CN113992384B - Secret communication method based on fractional Fourier transform order multiplexing - Google Patents
Secret communication method based on fractional Fourier transform order multiplexing Download PDFInfo
- Publication number
- CN113992384B CN113992384B CN202111235700.5A CN202111235700A CN113992384B CN 113992384 B CN113992384 B CN 113992384B CN 202111235700 A CN202111235700 A CN 202111235700A CN 113992384 B CN113992384 B CN 113992384B
- Authority
- CN
- China
- Prior art keywords
- data
- information
- transmission
- time
- communication frame
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000004891 communication Methods 0.000 title claims abstract description 72
- 238000000034 method Methods 0.000 title claims abstract description 21
- 230000005540 biological transmission Effects 0.000 claims abstract description 72
- 238000012544 monitoring process Methods 0.000 claims abstract description 11
- 238000012545 processing Methods 0.000 claims description 20
- 238000004458 analytical method Methods 0.000 claims description 13
- 230000002159 abnormal effect Effects 0.000 claims description 10
- 239000013598 vector Substances 0.000 claims description 9
- 238000006243 chemical reaction Methods 0.000 claims description 7
- 238000001514 detection method Methods 0.000 claims description 5
- 239000000284 extract Substances 0.000 claims description 5
- 230000008676 import Effects 0.000 claims description 4
- 230000006399 behavior Effects 0.000 claims description 3
- 238000004364 calculation method Methods 0.000 claims description 3
- 238000000605 extraction Methods 0.000 claims description 3
- 230000008054 signal transmission Effects 0.000 claims description 3
- 230000009286 beneficial effect Effects 0.000 abstract description 3
- 238000005516 engineering process Methods 0.000 description 4
- 238000010276 construction Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 230000005856 abnormality Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000009365 direct transmission Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
- G06F17/14—Fourier, Walsh or analogous domain transformations, e.g. Laplace, Hilbert, Karhunen-Loeve, transforms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Computational Mathematics (AREA)
- Pure & Applied Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Theoretical Computer Science (AREA)
- Algebra (AREA)
- Databases & Information Systems (AREA)
- Software Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
技术领域Technical field
本发明涉及通信技术领域,尤其涉及一种基于分数阶傅里叶变换阶次复用的保密通信方法。The present invention relates to the field of communication technology, and in particular to a secure communication method based on fractional Fourier transform order multiplexing.
背景技术Background technique
保密通信是研究通信中信息保密技术的科学,能信学科的分支,其具体是指采取了保密措施的通信,除采用暗号、隐语、密码等保密措施外,现代保密通信主要采用信道保密和信息保密,信道保密是采用使窃密者不易截收到信息的通信信道,如采用专用的线路、瞬间通信和无线电扩频通信等,信息保密是对传输的信息用约定的代码密码等方法加以隐蔽再传送出去,随着电子技术的发展,已采用保密机进行保密,其特点是对传输的信息在发送端进行变换加密处理,接收端按相反过程还原信息,使窃密者即使收到信号,也不明信号所代表的内容,数据通信的迅速发展带来了数据失密问题,信息被非法截取和数据库资料被窃的事例经常发生,在日常生活中信用卡密码被盗是常见的例子。数据失密会造成严重后果,所以数据保密成为十分重要的问题;因此,发明出一种基于分数阶傅里叶变换阶次复用的保密通信方法变得尤为重要。Secure communications is the science that studies information security technology in communications, a branch of the science of trust. It specifically refers to communications that adopt security measures. In addition to using secret codes, lingoes, passwords and other security measures, modern secure communications mainly use channel confidentiality and information security. Confidentiality, channel confidentiality is the use of communication channels that make it difficult for eavesdroppers to intercept information, such as the use of dedicated lines, instantaneous communication and radio spread spectrum communication, etc. Information confidentiality is the use of agreed codes and passwords to conceal the transmitted information. With the development of electronic technology, secret machines have been used for confidentiality. Its characteristic is that the transmitted information is transformed and encrypted at the sending end, and the receiving end restores the information according to the reverse process, so that even if the eavesdropper receives the signal, he will not know it. The content represented by the signal, the rapid development of data communication has brought about the problem of data confidentiality. Instances of illegal interception of information and theft of database data often occur. Stolen credit card passwords are common examples in daily life. Data confidentiality will cause serious consequences, so data confidentiality has become a very important issue; therefore, it is particularly important to invent a secure communication method based on fractional Fourier transform order multiplexing.
经检索,中国专利号CN108768927A公开了保密通信方法和装置,该发明虽然适用于通信带宽较窄且通信双方系统时间有偏差的通信场景,但是无法对用户发送的传输数据进行检测,无法有效的阻止违规信息的传递,无法维护网络环境的安全性以及合法性;此外,现有的基于分数阶傅里叶变换阶次复用的保密通信方法在受到外部人员攻击时,容易造成数据泄露,无法保证数据安全,且无法对攻击来源位置进行定位,不利于维护个人信息安全;为此,我们提出一种基于分数阶傅里叶变换阶次复用的保密通信方法。After searching, Chinese patent number CN108768927A discloses a secure communication method and device. Although this invention is suitable for communication scenarios where the communication bandwidth is narrow and the system times of both communicating parties are deviated, it cannot detect the transmission data sent by the user and cannot effectively prevent it. The transmission of illegal information cannot maintain the security and legality of the network environment; in addition, the existing confidential communication method based on fractional Fourier transform order multiplexing can easily cause data leakage when attacked by external parties, and cannot guarantee The data is secure, and the location of the attack source cannot be located, which is not conducive to maintaining the security of personal information. To this end, we propose a secure communication method based on fractional Fourier transform order multiplexing.
发明内容Contents of the invention
本发明的目的是为了解决现有技术中存在的缺陷,而提出的一种基于分数阶傅里叶变换阶次复用的保密通信方法。The purpose of the present invention is to propose a secure communication method based on fractional Fourier transform order multiplexing in order to solve the defects existing in the prior art.
为了实现上述目的,本发明采用了如下技术方案:In order to achieve the above objects, the present invention adopts the following technical solutions:
一种基于分数阶傅里叶变换阶次复用的保密通信方法,该保密通信方法具体步骤如下:A secure communication method based on fractional Fourier transform order multiplexing. The specific steps of the secure communication method are as follows:
(1)接收传输数据,并记录数据信息:传输模块接收用户发送的传输数据,并收集其相关信息,并对收集到的进行分类处理,同时自行构建加密记录表,并将各组信息进行记录;(1) Receive the transmission data and record the data information: The transmission module receives the transmission data sent by the user, collects its relevant information, and classifies the collected information. At the same time, it builds an encrypted record table by itself and records each group of information. ;
(2)对传输数据进行安全检测:对用户发送的传输数据通过监测、分析并判断传输数据的安全性以及合法性;(2) Security detection of transmitted data: Monitor, analyze and determine the security and legality of the transmitted data sent by users;
(3)对传输数据进行加密处理生成通信帧:对符合传输规则的传输数据进行数据加密,同时将加密完成的传输数据通过数据转换生成通信帧;(3) Encrypt the transmission data to generate a communication frame: Encrypt the transmission data that conforms to the transmission rules, and at the same time convert the encrypted transmission data to generate a communication frame;
(4)实时监测通信安全环境:对通信帧传输环境进行实时监测,并对外部攻击行为进行分析处理,同时对攻击来源进行IP地址定位,并将其反馈给工作人员;(4) Real-time monitoring of the communication security environment: Real-time monitoring of the communication frame transmission environment, analysis and processing of external attack behaviors, while locating the IP address of the source of the attack and feeding it back to the staff;
(5)接收通信帧,并对其进行数据解码:数据接收模块接收通信帧,并将其发送至解密算法模块,解密算法模块利用解密算法对接收到的加密信息进行解密分析,同时将解密后的数据反馈给用户。(5) Receive the communication frame and decode the data: the data receiving module receives the communication frame and sends it to the decryption algorithm module. The decryption algorithm module uses the decryption algorithm to decrypt and analyze the received encrypted information, and at the same time, the decrypted The data is fed back to the user.
进一步地,步骤(1)中所述分类处理具体步骤如下:Further, the specific steps of the classification processing described in step (1) are as follows:
步骤一:对传输数据的数据类型、数据长度以及数据大小进行信息收集,并将其分别录入加密记录表中;Step 1: Collect information on the data type, data length and data size of the transmitted data, and enter them into the encryption record table respectively;
步骤二:对接收到传输数据时的系统时间进行收集,并将其标记为发送时间,同时将其在加密记录表中进行记录。Step 2: Collect the system time when the transmission data is received, mark it as the sending time, and record it in the encrypted record table.
进一步地,步骤(2)中所述监测分析具体步骤如下:Further, the specific steps of monitoring and analysis described in step (2) are as follows:
第一步:对传输数据进行异常排查,若传输数据中存在异常信息,则将其反馈给用户,并停止后续传输过程;Step 1: Check for exceptions in the transmission data. If there is abnormal information in the transmission data, feedback it to the user and stop the subsequent transmission process;
第二步:若传输数据中不存在异常信息,传输模块检测传输数据中是否存在违规信息,若存在,则反馈用户“存在违规信息,无法传输”。Step 2: If there is no abnormal information in the transmitted data, the transmission module detects whether there is illegal information in the transmitted data. If it exists, it will feedback to the user that "there is illegal information and cannot be transmitted."
进一步地,步骤(3)中所述数据加密具体步骤如下:Further, the specific steps of data encryption described in step (3) are as follows:
Ⅰ:构建分数阶傅里叶多路传输复用器,并从加密记录表中提取数据长度,并依据其构建分数阶傅里叶多路传输复用器综合滤波器组;Ⅰ: Construct a fractional-order Fourier multiplexer, extract the data length from the encrypted record table, and construct a comprehensive filter bank for the fractional-order Fourier multiplexer based on it;
Ⅱ:将传输数据导入分数阶傅里叶多路传输复用器综合滤波器组中,并对其进行调制处理生成复用信号;Ⅱ: Import the transmission data into the comprehensive filter bank of the fractional Fourier multiplexer, and modulate it to generate a multiplexed signal;
Ⅲ:从加密记录表中提取发送时间信息,并依据发送时间信息进行时间单元倍数计算,其具体计算公式如下:III: Extract the sending time information from the encrypted record table, and calculate the time unit multiple based on the sending time information. The specific calculation formula is as follows:
Ns=int(Ts/Tu) (1)N s =int(T s /T u ) (1)
其中,Ns代表发送时间单元倍数,Ts代表系统时间,Tu代表设定的时间单元的长度,int()为取整函数;Among them, N s represents the multiple of the sending time unit, T s represents the system time, Tu represents the length of the set time unit, and int() is the rounding function;
Ⅳ:依据计算出的时间单元倍数对复用信号发送时间密钥信息进行确认,并将复用信号通过数据转换处理生成通信帧。IV: Confirm the multiplexed signal transmission time key information based on the calculated time unit multiple, and generate a communication frame through data conversion processing of the multiplexed signal.
进一步地,步骤(4)中所述分析处理具体步骤如下:Further, the specific steps of the analysis and processing described in step (4) are as follows:
S1:当通信帧在传输过程中遭到外部攻击时,启动防火墙对攻击数据进行防御,并通过防火墙对攻击来源IP地址进行确认;S1: When the communication frame is attacked by an external attack during transmission, start the firewall to defend against the attack data, and confirm the attack source IP address through the firewall;
S2:与GPS卫星进行通信连接,并抓取IP地址所在区域图像,同时将抓取到的真实地址反馈给工作人员,同时发送警报信息至相关单位进行处理;S2: Communicate with the GPS satellite and capture the image of the area where the IP address is located. At the same time, the captured real address is fed back to the staff, and alarm information is sent to relevant units for processing;
S3:当防火墙无法阻挡外部数据入侵时,该防火墙会对通信帧进行数据更改或数据销毁处理,避免造成数据泄露,同时将处理信息反馈给工作人员。S3: When the firewall cannot block external data intrusion, the firewall will change or destroy data in the communication frame to avoid data leakage, and at the same time feed back the processing information to the staff.
进一步地,步骤(5)中所述解密分析具体步骤如下:Further, the specific steps of the decryption analysis described in step (5) are as follows:
P1:记录接收到通信帧的时间,并将其记录为接收时间,同时依据接收时间确认发送时间密钥信息;P1: Record the time when the communication frame is received, record it as the reception time, and confirm the sending time key information based on the reception time;
P2:将通信帧导入分数阶傅里叶多路复用器中的分析滤波器组中进行数据转换处理生成输出信号矢量;P2: Import the communication frame into the analysis filter bank in the fractional Fourier multiplexer for data conversion processing to generate an output signal vector;
P3:将各组输出信号矢量通过提取解密转换成输入信号矢量,并依据其进行传输数据恢复,同时将传输数据反馈给用户。P3: Convert each group of output signal vectors into input signal vectors through extraction and decryption, and restore the transmission data based on them, while feeding back the transmission data to the user.
相比于现有技术,本发明的有益效果在于:Compared with the existing technology, the beneficial effects of the present invention are:
1、该基于分数阶傅里叶变换阶次复用的保密通信方法相较于以往直接传输用户数据,该方法在信息传输前,通过安全监测模块对传输数据进行异常排查,若传输数据中存在异常信息,则将其反馈给用户,并停止后续传输过程,若传输数据中不存在异常信息,传输模块检测传输数据中是否存在违规信息,若存在违规信息,则反馈用户“存在违规信息,无法传输”,能够有效的阻止违规信息的传递,提高维护网络环境的安全性以及合法性的效率,同时有利于净化网络环境,保证人们健康上网的需求;1. Compared with the past direct transmission of user data, this secure communication method based on fractional Fourier transform order multiplexing uses a security monitoring module to detect abnormalities in the transmitted data before the information is transmitted. If there are If there is abnormal information, it will be fed back to the user and the subsequent transmission process will be stopped. If there is no abnormal information in the transmission data, the transmission module will detect whether there is any violation information in the transmission data. If there is violation information, it will feed back to the user "There is violation information and cannot "Transmission" can effectively prevent the transmission of illegal information, improve the efficiency of maintaining the security and legality of the network environment, and at the same time help purify the network environment and ensure people's needs for healthy Internet access;
2、该基于分数阶傅里叶变换阶次复用的保密通信方法,传输模块对传输数据检测完成,通过分数阶傅里叶多路传输复用器将传输数据经过数据转换处理生成通信帧进行传输,当通信帧在传输过程中遭到外部攻击时,启动防火墙对攻击数据进行防御,并通过防火墙对攻击来源IP地址进行确认,与GPS卫星进行通信连接,并抓取IP地址所在区域图像,同时将抓取到的真实地址反馈给工作人员,同时发送警报信息至相关单位进行处理,能够保证数据在传输过程中受到外部人员攻击时,降低数据泄露概率,保证数据安全,且能够对攻击来源位置进行定位,有利于维护个人信息安全以及社会治安。2. In this secure communication method based on fractional Fourier transform order multiplexing, the transmission module completes the detection of the transmission data, and the fractional Fourier multiplexer converts the transmission data through data conversion processing to generate a communication frame. Transmission, when the communication frame is attacked by an external attack during the transmission process, the firewall is activated to defend against the attack data, and the IP address of the attack source is confirmed through the firewall, the communication connection is made with the GPS satellite, and the image of the area where the IP address is located is captured. At the same time, the captured real address is fed back to the staff, and alarm information is sent to relevant units for processing. This can ensure that when the data is attacked by external parties during the transmission process, the probability of data leakage is reduced, data security is ensured, and the source of the attack can be identified. Location-based positioning is conducive to maintaining personal information security and social security.
附图说明Description of the drawings
附图用来提供对本发明的进一步理解,并且构成说明书的一部分,与本发明的实施例一起用于解释本发明,并不构成对本发明的限制。The drawings are used to provide a further understanding of the present invention and constitute a part of the specification. They are used to explain the present invention together with the embodiments of the present invention and do not constitute a limitation of the present invention.
图1为本发明提出的一种基于分数阶傅里叶变换阶次复用的保密通信方法的流程框图。Figure 1 is a flow chart of a secure communication method based on fractional Fourier transform order multiplexing proposed by the present invention.
具体实施方式Detailed ways
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, rather than all the embodiments.
在本发明的描述中,需要理解的是,术语“上”、“下”、“前”、“后”、“左”、“右”、“顶”、“底”、“内”、“外”等指示的方位或位置关系为基于附图所示的方位或位置关系,仅是为了便于描述本发明和简化描述,而不是指示或暗示所指的装置或元件必须具有特定的方位、以特定的方位构造和操作,因此不能理解为对本发明的限制。In the description of the present invention, it should be understood that the terms "upper", "lower", "front", "back", "left", "right", "top", "bottom", "inner", " The orientation or positional relationship indicated by "outside" and so on is based on the orientation or positional relationship shown in the drawings. It is only for the convenience of describing the present invention and simplifying the description, and does not indicate or imply that the device or element referred to must have a specific orientation. Specific orientations of construction and operation are therefore not to be construed as limitations of the invention.
实施例1Example 1
参照图1,一种基于分数阶傅里叶变换阶次复用的保密通信方法,本实施例主要公开了一种监测分析方法:Referring to Figure 1, a secure communication method based on fractional Fourier transform order multiplexing. This embodiment mainly discloses a monitoring and analysis method:
接收传输数据,并记录数据信息:传输模块接收用户发送的传输数据,并收集其相关信息,并对收集到的进行分类处理,同时自行构建加密记录表,并将各组信息进行记录。Receive the transmission data and record the data information: The transmission module receives the transmission data sent by the user, collects its related information, and classifies the collected data. At the same time, it builds an encrypted record table by itself and records each group of information.
具体的,首先,传输模块对传输数据的数据类型、数据长度以及数据大小进行信息收集,并将其分别录入加密记录表中,各组信息记录完成,传输模块对接收到传输数据时的系统时间进行收集,并将其标记为发送时间,同时将其在加密记录表中进行记录。Specifically, first, the transmission module collects information on the data type, data length and data size of the transmission data, and enters them into the encrypted record table respectively. After each group of information is recorded, the transmission module collects the system time when the transmission data is received. Collect it, mark it as the time it was sent, and record it in the encrypted record table.
对传输数据进行安全检测:对用户发送的传输数据通过监测、分析并判断传输数据的安全性以及合法性。Security detection of transmitted data: Monitor, analyze and determine the security and legality of transmitted data sent by users.
具体的,在信息传输前,安全监测模块对传输数据进行异常排查,若传输数据中存在异常信息,则将其反馈给用户,并停止后续传输过程,若传输数据中不存在异常信息,传输模块检测传输数据中是否存在违规信息,若存在违规信息,则反馈用户“存在违规信息,无法传输”。Specifically, before information is transmitted, the security monitoring module performs abnormal inspection on the transmitted data. If there is abnormal information in the transmitted data, it will be fed back to the user and the subsequent transmission process will be stopped. If there is no abnormal information in the transmitted data, the transmission module Detect whether there is any illegal information in the transmitted data. If there is illegal information, it will feedback to the user that "there is illegal information and cannot be transmitted".
需要进一步说明的是,异常信息包括病毒数据以及违规数据。It should be further explained that abnormal information includes virus data and violation data.
对传输数据进行加密处理生成通信帧:对符合传输规则的传输数据进行数据加密,同时将加密完成的传输数据通过数据转换生成通信帧。Encrypt the transmission data to generate a communication frame: Encrypt the transmission data that conforms to the transmission rules, and at the same time convert the encrypted transmission data to generate a communication frame.
具体的,首先,传输模块自行构建分数阶傅里叶多路传输复用器,并从加密记录表中提取数据长度,并依据其构建分数阶傅里叶多路传输复用器综合滤波器组,构建完成后,将传输数据导入分数阶傅里叶多路传输复用器综合滤波器组中,并对其进行调制处理生成复用信号,从加密记录表中提取发送时间信息,并依据发送时间信息进行时间单元倍数计算,并依据计算出的时间单元倍数对复用信号发送时间密钥信息进行确认,并将复用信号通过数据转换处理生成通信帧。Specifically, first, the transmission module constructs a fractional-order Fourier multiplexer by itself, extracts the data length from the encrypted record table, and constructs a comprehensive filter bank of the fractional-order Fourier multiplexer based on it. , after the construction is completed, the transmission data is imported into the comprehensive filter bank of the fractional Fourier multiplexer, and modulated to generate a multiplexed signal. The transmission time information is extracted from the encryption record table, and based on the transmission The time information is calculated as a time unit multiple, and the multiplexed signal transmission time key information is confirmed based on the calculated time unit multiple, and the multiplexed signal is processed through data conversion to generate a communication frame.
需要进一步说明的是,其具体时间单元倍数计算公式如下:What needs further explanation is that the specific time unit multiple calculation formula is as follows:
Ns=int(Ts/Tu) (1)N s =int(T s /T u ) (1)
其中,Ns代表发送时间单元倍数,Ts代表系统时间,Tu代表设定的时间单元的长度,int()为取整函数。Among them, N s represents the multiple of the sending time unit, T s represents the system time, Tu represents the length of the set time unit, and int() is the rounding function.
实施例2Example 2
参照图1,一种基于分数阶傅里叶变换阶次复用的保密通信方法,除与上述实施例相同结构外,本实施例主要公开了一种分析处理方法:Referring to Figure 1, a secure communication method based on fractional Fourier transform order multiplexing is shown. In addition to the same structure as the above embodiment, this embodiment mainly discloses an analysis and processing method:
实时监测通信安全环境:对通信帧传输环境进行实时监测,并对外部攻击行为进行分析处理,同时对攻击来源进行IP地址定位,并将其反馈给工作人员。Real-time monitoring of the communication security environment: Real-time monitoring of the communication frame transmission environment, analysis and processing of external attack behaviors, while locating the IP address of the source of the attack and feeding it back to the staff.
具体的,当通信帧在传输过程中遭到外部攻击时,启动防火墙对攻击数据进行防御,并通过防火墙对攻击来源IP地址进行确认,与GPS卫星进行通信连接,并抓取IP地址所在区域图像,同时将抓取到的真实地址反馈给工作人员,同时发送警报信息至相关单位进行处理,当防火墙无法阻挡外部数据入侵时,该防火墙会对通信帧进行数据更改或数据销毁处理,避免造成数据泄露,同时将处理信息反馈给工作人员。Specifically, when the communication frame is attacked by an external attack during transmission, the firewall is activated to defend against the attack data, the IP address of the attack source is confirmed through the firewall, the communication connection is made with the GPS satellite, and the image of the area where the IP address is located is captured. At the same time, the captured real address is fed back to the staff, and alarm information is sent to relevant units for processing. When the firewall cannot block external data intrusion, the firewall will change the data or destroy the communication frame to avoid data corruption. leak, and at the same time feedback the processing information to the staff.
接收通信帧,并对其进行数据解码:数据接收模块接收通信帧,并将其发送至解密算法模块,解密算法模块利用解密算法对接收到的加密信息进行解密分析,同时将解密后的数据反馈给用户。Receive the communication frame and decode the data: the data receiving module receives the communication frame and sends it to the decryption algorithm module. The decryption algorithm module uses the decryption algorithm to decrypt and analyze the received encrypted information, and at the same time feeds back the decrypted data to users.
具体的,数据接收模块成功接收到通信帧时,数据接收模块记录接收到通信帧的时间,并将其记录为接收时间,同时依据接收时间确认发送时间密钥信息,确认完成后,数据接收模块将通信帧导入分数阶傅里叶多路复用器中的分析滤波器组中进行数据转换处理生成输出信号矢量,将各组输出信号矢量通过提取解密转换成输入信号矢量,并依据其进行传输数据恢复,同时将传输数据反馈给用户。Specifically, when the data receiving module successfully receives the communication frame, the data receiving module records the time when the communication frame is received and records it as the receiving time. At the same time, it confirms the sending time key information based on the receiving time. After the confirmation is completed, the data receiving module The communication frame is introduced into the analysis filter bank in the fractional-order Fourier multiplexer for data conversion processing to generate an output signal vector. Each group of output signal vectors is converted into an input signal vector through extraction and decryption, and is transmitted according to it. Data recovery, while feeding back the transmitted data to the user.
以上所述,仅为本发明较佳的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,根据本发明的技术方案及其发明构思加以等同替换或改变,都应涵盖在本发明的保护范围之内。The above are only preferred specific embodiments of the present invention, but the protection scope of the present invention is not limited thereto. Any person familiar with the technical field can, within the technical scope disclosed in the present invention, implement the technical solutions of the present invention. Equivalent substitutions or changes of the inventive concept thereof shall be included in the protection scope of the present invention.
Claims (3)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111235700.5A CN113992384B (en) | 2021-10-22 | 2021-10-22 | Secret communication method based on fractional Fourier transform order multiplexing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111235700.5A CN113992384B (en) | 2021-10-22 | 2021-10-22 | Secret communication method based on fractional Fourier transform order multiplexing |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113992384A CN113992384A (en) | 2022-01-28 |
CN113992384B true CN113992384B (en) | 2023-10-20 |
Family
ID=79740618
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111235700.5A Active CN113992384B (en) | 2021-10-22 | 2021-10-22 | Secret communication method based on fractional Fourier transform order multiplexing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113992384B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114826645B (en) * | 2022-03-03 | 2024-04-16 | 深圳市迪讯飞科技有限公司 | Method and terminal for real-time aggregation of multipath data |
CN115984063A (en) * | 2022-09-29 | 2023-04-18 | 河北数微信息技术有限公司 | Community online security monitoring method and device, computer equipment and storage medium |
Citations (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101345616A (en) * | 2008-08-15 | 2009-01-14 | 哈尔滨工业大学 | Communication Encryption and Decryption Method Based on Multi-parameter Four-term Weighted Fractional Fourier Transform |
CN101667911A (en) * | 2009-09-25 | 2010-03-10 | 北京理工大学 | Secret communication method based on fraction order Fourier transform order-multiplexing |
CN102201914A (en) * | 2011-07-14 | 2011-09-28 | 哈尔滨工业大学 | Secret communication method based on multi-dimensional single/multi-parameter four-weighted fractional Fourier transform |
CN103916238A (en) * | 2014-04-01 | 2014-07-09 | 北京工业大学 | Digital audio signal encryption/decryption method based on quanta |
CN106102045A (en) * | 2016-05-25 | 2016-11-09 | 赵京磊 | A kind of secret communication method using Fourier Transform of Fractional Order |
CN108768927A (en) * | 2018-04-04 | 2018-11-06 | 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) | Secret communication method and device |
CN109088895A (en) * | 2018-10-25 | 2018-12-25 | 苏州格目软件技术有限公司 | A kind of working method positioning distributed network security attack system of defense |
CN109391292A (en) * | 2018-12-20 | 2019-02-26 | 哈尔滨工业大学 | The collaborative transmission method of weighted score Fourier transform domain double slot diversities and multiplexing |
CN109617676A (en) * | 2018-11-15 | 2019-04-12 | 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) | A password synchronization method and communication node |
WO2019073232A1 (en) * | 2017-10-11 | 2019-04-18 | Data Border Ltd. | A security system and method |
CN110311898A (en) * | 2019-06-13 | 2019-10-08 | 浙江工业大学 | Man-in-the-middle attack detection method for networked CNC system based on Gaussian radial basis function classifier |
CN110366181A (en) * | 2019-07-29 | 2019-10-22 | 努比亚技术有限公司 | Data transmission method, system and computer readable storage medium |
CN111245804A (en) * | 2020-01-06 | 2020-06-05 | 北京松果电子有限公司 | Communication security testing method and device for terminal equipment and storage medium |
CN210927991U (en) * | 2019-12-05 | 2020-07-03 | 中鄂飞鹿科技有限责任公司 | A low power and real-time LoRa network |
CN111865996A (en) * | 2020-07-24 | 2020-10-30 | 中国工商银行股份有限公司 | Data detection method and device and electronic equipment |
CN112016112A (en) * | 2020-09-08 | 2020-12-01 | 中国人民解放军海军航空大学 | Method for encrypting image by compounding Fourier transform and differential transform |
CN112015985A (en) * | 2020-08-25 | 2020-12-01 | 中国民航大学 | A network information security supervision system based on computer communication |
WO2021008028A1 (en) * | 2019-07-18 | 2021-01-21 | 平安科技(深圳)有限公司 | Network attack source tracing and protection method, electronic device and computer storage medium |
CN112437094A (en) * | 2020-12-04 | 2021-03-02 | 武汉华工赛百数据系统有限公司 | Block chain-based network data evidence storage and management integrated service platform |
CN112615865A (en) * | 2020-12-21 | 2021-04-06 | 曹佳乐 | Data anti-intrusion method based on big data and artificial intelligence and big data server |
CN112910568A (en) * | 2021-01-18 | 2021-06-04 | 猫岐智能科技(上海)有限公司 | Data communication method, data sending method and data receiving method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9043861B2 (en) * | 2007-09-17 | 2015-05-26 | Ulrich Lang | Method and system for managing security policies |
-
2021
- 2021-10-22 CN CN202111235700.5A patent/CN113992384B/en active Active
Patent Citations (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101345616A (en) * | 2008-08-15 | 2009-01-14 | 哈尔滨工业大学 | Communication Encryption and Decryption Method Based on Multi-parameter Four-term Weighted Fractional Fourier Transform |
CN101667911A (en) * | 2009-09-25 | 2010-03-10 | 北京理工大学 | Secret communication method based on fraction order Fourier transform order-multiplexing |
CN102201914A (en) * | 2011-07-14 | 2011-09-28 | 哈尔滨工业大学 | Secret communication method based on multi-dimensional single/multi-parameter four-weighted fractional Fourier transform |
CN103916238A (en) * | 2014-04-01 | 2014-07-09 | 北京工业大学 | Digital audio signal encryption/decryption method based on quanta |
CN106102045A (en) * | 2016-05-25 | 2016-11-09 | 赵京磊 | A kind of secret communication method using Fourier Transform of Fractional Order |
WO2019073232A1 (en) * | 2017-10-11 | 2019-04-18 | Data Border Ltd. | A security system and method |
CN108768927A (en) * | 2018-04-04 | 2018-11-06 | 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) | Secret communication method and device |
CN109088895A (en) * | 2018-10-25 | 2018-12-25 | 苏州格目软件技术有限公司 | A kind of working method positioning distributed network security attack system of defense |
CN109617676A (en) * | 2018-11-15 | 2019-04-12 | 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) | A password synchronization method and communication node |
CN109391292A (en) * | 2018-12-20 | 2019-02-26 | 哈尔滨工业大学 | The collaborative transmission method of weighted score Fourier transform domain double slot diversities and multiplexing |
CN110311898A (en) * | 2019-06-13 | 2019-10-08 | 浙江工业大学 | Man-in-the-middle attack detection method for networked CNC system based on Gaussian radial basis function classifier |
WO2021008028A1 (en) * | 2019-07-18 | 2021-01-21 | 平安科技(深圳)有限公司 | Network attack source tracing and protection method, electronic device and computer storage medium |
CN110366181A (en) * | 2019-07-29 | 2019-10-22 | 努比亚技术有限公司 | Data transmission method, system and computer readable storage medium |
CN210927991U (en) * | 2019-12-05 | 2020-07-03 | 中鄂飞鹿科技有限责任公司 | A low power and real-time LoRa network |
CN111245804A (en) * | 2020-01-06 | 2020-06-05 | 北京松果电子有限公司 | Communication security testing method and device for terminal equipment and storage medium |
CN111865996A (en) * | 2020-07-24 | 2020-10-30 | 中国工商银行股份有限公司 | Data detection method and device and electronic equipment |
CN112015985A (en) * | 2020-08-25 | 2020-12-01 | 中国民航大学 | A network information security supervision system based on computer communication |
CN112016112A (en) * | 2020-09-08 | 2020-12-01 | 中国人民解放军海军航空大学 | Method for encrypting image by compounding Fourier transform and differential transform |
CN112437094A (en) * | 2020-12-04 | 2021-03-02 | 武汉华工赛百数据系统有限公司 | Block chain-based network data evidence storage and management integrated service platform |
CN112615865A (en) * | 2020-12-21 | 2021-04-06 | 曹佳乐 | Data anti-intrusion method based on big data and artificial intelligence and big data server |
CN112910568A (en) * | 2021-01-18 | 2021-06-04 | 猫岐智能科技(上海)有限公司 | Data communication method, data sending method and data receiving method |
Non-Patent Citations (4)
Title |
---|
一种基于分数阶傅里叶变换的OFDM系统及其均衡算法;陈恩庆;陶然;张卫强;孟祥意;;电子学报(03);第409-414页 * |
基于离散分数阶Fourier变换本征矢量分解的图像加密算法;田玉萍;;计算机应用与软件(02);第318-321、333页 * |
小波包变换和加权分数阶傅里叶变换的通信应用对比分析;刘菁;魏雪缘;刘钊;徐瑞阳;;无线电通信技术(01);第18-23页 * |
级联混沌对视频分数阶傅立叶域的加密;金建国;马刚;魏明军;;计算机工程与设计(08);第1995-2001页 * |
Also Published As
Publication number | Publication date |
---|---|
CN113992384A (en) | 2022-01-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113992384B (en) | Secret communication method based on fractional Fourier transform order multiplexing | |
CN111274578A (en) | Data safety protection system and method for video monitoring system | |
CN101350724A (en) | An Encryption Method Based on Biometric Information | |
CN101442407A (en) | Method and system for identification authentication using biology characteristics | |
CN101695038A (en) | Method and device for detecting SSL enciphered data safety | |
CN111224995A (en) | SSL/TLS network encryption communication information real-time decryption method based on memory analysis | |
CN111245783A (en) | Isolated environment data transmission device and method based on digital encryption technology | |
CN107947937A (en) | A kind of safe audio-video encryption system and terminal authentication implementation method | |
CN111698253A (en) | Computer network safety system | |
CN113965396B (en) | Data security communication system and method based on risk assessment | |
CN115499844A (en) | Mobile terminal information safety protection system and method | |
CN112307875A (en) | Face verification method and face verification system | |
US7920705B1 (en) | System and method for convert channel detection | |
CN110473131A (en) | Material evidence information saves trace to the source monitoring system and monitoring method from damage | |
CN114357418A (en) | Encryption authentication method, system, terminal device, server and storage medium | |
CN114547589A (en) | Privacy-protecting user registration and user authentication method and device | |
Han et al. | The privacy protection framework for biometric information in network based CCTV environment | |
Khalid et al. | Cloud server security using bio-cryptography | |
CN112637172A (en) | Novel data security and confidentiality method | |
CN115776413B (en) | Iris encryption-based data transmission method and system | |
CN111010491A (en) | Image data transmission method, device and system based on hiding technology | |
KR101754519B1 (en) | Keyboard secure system and method for protecting data input via keyboard using one time key | |
CN115659359A (en) | Business system access active auditing method and system | |
CN115118446A (en) | Data security control method and system | |
CN115221546A (en) | Safety data processing method and device for burning after use |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |