[go: up one dir, main page]

CN118316740B - Electronic detonator data encryption method, system and medium - Google Patents

Electronic detonator data encryption method, system and medium Download PDF

Info

Publication number
CN118316740B
CN118316740B CN202410743118.7A CN202410743118A CN118316740B CN 118316740 B CN118316740 B CN 118316740B CN 202410743118 A CN202410743118 A CN 202410743118A CN 118316740 B CN118316740 B CN 118316740B
Authority
CN
China
Prior art keywords
encryption method
electronic detonator
encryption
threshold value
detonation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410743118.7A
Other languages
Chinese (zh)
Other versions
CN118316740A (en
Inventor
任万孟
张正旭
向桂宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Ruoke Petroleum Co.,Ltd.
Original Assignee
Chengdu Rock Petroleum Technology Development Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Rock Petroleum Technology Development Co ltd filed Critical Chengdu Rock Petroleum Technology Development Co ltd
Priority to CN202410743118.7A priority Critical patent/CN118316740B/en
Publication of CN118316740A publication Critical patent/CN118316740A/en
Application granted granted Critical
Publication of CN118316740B publication Critical patent/CN118316740B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F42AMMUNITION; BLASTING
    • F42CAMMUNITION FUZES; ARMING OR SAFETY MEANS THEREFOR
    • F42C19/00Details of fuzes
    • F42C19/08Primers; Detonators
    • F42C19/12Primers; Detonators electric
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Lock And Its Accessories (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of data transmission encryption, in particular to a method, a system and a medium for encrypting data of an electronic detonator, which are used for setting a first quantity threshold value and a second quantity threshold value, judging whether the current quantity value exceeds the first quantity threshold value or the second quantity threshold value, and encrypting a detonation password of the electronic detonator by using the first encryption method, the second encryption method and the third encryption method. According to the method, when the detonation passwords of the encrypted electronic detonators are required to be encrypted, different encryption methods can be selected for encryption, and meanwhile, the relation between the number of the electronic detonators and the dangerous degree is considered, the electronic detonators with the larger number represent the higher dangerous degree, so that the security and confidentiality can be improved by selecting the encryption method with higher encryption complexity through the scheme, and the damage caused by interception and theft of illegal molecules in the midway is avoided.

Description

一种电子雷管数据加密方法及系统、介质A method, system and medium for encrypting electronic detonator data

技术领域Technical Field

本发明涉及数据传输加密技术领域,具体而言,涉及一种电子雷管数据加密方法及系统、介质。The present invention relates to the technical field of data transmission encryption, and in particular to an electronic detonator data encryption method, system and medium.

背景技术Background Art

电子雷管是采用电子控制模块对起爆过程进行控制的雷管,每一发电子雷管有独立的密码,密码比对通过方能起爆。电子雷管起爆系统包含两部分,即电子雷管和起爆器。电子雷管起爆系统的工作流程为:在电子雷管的生成阶段,注入起爆密码,将起爆密码上传至全国工业电子雷管密码管控中心,起爆器申请起爆密码,起爆器将申请的起爆密码下载至起爆器中,起爆器解码后与雷管进行密码比对验证,验证成功后起爆电子雷管。Electronic detonators are detonators that use electronic control modules to control the detonation process. Each electronic detonator has an independent password, and can only be detonated after the password is matched. The electronic detonator detonation system consists of two parts, namely the electronic detonator and the detonator. The working process of the electronic detonator detonation system is as follows: in the generation stage of the electronic detonator, the detonation password is injected, and the detonation password is uploaded to the National Industrial Electronic Detonator Password Control Center. The detonator applies for the detonation password, and the detonator downloads the applied detonation password to the detonator. After the detonator decodes, it compares the password with the detonator for verification, and the electronic detonator is detonated after successful verification.

在目前的现有技术中,一般是简单的对密码进行哈希函数进行加密后发送,来提高保密程度,但是没有考虑到电子雷管的数量影响,电子雷管数量越多,说明绑定的需要被引爆的炸药越多,对电子雷管的信息需要进行更复杂的加密。In the current existing technology, the password is generally simply encrypted with a hash function before being sent to improve confidentiality. However, the impact of the number of electronic detonators is not taken into account. The more electronic detonators there are, the more explosives are bound to be detonated, and the information of the electronic detonators needs to be encrypted more complexly.

发明内容Summary of the invention

本发明的目的是提供一种电子雷管数据加密方法及系统、设备、介质,来解决现有技术中电子雷管数据传输仅使用常规的加密方式,对于量大的电子雷管安全性较低的问题。The purpose of the present invention is to provide an electronic detonator data encryption method and system, device and medium to solve the problem that the electronic detonator data transmission in the prior art only uses conventional encryption methods, which has low security for a large number of electronic detonators.

本发明的实施例通过以下技术方案实现:The embodiments of the present invention are implemented by the following technical solutions:

第一方面,本发明提供了一种电子雷管数据加密方法,包括第一数据加密方法:In a first aspect, the present invention provides an electronic detonator data encryption method, including a first data encryption method:

获取电子雷管的数目信息得到电子雷管的数量值,设置第一数量阈值和第二数量阈值;Acquire the number information of electronic detonators to obtain the number value of the electronic detonators, and set a first number threshold and a second number threshold;

判断当前数量值是否超过第一数量阈值,若未超过第一数量阈值,则通过第一加密方法对电子雷管的引爆密码进行加密;Determine whether the current quantity value exceeds a first quantity threshold, and if it does not exceed the first quantity threshold, encrypt the detonation password of the electronic detonator by using a first encryption method;

若超过第一数量阈值,则判断是否超过第二数量阈值,若未超过第二数量阈值,则通过第二加密方法对电子雷管的引爆密码进行加密;If the number exceeds the first threshold, determining whether the number exceeds the second threshold; if the number does not exceed the second threshold, encrypting the detonation password of the electronic detonator by a second encryption method;

若超过第二数量阈值,则通过第三加密方法对电子雷管的引爆密码进行加密;If the number exceeds the second threshold, the detonation password of the electronic detonator is encrypted by a third encryption method;

所述第一加密方法、第二加密方法和第三加密方法的加密复杂度逐步提高,将加密后的引爆密码发送至控制端,所述控制端用于解密和验证加密后的密码信息,验证通过后进行引爆。The encryption complexity of the first encryption method, the second encryption method and the third encryption method is gradually increased, and the encrypted detonation password is sent to the control end, and the control end is used to decrypt and verify the encrypted password information, and detonation is performed after the verification is passed.

在本发明的一实施例中,还包括获取电子雷管引爆区域的场所危险等级,所述场所危险等级包括普通危险和特别危险;In one embodiment of the present invention, it further includes obtaining a site danger level of the electronic detonator detonation area, wherein the site danger level includes ordinary danger and special danger;

若当前所述场所危险等级为普通危险时,进行所述第一数据加密方法;If the current danger level of the place is ordinary danger, the first data encryption method is performed;

若当前所述场所危险等级为特别危险时,进行第二数据加密方法,所述第二数据加密方法包括;If the current danger level of the place is particularly dangerous, a second data encryption method is performed, and the second data encryption method includes:

判断当前数量值是否超过第三数量阈值,所述第三数量阈值小于第一数量阈值,若未超过第三数量阈值,则通过第二加密方法对电子雷管的引爆密码进行加密;Determine whether the current quantity value exceeds a third quantity threshold, where the third quantity threshold is less than the first quantity threshold; if the current quantity value does not exceed the third quantity threshold, encrypt the detonation password of the electronic detonator by using a second encryption method;

若超过第三数量阈值,则通过第三加密方法对电子雷管的引爆密码进行加密。If the third quantity threshold is exceeded, the detonation code of the electronic detonator is encrypted using a third encryption method.

在本发明的一实施例中,还包括确定场所危险等级,所述确定场所危险等级包括:In one embodiment of the present invention, it further includes determining a danger level of a place, wherein determining the danger level of a place includes:

获取电子雷管引爆区域的必要参数,所述必要参数包括属性、影响面积和影响面积内的居住人数,通过必要参数计算评价指数;Obtaining necessary parameters of the electronic detonator detonation area, the necessary parameters including attributes, affected area and number of residents in the affected area, and calculating the evaluation index through the necessary parameters;

设置评价指数阈值,若超过评价指数阈值则确定为特别危险,若未超过评价指数阈值则确定为普通危险。An evaluation index threshold is set. If the evaluation index threshold is exceeded, it is determined to be particularly dangerous. If the evaluation index threshold is not exceeded, it is determined to be generally dangerous.

在本发明的一实施例中,所述通过必要参数计算评价指数包括:In one embodiment of the present invention, calculating the evaluation index by using necessary parameters includes:

式中,S为影响面积内居住人数,A为影响面积,为属性系数,为评价指数。In the formula, S is the number of people living in the affected area, A is the affected area, is the attribute coefficient, For the evaluation index.

在本发明的一实施例中,所述第一加密方法包括:In one embodiment of the present invention, the first encryption method includes:

利用ASE对称加密算法对电子雷管的引爆密码中的密码信息进行处理,得到第一对称密钥和第一加密数据文件,并将第一对称密钥保存至控制端。The ASE symmetric encryption algorithm is used to process the password information in the detonation password of the electronic detonator to obtain a first symmetric key and a first encrypted data file, and the first symmetric key is saved to the control end.

在本发明的一实施例中,所述第二加密方法包括:In one embodiment of the present invention, the second encryption method includes:

随机获取每个电子雷管的ID编号,并记录ID编号的获取顺序,直至ID编号获取完毕;Randomly obtain the ID number of each electronic detonator and record the order in which the ID numbers are obtained until all the ID numbers have been obtained;

分别对电子雷管的ID编号的获取顺序和引爆密码通过ASE对称加密算法进行加密,得到第二对称密钥和第二加密数据文件,并将第二对称密钥保存至控制端;Encrypting the acquisition sequence of the ID number of the electronic detonator and the detonation password respectively by using the ASE symmetric encryption algorithm to obtain a second symmetric key and a second encrypted data file, and saving the second symmetric key to the control end;

所述控制端接收到第二加密数据文件后,通过第二对称密钥对第二加密数据文件进行解密,控制端通过ID编号的获取顺序对电子雷管的ID编号进行核对验证。After receiving the second encrypted data file, the control end decrypts the second encrypted data file using the second symmetric key, and verifies the ID number of the electronic detonator according to the order in which the ID number is obtained.

在本发明的一实施例中,所述第三加密方法包括:In one embodiment of the present invention, the third encryption method includes:

获取第二加密数据文件,设置发送数据阈值,将第二数据加密文件通过数据阈值划分成若干份;Obtain a second encrypted data file, set a data sending threshold, and divide the second encrypted data file into a plurality of parts according to the data threshold;

将第一份第二加密数据文件发送至控制端,所述控制端将发送反馈信息,所述反馈信息为成功接收第一份第二加密数据文件;Sending the first second encrypted data file to the control end, the control end will send feedback information, the feedback information is the successful receipt of the first second encrypted data file;

若获取到控制端的反馈信息,则发送第二份第二加密数据文件,直至发送完毕;If feedback information from the control end is obtained, the second encrypted data file is sent until the sending is completed;

若未接收到控制端的反馈信息,则停止发送。If no feedback information is received from the control end, the sending is stopped.

第二方面,本发明还提供了一种电子雷管数据加密系统,包括第一数据加密系统,所述第一数据加密系统包括:In a second aspect, the present invention further provides an electronic detonator data encryption system, including a first data encryption system, wherein the first data encryption system includes:

数量值设置模块,被配置为获取电子雷管的数目信息得到电子雷管的数量值,设置第一数量阈值和第二数量阈值;A quantity value setting module is configured to obtain the number information of the electronic detonators to obtain the quantity value of the electronic detonators, and set a first quantity threshold and a second quantity threshold;

第一加密模块,被配置为判断当前数量值是否超过第一数量阈值,若未超过第一数量阈值,则通过第一加密方法对电子雷管的引爆密码进行加密;A first encryption module is configured to determine whether the current quantity value exceeds a first quantity threshold, and if it does not exceed the first quantity threshold, encrypt the detonation password of the electronic detonator by a first encryption method;

第二加密模块,被配置为若超过第一数量阈值,则判断是否超过第二数量阈值,若未超过第二数量阈值,则通过第二加密方法对电子雷管的引爆密码进行加密;A second encryption module is configured to determine whether the number of detonators exceeds the second number threshold if the number of detonators exceeds the first number threshold, and encrypt the detonation password of the electronic detonator by a second encryption method if the number of detonators does not exceed the second number threshold;

第三加密模块,被配置为若超过第二数量阈值,则进行第三加密方法进行对电子雷管的引爆密码加密;A third encryption module is configured to perform a third encryption method to encrypt the detonation password of the electronic detonator if the second number threshold is exceeded;

数量值设置模块,被配置为所述第一加密方法、第二加密方法和第三加密方法的加密复杂度逐步提高,将加密后的引爆密码发送至控制端,所述控制端用于解密和验证加密后的密码信息,验证通过后进行引爆。The quantity value setting module is configured to gradually increase the encryption complexity of the first encryption method, the second encryption method and the third encryption method, and send the encrypted detonation password to the control end, which is used to decrypt and verify the encrypted password information, and detonate after the verification is passed.

在本发明的一实施例中,还包括危险等级判断模块;In one embodiment of the present invention, it also includes a danger level determination module;

所述危险等级判断模块,用于获取电子雷管引爆区域的场所危险等级,所述场所危险等级包括普通危险和特别危险;The danger level judgment module is used to obtain the danger level of the electronic detonator detonation area, and the danger level of the place includes ordinary danger and special danger;

若当前所述场所危险等级为普通危险时,进行所述第一数据加密方法;If the current danger level of the place is ordinary danger, the first data encryption method is performed;

若当前所述场所危险等级为特别危险时,进行第二数据加密方法,所述第二数据加密方法包括;If the current danger level of the place is particularly dangerous, a second data encryption method is performed, and the second data encryption method includes:

判断当前数量值是否超过第三数量阈值,所述第三数量阈值小于第一数量阈值,若未超过第三数量阈值,则进行第二加密方法进行对电子雷管的密码信息加密;Determine whether the current quantity value exceeds a third quantity threshold, the third quantity threshold being less than the first quantity threshold; if the current quantity value does not exceed the third quantity threshold, encrypt the password information of the electronic detonator using a second encryption method;

若超过第三数量阈值,则通过第三加密方法对电子雷管的密码信息进行加密。If the third quantity threshold is exceeded, the password information of the electronic detonator is encrypted using a third encryption method.

第三方面,一种计算机可读存储介质,所述计算机可读存储介质上存储计算机程序,所述计算机程序被处理器执行时实现上述的一种电子雷管数据加密方法。In a third aspect, a computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, the electronic detonator data encryption method described above is implemented.

本发明实施例的技术方案至少具有如下优点和有益效果:The technical solution of the embodiment of the present invention has at least the following advantages and beneficial effects:

采用本发明所提供的方法,设置第一数量阈值和第二数量阈值,判断当前数量值是否超过第一数量阈值或者第二数量阈值,通过第一加密方法、第二加密方法和第三加密方法对电子雷管的引爆密码加密。通过上述方法,在需要对加密电子雷管的引爆密码进行加密时,可以选择不同的加密方法进行加密,同时考虑到了的电子雷管的数量与危险程度的关系,数量越多的电子雷管,代表危险程度越高,所以可以通过本方案选择加密复杂度更高的加密方法,来提高安全保密性,避免中途被不法分子拦截盗取,造成损失。The method provided by the present invention is adopted to set a first quantity threshold and a second quantity threshold, and to judge whether the current quantity value exceeds the first quantity threshold or the second quantity threshold, and to encrypt the detonation password of the electronic detonator by the first encryption method, the second encryption method and the third encryption method. Through the above method, when it is necessary to encrypt the detonation password of the encrypted electronic detonator, different encryption methods can be selected for encryption, and the relationship between the number of electronic detonators and the degree of danger is taken into account at the same time. The more electronic detonators there are, the higher the degree of danger. Therefore, an encryption method with higher encryption complexity can be selected through this scheme to improve security and confidentiality, and avoid being intercepted and stolen by lawless elements in the middle, causing losses.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

为了更清楚地说明本发明实施例的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,应当理解,以下附图仅示出了本发明的某些实施例,因此不应被看作是对范围的限定,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他相关的附图。In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for use in the embodiments are briefly introduced below. It should be understood that the following drawings only show certain embodiments of the present invention and therefore should not be regarded as limiting the scope. For ordinary technicians in this field, other related drawings can be obtained based on these drawings without creative work.

图1为本发明的流程示意图。FIG. 1 is a schematic diagram of the process of the present invention.

具体实施方式DETAILED DESCRIPTION

为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。通常在此处附图中描述和示出的本发明实施例的组件可以以各种不同的配置来布置和设计。In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, not all of the embodiments. Generally, the components of the embodiments of the present invention described and shown in the drawings here can be arranged and designed in various different configurations.

本申请的说明书和权利要求书及上述附图中的术语“第一、第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。在本申请中出现的对步骤进行的命名或者编号,并不意味着必须按照命名或者编号所指示的时间/逻辑先后顺序执行方法流程中的步骤,已经命名或者编号的流程步骤可以根据要实现的技术目的变更执行次序,只要能达到相同或者相类似的技术效果即可。The terms "first, second" and the like in the specification and claims of this application and the above drawings are used to distinguish similar objects, and are not necessarily used to describe a specific order or sequence. The naming or numbering of steps in this application does not mean that the steps in the method flow must be executed in the time/logical sequence indicated by the naming or numbering. The named or numbered process steps can be changed in the execution order according to the technical purpose to be achieved, as long as the same or similar technical effects can be achieved.

请参照图1,本发明提供了一种电子雷管数据加密方法,包括第一数据加密方法:Referring to FIG. 1 , the present invention provides an electronic detonator data encryption method, including a first data encryption method:

S101:获取电子雷管的数目信息得到电子雷管的数量值,设置第一数量阈值和第二数量阈值;S101: Acquire the number information of electronic detonators to obtain the number value of electronic detonators, and set a first number threshold and a second number threshold;

电子雷管的数目信息,直接反映了本次引爆任务所需要的炸药量,数量越多,说明此次爆炸任务如果失误,则会更加危险。The number of electronic detonators directly reflects the amount of explosives required for this detonation mission. The larger the number, the more dangerous it will be if the explosion mission fails.

其中,关于第一数量阈值和第二数量阈值的设定,可以根据每个电子雷管所要引爆的炸药当量来确定,若是当量很大,危险度高的,可以将第一数量阈值和第二数量阈值设置为较小的数值,相反,可以设置为较大的数值。Among them, the setting of the first quantity threshold and the second quantity threshold can be determined according to the explosive equivalent to be detonated by each electronic detonator. If the equivalent is large and the danger level is high, the first quantity threshold and the second quantity threshold can be set to smaller values. Conversely, they can be set to larger values.

S102:判断当前数量值是否超过第一数量阈值,若未超过第一数量阈值,则通过第一加密方法对电子雷管的引爆密码进行加密;S102: determining whether the current quantity value exceeds a first quantity threshold, and if it does not exceed the first quantity threshold, encrypting the detonation password of the electronic detonator by using a first encryption method;

S103:若超过第一数量阈值,则判断是否超过第二数量阈值,若未超过第二数量阈值,则通过第二加密方法对电子雷管的引爆密码进行加密;S103: If the number exceeds the first threshold, determining whether the number exceeds the second threshold; if the number does not exceed the second threshold, encrypting the detonation password of the electronic detonator by a second encryption method;

S104:若超过第二数量阈值,则通过第三加密方法对电子雷管的引爆密码进行加密;S104: If the number exceeds the second threshold, encrypting the detonation password of the electronic detonator by a third encryption method;

S105:所述第一加密方法、第二加密方法和第三加密方法的加密复杂度逐步提高,将加密后的引爆密码发送至控制端,所述控制端用于解密和验证加密后的密码信息,验证通过后进行引爆。S105: The encryption complexity of the first encryption method, the second encryption method and the third encryption method is gradually increased, and the encrypted detonation password is sent to the control end, and the control end is used to decrypt and verify the encrypted password information, and detonation is performed after verification.

采用本发明所提供的方法,设置第一数量阈值和第二数量阈值,判断当前数量值是否超过第一数量阈值或者第二数量阈值,通过第一加密方法、第二加密方法和第三加密方法对电子雷管的引爆密码加密。通过上述方法,在需要对加密电子雷管的引爆密码进行加密时,可以选择不同的加密方法进行加密,同时考虑到了的电子雷管的数量与危险程度的关系,数量越多的电子雷管,代表危险程度越高,所以可以通过本方案选择加密复杂度更高的加密方法,来提高安全保密性,避免中途被不法分子拦截盗取,造成损失。The method provided by the present invention is adopted to set a first quantity threshold and a second quantity threshold, and to judge whether the current quantity value exceeds the first quantity threshold or the second quantity threshold, and to encrypt the detonation password of the electronic detonator by the first encryption method, the second encryption method and the third encryption method. Through the above method, when it is necessary to encrypt the detonation password of the encrypted electronic detonator, different encryption methods can be selected for encryption, and the relationship between the number of electronic detonators and the degree of danger is taken into account at the same time. The more electronic detonators there are, the higher the degree of danger. Therefore, an encryption method with higher encryption complexity can be selected through this scheme to improve security and confidentiality, and avoid being intercepted and stolen by lawless elements in the middle, causing losses.

本发明的一个实例性实施方式,还包括获取电子雷管引爆区域的场所危险等级,所述场所危险等级包括普通危险和特别危险;An exemplary embodiment of the present invention further includes obtaining a site danger level of an electronic detonator detonation area, wherein the site danger level includes ordinary danger and special danger;

S201:若当前所述场所危险等级为普通危险时,进行所述第一数据加密方法;S201: If the current danger level of the place is normal danger, perform the first data encryption method;

S202:若当前所述场所危险等级为特别危险时,进行第二数据加密方法,所述第二数据加密方法包括;S202: If the current danger level of the place is particularly dangerous, a second data encryption method is performed, and the second data encryption method includes:

S203:判断当前数量值是否超过第三数量阈值,所述第三数量阈值小于第一数量阈值,若未超过第三数量阈值,则通过第二加密方法对电子雷管的引爆密码进行加密;S203: determining whether the current quantity value exceeds a third quantity threshold, where the third quantity threshold is less than the first quantity threshold; if the current quantity value does not exceed the third quantity threshold, encrypting the detonation password of the electronic detonator by using a second encryption method;

S204:若超过第三数量阈值,则通过第三加密方法进行对电子雷管的引爆密码进行加密。S204: If the number exceeds the third threshold, encrypt the detonation code of the electronic detonator using a third encryption method.

在本实施例中,电子雷管所引爆区域的使用属性,同样危险性有这较大的影响,具体的,还包括确定场所危险等级,所述确定场所危险等级包括:In this embodiment, the use attribute of the area where the electronic detonator is detonated also has a great influence on the danger. Specifically, it also includes determining the danger level of the place. The determination of the danger level of the place includes:

获取电子雷管引爆区域的必要参数,所述必要参数包括属性、影响面积和影响面积内的居住人数,通过必要参数计算评价指数;Obtaining necessary parameters of the electronic detonator detonation area, the necessary parameters including attributes, affected area and number of residents in the affected area, and calculating the evaluation index through the necessary parameters;

其中,属性具体可以为该区域的地理属性,例如,城郊区、城市区、乡镇区、山区等,不同的地域使用电子雷管的危险性明显不同。The attribute may specifically be the geographical attribute of the area, such as suburban area, urban area, township area, mountainous area, etc. The danger of using electronic detonators in different regions is obviously different.

设置评价指数阈值,若超过评价指数阈值则确定为特别危险,若未超过评价指数阈值则确定为普通危险。An evaluation index threshold is set. If the evaluation index threshold is exceeded, it is determined to be particularly dangerous. If the evaluation index threshold is not exceeded, it is determined to be generally dangerous.

通过必要参数计算评价指数包括:The necessary parameters for calculating the evaluation index include:

式中,S为影响面积内居住人数,A为影响面积,为属性系数,为评价指数,在本实施例,属性系数可以为100%、80%和60%,分别代表为城市区、城郊区和乡镇区,通过设置不同的系数,来对整体结果进行影响,凸显出不同区域的使用电子雷管的差别,影响面积可以为该电子雷管所捆绑的炸药被无意引爆后所影响的区域。In the formula, S is the number of people living in the affected area, A is the affected area, is the attribute coefficient, For the evaluation index, in this embodiment, the attribute coefficient can be 100%, 80% and 60%, representing the urban area, suburban area and township area respectively. By setting different coefficients, the overall result can be affected, highlighting the difference in the use of electronic detonators in different areas. The affected area can be the area affected by the accidental detonation of the explosive bundled with the electronic detonator.

例如,设置的阈值评价指数为1000,输入的S为2000人,A为1平方公里,为属性系数为城市区,取,100%,计算结果则大于1000。For example, if the threshold evaluation index is set to 1000, the input S is 2000 people, and A is 1 square kilometer, For the attribute coefficient of urban area, take 100%, and the calculation result is greater than 1000.

则需要按照第三数量阈值进行判断,即选择使用第二加密方法还是第三加密方法对电子雷管的引爆密码进行加密。It is necessary to make a judgment according to the third quantity threshold, that is, to choose whether to use the second encryption method or the third encryption method to encrypt the detonation password of the electronic detonator.

本发明的一个实例性实施方式,所述第一加密方法包括:In an exemplary embodiment of the present invention, the first encryption method comprises:

利用ASE对称加密算法对电子雷管的引爆密码中的密码信息进行处理,得到第一对称密钥和第一加密数据文件,并将第一对称密钥保存至控制端。The ASE symmetric encryption algorithm is used to process the password information in the detonation password of the electronic detonator to obtain a first symmetric key and a first encrypted data file, and the first symmetric key is saved to the control end.

其中,第一加密方法则可以采用常规的加密算法进行加密,例如ASE对称加密、RSA非对称加密算法或者ECC非对称加密算法等,控制端接收第一加密数据文件,通过密钥进行解密,然后验证密码信息是否正确,即完成整个步骤,本方案不再过多赘述。Among them, the first encryption method can use a conventional encryption algorithm for encryption, such as ASE symmetric encryption, RSA asymmetric encryption algorithm or ECC asymmetric encryption algorithm, etc. The control end receives the first encrypted data file, decrypts it through the key, and then verifies whether the password information is correct, that is, the entire step is completed, and this solution will not be elaborated in detail.

本发明的一个实例性实施方式,所述第二加密方法包括:In an exemplary embodiment of the present invention, the second encryption method comprises:

S301:随机获取每个电子雷管的ID编号,并记录ID编号的获取顺序,直至ID编号获取完毕;S301: randomly obtaining the ID number of each electronic detonator, and recording the order in which the ID numbers are obtained, until all the ID numbers are obtained;

S302:分别对电子雷管的ID编号的获取顺序和引爆密码通过ASE对称加密算法进行加密,得到第二对称密钥和第二加密数据文件,并将第二对称密钥保存至控制端;S302: Encrypt the acquisition sequence of the ID number of the electronic detonator and the detonation password respectively by using the ASE symmetric encryption algorithm to obtain a second symmetric key and a second encrypted data file, and save the second symmetric key to the control end;

S303:所述控制端接收到第二加密数据文件后,通过第二对称密钥对第二加密数据文件进行解密,控制端通过ID编号的获取顺序对电子雷管的ID编号进行核对验证。S303: After receiving the second encrypted data file, the control end decrypts the second encrypted data file using the second symmetric key, and verifies the ID number of the electronic detonator according to the order in which the ID number is obtained.

在本实施例中,加入了对ID编号获取顺序的考虑,对所要加密的引爆密码做了增加,复杂化了所要加密的内容,一方面答复增加了若是被拦截后,不发分子的解密时间,另一方面在实际的使用过程中,就算被获取到了密码信息,但是解密后,对电子雷管ID的验证顺序不正确,依然无法进行正确的触发电子雷管,给电子雷管再次增加了一次保险,来达到提高保密程度的目的。In this embodiment, the order of obtaining ID numbers is taken into consideration, and the detonation password to be encrypted is increased, which complicates the content to be encrypted. On the one hand, it increases the decryption time if it is intercepted. On the other hand, in actual use, even if the password information is obtained, after decryption, the verification order of the electronic detonator ID is incorrect and the electronic detonator cannot be correctly triggered. This adds another insurance to the electronic detonator to achieve the purpose of improving the confidentiality level.

其中,电子雷管的ID编号的获取顺序和电子雷管的密码信息,可以分开发送,避免一次被全部拦截。Among them, the order of obtaining the ID numbers of the electronic detonators and the password information of the electronic detonators can be sent separately to avoid being intercepted all at once.

本发明的一个实例性实施方式,所述第三加密方法包括:In an exemplary embodiment of the present invention, the third encryption method comprises:

S401:获取第二加密数据文件,设置发送数据阈值,将第二数据加密文件通过数据阈值划分成若干份;S401: Acquire a second encrypted data file, set a data sending threshold, and divide the second encrypted data file into a plurality of parts according to the data threshold;

S402:将第一份第二加密数据文件发送至控制端,所述控制端将发送反馈信息,所述反馈信息为成功接收第一份第二加密数据文件;S402: Sending the first second encrypted data file to the control end, and the control end will send feedback information, wherein the feedback information indicates that the first second encrypted data file is successfully received;

S403:若获取到控制端的反馈信息,则发送第二份第二加密数据文件,直至发送完毕;S403: If feedback information from the control end is obtained, the second encrypted data file is sent until the sending is completed;

S404:若未接收到控制端的反馈信息,则停止发送。S404: If no feedback information is received from the control end, stop sending.

在本实施例中,基于第二加密方法的结果,进行进一步的处理,将第二加密数据文件划分成多个文件,也可以理解为进行多次发送,这样,在每次发送后,收到反馈结果后,再进行下一次的发送,这样,若是没有收到上次发送的反馈,这样可以的避免被不法分子拦截获得完整的文件,进一步的提高不法分子的破解难度。In this embodiment, based on the result of the second encryption method, further processing is performed to divide the second encrypted data file into multiple files, which can also be understood as multiple sending. In this way, after each sending, the next sending is performed after receiving the feedback result. In this way, if no feedback is received from the last sending, this can avoid being intercepted by criminals to obtain the complete file, further increasing the difficulty of cracking by criminals.

本发明提供一个具体的实例,进行进一步的说明。The present invention provides a specific example for further explanation.

例如,第一数量阈值设置为20,第二数量阈值为30,第三数量阈值为10For example, the first quantity threshold is set to 20, the second quantity threshold is set to 30, and the third quantity threshold is set to 10.

输入的数量值为15,属于小于第一数量阈值的情况,初步判断为使用第一加密方法。然后进行确定场所危险等级,确定为特别危险。The input quantity value is 15, which is less than the first quantity threshold, and it is initially determined that the first encryption method is used. Then the danger level of the place is determined to be particularly dangerous.

则数量值15属于大于第三数量阈值的情况,将电子雷管的引爆密码进行第三加密方法进行处理,输出处理后的第二加密数据文件,并将第二加密数据文件进行拆分发送。The quantity value 15 is greater than the third quantity threshold, the detonation password of the electronic detonator is processed by the third encryption method, the processed second encrypted data file is output, and the second encrypted data file is split and sent.

第二方面,本发明还提供了一种电子雷管数据加密系统,包括第一数据加密系统,所述第一数据加密系统包括:In a second aspect, the present invention further provides an electronic detonator data encryption system, including a first data encryption system, wherein the first data encryption system includes:

数量值设置模块,被配置为获取电子雷管的数目信息得到电子雷管的数量值,设置第一数量阈值和第二数量阈值;A quantity value setting module is configured to obtain the number information of the electronic detonators to obtain the quantity value of the electronic detonators, and set a first quantity threshold and a second quantity threshold;

第一加密模块,被配置为判断当前数量值是否超过第一数量阈值,若未超过第一数量阈值,则通过第一加密方法对电子雷管的引爆密码进行加密;A first encryption module is configured to determine whether the current quantity value exceeds a first quantity threshold, and if it does not exceed the first quantity threshold, encrypt the detonation password of the electronic detonator by a first encryption method;

第二加密模块,被配置为若超过第一数量阈值,则判断是否超过第二数量阈值,若未超过第二数量阈值,则通过第二加密方法对电子雷管的引爆密码进行加密;A second encryption module is configured to determine whether the number of detonators exceeds the second number threshold if the number of detonators exceeds the first number threshold, and encrypt the detonation password of the electronic detonator by a second encryption method if the number of detonators does not exceed the second number threshold;

第三加密模块,被配置为若超过第二数量阈值,则通过第三加密方法对电子雷管的引爆密码进行加密;A third encryption module is configured to encrypt the detonation password of the electronic detonator by a third encryption method if the second quantity threshold is exceeded;

数量值设置模块,被配置为第一加密方法、第二加密方法和第三加密方法的加密复杂度逐步提高,将加密后的引爆密码发送至控制端,所述控制端用于解密和验证加密后的密码信息,验证通过后进行引爆。The quantity value setting module is configured to gradually increase the encryption complexity of the first encryption method, the second encryption method and the third encryption method, and sends the encrypted detonation password to the control end, which is used to decrypt and verify the encrypted password information, and detonate after the verification is passed.

第三方面,本发明还提供了一种电子设备,包括存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现上述的一种电子雷管数据加密方法。In a third aspect, the present invention further provides an electronic device, comprising a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor implements the above-mentioned electronic detonator data encryption method when executing the computer program.

第四方面,一种计算机可读存储介质,所述计算机可读存储介质上存储计算机程序,所述计算机程序被处理器执行时实现上述的一种电子雷管数据加密方法。In a fourth aspect, a computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, the electronic detonator data encryption method described above is implemented.

另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。In addition, each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit. The above-mentioned integrated unit may be implemented in the form of hardware or in the form of software functional units.

集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本发明各个实施例方法的全部或部分步骤。而前述的存储介质包括: U 盘、移动硬盘、只读存储器(ROM,Read — OnlyMemory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。If the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer-readable storage medium. The computer software product is stored in a storage medium, including a number of instructions for a computer device (which can be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods of various embodiments of the present invention. The aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), disk or optical disk and other media that can store program codes.

以上仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。The above are only preferred embodiments of the present invention and are not intended to limit the present invention. For those skilled in the art, the present invention may have various modifications and variations. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention shall be included in the protection scope of the present invention.

Claims (8)

1. An electronic detonator data encryption method is characterized by comprising a first data encryption method:
acquiring the number information of the electronic detonators to obtain the number value of the electronic detonators, and setting a first number threshold value and a second number threshold value;
judging whether the current quantity value exceeds a first quantity threshold value, and encrypting the detonation password of the electronic detonator by a first encryption method if the current quantity value does not exceed the first quantity threshold value;
If the first number threshold is exceeded, judging whether the second number threshold is exceeded, and if the second number threshold is not exceeded, encrypting the detonation password of the electronic detonator by a second encryption method;
if the number exceeds the second number threshold, encrypting the detonation password of the electronic detonator by a third encryption method;
The encryption complexity of the first encryption method, the second encryption method and the third encryption method is gradually increased, the encrypted detonation cipher is sent to the control end, the control end is used for decrypting and verifying the encrypted detonation cipher, and detonation is carried out after verification is passed;
the second encryption method comprises the following steps:
randomly acquiring the ID number of each electronic detonator, and recording the acquisition sequence of the ID numbers until the ID numbers are acquired;
Encrypting the acquisition sequence of the ID numbers of the electronic detonators and the detonation passwords through an ASE symmetric encryption algorithm to obtain a second symmetric key and a second encrypted data file, and storing the second symmetric key to a control end;
after the control end receives the second encrypted data file, the second encrypted data file is decrypted through a second symmetric key, and the control end checks and verifies the ID number of the electronic detonator through the acquisition sequence of the ID number;
The third encryption method comprises the following steps:
Acquiring a second encrypted data file, setting a data threshold value sent each time, and dividing the second encrypted data file into a plurality of parts through the data threshold value;
The first encrypted data file and the second encrypted data file are transmitted to a control end, and the control end transmits feedback information which is that the first encrypted data file and the second encrypted data file are successfully received;
If the feedback information of the control end is obtained, a second encrypted data file is sent until the sending is finished;
And if the feedback information of the control end is not received, stopping sending.
2. The method of claim 1, further comprising obtaining a site hazard level for the detonation zone of the electronic detonator, the site hazard level comprising a general hazard and a special hazard;
If the current place danger level is common danger, performing the first data encryption method;
if the current place danger level is particularly dangerous, performing a second data encryption method, wherein the second data encryption method comprises the following steps of;
judging whether the current quantity value exceeds a third quantity threshold value, wherein the third quantity threshold value is smaller than the first quantity threshold value, and encrypting the detonation password of the electronic detonator by a second encryption method if the current quantity value does not exceed the third quantity threshold value;
And if the number exceeds the third number threshold, encrypting the detonation password of the electronic detonator by a third encryption method.
3. The method of claim 2, further comprising determining a location risk level, the determining a location risk level comprising:
acquiring necessary parameters of an electronic detonator detonation region, wherein the necessary parameters comprise attributes, an influence area and the number of residents in the influence area, and calculating an evaluation index through the necessary parameters;
An evaluation index threshold is set, and if the evaluation index threshold is exceeded, the risk is determined to be particularly dangerous, and if the evaluation index threshold is not exceeded, the risk is determined to be normal.
4. A method of encrypting electronic detonator data according to claim 3, wherein said calculating an evaluation index by means of necessary parameters comprises:
Wherein S is the number of people living in the affected area, A is the affected area, As the coefficient of the attribute(s),To evaluate the index.
5. The method for encrypting electronic detonator data of claim 1 wherein said first encryption method comprises:
And processing the password information in the detonation password of the electronic detonator by using an ASE symmetric encryption algorithm to obtain a first symmetric key and a first encrypted data file, and storing the first symmetric key to a control end.
6. An electronic detonator data encryption system comprising a first data encryption system, said first data encryption system comprising:
the quantity value setting module is configured to acquire the number information of the electronic detonators to obtain the quantity value of the electronic detonators, and set a first quantity threshold value and a second quantity threshold value;
The first encryption module is configured to judge whether the current quantity value exceeds a first quantity threshold value, and if the current quantity value does not exceed the first quantity threshold value, the detonation password of the electronic detonator is encrypted through a first encryption method;
The second encryption module is configured to judge whether the first number threshold value is exceeded or not if the first number threshold value is exceeded, and encrypt the detonation password of the electronic detonator by a second encryption method if the second number threshold value is not exceeded;
The third encryption module is configured to encrypt the detonation password of the electronic detonator by a third encryption method if the second number threshold is exceeded;
The quantity value setting module is configured to gradually increase the encryption complexity of the first encryption method, the second encryption method and the third encryption method, send the encrypted detonation passwords to the control end, and the control end is used for decrypting and verifying the encrypted password information and detonating after verification;
the second encryption method comprises the following steps:
randomly acquiring the ID number of each electronic detonator, and recording the acquisition sequence of the ID numbers until the ID numbers are acquired;
Encrypting the acquisition sequence of the ID numbers of the electronic detonators and the detonation passwords through an ASE symmetric encryption algorithm to obtain a second symmetric key and a second encrypted data file, and storing the second symmetric key to a control end;
after the control end receives the second encrypted data file, the second encrypted data file is decrypted through a second symmetric key, and the control end checks and verifies the ID number of the electronic detonator through the acquisition sequence of the ID number;
The third encryption method comprises the following steps:
Acquiring a second encrypted data file, setting a data threshold value sent each time, and dividing the second encrypted data file into a plurality of parts through the data threshold value;
The first encrypted data file and the second encrypted data file are transmitted to a control end, and the control end transmits feedback information which is that the first encrypted data file and the second encrypted data file are successfully received;
If the feedback information of the control end is obtained, a second encrypted data file is sent until the sending is finished;
And if the feedback information of the control end is not received, stopping sending.
7. The electronic detonator data encryption system of claim 6 further comprising a hazard class determination module;
The dangerous grade judging module is used for acquiring the dangerous grade of the place in the electronic detonator detonating area, wherein the dangerous grade of the place comprises common danger and special danger;
If the current place danger level is common danger, performing the first data encryption method;
if the current place danger level is particularly dangerous, performing a second data encryption method, wherein the second data encryption method comprises the following steps of;
Judging whether the current quantity value exceeds a third quantity threshold value, wherein the third quantity threshold value is smaller than the first quantity threshold value, and if the current quantity value does not exceed the third quantity threshold value, performing a second encryption method to encrypt the password information of the electronic detonator;
and if the number of the electronic detonators exceeds the third number threshold, performing a third encryption method to encrypt the password information of the electronic detonators.
8. A computer readable storage medium, wherein a computer program is stored on the computer readable storage medium, which when executed by a processor, implements an electronic detonator data encryption method as claimed in any one of claims 1 to 5.
CN202410743118.7A 2024-06-11 2024-06-11 Electronic detonator data encryption method, system and medium Active CN118316740B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410743118.7A CN118316740B (en) 2024-06-11 2024-06-11 Electronic detonator data encryption method, system and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410743118.7A CN118316740B (en) 2024-06-11 2024-06-11 Electronic detonator data encryption method, system and medium

Publications (2)

Publication Number Publication Date
CN118316740A CN118316740A (en) 2024-07-09
CN118316740B true CN118316740B (en) 2024-09-10

Family

ID=91726780

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410743118.7A Active CN118316740B (en) 2024-06-11 2024-06-11 Electronic detonator data encryption method, system and medium

Country Status (1)

Country Link
CN (1) CN118316740B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113656792A (en) * 2021-07-29 2021-11-16 深圳雪峰电子有限公司 Electronic detonator password verification method and device and terminal equipment

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10393128B4 (en) * 2002-08-30 2015-10-29 Orica Explosives Technology Pty. Ltd. Access control for electronic explosive devices
EP1757006A2 (en) * 2004-06-01 2007-02-28 Ben-Gurion University of the Negev Research and Development Authority Structure preserving database encryption method and system
WO2010048587A1 (en) * 2008-10-24 2010-04-29 Battelle Memorial Institute Electronic detonator system
WO2013044275A1 (en) * 2011-09-22 2013-03-28 Detnet South Africa (Pty) Ltd Detonator device communication

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113656792A (en) * 2021-07-29 2021-11-16 深圳雪峰电子有限公司 Electronic detonator password verification method and device and terminal equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于分类分级的数据资产安全管控平台设计与实现;陈驰、马红霞、赵延帅;计算机应用;20160610(S1);第266-267页 *

Also Published As

Publication number Publication date
CN118316740A (en) 2024-07-09

Similar Documents

Publication Publication Date Title
CN110519260B (en) Information processing method and information processing device
CN111917535B (en) Data encryption storage method and device and server
CN111506901B (en) Block chain-based data processing method, terminal and storage medium
EP3356988B1 (en) Method and system for verifiable searchable symmetric encryption
US9071581B2 (en) Secure storage with SCSI storage devices
AU2008200225B8 (en) ROM bios based trusted encrypted operating system
CN109960903A (en) A method, device, electronic device and storage medium for application reinforcement
CN109711841B (en) Data transaction method and system, platform and storage medium
US8577024B2 (en) Concealing plain text in scrambled blocks
US20200076592A1 (en) Method for generating seed and device thereof
CN112968774B (en) Method, device storage medium and equipment for encrypting and decrypting configuration file
CN114244508A (en) Data encryption method, device, equipment and storage medium
WO2020243245A1 (en) Protection of online applications and webpages using a blockchain
CN115455497A (en) Computer hard disk data encryption system and method
US8499357B1 (en) Signing a library file to verify a callback function
CN118316740B (en) Electronic detonator data encryption method, system and medium
CN114372284A (en) User data protection method for security computer
CN116305330B (en) Safety management method for CPU hardware
CN116911988A (en) Transaction data processing method, system, computer equipment and storage medium
CN110321737B (en) Method for preventing injection type attack of data encryption standard coprocessor
CN115361198A (en) Decryption method, encryption method, device, computer equipment and storage medium
CN108921561B (en) Digital hot wallet based on hardware encryption
CN110311773B (en) Method for preventing injection type attack of advanced encryption standard coprocessor
CN110414192B (en) Control and management system and method applied to safety manufacture
CN114329614A (en) A data desensitization method and system based on string obfuscation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: No. 199, Huqiao Road, East Industrial District, Xindu District, Chengdu, Sichuan 610500

Patentee after: Chengdu Ruoke Petroleum Co.,Ltd.

Country or region after: China

Address before: No. 199, Huqiao Road, East Industrial District, Xindu District, Chengdu, Sichuan 610500

Patentee before: CHENGDU ROCK PETROLEUM TECHNOLOGY DEVELOPMENT CO.,LTD.

Country or region before: China

CP03 Change of name, title or address
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A method, system, and medium for encrypting electronic detonator data

Granted publication date: 20240910

Pledgee: Chengdu Rural Commercial Bank Co.,Ltd. Xindu Branch

Pledgor: Chengdu Ruoke Petroleum Co.,Ltd.

Registration number: Y2025980015776

PE01 Entry into force of the registration of the contract for pledge of patent right