CN103685287B - Land consolidation survey and drawing of investigation remote data is wirelessly transferred method of controlling security - Google Patents

Land consolidation survey and drawing of investigation remote data is wirelessly transferred method of controlling security Download PDF

Info

Publication number
CN103685287B
CN103685287B CN201310703159.5A CN201310703159A CN103685287B CN 103685287 B CN103685287 B CN 103685287B CN 201310703159 A CN201310703159 A CN 201310703159A CN 103685287 B CN103685287 B CN 103685287B
Authority
CN
China
Prior art keywords
data
data center
acquisition terminal
information
land
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310703159.5A
Other languages
Chinese (zh)
Other versions
CN103685287A (en
Inventor
柯福阳
丰菁
王星
潘祥武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ke Fuyang
Original Assignee
Nanjing University of Information Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Information Science and Technology filed Critical Nanjing University of Information Science and Technology
Priority to CN201310703159.5A priority Critical patent/CN103685287B/en
Publication of CN103685287A publication Critical patent/CN103685287A/en
Application granted granted Critical
Publication of CN103685287B publication Critical patent/CN103685287B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)

Abstract

The present invention devises a kind of land consolidation survey and drawing of investigation remote data and is wirelessly transferred method of controlling security, acquisition terminal and data center use rivest, shamir, adelman that data are carried out safe transmission, comprise the following steps: data are tentatively arranged by A. acquisition terminal according to Land Information host-host protocol;B. preliminary arrangement data are encrypted by acquisition terminal according to AES;C. the data after encryption are sent to data center by acquisition terminal;D. data center receives data and deciphers;E. data center carries out filtering acquisition valid data according to Land Information host-host protocol to solving ciphertext data.This invention ensures that standardization and the safety of data, the data transmission environments of stable safety is provided for Land Information acquisition terminal system.

Description

Land consolidation survey and drawing of investigation remote data is wirelessly transferred method of controlling security
Technical field
The invention belongs to data transmission security control method field, the specially wireless biography of land consolidation survey and drawing of investigation remote data Defeated method of controlling security.
Background technology
Current Land Information acquisition terminal combines multiple environmental data measuring instrument, and utilizes wireless network by measuring instrument Data and map measured by device are reached control data corporation by acquisition terminal equipment, to accelerate land investigation working performance, But this system mainly uses ICP/IP protocol directly to transmit in data transmission, does not take to appoint in terms of data encryption What measure.Wu Yadong paper " used in land use change survey design of data acquisition system based on RTK-PDA technology with Realize " in, apply GPRS wireless network, but and the transmission encryption of not mentioned data, at the paper " GPS/PDA of Zhao Jianli Data collecting system applied research in second time land investigation " in, apply GSM mobile radio communication, do not relate to equally And data transmission encryption.
Above-mentioned technology is the state-of-the-art technology in terms of current soil gathers data Radio Transmission Technology, but is all not directed to wireless network Transmission data encryption.Therefore, it is necessary to provide a kind of wireless network transmissions number with standardization, safety and stability According to encryption method, it is ensured that soil gathers the transmission that data can be safe in a large number.
Summary of the invention
Present invention solves the technical problem that and provide a kind of wireless network transmissions data encryption for Land Information acquisition terminal Method;
For solving above-mentioned technical problem, the technical solution adopted in the present invention is:
A kind of land consolidation survey and drawing of investigation remote data is wirelessly transferred method of controlling security, and acquisition terminal transmits to data center Data comprise the following steps:
A. data are tentatively arranged by acquisition terminal according to Land Information host-host protocol;
B. preliminary arrangement data are encrypted by acquisition terminal according to AES;
C. the data after encryption are sent to data center by acquisition terminal;
D. data center receives data and deciphers;
E. data center carries out filtering acquisition valid data according to Land Information host-host protocol to solving ciphertext data;
Acquisition terminal and data center use rivest, shamir, adelman that data carry out safe transmission, described asymmetric encryption Algorithm is acquisition terminal and data center all produces a pair for encryption and the PKI of deciphering and private key;Wherein acquisition terminal The private key of private key and data center all maintains secrecy, and the PKI of acquisition terminal tells data center, and the PKI of data center is told Acquisition terminal;When acquisition terminal to send information to data center, acquisition terminal is by the public key encryption information of data center also This message is issued data center;After data center receives this message, data center deciphers with the private key of oneself and gathers The message of terminal;
Described Land Information host-host protocol is a kind of agreement based on TCP/IP, sends out to data center including acquisition terminal Send logging request message and data message.
Further, the land consolidation survey and drawing of investigation remote data of the present invention is wirelessly transferred method of controlling security, Land Information In host-host protocol,
Described acquisition terminal sends logging request message format to data center:
$ILLTS,<user>,<password>*hh\r\n
$ILLTS,<result>*hh\r\n
Wherein $ ILLTS represents the information that is logged on or logging status information sent,<user>for user name,<password> For password,<result>is that data center returns login authentication result, and hh is check code, r n be that new line terminates Symbol, after data center receives logging request, username and password in checking message, if the verification passes, then return knot Really<result>is true;
Described acquisition terminal to data center's form that sends datagram is:
$ILPIN,<1>,<2>,……,<n-1>,<n>*hh\r\n
$ILBPI,<1>,<2>,……,<n-1>,<n>*hh\r\n
$ILBLI,<1>,<2>,……,<n-1>,<n>*hh\r\n
$ILPLI,<1>,<2>,……,<n-1>,<n>*hh\r\n
$ILASI,<1>,<2>,……,<n-1>,<n>*hh\r\n
$ILREI,<1>,<2>,……,<n-1>,<n>*hh\r\n
$ILORI,<1>,<2>,……,<n-1>,<n>*hh\r\n
Wherein $ ILPIN, $ ILBPI, $ ILBLI, $ ILPLI, $ ILASI, $ ILREI, $ ILORI represent engineering letter respectively Breath, boundary mark information, location, boundary line information, block message, plot ownership information, plot registration information, he power The categorical data of profit register information.After data center receives data message, according to different prefixs, use different methods Cross filter data.
Further, the land consolidation survey and drawing of investigation remote data of the present invention is wirelessly transferred method of controlling security, described collection GPRS network, 3G network or wlan network is used to carry out data communication between terminal and data center.
The present invention uses above technical scheme compared with prior art, has the advantage that
The present invention devises a kind of wireless network transmissions data ciphering method, wireless for land consolidation survey and drawing of investigation remote data Transmission method of controlling security, it is ensured that the standardization of data and safety, provides stable for Land Information acquisition terminal system The data transmission environments of safety.
Accompanying drawing explanation
Fig. 1 is Data Encryption Transmission basic flow sheet.
Detailed description of the invention
Below in conjunction with concrete accompanying drawing, scheme of the invention is described in detail:
As it is shown in figure 1, acquisition terminal comprises the following steps to data center's transmission data in the present invention:
A. data are tentatively arranged by acquisition terminal according to Land Information host-host protocol;
B. preliminary arrangement data are encrypted by acquisition terminal according to AES;
C. the data after encryption are sent to data center by acquisition terminal;
D. data center receives data and deciphers;
E. data center carries out filtering acquisition valid data according to Land Information host-host protocol to solving ciphertext data.
In the present invention, Land Information host-host protocol is from creating non-common protocol, is stateless protocol based on TCP/IP, uses First arrangement before data send and the data filtering after reception.Including logging request message and data message.
(1) acquisition terminal sends logging request message to data center, including user name, password:
$ILLTS,<user>,<password>*hh\r\n
$ILLTS,<result>*hh\r\n
Wherein $ ILLTS represents the information that is logged on or logging status information sent,<user>for user name,<password> For password,<result>is that data center returns to login authentication result, and hh is check code, r n be new line knot Bundle symbol;After data center receives acquisition terminal logging request, first verify that user and password in message, if checking is logical Cross, then returning result<result>is true;Acquisition terminal system starts after receiving response message to send to data center Land Information data stream.
(2) acquisition terminal system sends datagram to data center:
$ILPIN,<1>,<2>,……,<n-1>,<n>*hh\r\n
$ILBPI,<1>,<2>,……,<n-1>,<n>*hh\r\n
$ILBLI,<1>,<2>,……,<n-1>,<n>*hh\r\n
$ILPLI,<1>,<2>,……,<n-1>,<n>*hh\r\n
$ILASI,<1>,<2>,……,<n-1>,<n>*hh\r\n
$ILREI,<1>,<2>,……,<n-1>,<n>*hh\r\n
$ILORI,<1>,<2>,……,<n-1>,<n>*hh\r\n
Wherein $ ILPIN, $ ILBPI, $ ILBLI, $ ILPLI, $ ILASI, $ ILREI, $ ILORI represent engineering information, Boundary mark information, location, boundary line information, block message, plot ownership information, plot registration information, he a right steps on The categorical data of note information.After data center receives data message, according to different prefixs, different methods is used to filter Data.
In the present invention, AES is rivest, shamir, adelman, encryption principle: first acquisition terminal and data center all produces A pair for the PKI encrypted and decipher and private key;Wherein, the private keys secret of acquisition terminal, the PKI of acquisition terminal is told Data center;The private keys secret of data center, the PKI of data center tells acquisition terminal.Then to give when acquisition terminal When data center sends information, this message by the public key encryption information of data center and is issued in data by acquisition terminal The heart.After data center receives this message, the message of acquisition terminal is deciphered with the private key of oneself by data center.
In the present invention, wireless network transmissions uses GPRS network, naturally it is also possible to use current 3G network, wlan network.

Claims (2)

1. land consolidation survey and drawing of investigation remote data is wirelessly transferred method of controlling security, it is characterised in that: acquisition terminal is to data Central transmission data comprise the following steps:
A. data are tentatively arranged by acquisition terminal according to Land Information host-host protocol;
B. preliminary arrangement data are encrypted by acquisition terminal according to AES;
C. the data after encryption are sent to data center by acquisition terminal;
D. data center receives data and deciphers;
E. data center carries out filtering acquisition valid data according to Land Information host-host protocol to solving ciphertext data;
Acquisition terminal and data center use rivest, shamir, adelman that data carry out safe transmission, and described asymmetric encryption is calculated Method is acquisition terminal and data center all produces a pair for encryption and the PKI of deciphering and private key;The wherein private key of acquisition terminal And the private key of data center all maintains secrecy, the PKI of acquisition terminal tells data center, and the PKI of data center tells that collection is eventually End;When acquisition terminal to send information to data center, this by the public key encryption information of data center and is disappeared by acquisition terminal Breath issues data center;After data center receives this message, the message of acquisition terminal is deciphered with the private key of oneself by data center;
Described Land Information host-host protocol is a kind of agreement based on TCP/IP, sends to data center including acquisition terminal Logging request message and data message;
In Land Information host-host protocol,
Described acquisition terminal sends logging request message format to data center:
$ILLTS,<user>,<password>*hh\r\n
$ILLTS,<result>*hh\r\n
Wherein $ ILLTS represents the information that is logged on or logging status information sent,<user>for user name,<password> For password,<result>is that data center returns login authentication result, and hh is check code, r n be new line end mark, After data center receives logging request, username and password in checking message, if the verification passes, then return result <result>is true;
Described acquisition terminal to data center's form that sends datagram is:
$ILPIN,<1>,<2>,……,<n-1>,<n>*hh\r\n
$ILBPI,<1>,<2>,……,<n-1>,<n>*hh\r\n
$ILBLI,<1>,<2>,……,<n-1>,<n>*hh\r\n
$ILPLI,<1>,<2>,……,<n-1>,<n>*hh\r\n
$ILASI,<1>,<2>,……,<n-1>,<n>*hh\r\n
$ILREI,<1>,<2>,……,<n-1>,<n>*hh\r\n
$ILORI,<1>,<2>,……,<n-1>,<n>*hh\r\n
Wherein $ ILPIN, $ ILBPI, $ ILBLI, $ ILPLI, $ ILASI, $ ILREI, $ ILORI represent respectively engineering information, Boundary mark information, location, boundary line information, block message, plot ownership information, plot registration information, his right registration The categorical data of information.
2. land consolidation survey and drawing of investigation remote data as claimed in claim 1 is wirelessly transferred method of controlling security, and its feature exists In: use GPRS network, 3G network or wlan network to carry out data communication between described acquisition terminal and data center.
CN201310703159.5A 2013-12-19 2013-12-19 Land consolidation survey and drawing of investigation remote data is wirelessly transferred method of controlling security Expired - Fee Related CN103685287B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310703159.5A CN103685287B (en) 2013-12-19 2013-12-19 Land consolidation survey and drawing of investigation remote data is wirelessly transferred method of controlling security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310703159.5A CN103685287B (en) 2013-12-19 2013-12-19 Land consolidation survey and drawing of investigation remote data is wirelessly transferred method of controlling security

Publications (2)

Publication Number Publication Date
CN103685287A CN103685287A (en) 2014-03-26
CN103685287B true CN103685287B (en) 2016-08-17

Family

ID=50321601

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310703159.5A Expired - Fee Related CN103685287B (en) 2013-12-19 2013-12-19 Land consolidation survey and drawing of investigation remote data is wirelessly transferred method of controlling security

Country Status (1)

Country Link
CN (1) CN103685287B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2285029A1 (en) * 2008-12-30 2011-02-16 State Grid Corporation of China Data transmission method, transmission system and data transmitter
CN102096759A (en) * 2010-12-03 2011-06-15 东南大学 Real-time land cluster survey method
CN103020327A (en) * 2013-01-07 2013-04-03 安徽理工大学 Terminal system and method for collecting real-time data of intensive land use survey

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2285029A1 (en) * 2008-12-30 2011-02-16 State Grid Corporation of China Data transmission method, transmission system and data transmitter
CN102096759A (en) * 2010-12-03 2011-06-15 东南大学 Real-time land cluster survey method
CN103020327A (en) * 2013-01-07 2013-04-03 安徽理工大学 Terminal system and method for collecting real-time data of intensive land use survey

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
《GPS/PDA数据采集***在第二次土地调查中的应用研究》;赵建利等;《测绘通报》;20090228(第2期);全文 *
《卫星通信大地测量数据传输的安全控制》;李昌贵等;《海洋测绘》;20100131;第30卷(第1期);第1页-第2页 *

Also Published As

Publication number Publication date
CN103685287A (en) 2014-03-26

Similar Documents

Publication Publication Date Title
RU2016102035A (en) EFFECTIVE NETWORK LEVEL FOR IPv6 PROTOCOL.
CN102082796B (en) Method for encrypting channels and simplified method and system for encrypting channels based on HTTP (hyper text transport protocol)
CN106452749B (en) A kind of method and system carrying out key and data separated transmission by satellite communication
CN103415008A (en) Encryption communication method and encryption communication system
WO2018016713A3 (en) Method for security of user equipment connection identifier in wireless communication system and apparatus therefor
WO2016161583A1 (en) Gprs system key enhancement method, sgsn device, ue, hlr/hss and gprs system
CN105163309A (en) Method for secure communication of wireless sensor network based on combined password
CN103179559B (en) The safety communicating method of a kind of low cost terminals, Apparatus and system
Zhang et al. Vproof: Lightweight privacy-preserving vehicle location proofs
CN105812128A (en) Malicious data mining attack-resisting data aggregation system and method for smart grid
CN102111273A (en) Pre-sharing-based secure data transmission method for electric load management system
CN107914665A (en) A kind of vehicle remote security remote-control system and remote control thereof
CN103929745A (en) Wireless MESH network access authentication system and method based on privacy protection
CN102546650A (en) End-to-end safety control method for wireless sensor network and internet intercommunication
CN104219054A (en) NFC (near field communication)-based point-to-point data transmission method
CN108307388A (en) A kind of wireless security terminal and data ciphering method
CN107026823A (en) Applied to the access authentication method and terminal in WLAN WLAN
CN1980122B (en) Method for increasing information transmission safety
CN102487503A (en) Method for managing multi-stage security dynamic group security keys
CN102355662A (en) Key exchanging method on basis of wireless low-cost equipment
CN104244236A (en) Data fusion method capable of ensuring confidentiality and integrity
CN103685287B (en) Land consolidation survey and drawing of investigation remote data is wirelessly transferred method of controlling security
Poddar et al. A comparitive analysis of wireless security protocols (WEP and WPA2)
CN105871859A (en) Safe wireless communication method
CN104955035B (en) Based on the symmetric encryption method of the artificial base band noise of digital baseband signal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20161028

Address after: 234000 Anhui City, Suzhou Province glorious city D District, building 0109, room 28

Patentee after: Suzhou Daming Electronic Technology Co., Ltd.

Address before: Zhongshan road Wuzhong District Mudu town of Suzhou city in Jiangsu province 215101 No. 70 Wuzhong Science Park Building 2 room 2310

Patentee before: Nanjing University of Information Science and Technology

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20170113

Address after: Four pailou Nanjing Xuanwu District of Jiangsu Province, No. 2 210018

Patentee after: Ke Fuyang

Address before: 234000 Anhui City, Suzhou Province glorious city D District, building 0109, room 28

Patentee before: Suzhou Daming Electronic Technology Co., Ltd.

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160817

Termination date: 20181219