[go: up one dir, main page]

TWI682656B - Communication system using two kinds of keys - Google Patents

Communication system using two kinds of keys Download PDF

Info

Publication number
TWI682656B
TWI682656B TW107125332A TW107125332A TWI682656B TW I682656 B TWI682656 B TW I682656B TW 107125332 A TW107125332 A TW 107125332A TW 107125332 A TW107125332 A TW 107125332A TW I682656 B TWI682656 B TW I682656B
Authority
TW
Taiwan
Prior art keywords
server
electronic device
data
key
type
Prior art date
Application number
TW107125332A
Other languages
Chinese (zh)
Other versions
TW202008746A (en
Inventor
陳明宗
Original Assignee
陳明宗
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 陳明宗 filed Critical 陳明宗
Priority to TW107125332A priority Critical patent/TWI682656B/en
Application granted granted Critical
Publication of TWI682656B publication Critical patent/TWI682656B/en
Publication of TW202008746A publication Critical patent/TW202008746A/en

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

A communication system is provided in the present disclosure. The communication system includes a server, and a first electronic device including a first predetermined device key. When the first electronic device transmits the first type of data, the server verifies whether the first device preset key matches the first device key to determine whether the first electronic device transmits the first type of data to the server. When the first electronic device transmits a second type of data to the server, the first electronic device encrypts and encodes a first time stamp and a second transmission key to generate a first hash value. The first electronic device transmits the first hash value to the server.

Description

利用兩種密鑰的通訊系統 Communication system using two keys

本發明有關於一種通訊系統,尤指一種利用兩種密鑰進行傳輸的通訊系統。 The invention relates to a communication system, especially a communication system that uses two keys for transmission.

由於智能電錶的出現,而使得智能電網能夠逐漸普及,不過現今智能電錶無論是利用有線網路或是無線網路傳輸資料。以無線網路作為主要傳輸方式的智能電網系統,除了電力資料,還有其他電力保護訊號需要傳輸,若是都使用同樣的密鑰進行傳輸,在機密等級不容易區分。 Due to the emergence of smart meters, smart grids can gradually become popular, but today smart meters use either wired or wireless networks to transmit data. In the smart grid system with wireless network as the main transmission method, in addition to power data, there are other power protection signals that need to be transmitted. If they all use the same key for transmission, it is not easy to distinguish at the confidential level.

有鑑於此,提供一個能夠依照不同機密等級資料進行通訊傳輸的通訊系統,實是業界的一個重要課題。 In view of this, it is an important issue in the industry to provide a communication system capable of communicating according to data of different confidential levels.

有鑑於此,本發明實施例提供了一種使用兩種密鑰進行通訊傳輸的通訊系統,包括:一伺服器;以及一第一電子裝置,具有一第一裝置預設密鑰;其中,當所述第一電子裝置發送一第一類型資料至所述伺服器之前,所述第一電子裝置提供對應所述第一類型資料的一第一傳輸要求訊號至所述伺服器,所述伺服器根據所述第一傳輸要求訊號產生一第一裝置密鑰,所述伺服器根據所述第一傳輸要求訊號,提供一第一驗證要求訊號至所述第一電子裝置,所述第一電子裝置根據所述第一驗證要求訊號傳送所述第一裝置預設密鑰至所述伺服器,所述伺服器驗證所述第一裝置預設密鑰是否與第一裝置密鑰相符合,以決定是否同意所述第一電 子裝置傳輸所述第一類型資料至所述伺服器;其中,當所述第一電子裝置發送一第二類型資料至所述伺服器時,所述第一電子裝置對一第一時間戳記以及一第二傳輸密鑰進行加密編碼,以產生一第一加密雜湊值,所述第一電子裝置傳送所述第一加密雜湊值至所述伺服器。 In view of this, embodiments of the present invention provide a communication system that uses two keys for communication transmission, including: a server; and a first electronic device with a first device preset key; Before the first electronic device sends a first type of data to the server, the first electronic device provides a first transmission request signal corresponding to the first type of data to the server, the server according to The first transmission request signal generates a first device key, and the server provides a first verification request signal to the first electronic device according to the first transmission request signal, and the first electronic device The first verification request signal transmits the first device preset key to the server, and the server verifies whether the first device preset key matches the first device key to determine whether Agree with the first electricity The sub-device transmits the first type of data to the server; wherein, when the first electronic device sends a second type of data to the server, the first electronic device sends a first timestamp and A second transmission key is encrypted and encoded to generate a first encrypted hash value, and the first electronic device transmits the first encrypted hash value to the server.

其中,在所述第一電子裝置發送所述第二類型資料至所述伺服器前,所述第一電子裝置提供對應所述第二類型資料的一第二傳輸要求訊號至所述伺服器,所述伺服器根據所述第二傳輸要求訊號,產生所述第二傳輸密鑰,所述伺服器將所述伺服器產生的所述第二傳輸密鑰傳送至所述第一電子裝置。 Before the first electronic device sends the second type of data to the server, the first electronic device provides a second transmission request signal corresponding to the second type of data to the server, The server generates the second transmission key according to the second transmission request signal, and the server transmits the second transmission key generated by the server to the first electronic device.

其中,所述伺服器根據一第二時間戳記以及所述第二傳輸密鑰,產生一第二加密雜湊值,所述伺服器比對所述第一加密雜湊值以及所述第二加密雜湊值,以決定是否同意所述第一電子裝置傳輸所述第二類型資料至所述伺服器。 Wherein, the server generates a second encrypted hash value based on a second time stamp and the second transmission key, and the server compares the first encrypted hash value and the second encrypted hash value To decide whether to allow the first electronic device to transmit the second type of data to the server.

其中,所述第一類型資料的機密等級比所述第二類型資料的機密等級為高。 Wherein, the confidentiality level of the first type data is higher than that of the second type data.

其中,所述第一時間戳記以及所述第二時間戳記的一時間差小於一預定時間。 Wherein, a time difference between the first time stamp and the second time stamp is less than a predetermined time.

其中,所述第一時間戳記與所述第二時間戳記相同。 The first time stamp is the same as the second time stamp.

其中,當所述第一電子裝置發送一另一第一類型資料至所述伺服器之前,所述第一電子裝置提供對應所述第一類型資料的一另一第一傳輸要求訊號至所述伺服器,所述伺服器根據所述第一傳輸要求訊號產生一另一第一裝置密鑰,所述伺服器根據所述另一第一傳輸要求訊號提供一第一驗證要求訊號至所述第一電子裝置,所述第一電子裝置根據所述第一驗證要求訊號傳送所述第一裝置預設密鑰至所述伺服器,所述伺服器驗證所述第一裝置預設密鑰是否與所述另一第一裝置密鑰相符合,以決定是否同意所述第一電子裝置傳輸所述第一類型資料至所述伺服器。 Wherein, before the first electronic device sends another first type data to the server, the first electronic device provides another first transmission request signal corresponding to the first type data to the server A server, the server generates another first device key according to the first transmission request signal, and the server provides a first verification request signal to the first according to the other first transmission request signal An electronic device, the first electronic device transmits the first device preset key to the server according to the first verification request signal, the server verifies whether the first device preset key is The key of the other first device matches to determine whether to approve the first electronic device to transmit the first type of data to the server.

其中,所述第一電子裝置是利用藍牙通訊協定4.0或是藍牙通訊協定5.0與所述伺服器進行通訊。 Wherein, the first electronic device uses Bluetooth communication protocol 4.0 or Bluetooth communication protocol 5.0 to communicate with the server.

其中,所述通訊系統還包括:一第二電子裝置;所述第一電子裝置以及所述第二電子裝置是以藍牙通訊協定4.0或是藍牙通訊協定5.0與所述伺服器以及所述第二電子裝置進行通訊,所述第二電子裝置是利用藍牙通訊協定4.0或是藍牙通訊協定5.0與所述第一電子裝置以及所述伺服器進行通訊。 Wherein, the communication system further includes: a second electronic device; the first electronic device and the second electronic device are based on Bluetooth communication protocol 4.0 or Bluetooth communication protocol 5.0 with the server and the second The electronic device communicates, and the second electronic device uses Bluetooth communication protocol 4.0 or Bluetooth communication protocol 5.0 to communicate with the first electronic device and the server.

有鑑於此,本發明實施例提供了一種利用兩種密鑰的通訊方法,包括:傳送對應一第一類型資料的一第一傳輸要求訊號;提供一第一驗證訊號;根據所述第一驗證訊號,提供一第一裝置預設密鑰;以及驗證是否所述第一裝置預設密鑰與一第一裝置密鑰相符合,以決定是否同意傳送所述第一類型資料。 In view of this, an embodiment of the present invention provides a communication method using two keys, including: transmitting a first transmission request signal corresponding to a first type of data; providing a first verification signal; based on the first verification The signal provides a first device preset key; and verifies whether the first device preset key matches a first device key to decide whether to agree to send the first type of data.

其中,所述通訊方法還包括:傳送對應一第二類型資料的一第二傳輸要求訊號;根據所述第二傳輸要求訊號,產生一第二傳輸密鑰;回傳所述第二傳輸密鑰;根據所述第二傳輸密鑰以及一第一時間戳記產生一第一加密雜湊值;根據所述第二傳輸密鑰以及一第二時間戳記產生一第二加密雜湊值;比對所述第一加密雜湊值以及所述第二加密雜湊值,產生一比對結果;以及根據所述比對結果,決定是否同意傳送所述第二類型資料。 Wherein, the communication method further includes: transmitting a second transmission request signal corresponding to a second type of data; generating a second transmission key according to the second transmission request signal; returning the second transmission key Generating a first encrypted hash value based on the second transmission key and a first time stamp; generating a second encrypted hash value based on the second transmission key and a second time stamp; comparing the first An encrypted hash value and the second encrypted hash value generate a comparison result; and based on the comparison result, decide whether to agree to send the second type of data.

綜上所述,本發明實施例的通訊系統,是利用兩種不同密鑰進行不同類型資料的傳輸,除了針對不同機密等級的資料進行不同加密等級的通訊傳輸,更由於本發明利用的兩種密鑰,僅限當次資料傳輸使用,更使本發明通訊方法的保密等級有所提升。 In summary, the communication system according to the embodiment of the present invention uses two different keys for different types of data transmission. In addition to different encryption levels of data transmission for different confidential levels of data, it is also due to the two The key is only used for the current data transmission, which further improves the security level of the communication method of the present invention.

1‧‧‧通訊系統 1‧‧‧Communication system

10‧‧‧伺服器 10‧‧‧Server

11‧‧‧第一電子裝置 11‧‧‧ First electronic device

12‧‧‧第二電子裝置 12‧‧‧Second electronic device

S100-S105、S200-S207‧‧‧步驟 S100-S105, S200-S207

圖1是本發明實施例的通訊系統的示意圖。 FIG. 1 is a schematic diagram of a communication system according to an embodiment of the invention.

圖2是本發明實施例的第一電子裝置與伺服器利用第一裝置密鑰 進行通訊的示意圖。 FIG. 2 is the first electronic device and the server using the first device key according to an embodiment of the invention Schematic diagram of communication.

圖3是本發明實施例的第一電子裝置與伺服器利用第二傳輸密鑰進行通訊的示意圖。 3 is a schematic diagram of a first electronic device and a server communicating with a second transmission key according to an embodiment of the invention.

以下是通過特定的具體實施例來說明本發明所公開有關“生理檢測裝置”的實施方式,熟悉本領域的技術人員可由本說明書所公開的內容輕易地瞭解本發明的優點與效果。本發明可通過其他不同的具體實施例加以施行或應用,本說明書中的各項細節也可基於不同觀點與應用,在不悖離本發明的精神下進行各種修飾與變更。另外,本發明的附圖僅為簡單示意說明,並非依實際尺寸的描繪,予以聲明。應理解,雖然本文中可能使用術語第一、第二、第三等來描述各種元件等,但這些元件不應受這些術語限制。這些術語乃用以區分一元件與另一元件。另外,有提及數量或其類似者,除非另作說明,否則本發明的應用範疇應不受其數量或其類似者之限制。以下的實施方式將進一步詳細說明本發明的相關技術內容,但所公開的內容並非用以限制本發明的技術範圍。 The following are specific specific examples to illustrate the implementation of the "physiological detection device" disclosed in the present invention. Those skilled in the art can easily understand the advantages and effects of the present invention from the content disclosed in this specification. The present invention can be implemented or applied through other different specific embodiments. Various details in this specification can also be based on different viewpoints and applications, and various modifications and changes can be made without departing from the spirit of the present invention. In addition, the drawings of the present invention are merely schematic illustrations, and are not depicted according to actual dimensions. It should be understood that although the terms first, second, third, etc. may be used herein to describe various elements and the like, these elements should not be limited by these terms. These terms are used to distinguish one element from another. In addition, there are mentioned quantities or the like, and unless otherwise stated, the application scope of the present invention should not be limited by the quantity or the like. The following embodiments will further describe the related technical content of the present invention in detail, but the disclosed content is not intended to limit the technical scope of the present invention.

【本發明通訊系統的實施例】 [The embodiment of the communication system of the present invention]

請參照圖1、圖2以及圖3,圖1是本發明實施例的通訊系統的示意圖。圖2是本發明實施例的第一電子裝置與伺服器利用第一裝置密鑰進行通訊的示意圖。圖3是本發明實施例的第一電子裝置與伺服器利用第二傳輸密鑰進行通訊的示意圖。 Please refer to FIG. 1, FIG. 2 and FIG. 3. FIG. 1 is a schematic diagram of a communication system according to an embodiment of the present invention. 2 is a schematic diagram of the first electronic device and the server communicating with the first device key according to an embodiment of the present invention. 3 is a schematic diagram of a first electronic device and a server communicating with a second transmission key according to an embodiment of the invention.

請參照圖1,在本實施例中,通訊系統1包括一伺服器10、一第一電子裝置11、以及一第二電子裝置12。 Please refer to FIG. 1. In this embodiment, the communication system 1 includes a server 10, a first electronic device 11, and a second electronic device 12.

第一電子裝置11以及第二電子裝置12分別與伺服器10以一第一通訊協定進行通訊。第一電子裝置11與第二電子裝置12是 以第二通訊協定進行通訊。在本實施例中,通訊系統1可以適用於一智能電網系統中。 The first electronic device 11 and the second electronic device 12 communicate with the server 10 according to a first communication protocol. The first electronic device 11 and the second electronic device 12 are Communicate with the second communication protocol. In this embodiment, the communication system 1 can be applied to a smart grid system.

在本實施例中,第一電子裝置11以及第二電子裝置12分別是一藍牙通訊裝置。第一電子裝置11、第二電子裝置12可以分別設置在不同的智能電錶或是智能電網的不同電力迴路控制開關中,在本發明中不做限制。 In this embodiment, the first electronic device 11 and the second electronic device 12 are respectively a Bluetooth communication device. The first electronic device 11 and the second electronic device 12 may be respectively installed in different smart circuit meters or different power circuit control switches of the smart grid, which is not limited in the present invention.

此外,第一電子裝置11、第二電子裝置12的數量可以根據實際需求進行調整,也就是,通訊系統1可以通訊連接的電子裝置數量,可以根據實際需求進行調整、設計,在本發明中不做限制。 In addition, the numbers of the first electronic device 11 and the second electronic device 12 can be adjusted according to actual needs, that is, the number of electronic devices that the communication system 1 can communicate with can be adjusted and designed according to actual needs. Do restrictions.

在本實施例中,第一通訊協定包括:一藍牙通訊協定4.0、一藍牙通訊協定5.0、一無線保真通訊協定(Wifi)、一LoRa通訊協定、一Sigfox通訊協定、一第四代移動通訊技術通訊協定(4G)或是一第五代移動通訊技術通訊協定(5G),可以根據實際需求進行調整、設計,在本發明中,不做限制。第二通訊協定包括一藍牙通訊協定4.0、一藍牙通訊協定5.0、一無線保真通訊協定(Wifi)、一LoRa通訊協定、一Sigfox通訊協定、一第四代移動通訊技術通訊協定(4G)或是一第五代移動通訊技術通訊協定(5G),可以根據實際需求進行調整、設計,在本發明中,不做限制。 In this embodiment, the first communication protocol includes: a Bluetooth communication protocol 4.0, a Bluetooth communication protocol 5.0, a wireless fidelity communication protocol (Wifi), a LoRa communication protocol, a Sigfox communication protocol, and a fourth generation mobile communication The technology communication protocol (4G) or a fifth-generation mobile communication technology communication protocol (5G) can be adjusted and designed according to actual needs. In the present invention, there is no limitation. The second communication protocol includes a Bluetooth communication protocol 4.0, a Bluetooth communication protocol 5.0, a wireless fidelity communication protocol (Wifi), a LoRa communication protocol, a Sigfox communication protocol, a fourth generation mobile communication technology communication protocol (4G) or It is a fifth-generation mobile communication technology communication protocol (5G), which can be adjusted and designed according to actual needs. In the present invention, there is no limitation.

在本實施例中,第一電子裝置11、第二電子裝置12分別是以藍牙通訊協定與伺服器10進行通訊。 In this embodiment, the first electronic device 11 and the second electronic device 12 communicate with the server 10 using the Bluetooth communication protocol, respectively.

其中,第一電子裝置具有一第一裝置預設密鑰,第一電子裝置11與伺服器10傳輸第一類型資料的通訊方法包括下列步驟: The first electronic device has a first device preset key, and the communication method between the first electronic device 11 and the server 10 to transmit the first type of data includes the following steps:

提供一第一傳輸要求訊號(步驟S100);提供一驗證要求訊號(步驟S101);根據第一傳輸要求訊號,產生一第一裝置密鑰(步驟S102);根據驗證要求訊號,提供第一裝置預設密鑰至伺服器(步驟S103);校驗第一裝置預設密鑰與第一裝置密鑰是否相符合(步驟S104);提供一校驗結果,以決定第一電子裝置是否傳輸第一類型資料(步驟S105)。 Provide a first transmission request signal (step S100); provide a verification request signal (step S101); generate a first device key based on the first transmission request signal (step S102); provide a first device based on the verification request signal Preset key to the server (step S103); verify that the first device preset key is consistent with the first device key (step S104); provide a verification result to determine whether the first electronic device transmits the first key One type of material (step S105).

在本實施例中,第一電子裝置11在傳輸資料之前,會先檢測資料類型,也就是第一電子裝置11會在傳輸第一類型資料或第二類型資料之前,首先會檢測第一類型資料或第二類型資料適合利用哪一種密鑰、傳輸方式進行傳輸,也就是,在本實施例中,會根據資料的機密等級分類進行密鑰的選擇。 In this embodiment, the first electronic device 11 will first detect the data type before transmitting the data, that is, the first electronic device 11 will first detect the first type of data before transmitting the first type data or the second type data Or which key and transmission method is suitable for the second type of data to be transmitted, that is, in this embodiment, the key is selected according to the classification of the confidentiality of the data.

在步驟S100中,第一電子裝置11在傳輸第一類型資料之前,會先提供對應第一類型資料的一第一傳輸要求訊號至伺服器10。而後,伺服器10則會執行如步驟S101中所述的,伺服器10根據第一傳輸要求訊號,提供一驗證要求訊號至第一電子裝置11。 In step S100, before transmitting the first type of data, the first electronic device 11 first provides a first transmission request signal corresponding to the first type of data to the server 10. Then, the server 10 executes as described in step S101, and the server 10 provides a verification request signal to the first electronic device 11 according to the first transmission request signal.

在步驟S102中,伺服器10會根據第一傳輸要求訊號,產生對應一第一裝置密鑰。 In step S102, the server 10 generates a corresponding first device key according to the first transmission request signal.

在步驟S103中,第一電子裝置11會根據驗證要求訊號提供第一裝置預設密鑰至伺服器10。在本實施例中,第一裝置預設密鑰儲存在第一電子裝置11中,而且第一裝置預設密碼是被隔離儲存,無法輕易被更改。 In step S103, the first electronic device 11 provides the first device default key to the server 10 according to the verification request signal. In this embodiment, the first device preset key is stored in the first electronic device 11, and the first device preset password is stored in isolation and cannot be easily changed.

在步驟S104,伺服器10會對第一電子裝置11傳送的第一裝置預設密鑰與伺服器10根據第一傳輸要求訊號而產生的第一裝置密鑰進行校驗,以確認第一裝置預設密鑰與第一裝置密鑰是否相符合,並且產生一校驗結果。 In step S104, the server 10 verifies the first device preset key sent by the first electronic device 11 and the first device key generated by the server 10 according to the first transmission request signal to confirm the first device Whether the preset key is consistent with the first device key, and generates a verification result.

在步驟S105中,伺服器10會提供一校驗結果至第一電子裝置11,以決定第一電子裝置11是否傳輸第一類型資料。若校驗結果為相符合,則第一電子裝置11開始傳輸第一類型資料,若校驗結果為不相符,則第一電子裝置11則不傳輸第一類型資料。在本實施例中,第一類型資料是具有較高機密等級的資料。 In step S105, the server 10 provides a verification result to the first electronic device 11 to determine whether the first electronic device 11 transmits the first type of data. If the verification result is consistent, the first electronic device 11 starts to transmit the first type of data. If the verification result is not consistent, the first electronic device 11 does not transmit the first type of data. In this embodiment, the first type of data is data with a higher level of confidentiality.

在本實施例中,當第一電子裝置11發送一另一第一類型資料至伺服器10之前,第一電子裝置11提供對應另一第一類型資料的一另一第一傳輸要求訊號至伺服器10,伺服器10根據另一第一傳輸要求訊號產生一另一第一裝置密鑰,伺服器10根據另一第一 傳輸要求訊號提供一第一驗證要求訊號至第一電子裝置11,第一電子裝置11根據第一驗證要求訊號傳送第一裝置預設密鑰至伺服器10,伺服器10校驗第一裝置預設密鑰是否與所述另一第一裝置密鑰相符合,以決定第一電子裝置是否傳輸第一類型資料至伺服器10。 In this embodiment, before the first electronic device 11 sends another first type data to the server 10, the first electronic device 11 provides another first transmission request signal corresponding to the other first type data to the servo Server 10, the server 10 generates another first device key based on another first transmission request signal, and the server 10 generates another key according to another first The transmission request signal provides a first verification request signal to the first electronic device 11, and the first electronic device 11 sends the first device preset key to the server 10 according to the first verification request signal, and the server 10 verifies the first device It is determined whether the key matches the key of the other first device to determine whether the first electronic device transmits the first type of data to the server 10.

請參照圖3,第一電子裝置11與伺服器10傳輸第二類型資料的通訊方法包括下列步驟: Referring to FIG. 3, the communication method for the first electronic device 11 and the server 10 to transmit the second type of data includes the following steps:

提供一第二傳輸要求訊號(步驟S200);產生一第二傳輸密鑰(步驟S201);提供第二傳輸密鑰至第一電子裝置(步驟S202);根據第一時間戳記與第二傳輸密鑰產生一第一加密雜湊值(步驟S203);提供第一加密雜湊值至伺服器(步驟S204);根據一第二時間戳記與第二傳輸密鑰,產生一第二加密雜湊值(步驟S205);比對第一加密雜湊值以及第二加密雜湊值(步驟S206);以及提供一比對結果至第一電子裝置,決定第一電子裝置是否傳輸第二類型資料(步驟S207)。 Provide a second transmission request signal (step S200); generate a second transmission key (step S201); provide a second transmission key to the first electronic device (step S202); according to the first time stamp and the second transmission password The key generates a first encrypted hash value (step S203); provides the first encrypted hash value to the server (step S204); generates a second encrypted hash value based on a second time stamp and a second transmission key (step S205) ); compare the first encrypted hash value and the second encrypted hash value (step S206); and provide a comparison result to the first electronic device to determine whether the first electronic device transmits the second type of data (step S207).

在本實施例中,第一電子裝置11在傳輸資料之前,會先檢測資料類型,也就是第一電子裝置11會在傳輸第一類型資料或第二類型資料之前,首先會檢測第一類型資料或第二類型資料適合利用哪一種密鑰、傳輸方式進行傳輸,也就是,在本實施例中,會根據資料的機密等級分類進行密鑰的選擇。 In this embodiment, the first electronic device 11 will first detect the data type before transmitting the data, that is, the first electronic device 11 will first detect the first type of data before transmitting the first type data or the second type data Or which key and transmission method is suitable for the second type of data to be transmitted, that is, in this embodiment, the key is selected according to the classification of the confidentiality of the data.

在步驟S200中,第一電子裝置11在傳輸第二類型資料之前,會先提供對應第二類型的一第二傳輸要求訊號至伺服器10。 In step S200, before transmitting the second type of data, the first electronic device 11 first provides a second transmission request signal corresponding to the second type to the server 10.

在步驟S201中,伺服器10會根據第二傳輸要求訊號,產生一第二傳輸密鑰,在本實施例中,第二傳輸密鑰是一次性密鑰,也就是僅限此次傳輸要求可以使用。在別次傳輸要求,則需要一新的第二傳輸密鑰。 In step S201, the server 10 generates a second transmission key according to the second transmission request signal. In this embodiment, the second transmission key is a one-time key, that is, only the current transmission request can use. In other transmission requirements, a new second transmission key is required.

在步驟S202中,伺服器10會提供對應第二傳輸要求訊號的第二傳輸密鑰至第一電子裝置11。 In step S202, the server 10 provides a second transmission key corresponding to the second transmission request signal to the first electronic device 11.

在步驟S203中,第一電子裝置11會根據第一時間戳記與第二傳輸密鑰產生一第一加密雜湊值。 In step S203, the first electronic device 11 generates a first encrypted hash value according to the first time stamp and the second transmission key.

在步驟S204中,第一電子裝置11會提供第一加密雜湊值至伺服器10。 In step S204, the first electronic device 11 provides the first encrypted hash value to the server 10.

在步驟S205中,伺服器10根據一第二時間戳記與第二傳輸密鑰,產生一第二加密雜湊值。在本實施例中,在步驟S203以及步驟S205中的第一加密雜湊值以及第二加密雜湊值,是利用第二傳輸密鑰以及不同的時間戳記進行雜湊運算而得到的。 In step S205, the server 10 generates a second encrypted hash value based on a second time stamp and a second transmission key. In this embodiment, the first encrypted hash value and the second encrypted hash value in step S203 and step S205 are obtained by performing a hash operation using the second transmission key and different time stamps.

在步驟S206中,伺服器10會比對第一加密雜湊值以及第二加密雜湊值是否相符,以產生一比對結果。 In step S206, the server 10 compares whether the first encrypted hash value and the second encrypted hash value match to generate a comparison result.

在步驟207中,伺服器10會提供比對結果至第一電子裝置11,以決定第一電子裝置11是否傳輸第二類型資料。其中,若比對結果是相符合的,則第一電子裝置11進行第二類型資料的傳輸,若比對結果是不相符的,則第一電子裝置11就不會進行第二類型資料的傳輸。 In step 207, the server 10 provides the comparison result to the first electronic device 11 to determine whether the first electronic device 11 transmits the second type of data. If the comparison result is consistent, the first electronic device 11 transmits the second type of data. If the comparison result is not consistent, the first electronic device 11 will not perform the second type of data transmission. .

在本實施例中,第一時間戳記以及第二時間戳記的一時間差小於一預定時間。其中,預定時間例如是5秒或是10秒。在其他實施例中,第一時間戳記與第二時間戳記也可以是相同的時間。 In this embodiment, a time difference between the first time stamp and the second time stamp is less than a predetermined time. The predetermined time is, for example, 5 seconds or 10 seconds. In other embodiments, the first time stamp and the second time stamp may also be the same time.

在本實施例中,第一類型資料的機密等級比第二類型資料的機密等級為高。也就是,第一類型資料可以是電力使用資料,而第二類型資料可以是通知訊號、警告訊號或是其他保護訊號,在本發明中不做限制。 In this embodiment, the confidentiality level of the first type data is higher than that of the second type data. That is, the first type of data may be power usage data, and the second type of data may be notification signals, warning signals, or other protection signals, which are not limited in the present invention.

綜上所述,本發明實施例的通訊系統,是利用兩種不同密鑰進行不同類型資料的傳輸,除了針對不同機密等級的資料進行不同加密等級的通訊傳輸,更由於本發明利用的兩種密鑰,僅限當次資料傳輸使用,更使本發明通訊方法的保密等級有所提升。 In summary, the communication system according to the embodiment of the present invention uses two different keys for different types of data transmission. In addition to different encryption levels of data transmission for different confidential levels of data, it is also due to the two The key is only used for the current data transmission, which further improves the security level of the communication method of the present invention.

以上所述僅為本發明之較佳實施例,非意欲侷限本發明的專利保護範圍,故舉凡運用本發明說明書及圖式內容所為的等效變 化,均同理皆包含於本發明的權利保護範圍內,合予陳明。 The above are only the preferred embodiments of the present invention, and are not intended to limit the scope of patent protection of the present invention, so the equivalent changes in the description and drawings of the present invention are used. Both of them are included in the scope of protection of the rights of the present invention, and are given to Chen Ming.

1‧‧‧通訊系統 1‧‧‧Communication system

10‧‧‧伺服器 10‧‧‧Server

11‧‧‧第一電子裝置 11‧‧‧ First electronic device

12‧‧‧第二電子裝置 12‧‧‧Second electronic device

Claims (9)

一種適用於一電力系統的使用兩種密鑰進行通訊傳輸的通訊系統,包括:一伺服器;以及一第一電子裝置,具有一第一裝置預設密鑰;其中,當所述第一電子裝置發送一第一類型資料至所述伺服器之前,所述第一電子裝置提供對應所述第一類型資料的一第一傳輸要求訊號至所述伺服器,所述伺服器根據所述第一傳輸要求訊號產生一第一裝置密鑰,所述伺服器根據所述第一傳輸要求訊號,提供一第一驗證要求訊號至所述第一電子裝置,所述第一電子裝置根據所述第一驗證要求訊號傳送所述第一裝置預設密鑰至所述伺服器,所述伺服器驗證所述第一裝置預設密鑰是否與第一裝置密鑰相符合,以決定是否同意所述第一電子裝置傳輸所述第一類型資料至所述伺服器;其中,當所述第一電子裝置發送一第二類型資料至所述伺服器時,所述第一電子裝置對一第一時間戳記以及一傳輸密鑰進行加密編碼,以產生一第一加密雜湊值,所述第一電子裝置傳送所述第一加密雜湊值至所述伺服器。 A communication system suitable for an electric power system using two types of keys for communication transmission includes: a server; and a first electronic device having a first device preset key; wherein, when the first electronic Before the device sends a first type of data to the server, the first electronic device provides a first transmission request signal corresponding to the first type of data to the server, the server according to the first The transmission request signal generates a first device key, and the server provides a first verification request signal to the first electronic device according to the first transmission request signal, and the first electronic device according to the first The verification request signal transmits the first device preset key to the server, and the server verifies whether the first device preset key matches the first device key to decide whether to agree to the first An electronic device transmits the first type of data to the server; wherein, when the first electronic device sends a second type of data to the server, the first electronic device pairs a first time stamp And a transmission key is encrypted and encoded to generate a first encrypted hash value, and the first electronic device transmits the first encrypted hash value to the server. 如申請專利範圍第1項的通訊系統,其中,在所述第一電子裝置發送所述第二類型資料至所述伺服器前,所述第一電子裝置提供對應所述第二類型資料的一第二傳輸要求訊號至所述伺服器,所述伺服器根據所述第二傳輸要求訊號,產生所述傳輸密鑰,所述伺服器將所述伺服器產生的所述傳輸密鑰傳送至所述第一電子裝置。 A communication system as claimed in item 1 of the patent scope, wherein, before the first electronic device sends the second type of data to the server, the first electronic device provides a corresponding to the second type of data A second transmission request signal to the server, the server generates the transmission key according to the second transmission request signal, and the server transmits the transmission key generated by the server to the server The first electronic device is described. 如申請專利範圍第2項的通訊系統,其中,所述伺服器根據一第二時間戳記以及所述傳輸密鑰,產生一第二加密雜湊值,所述伺服器比對所述第一加密雜湊值以及所述第二加密雜湊值,以決定是否同意所述第一電子裝置傳輸所述第二類型資料至所 述伺服器。 A communication system as claimed in item 2 of the patent scope, wherein the server generates a second encrypted hash value based on a second time stamp and the transmission key, and the server compares the first encrypted hash Value and the second encrypted hash value to determine whether to allow the first electronic device to transmit the second type of data to all Describe the server. 如申請專利範圍第1項的通訊系統,其中,所述第一類型資料的機密等級比所述第二類型資料的機密等級為高。 For example, in the communication system of claim 1, the confidentiality level of the first type of data is higher than that of the second type of data. 如申請專利範圍第3項的通訊系統,其中,所述第一時間戳記以及所述第二時間戳記的一時間差小於一預定時間。 For example, in the communication system of claim 3, wherein a time difference between the first time stamp and the second time stamp is less than a predetermined time. 如申請專利範圍第3項的通訊系統,其中,所述第一時間戳記與所述第二時間戳記相同。 For example, in the communication system of claim 3, the first time stamp is the same as the second time stamp. 如申請專利範圍第1項的通訊系統,其中,所述第一電子裝置是利用藍牙通訊協定4.0或是藍牙通訊協定5.0與所述伺服器進行通訊。 For example, in the communication system of claim 1, the first electronic device uses Bluetooth communication protocol 4.0 or Bluetooth communication protocol 5.0 to communicate with the server. 如申請專利範圍第1項的通訊系統,還包括:一第二電子裝置;其中,所述第一電子裝置以及所述第二電子裝置是以藍牙通訊協定4.0或是藍牙通訊協定5.0與所述伺服器以及所述第二電子裝置進行通訊,所述第二電子裝置是利用藍牙通訊協定4.0或是藍牙通訊協定5.0與所述第一電子裝置以及所述伺服器進行通訊。 For example, the communication system of claim 1 of the patent scope further includes: a second electronic device; wherein, the first electronic device and the second electronic device are based on Bluetooth communication protocol 4.0 or Bluetooth communication protocol 5.0 and the The server communicates with the second electronic device, and the second electronic device communicates with the first electronic device and the server using Bluetooth communication protocol 4.0 or Bluetooth communication protocol 5.0. 一種適用於一電力系統的利用兩種密鑰的通訊方法,包括:傳送對應一第一類型資料的一第一傳輸要求訊號;提供一第一驗證訊號;根據所述第一驗證訊號,提供一第一裝置預設密鑰;驗證是否所述第一裝置預設密鑰與一第一裝置密鑰相符合,以決定是否同意傳送所述第一類型資料;傳送對應一第二類型資料的一第二傳輸要求訊號;根據所述第二傳輸要求訊號,產生一傳輸密鑰;回傳所述傳輸密鑰;根據所述傳輸密鑰以及一第一時間戳記產生一第一加密雜湊值; 根據所述傳輸密鑰以及一第二時間戳記產生一第二加密雜湊值;比對所述第一加密雜湊值以及所述第二加密雜湊值,產生一比對結果;以及根據所述比對結果,決定是否同意傳送所述類型資料。 A communication method using two keys suitable for an electric power system includes: transmitting a first transmission request signal corresponding to a first type of data; providing a first verification signal; according to the first verification signal, providing a The first device preset key; verify whether the first device preset key matches a first device key to determine whether to agree to send the first type of data; send a corresponding to a second type of data A second transmission request signal; generating a transmission key according to the second transmission request signal; returning the transmission key; generating a first encrypted hash value according to the transmission key and a first time stamp; Generating a second encrypted hash value based on the transmission key and a second time stamp; comparing the first encrypted hash value and the second encrypted hash value to generate a comparison result; and based on the comparison As a result, it is decided whether to agree to the transmission of the said type of material.
TW107125332A 2018-07-23 2018-07-23 Communication system using two kinds of keys TWI682656B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW107125332A TWI682656B (en) 2018-07-23 2018-07-23 Communication system using two kinds of keys

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW107125332A TWI682656B (en) 2018-07-23 2018-07-23 Communication system using two kinds of keys

Publications (2)

Publication Number Publication Date
TWI682656B true TWI682656B (en) 2020-01-11
TW202008746A TW202008746A (en) 2020-02-16

Family

ID=69942522

Family Applications (1)

Application Number Title Priority Date Filing Date
TW107125332A TWI682656B (en) 2018-07-23 2018-07-23 Communication system using two kinds of keys

Country Status (1)

Country Link
TW (1) TWI682656B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030210789A1 (en) * 2002-01-17 2003-11-13 Kabushiki Kaisha Toshiba Data transmission links
US20090204806A1 (en) * 2006-07-03 2009-08-13 Kouichi Kanemura Certifying device, verifying device, verifying system, computer program and integrated circuit
CN101599835A (en) * 2009-07-14 2009-12-09 北京坚石诚信科技有限公司 Signature device and method for executing operating instructions thereof
US20140129834A1 (en) * 2012-11-02 2014-05-08 Jacob Andrew Brill Providing User Authentication

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030210789A1 (en) * 2002-01-17 2003-11-13 Kabushiki Kaisha Toshiba Data transmission links
US20090204806A1 (en) * 2006-07-03 2009-08-13 Kouichi Kanemura Certifying device, verifying device, verifying system, computer program and integrated circuit
CN101599835A (en) * 2009-07-14 2009-12-09 北京坚石诚信科技有限公司 Signature device and method for executing operating instructions thereof
US20140129834A1 (en) * 2012-11-02 2014-05-08 Jacob Andrew Brill Providing User Authentication

Also Published As

Publication number Publication date
TW202008746A (en) 2020-02-16

Similar Documents

Publication Publication Date Title
CN108235806B (en) Method, device and system for safely accessing block chain, storage medium and electronic equipment
US10075820B2 (en) Secure broadcast beacon communications
CN111343613B (en) Method and apparatus for establishing secure low energy wireless communications in a process control system
CN104094267B (en) Method, apparatus and system for secure sharing of media content from a source device
KR101410764B1 (en) Apparatus and method for remotely deleting important information
KR20180119201A (en) Electronic device for authentication system
US11711205B2 (en) Unified secure device provisioning
CN116671062A (en) Remote management of hardware security modules
KR20210128418A (en) Resource request method, device and storage medium
US11804972B2 (en) Fluid meter communicating with an electromechanical valve
CN114745180B (en) Access authentication method, device and computer equipment
JP3224994U (en) Communication system using two keys
KR101848300B1 (en) METHOD FOR OPERATING COMMUNICATION CLIENT INSTALLED IN IoT DEVICE AND IoT DEVICE INCLUDING THE CLIENT
US12045600B2 (en) Method for upgrading IoT terminal device and electronic device thereof
CN109960935B (en) Method, device and storage medium for determining trusted state of TPM (trusted platform Module)
TWI682656B (en) Communication system using two kinds of keys
CN117294776A (en) Controller trusted data transmission system and method
CN112929871A (en) OTA upgrade package acquisition method, electronic device and storage medium
KR20100043799A (en) Method for moving secret data between mobile terminal based on mobile trusted module
US20220368522A1 (en) Bluetooth peripheral and central apparatuses and verification method
KR20240045160A (en) Method and system for providing encrypted and authenticated firmware with root-of-trust based security
KR20190115489A (en) IOT equipment certification system utilizing security technology
KR20190108888A (en) Electronic device and certification method in electronic device
KR102118956B1 (en) System and method for authentication
EP4270873A1 (en) Embedded system support for secure time-aware authentication, acting and sensing devices

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees