receives the transmission package from the output end of the network cable and analyzes the original digital data from the transmission package.
In the foregoing steps S1 to S3, after the first device packages the original digital data into the transmission packet, the transmission packet is transmitted to the second device through the network cable, and the second device parses the original data in the transmission packet. In fact, the mainstream transmission form of the digital data in the network cable in the prior art is similar to the implementation manner described in steps S1 to S3, and in order to ensure compatibility, the basic transmission form of the digital data in the network cable (i.e. the description contents of steps S1 to S3) is not changed in the embodiment of the present invention.
Specifically, in combination with the prior art and related knowledge in the art, the descriptions of step S1 to step S3 further include the following implicit contents:
the original digital data is what is actually required to be packaged, the content is expressed as a combination of numbers in a computer language, for example, according to an ASCII coding system, each character has a corresponding binary expression in the computer language, such as a binary ASCII code of capital "A" as 0100 0001;
the transmission packet is a data structure obtained by processing original digital data according to a data processing protocol, the transmission packet generally has a specific data structure, and besides the original digital data, the transmission packet also includes content such as an identification code for external identification, and generally, the transmission packet is a minimum unit in a data network transmission process.
The actual form of transmission of the transmission packets in the network cable is acknowledged in accordance with the respective protocol and the respective network transmission hardware, which generally comprises a plurality of data lines, so that, in practice, the respective protocol and the respective network transmission hardware actually prescribe the form of delivery of the transmission packets in the plurality of data lines in the network cable, each data line corresponding to the content of a portion of the transmission packet. In addition, the signal transmission mode of the network cable is realized through level change, according to the high-low level distinguishing voltage (one of 3V to 3.3V is generally used as the high-low level distinguishing voltage in the field), the level signal which is larger than or equal to the high-low level distinguishing voltage is used for expressing binary '1', the level signal which is smaller than the high-low level distinguishing voltage is used for expressing binary '0', and relevant core elements which are relevant to realize the function are triodes.
The transmission packet is transmitted to the second device through the network cable, and the second device substantially converts the electrical signal in the network cable into a digital signal when receiving the transmission packet, wherein the process is substantially an analog-to-digital conversion process.
The second device unpacks the transmission packet through a data processing protocol corresponding to the transmission packet to obtain the required original digital data, wherein the original digital data can directly reflect the specific content required to be expressed.
In the embodiment of the present invention, the following modifications are made to the implementation contents in the foregoing steps S1 to S3.
The improvement is as follows:
in the foregoing step S1, the first device packages the original digital data into a transmission packet, and specifically includes the following steps:
s11, the first device packages the original digital data into a first package according to a first protocol corresponding to the network cable.
Specifically, the actual generation manner of the first packet may be understood as that the original digital data is packaged into the first packet by one of a packet generation protocol and a transmission protocol in the prior art (the overall content of the packet generation protocol and the transmission protocol is the first protocol in the embodiment of the present invention), where the first packet may be directly transmitted through a network cable in the prior art, and the transmission method provided in the embodiment of the present invention further processes the first packet in a subsequent step and then transmits the first packet through the network cable.
Correspondingly, in combination with the foregoing description, the content of the first packet actually corresponds to a plurality of data lines in the network cable, and each data line transmits a part of the packet content.
Thus, the first packet includesFirst data, theThe first data includes packet positions sequentially orderedBit first information, each bit first information is of high potential information or low potential information, the firstFirst data and second dataThe root data lines correspond to each other, wherein,
s12, converting all the first packets into second packets.
Adjusting the structure of the first packet according to the power-on rule corresponding to the real-time, and setting the first packetIn the first dataThe first information is arranged on the packet position corresponding to the power-on time in sequence, and random redundant information is added on the packet position corresponding to the power-off time, the first information is arranged on the packet position corresponding to the power-off time in sequenceConversion of the first data into the firstSecond data, said firstThe second data comprises sequentially arrangedBit first information interspersed with theRedundancy information of the first information is bit.
Specifically, the firstDistributing a power-on rule corresponding to real-time on a data line, wherein the power-on rule comprises power-on time and power-off time, and the first stepThe first data line normally transmits high-level electric signals and low-level electric signals in the power-on timeThe root data line continuously transmits a zero potential signal in the power-off time.
In a specific implementation, the first step may be adjusted according to the power-on rulePacket length of the first data, and the first data is calculatedThe first information is sequentially arranged at the packet positions corresponding to the power-on time, and random redundant information is added at the packet positions corresponding to the power-off time.
Specifically, the firstA set of packet positions of redundant information in the second data in the second packet is used for expressing a corresponding encryption rule, and the second packet comprisesAnd each encryption rule in the second packet corresponds to one of the second data in the second packet.
Specifically, in the embodiment of the present invention, a new technical term "power-up rule" is defined, where the power-up rule is essentially a time distribution condition that each data line can work and cannot work in a period of time, when the data line is in a power-up time, it can normally use potential information to transmit a corresponding signal, and when the data line is in a power-off time, the data line is in a zero potential state, any information loaded on the data line cannot generate corresponding data on the data line due to lack of driving energy, so under the control of the power-up rule, the signal type that each data line can transmit includes a high potential signal, a low potential signal and a zero potential signal.
In addition, the second packet has thereinThe encryption rule, specifically, the redundant information is zero-potential signal in the actual transmission of the network line, in the embodiment of the invention, in the second packet, the first packetThe set of packet positions of the redundant information in the second data in the second packet is used for expressing a corresponding encryption rule, and correspondingly, the second packet is provided withAnd the encryption rule is generated.
Specifically, the embodiment of the invention describesThe set of packet positions of the redundant information in the second data within the second packet is substantially the firstDistribution of redundant information in second data, different fractionsThe distribution condition corresponds to different encryption rules, the corresponding relation between the distribution condition and the encryption rules is hidden, and only the first equipment and the second equipment can know the distribution condition and the encryption rules and are not transmitted through a network cable.
In the embodiment of the invention, in order to ensure that the content of the packet is not lost, the first packet is regulated under the guidance of a power-on rule, each bit of first information in the effective data (namely the first data) in the first packet is rearranged in the packet position corresponding to the power-on time, and in the power-off time, the packet data is complemented by randomly adding redundant information, so that the data structure integrity of the packet is ensured. With this embodiment, the length of the packet is correspondingly increased, and the actual content of the first packet is not changed.
It should be noted that each data line has a different power-up rule at a different real-time, or it may be understood that the network cable has a corresponding set of power-up rule sets at a different real-time, where the power-up rule sets include a plurality of power-up rules, and each power-up rule directs a corresponding one of the data lines to operate. In actual operation, the header content and the tail content of the first packet can be kept unchanged, namely the power-on rule is the power-on time in the time corresponding to the synchronous content and the tail content, so that the basic identification function of the packet is ensured, and the transmission method of the embodiment of the invention can have certain compatibility.
S13, the second packet is converted into a transmission packet.
Specifically, will beIn the second dataConversion of bit first information based on corresponding encryption rulesBit second information, the firstSecond dataConvert to the firstAnd third data.
In particular, obtained at the same timeSeed encryption rules may be used to guideIn the embodiment of the present invention, an encryption rule is not limited to only guiding the conversion of the second data corresponding to the same data line, and the content of the encryption rule may include the specific second data capable of being guided, in addition to the encryption mode.
After the step, the original digital data is finally packaged into a transmission packet, which is different from the prior art, and the whole transmission packet in the first device does not have actual information expression capability through the combination of the variability of the power-on rule and the randomness of the redundant information, if the transmission packet is cracked by a conventional cracking means, the prior cracking technology is completely disabled.
And (2) improvement:
in the aforementioned step S2, the transmission packet passes through the network cableThe transmission of the data line to the output end of the network cable specifically comprises: first, theThe root data line operates according to the corresponding power-on rule.
Specifically, the firstA power-on rule corresponding to real-time is distributed on the root data line, wherein the power-on rule comprises power-on time and power-off time, the firstRoot data lineNormally transmitting a high-level electric signal and a low-level electric signal in the power-on time, the firstThe root data line continuously transmits a zero potential signal during the power-off time,
said firstThe root data line works according to the power-on rule, and the transmission packet passes through the network cableAnd transmitting the data wire to an output end of the network cable.
In this step, the main purpose is to control the first based on the power-on ruleThe ability of the root data line to operate in different time periods. In the power-on time, the firstThe second information is converted into a high-level electric signal or a low-level signal by the data line for transmission, and the first information is converted into a high-level electric signal or a low-level electric signal in the power-off timeThe data line continuously transmits a zero potential signal.
Specifically, in practical implementation, the input end of the data line is provided with a driver or a driving circuit (hereinafter referred to as a driving source), the input end of the driving source is a stable input voltage, and an important function of the driving source is that according to control of a driving signal, a voltage signal loaded on the data line by the output end of the driving source changes, and the voltage signal is specifically expressed as a high level signal or a low level signal; when the driving source stops loading signals to the data line, the data line is in a voltage fluctuation-free state, namely, a zero potential signal is generated.
Therefore, the power-on rule may be understood as control of the input voltage of the driving source in actual operation, or may be understood as control of the connection state between the driving source and the connection line. Therefore, in the power-on time, the driving source is normally powered, and the connection between the driving source and the connecting wire is ensured; and stopping normal power supply to the driving source and/or disconnecting the connection between the driving source and the connecting wire in the power-off time, so that the power-on rule of the embodiment of the invention can be realized.
In the transmission process of the transmission packet in the network cable, the actual content of the redundant information of the transmission packet is practically eliminated by the control of the power-on rule, and when the second equipment practically receives, the potential signals corresponding to the redundant information are zero potential signals. If the redundant signal is not eliminated through the power-on rule, the second device cannot know the position of the redundant information and cannot know the encryption rule to restore and analyze the actual content of the original digital data.
Therefore, in practice, the transmission packet forms a mandatory association with the network cable and the transmission time when being generated, and redundant information in the transmission packet can be effectively removed only when the transmission packet is transmitted through the specific network cable at the specific transmission time, so that the method has good security in practical application.
And (3) improvement:
in the step S3, the second device analyzes the original digital data from the transmission packet, and specifically includes the steps of:
s31, the second equipment performs binary analog-to-digital conversion on the transmission packet according to the high-low level distinguishing voltage to obtain a first transmission packet, and the second equipment performs binary analog-to-digital conversion on the transmission packet according to the zero-level distinguishing voltage to obtain a second transmission packet;
specifically, the high-low level distinguishing voltage is taken as the binary signal distinguishing voltage in the analog-to-digital conversion process, the signal higher than the high-low level distinguishing voltage is identified as a digital signal '1', and the signal lower than or equal to the high-low level distinguishing voltage is identified as a digital signal '0', so that the related content of the redundant information is identified as a digital signal '0'.
Specifically, the zero level distinguishing voltage is taken as the binary signal distinguishing voltage in the analog-to-digital conversion process, the signal higher than the zero level distinguishing voltage is identified as the digital signal '1', the signal lower than the zero level distinguishing voltage is identified as the digital signal '0', therefore, the relevant content of the redundant information is identified as the digital signal '0', the relevant content of the rest information is identified as the digital signal '1', and the main purpose of taking the zero level distinguishing voltage as the binary signal distinguishing voltage in the analog-to-digital conversion process in the implementation step is to find the position of the redundant signal in the transmission package.
It should be noted that, for the implementation of taking the zero-level discrimination voltage as the binary signal discrimination voltage in the analog-to-digital conversion process, in the implementation, considering the structure and the function of the receiver (the receiver can only take the high-low level discrimination voltage as the binary signal discrimination voltage in the analog-to-digital conversion process), in order to satisfy the function of taking the zero-level discrimination voltage as the binary signal discrimination voltage in the analog-to-digital conversion process, all the electrical signals in the network cable may be amplified by the signal amplifying circuit and then input to the receiver for analog-to-digital conversion. Specifically, as can be seen from the foregoing description, in the electrical signals transmitted by the network cable, the types of the electrical signals are respectively a high-level signal, a low-level signal and a zero-level signal, after the electrical signals are amplified by the amplifying circuit, if the high-level distinguishing voltage is used as the binary signal distinguishing voltage in the analog-to-digital conversion process, the original low-level signal also becomes the high-level signal, and the zero-level signal does not have the level characteristic, so that the signal amplifying circuit is not enabled to work, and therefore, when the amplified signal is used as the binary signal distinguishing voltage in the analog-to-digital conversion process, the zero-level signal can be identified as the low-level signal, and the rest signals are identified as the high-level signals.
It should be noted that the transmission form of the transmission packet in the network cable is an electrical signal, which is converted into the first transmission packet and the second transmission packet in the form of digital data understandable by the computer in step S31 by using analog-to-digital conversion or similar implementation.
S32, the second device obtains the packet position of each bit of redundant information in the second transmission packet through the second transmission packet, and obtains the corresponding packet position set in the second transmission packet according to all the redundant informationA bar encryption rule;
firstly, according to a predefined rule, the second device can analyze the encryption mode corresponding to the transmission packet according to the distribution condition of the digital signal "0" in the second transmission packet.
And secondly, according to the distribution condition of the signal '0' in the second transmission packet, the signal '0' corresponding to the packet position of the redundant information in the first transmission packet can be removed, and the effective content in the transmission packet is extracted for subsequent data processing.
S33, the second equipment is based on theThe first transmission packet is restored to a third packet by a stripe encryption rule;
specifically, the rest data of the third packet except the redundant information is the same as the second packet.
The second device is parsing outAfter the encryption rule, the data in the first transmission packet can be decrypted so that the first transmission packetIn the second dataDecoding of the bit second information into a conversion based on the corresponding encryption rulesThe first information is bit. According to the generation mode of the first transmission packet, the rest data except the redundant information of the third packet is identical to the second packet.
S34, the second device removes redundant information in the third packet according to the packet position distribution condition of the redundant information in the second transmission packet, and restores the third packet into a first packet;
specifically, the second transmission packet includes the content of the packet position where the redundant information is located, and the corresponding third packet may be based on the content of the packet position where the redundant information is deleted, so thatThe first information positions are sequentially and adjacently ordered, and the third packet is finally restored into the data form and the data structure of the first packet.
S35, the second device analyzes the original digital data from the first package through a first protocol corresponding to the network cable.
Specifically, after removing redundant information in the transmission packet through the network cable, the second device can derive an encryption rule through the distribution condition of the redundant information, then gradually decrypt the content of the transmission packet in a manner similar to inverse operation, and finally obtain the required original digital data.
Fig. 2 is a block diagram of a secure transmission system of digital data in a network cable according to an embodiment of the present invention.
Correspondingly, the invention also provides a safe transmission system of the digital data in the network cable, which comprises the network cable and a controller, wherein the network cable comprisesEach data line is correspondingly provided with one controller;
the controller is used for controlling the working state of a corresponding data line, when the data line is in a normal state, the data line can transmit a high-level signal and a low-level signal, and when the data line is in an abnormal state, the data line can transmit a zero-level signal.
Further, the transmission system further includes:
the first device is used for packaging the original digital data into a transmission packet and inputting the transmission packet to the input end of the network cable;
and the second device is used for receiving the transmission package from the output end of the network cable and analyzing the original digital data from the transmission package.
In summary, the embodiment of the invention provides a method and a system for safely transmitting digital data in a network cable, which are used for distributing a power-on rule for each data line in the network cable in real time and endowing the working state of the data line with the variability of the power-on rule; on the basis, a transmission package can be generated by using a package mode matched with a power-on rule, and the transmission package has no readability and no hackability due to redundant information before being transmitted through a network cable, so that the data can be prevented from being hacked; the transmission package can only have readability after being transmitted through the corresponding network cable, so that the transmission package is prevented from being transmitted by the non-corresponding network cable, and the time for stealing the transmission package is prevented from occurring; after the transmission package is transmitted through the corresponding network cable, the operation characteristics of the network cable can be removed in the transmission package, only the information position of the redundant information is reserved, and the relevant encryption rule of the data can be obtained by utilizing the information position of the redundant information, so that the decryption and analysis functions of the data are realized, the encryption rule does not need to be transmitted through plaintext data, and the network cable has good safety and practicability in practical application.
The above describes in detail a method and a system for secure transmission of digital data in a network cable provided by the embodiments of the present invention, and specific examples are applied herein to describe the principles and implementations of the present invention, where the description of the above embodiments is only for helping to understand the method and core ideas of the present invention; meanwhile, as those skilled in the art will have variations in the specific embodiments and application scope in accordance with the ideas of the present invention, the present description should not be construed as limiting the present invention in view of the above.

Claims (9)

1. A secure transmission method of digital data in a network cable comprises a first device packaging original digital data into a transmission packet, wherein the first device inputs the transmission packet from an input end of the network cable, and the transmission packet passes through the network cableThe data cable is transmitted to the output end of the network cable, the second device receives the transmission package from the output end of the network cable and analyzes the original digital data from the transmission package, and the method is characterized in that the transmission package passes through the (II) in the network cable>The output end of the data cable transmitted to the network cable comprises:
first, theA power-on rule with real-time variation is distributed on the root data line, the +.>The root data line adjusts the working state based on the power-on rule, wherein the power-on rule comprises power-on time and power-off time;
said firstThe first data line normally transmits high-level electric signals and low-level electric signals in the power-on timeContinuously transmitting zero potential signal in the power-off time by the root data lineNumber (1)/(2)>,/>
Said firstThe root data line works according to the power-on rule, and the transmission packet passes through +_ in the network cable>Transmitting the data wire to the output end of the network cable;
during the process of the network cable transmitting the transmission packet, the first stepThe corresponding potential signal in the transmission packet is changed into a zero potential signal by the root data line in the power-off time;
wherein the first device packaging the raw digital data into a transmission packet comprises: the first device packages the original digital data into a first package according to a first protocol corresponding to the network cable, the first package comprisingPart first data, th->The first data includes +.>Bit first information, each bit first information is of high potential information or low potential information, the first bit first information is of the type +>First data and->Corresponding to the root data line, wherein->And->Is a preset positive integer, +.>,/>,/>The method comprises the steps of carrying out a first treatment on the surface of the Adjusting the structure of the first packet according to the power-on rule corresponding to the real-time, and adding +.>Part ∈10 in the first data>Bit first information is sequentially arranged at the packet position corresponding to the power-on time, and random redundant information is added at the packet position corresponding to the power-off time, namely>The first data is converted into +.>Second data, said->The second data comprises ∈10 arranged in sequence>Bit first information and interspersed with said +.>Redundancy information of the first information is bit, and all the first packets are converted into second packets; in->In the second data, the set of packet positions of the redundant information in the second packet is used for expressing a corresponding encryption rule, and the second packet comprises->An encryption rule, wherein each encryption rule in the second packet corresponds to one second data in the second packet; will be->Part ∈2 in the second data>Bit first information is converted into +_ based on corresponding encryption rules>Bit second information, said +.>The second data is converted into +.>And third data, wherein the second packet is converted into a transmission packet.
2. The method for secure transmission of digital data in a network cable according to claim 1, wherein the power-on rule is implemented based on the steps of:
a corresponding driving source is arranged corresponding to each data line, the driving source is provided with a driving input end, a driving control end and a driving output end, the driving input end is used for being connected with a voltage-stabilizing power supply, the driving control end is used for receiving driving signals, and the driving output end is used for being connected with the input end of the corresponding data line;
for the firstThe driving output end of the driving source is connected with the input end of the corresponding data line, and the driving source outputs a corresponding high-level signal or low-level signal at the driving output end according to the driving signal received by the driving control end;
for the firstA data line, in which the drive input end of the corresponding drive source is disconnected from the corresponding regulated power supply and/or the drive output end is disconnected from the input end of the corresponding data line during the power-off time, the eenth>The input end of the root data line is not input with a level signal, the +.>The data line transmits a zero potential signal.
3. The method for secure transmission of digital data in a network cable according to claim 1, wherein the encryption rule comprises an inversion of the digital signal.
4. The method for secure transmission of digital data in a network cable according to claim 1, wherein the first stepThe first data includes a header portion and an inner portionThe device comprises a containing part and a tail part, wherein the head part and the tail part are respectively provided with a preset fixed length;
the power-on rule is power-on time at the time corresponding to the packet head part and the time corresponding to the packet tail part.
5. The method of claim 1, wherein the second device parsing the original digital data from the transmission packet comprises:
the second device performs binary analog-to-digital conversion on the transmission packet according to the high-low level distinguishing voltage to obtain a first transmission packet, and performs binary analog-to-digital conversion on the transmission packet according to the zero-level distinguishing voltage to obtain a second transmission packet;
the second device obtains the packet position of each bit of redundant information in the second transmission packet through the second transmission packet, and obtains the corresponding packet position according to the set of all the redundant information in the second transmission packetA bar encryption rule;
the second device is based on theThe first transmission packet is restored to a third packet by a stripe encryption rule, and the rest data except redundant information of the third packet is identical to the second packet;
the second device removes redundant information in the third packet according to the packet position distribution condition of the redundant information in the second transmission packet, and restores the third packet to be a first packet;
the second device parses the original digital data from the first packet through a first protocol corresponding to the network cable.
6. The method for secure transmission of digital data in a network cable according to claim 5, wherein said high-low level discrimination voltage is one of voltage values between 3V and 3.3V.
7. The method of claim 5, wherein the second device receiving the transmission packet from the output of the network cable comprises:
amplifying a level signal at the output end of the network cable based on a signal amplifying circuit and outputting the amplified level signal to the second equipment, wherein the second equipment receives a signal amplifying transmission packet from the output end of the network cable;
the second device performing binary analog-to-digital conversion on the transmission packet according to the zero level discrimination voltage to obtain a second transmission packet includes:
and the second equipment performs binary analog-to-digital conversion on the signal amplification transmission packet according to the high-low level distinguishing voltage to obtain the second transmission packet.
8. A system for secure transmission of digital data in a network cable, characterized by implementing a method for secure transmission of digital data in a network cable according to any one of claims 1 to 7, comprising a network cable and a controller, the network cable comprisingEach data line is correspondingly provided with one controller;
the controller is used for controlling the working state of a corresponding data line, when the data line is in a normal state, the data line can transmit a high-level signal and a low-level signal, and when the data line is in an abnormal state, the data line can transmit a zero-level signal.
9. The secure transmission system of digital data in a network cable according to claim 8, further comprising:
the first device is used for packaging the original digital data into a transmission packet and inputting the transmission packet to the input end of the network cable;
and the second device is used for receiving the transmission package from the output end of the network cable and analyzing the original digital data from the transmission package.
CN202311013723.0A 2023-08-14 2023-08-14 Safe transmission method and system for digital data in network cable Active CN116743504B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311013723.0A CN116743504B (en) 2023-08-14 2023-08-14 Safe transmission method and system for digital data in network cable

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311013723.0A CN116743504B (en) 2023-08-14 2023-08-14 Safe transmission method and system for digital data in network cable

Publications (2)

Publication Number Publication Date
CN116743504A CN116743504A (en) 2023-09-12
CN116743504B true CN116743504B (en) 2023-10-17

Family

ID=87901560

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311013723.0A Active CN116743504B (en) 2023-08-14 2023-08-14 Safe transmission method and system for digital data in network cable

Country Status (1)

Country Link
CN (1) CN116743504B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117424757B (en) * 2023-12-18 2024-03-12 佳瑛科技有限公司 Data encryption method and device based on cloud database storage

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6061703A (en) * 1997-05-15 2000-05-09 International Business Machines Corporation Pseudorandom number generator with normal and test modes of operation
CN1301437A (en) * 1997-03-14 2001-06-27 印诺弗尼克斯股份有限公司 Methods and apparatus for securel encrypting data in conjunction with a personal computer
GB0115770D0 (en) * 2000-07-25 2001-08-22 Mitsubishi Electric Corp Cryptographic apparatus and cryptographic communication system
JP2008278459A (en) * 2007-03-30 2008-11-13 Seiko Epson Corp Communication system, transmitter, receiving apparatus and communication method, and semiconductor device
CN105577695A (en) * 2016-02-24 2016-05-11 上海卓繁信息技术股份有限公司 Automatic control data exchange device and control method for control system thereof
KR20180090019A (en) * 2017-02-02 2018-08-10 주식회사 시큐아이 Network device and packet transmission method of the network device
CN108471444A (en) * 2018-03-22 2018-08-31 江苏麦酷博信息科技有限公司 A kind of industrial Internet of Things data exchange method of the highly effective and safe based on Raspberry Pi
CN109905246A (en) * 2013-10-04 2019-06-18 德克萨斯仪器股份有限公司 Utilize segmentation and then power line communication (PLC) network node of encryption safe
CN111200490A (en) * 2018-11-18 2020-05-26 新唐科技股份有限公司 Electronic component using small indirect random precharge to prevent bypass attack
CN212258330U (en) * 2020-06-23 2020-12-29 黑龙江正泽信服务外包有限公司 Data center is with encrypting warning cable terminal box
CN114094436A (en) * 2022-01-19 2022-02-25 长芯盛(武汉)科技有限公司 Driving device and method for processing driving current
CN114338215A (en) * 2021-12-30 2022-04-12 天津光电通信技术有限公司 Network link security encryption system
WO2022198595A1 (en) * 2021-03-25 2022-09-29 华为技术有限公司 Encryption control method and apparatus for data transmission

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11108751B2 (en) * 2017-10-27 2021-08-31 Nicira, Inc. Segmentation of encrypted segments in networks
US10965728B2 (en) * 2018-10-22 2021-03-30 Tesla, Inc. Method and system for aggregating and converting sensor data streams
US20220210131A1 (en) * 2021-03-17 2022-06-30 Herbert Hannah System and method for secure file and data transfers

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1301437A (en) * 1997-03-14 2001-06-27 印诺弗尼克斯股份有限公司 Methods and apparatus for securel encrypting data in conjunction with a personal computer
US6061703A (en) * 1997-05-15 2000-05-09 International Business Machines Corporation Pseudorandom number generator with normal and test modes of operation
GB0115770D0 (en) * 2000-07-25 2001-08-22 Mitsubishi Electric Corp Cryptographic apparatus and cryptographic communication system
JP2008278459A (en) * 2007-03-30 2008-11-13 Seiko Epson Corp Communication system, transmitter, receiving apparatus and communication method, and semiconductor device
CN109905246A (en) * 2013-10-04 2019-06-18 德克萨斯仪器股份有限公司 Utilize segmentation and then power line communication (PLC) network node of encryption safe
CN105577695A (en) * 2016-02-24 2016-05-11 上海卓繁信息技术股份有限公司 Automatic control data exchange device and control method for control system thereof
KR20180090019A (en) * 2017-02-02 2018-08-10 주식회사 시큐아이 Network device and packet transmission method of the network device
CN108471444A (en) * 2018-03-22 2018-08-31 江苏麦酷博信息科技有限公司 A kind of industrial Internet of Things data exchange method of the highly effective and safe based on Raspberry Pi
CN111200490A (en) * 2018-11-18 2020-05-26 新唐科技股份有限公司 Electronic component using small indirect random precharge to prevent bypass attack
CN212258330U (en) * 2020-06-23 2020-12-29 黑龙江正泽信服务外包有限公司 Data center is with encrypting warning cable terminal box
WO2022198595A1 (en) * 2021-03-25 2022-09-29 华为技术有限公司 Encryption control method and apparatus for data transmission
CN114338215A (en) * 2021-12-30 2022-04-12 天津光电通信技术有限公司 Network link security encryption system
CN114094436A (en) * 2022-01-19 2022-02-25 长芯盛(武汉)科技有限公司 Driving device and method for processing driving current

Also Published As

Publication number Publication date
CN116743504A (en) 2023-09-12

Similar Documents

Publication Publication Date Title
US9032208B2 (en) Communication terminal, communication system, communication method and communication program
CN116743504B (en) Safe transmission method and system for digital data in network cable
US20170272239A1 (en) Authentication encryption method, authentication decryption method, and information-processing device
CN111371549A (en) Message data transmission method, device and system
JP2010166486A (en) Protection control measuring system and device and data transfer method
CA2613289A1 (en) Generating a secret key from an asymmetric private key
CN110166489B (en) Data transmission method, system, equipment and computer medium in Internet of things
CN116599766B (en) Smart electric meter detection method, device, equipment and storage medium
TW201628379A (en) Packet transmission device, packet-receiving device, packet transmission program, and packet-receiving program
CN115065472A (en) Multi-key encryption and decryption-based security chip encryption and decryption method and device
US20060269055A1 (en) Method and apparatus for improving performance and security of DES-CBC encryption algorithm
US9002010B2 (en) Secure communication of information over a wireless link
CN112401310A (en) Encrypted cigarette cartridge identification method and device
CN111698252B (en) Cloud platform data encryption transmission method and system
CN113517982A (en) Password generation method, password execution method and terminal
CN117097551A (en) Industrial control system communication protocol security enhancement method, system, equipment and storage medium
CN117675189A (en) Data encryption method, data decryption device and electronic equipment
CN113922976A (en) Equipment log transmission method and device, electronic equipment and storage medium
CN107566119A (en) A kind of guard method of eSIM cards data safety and system
CN116506024A (en) Communication method for quantum direct communication and quantum direct communication system
CN113343269B (en) Encryption method and device
CN115396179A (en) Data transmission method, device, medium and equipment based on block chain
CN115314386A (en) Firmware upgrading system of quantum safety equipment
CN109194490B (en) Power distribution network communication security authentication system and method
CN112905994A (en) Remote vulnerability patch program protection method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant