CN101452536B - Encrypting method for applying to container data communication - Google Patents

Encrypting method for applying to container data communication Download PDF

Info

Publication number
CN101452536B
CN101452536B CN2007101969296A CN200710196929A CN101452536B CN 101452536 B CN101452536 B CN 101452536B CN 2007101969296 A CN2007101969296 A CN 2007101969296A CN 200710196929 A CN200710196929 A CN 200710196929A CN 101452536 B CN101452536 B CN 101452536B
Authority
CN
China
Prior art keywords
reader
intelligent
key
container
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2007101969296A
Other languages
Chinese (zh)
Other versions
CN101452536A (en
Inventor
伍昕
周受钦
王元聪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen CIMC Intelligent Technology Co Ltd
Original Assignee
China International Marine Containers Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China International Marine Containers Group Co Ltd filed Critical China International Marine Containers Group Co Ltd
Priority to CN2007101969296A priority Critical patent/CN101452536B/en
Publication of CN101452536A publication Critical patent/CN101452536A/en
Application granted granted Critical
Publication of CN101452536B publication Critical patent/CN101452536B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to an encryption method applied to data communication for an intelligent container. An intelligent container system comprises an intelligent container terminal, a reader, a site server and a data center, wherein the intelligent terminal is arranged at the container, monitors transportation state information of the container in real time, transmits numbered information and the transportation state information of the container to the data center through the reader directly or through transfer of the site server, adopts a short-distance wireless communication mode to carry out the data communication with the reader, and transmits the transportation state information encrypted and processed by a key to the reader. By adopting the method, the data communication for the intelligent container is safe and reliable.

Description

Be applied to the encryption method of intelligent container data communication
Technical field
The present invention relates to container, relate in particular to a kind of data communication safety method that is used for intelligent container system.
Background technology
For adapting to International Terrorism, cargo security, international trade safety and development need easily, intelligent container just which is provided with the container of intelligent terminal, the certainty that has become the container development and used.
The relation object of intelligent container and intelligent container common data platform is similar to communication terminal and communication network; Exploitation and construction intelligent container common data platform are researched to developed intelligent container common data platform system standard, guarantee the intelligent container data transmission security; It is the container tracking supervision that realizes full supply chain in the global range; Solve international trade safety with convenient, realize safe trade passage, a key element of international ocean shipping green channel.
Existing intelligent container system comprises the intelligent terminal that is used for the monitoring containers state, carries out the read-write equipment of data communication and background information disposal system with intelligent terminal.The data communication safety problem of intelligent container system relates to data exchange safety and authentication method between intelligent container terminal, hand held readers, fixed reader, server in station and the data center.
The intelligent container terminal is a container bottom central monitoring unit, be responsible for intelligent container in the dialogue and the communication of other detector, and data session between intelligent container and the exterior read-write equipment and communication.The intelligent container terminal is monitored intelligent container through state sensor in real time, includes but not limited to: to the monitoring of internal container environment, and the monitoring of container door on off state, the monitoring of container shell integrality, the monitoring of cold machine equipment on the container.When this intelligent container terminal is furnished with the place, locality of read-write equipment through harbour, harbour sluice gate, shore tackle and bridge crane etc.; Read-write equipment can be read monitor data, the intelligent container terminal executed operational orders such as envelope, deblocking, inquiry and cancellation from the intelligent container terminal, and upload the data to the background information disposal system.Here; Read-write equipment is meant and is installed in fixed arrangement for reading and the capable of movable operating hand held readers that harbour or harbour etc. are located; Monitor data is forwarded to the server in station that is arranged in the harbour through these readers; Be forwarded to data center by the server in station unification again and carry out condition diagnosing and information fusion, the final user then can be through the travel position and the logistics information of data center's inquiry intelligent container.
Consider target to be monitored; Just the relevant data information of intelligent container belongs to the privacy of loglstics enterprise; Need under DCE, guarantee the safety of data communication, prevent malicious sabotage and illegal invasion, reliability and stability that simultaneously also can enhanced system.
Summary of the invention
The objective of the invention is to;, realizes intelligent container system relevant safety precaution target in using: prevent to forge terminal device; Promptly want to distinguish the identity of terminal device, need encrypt, prevent that unauthorized people from reading the content that relates to safety and privacy in the terminal; Prevent the manipulative communications cover center, the telecommunication data are encrypted, and prevent to eavesdrop, decode the confidential data of sending out on the terminal device; And, prevent to forge reader device, to distinguishing of operating personnel's identity of reader device, the corresponding precautionary measures are arranged to the situation that reader device loses occurring.
To achieve these goals; The invention provides a kind of encryption method that is applied to the intelligent container data communication; This intelligent container system comprises intelligent terminal, reader, server in station and data center; This intelligent terminal is arranged at the container place and the travel position information of container is monitored in real time; And through this reader directly or in this server in station then this container character information and travel position information are sent to this data center; This intelligent terminal adopts short-distance wireless communication mode and this reader to carry out data communication, after this intelligent terminal is handled said travel position information key-encrypted, is transferred to described reader.
The employed key of the communication of this intelligent terminal and reader is authorized through this processing enter; This key is only preserved at this intelligent terminal and this processing enter; This reader can be kept in this key when operating to the corresponding container of this intelligent terminal; And turn to when another container operated when this reader, can cover and the old corresponding key of intelligent terminal automatically with the corresponding key of new intelligent terminal.
Travel position information through encryption can only read for the reader of acquisition to the operation mandate of this intelligent terminal; Do not obtain the number information of the said container that not encrypted that reader to the operation mandate of this intelligent terminal then can only read this intelligent terminal handles; And this reader is to encrypt the employed key of said travel position information according to the number information of said container to this data center's application.
This intelligent terminal, reader or server in station will be reported to this data center with each autocorrelative identity information; And by after this data center's authentication; Registration gets into this intelligent container system, and the identity coding that intelligent terminal, reader or the server in station of this intelligent container system of registration entering carry separately is unique.
This reader and server in station dispose special-purpose intelligent encryption card separately, and this data center comprises the hardware identification that inserts the intelligent encryption card and carry out to the authentication of reader and server in station and identity information that operating personnel are imported and the software authentication that carries out; This data center according to classifying with the container corresponding codes, and provides each reader and operating personnel thereof and each reader and operating personnel thereof are corresponding, the intelligent encryption card and the username and password that are assigned different rights.
When this container is brought into use; Seal sign indicating number through reader demonstration and that have corresponding authority to executing of this data center's application intelligent terminal corresponding with this container; This data center calculates the employed key of this intelligent terminal in this time transportation according to the corresponding logistics information of this container according to key schedule simultaneously; And be issued to this intelligent terminal through this reader; When in transportation, needing to change key, need to apply for key again to this data center via this reader.
The communication data of this reader and server in station and this data center transmits through communication network; This communication data adopts intelligent encryption card that cooperates this reader and server in station use and/or the identity coding that equipment self carries to encrypt, and this data center deciphers this enciphered data based on the key of correspondence; The data that issue of this data center are encrypted according to the reader of correspondence and the key of server in station, and this reader and server in station are deciphered the data that issue of this encryption according to self key.
At this reader during via this server in station transfer; The container character information that this reader reports can not do encryption or only according to this reader in the identity coding that carries of intelligent encryption card or equipment self encrypt; Server in station is preserved the key of the reader corresponding with this server in station so that this information is deciphered, and this server in station is forwarded to this data center after this information is resolved; The travel position information that reader reports will be encrypted according to the corresponding key of identity coding that intelligent encryption card or equipment self in the reader carry, and this server in station is not resolved this information and directly this information is forwarded to this data center.
The key that this reader and/or server in station adopted is stored in the intelligent encryption card that cooperates this reader and/or server in station use.
The authentication of reader is divided into authentication of reader legitimacy and the authentication of reader application intelligent terminal key legitimacy, and this data center is through the intelligent encryption card information sent out on the reader and user name, password are confirmed, to confirm the legitimacy of reader; For reader application intelligent terminal key, the legitimacy of this reader is at first judged by this data center, again according to the classification of reader and operating right check and approve whether issue this intelligent terminal key to reader.
Compared with prior art, adopt the encryption method that is applied to the intelligent container data communication of the present invention, the data communication of intelligent container system is safe and reliable.
Description of drawings
Fig. 1 adopts the application system synoptic diagram that is applied to the encryption method of intelligent container data communication of the present invention;
Fig. 2 is the data transmission flow process synoptic diagram that is applied to the encryption method of intelligent container data communication of the present invention;
Fig. 3 is the acquisition schematic flow sheet of the key of the encryption method that is applied to the intelligent container data communication of the present invention;
Fig. 4 is the modification process synoptic diagram of the key of the encryption method that is applied to the intelligent container data communication of the present invention;
Fig. 5 is that the reader that is applied to the encryption method of intelligent container data communication of the present invention is proved schematic flow sheet.
Embodiment
Below in conjunction with accompanying drawing, the present invention is given elaboration further.
Intelligent container system of the present invention; Its general structure is as shown in Figure 1; The system hardware part is made up of intelligent terminal 1, hand held readers 3, fixed reader 2, server in station 4 and data center 5; This intelligent terminal 1 be meant with container intelligent container supporting, that general container is configured to, be installed on the container or the container delivery vehicle on all electronic equipments; This fixed reader 2 can be the independent intelligent electronic equipment; Also can be the electronic equipment that links to each other with computing machine, intelligent terminal 1 comprises the electronic package of installing on the intelligent containers such as the GPS terminal that matches with intelligent container and electronic seal device, and the information of preserving on the intelligent terminal 1 not only comprises the number information of container; Also comprise information such as container door on off state, the damaged situation of container body and container body internal and external environment state; Intelligent terminal 1 carries out communication through short-distance wireless connection 6 with reader, and this reader can be a hand-held 3, also can be fixed 2; Operating personnel are to the use of this reader; Can be through inserting an authentication encrypted smart card carrying out identification and affirmation, fixed reader 2 can directly be carried out data communication with local site server 4 through LAN 8,3 of hand held readers not only can short-distance wireless LAN 9 be connected with local site server 4, can also be through wireless telecommunications means such as GPRS 11 direct and data center 5 carry out communication; Local site server 4 can be gathered the data of each reader that is in local territorial scope, and is connected through telecommunication network means of communications 10 such as Internet with data center 5.
The encryption method that is applied to the intelligent container data communication of the present invention; In order to guarantee the intelligent container data; Just intelligent terminal 1 with the data exchange process of hand held readers 3, fixed reader 2, server in station 4 and data center 5 in illegally do not read; Guarantee the secret key safety that intelligent terminal 1 encryption is used; Guarantee the checking of user's identity legitimacy of reader 2 or 3, and reader 2 or 3 system after going out situation such as active can keep safe in utilizationly, this is that safety practice through four layers realizes:
Facility registration; The intelligent terminal 1 that relates in the intelligent container system, hand held readers 3, fixed reader 2, encrypted smart card (figure is slightly) and server in station 4 etc.; Following general designation equipment; All need carry out registration operation in data center 5, guaranteeing the legitimacy of equipment, intelligent container and relevant device thereof are through being registered by the numbering and/or the device numbering of the container of data center's 5 unified distributions; Need to prove; The facility registration process 12 of intelligent terminal 1 can be accomplished by device registration special, that be connected with the data center telecommunication network in the production process; Obviously; This device registration and reader or server in station are similar, have encrypted smart card that is distributed by data center and the username and password of authorizing the relevant personnel that device registration is operated etc.
Authenticating operation; The direct control personnel identity is confirmed; Through using the identification means to insert the intelligent encryption card in reader 2 or 3 and on the operation interface of reader 2 or 3, to input information such as user name, password direct control personnel's identity is examined; This intelligent encryption card is that every card not only has globally unique sequence number by data center's 5 distributions, can also realize that key is preserved, the function of DEA computing;
Terminal data is encrypted; Communication data between intelligent terminal 1 and reader 2 or 3 is a wireless transmission; In order to guarantee that data are not read by illegality equipment and unauthorized user; Communication data need be encrypted by AES; The key that AES uses only is kept at intelligent terminal 1 and data center 5; Miscellaneous equipment such as reader 2 or 3 and server in station 4 need resolve encrypted data packet the time, must obtain and this intelligent terminal 1 corresponding key from data center 4 earlier;
The computing machine communication security; For guarantee reader 2 or 3 and the computing machine that links to each other with reader 2 or 3 (figure slightly) and server in station 4, server in station 4 and data center 5 between communication data not by illegal parsing; All communication datas will be encrypted packing with data through intelligent encryption card or AES before transmission, encrypted data packet is deciphered through the key of correspondence at receiving end again.
When data center registered, the information such as unique coding, affiliated company, harbour and harbour that each equipment is corresponding all had record in data center, and the difference classification through to each equipment can realize the rights management of each equipment.Communication data between equipment and the equipment all passes through encryption, and unauthorized user and illegality equipment can't be resolved data, for the equipment operator of reality, also need distribute different user name, password and encrypted smart card.Referring to Fig. 2, details such as the encryption method of the authentication of equipment, data and key management method are following in the practical implementation:
Intelligent terminal 1 sends to reader 2 or 3 through the short-distance wireless communication mode with data; In communication process; Data in order to ensure intelligent terminal 1 are not illegally read and are changed, and with the communication data employing symmetric encipherment algorithm such as the 3DES algorithm of need to be keep secret, or other AES is encrypted data; Ciphering process 101 adopts key A to encrypt; Encrypt the key A of using and only be kept in intelligent terminal 1 and the data center 5, this key A is through data center's 5 distributions, and the data that relate to intelligent container safety in the data to intelligent terminal 1 are encrypted.And the data that need not maintain secrecy; Information such as numbering like container adopt plain code to send; Reader 2 or 3 can obtain the key A corresponding with the numbering of being somebody's turn to do from data center 5 by the plain code information that reads; And can decipher the encryption communication data; The data that reader 2 or 3 is issued to intelligent terminal 1 are with to upload data ciphering method similar; It is plain code that part does not need private data, and the data of other need to be keep secret use key A to encrypt;
Reader 2 or 3 can pass through server in station 4 visit data centers 5, also can directly pass through the direct visit data of Internet network center 5, and cut-in method can be wireless; Such as adopting the GPRS communication modes; Also can be wired, resolved by illegal that reader 2 or 3 all need be encrypted to the data of data center 5 for fear of communication data; Be similar to the encryption of the data of above-mentioned intelligent terminal 1; Ciphering process 103 adopts key B to encrypt, and can adopt symmetric encipherment algorithm, also can adopt rivest, shamir, adelman; Key B can directly be provided by the intelligent encryption card that is inserted in reader 2 or 3, also can be authorized by data center 5 through the information such as sequence number of reader;
Fixed reader is connected through local area network with server in station; Hand held readers is connected with server in station through WLAN (WIFI); Server in station 4 transfer readers 2 or 3 and the communication data packet of data center 5, and this packet not being resolved, server in station 4 through in the data at the intelligent box terminal 1 of reading reader 2 or 3 and sending not enciphered message to obtain container cargo distribution information; Server in station 4 do not resolve reader 2 or 3 and data center 5 between enciphered message; In other words, reader 2 or 3 is when communication is carried out in server in station 4 transfers, and ciphering process 102 employing key B encrypt, ciphering process 104 adopts key B to encrypt; Need not obtain the key A of corresponding intelligent terminal 1, then the data communication between reader and the server in station can be thought safe;
Server in station is except the hand-held under transfer this locality, fixed reader and data center's communication data; Because server in station is only through reader communication data recording intelligent container logistics information; When server in station 4 is inquired about information such as specific intelligence container state if desired; Need read related data from data center 5, at this moment, server in station 4 all need be encrypted with the communication data of data center 5; Encryption method and reader and data center's data ciphering method are similar; Ciphering process 105 adopts ciphering key to encrypt, and server in station 4 can provide ciphering key through the intelligent encryption card that inserts, and perhaps authorizes ciphering key according to the information such as sequence number of server in station 4 by data center 5;
Reader 2 or 3 authentication method have two kinds, and first kind is hardware identification, operating personnel's identity is discerned and confirmed through inserting encrypted smart card; Second kind is software authentication, imports identity identification information parts such as username and password through operating personnel and discerns and confirm; As shown in Figure 5, reader is realized described hardware and software authentication through the Internet network insertion to data center 5, authenticated legal after, operating personnel just can operate reader 2 or 3, and operate through reader 2 or 3 pairs of intelligent terminals 1;
The key A that intelligent terminal 1 uses is relevant with the information such as numbering, terminal number, use date and common carrier of this intelligent container; When beginning to launch this intelligent container; Send key through reader 2 or 3 and generate request; And the information such as numbering of container are sent to data center 4, data center transports employed key according to this time that the comprehensive associated information calculation of key schedule obtains after the legitimacy of confirming reader; The key that intelligent terminal 1 uses is only preserved in data center and intelligent terminal 1; When reader 2 or 3 is operated each intelligent container; Need be through obtaining the key of this container after the authentication from data center; This key is only done temporary in reader 2 or 3, works as end of operation, and this key will be removed in reader inside; The key acquisition process of intelligent terminal, as shown in Figure 3, comprising: reader reads monitor terminal information, the intelligent terminal that the monitor terminal here is just above-mentioned; From these information, parse case number (CN) information, just in the number information of the corresponding container of intelligent terminal; By cooperating, reality just is inserted in the information on the smart card in the reader, and this packets of information contains corresponding key, encrypts with this key; Report case number (CN), propose the key application of intelligent terminal, obviously, include the identity information of this reader self in this application; Data center adopts with the corresponding key of key of this reader and deciphers, and whether differentiate this application of this reader legal, illegal words; Refuse an application, legal, inquiry and the corresponding key of this intelligent terminal; Can know in conjunction with Fig. 2; Key A just, obviously the inquiry here both can refer to calculated immediately according to certain key schedule according to application by data center; Also can refer to when intelligent terminal is registered, generate and be kept in the corresponding tabulation, data center is receiving the taking-up of just merely tabling look-up when applying for; Then, data center adopts and the corresponding key of reader key, can know that in conjunction with Fig. 2 just key B encrypts this key information that need issue, and issues data; Reader issues data to this that receives and deciphers, and reader has just obtained the key of this intelligent terminal; At last, reader sends this key to this intelligent terminal, and this intelligent terminal is preserved this key, to carry out follow-up corresponding encrypted data communications.
The key that data encryption is used all is to be distributed by data center, and key only is kept in the database of communication apparatus and data center, and miscellaneous equipment need just can obtain this key through authentication in the communication link; The key of intelligent terminal 1 is that data center calculates according to container character and out of Memory, and key effectively, can generate new key in the transportation next time in transportation of container; The key that in transportation, also can more renew if necessary, the replacing process of key is as shown in Figure 4, and this process and key application process shown in Figure 3 are basic identical; The difference part mainly is; Obtain after the new key, what deciphering obtained in the reader is new and old two group keys, at this moment; Reader sends to intelligent terminal after will the information of new key being encrypted with old key; Behind the key of intelligent terminal with new key replace old, must be through the situation of reader to data center's feedback affirmation new key, data center obtains just calculating this secondary key modification process of completion after this affirmation.
The key of reader, server in station and data center's communication is to be provided by the intelligent encryption card, and communication two party is encrypted with the key in the intelligent encryption card that inserts in this machine respectively, and key is in the inner generation of card, and it is inner that communication data is kept at card;
The term of validity of key is that the start time point that once transports of intelligent container is to the time interval between the start time point that transports next time; When beginning to launch this intelligent container; Reader reads the information such as numbering of not encrypting, and these information are sent to data center request obtains new key, and data center calculates behind the key this delivering key to reader; And be forwarded to intelligent terminal through reader; Afterwards, data center and intelligent terminal all carry out communication with this key, begin to launch up to another new intelligent container;
Reader is when the key of data center's request intelligent terminal; Issue counterpart keys after data center's authentication; In order to guarantee the safety of key; Key can not occur with plain mode in transmittance process, data center with this key as enciphered data; Use corresponding intelligent encryption card of reader or reader coding that key is encrypted; After reader obtains this packet, can decipher this encrypted packets by self key, with the key that obtains applying for;
For fear of losing owing to reader or pretending to be legal user that the system communication content is cheated through Internet; User to using reader need carry out two kinds of authentication modes of software and hardware simultaneously; Hardware identification is through inserting the hardware encipher smart card user's identity to be carried out authentication; This smart card is authorized distribution by data center; Every card all has record in data center, and function software regularly sends to data center with the encrypted smart card Verification Number and confirms, as illegal with compulsory withdrawal; Software authentication is to eject user name, password input window mouth when starting in function software or after work a period of time, and function software is checked it; Likewise, the authentication method that smart card identity authentication and user name, password combine is also adopted in the user management of data center.
Foregoing; Be merely preferred embodiment of the present invention; Be not to be used to limit embodiment of the present invention; Those of ordinary skills can carry out corresponding flexible or modification, so protection scope of the present invention should be as the criterion with the desired protection domain of claims very easily according to main design of the present invention and spirit.

Claims (10)

1. encryption method that is applied to the data communication of intelligent container system; This intelligent container system comprises intelligent terminal, reader, server in station and data center; This intelligent terminal is arranged at the container place and the travel position information of container is monitored in real time; And through this reader directly or in this server in station then this container character information and travel position information are sent to this data center; It is characterized in that: this intelligent terminal adopts short-distance wireless communication mode and this reader to carry out data communication, after this intelligent terminal is handled said travel position information key-encrypted, is transferred to described reader.
2. the encryption method that is applied to the data communication of intelligent container system as claimed in claim 1; It is characterized in that: the employed key of the communication of this intelligent terminal and reader is authorized through this processing enter; This key is only preserved at this intelligent terminal and this processing enter; This reader can be kept in this key when operating to the corresponding container of this intelligent terminal; And turn to when another container operated when this reader, can cover and the old corresponding key of intelligent terminal automatically with the corresponding key of new intelligent terminal.
3. the encryption method that is applied to the data communication of intelligent container system as claimed in claim 2; It is characterized in that: the travel position information through encryption can only read for the reader of acquisition to the operation mandate of this intelligent terminal; Do not obtain the number information of the said container that not encrypted that reader to the operation mandate of this intelligent terminal then can only read this intelligent terminal handles; And this reader is to encrypt the employed key of said travel position information according to the number information of said container to this data center's application.
4. the encryption method that is applied to the data communication of intelligent container system as claimed in claim 3; It is characterized in that: this intelligent terminal, reader or server in station will be reported to this data center with each autocorrelative identity information; And by after this data center's authentication; Registration gets into this intelligent container system, and the identity coding that intelligent terminal, reader or the server in station of this intelligent container system of registration entering carry separately is unique.
5. the encryption method that is applied to the data communication of intelligent container system as claimed in claim 4; It is characterized in that: this reader and server in station dispose special-purpose intelligent encryption card separately, and this data center comprises the hardware identification that inserts the intelligent encryption card and carry out to the authentication of reader and server in station and identity information that operating personnel are imported and the software authentication that carries out; This data center according to classifying with the container corresponding codes, and provides each reader and operating personnel thereof and each reader and operating personnel thereof are corresponding, the intelligent encryption card and the username and password that are assigned different rights.
6. the encryption method that is applied to the data communication of intelligent container system as claimed in claim 5; It is characterized in that: when this container is brought into use; Seal sign indicating number through reader demonstration and that have corresponding authority to executing of this data center's application intelligent terminal corresponding with this container; This data center calculates the employed key of this intelligent terminal in this time transportation according to the corresponding logistics information of this container according to key schedule simultaneously; And be issued to this intelligent terminal through this reader, when in transportation, needing to change key, need apply for key again to this data center via this reader.
7. the encryption method that is applied to the data communication of intelligent container system as claimed in claim 5; It is characterized in that: the communication data of this reader and server in station and this data center transmits through communication network; This communication data adopts intelligent encryption card that cooperates this reader and server in station use and/or the identity coding that equipment self carries to encrypt, and this data center deciphers this enciphered data according to the key of correspondence; The data that issue of this data center are encrypted according to the reader of correspondence and the key of server in station, and this reader and server in station are deciphered the data that issue of this encryption according to self key.
8. the encryption method that is applied to the data communication of intelligent container system as claimed in claim 5; It is characterized in that: at this reader during via this server in station transfer; The container character information that this reader reports can not do encryption or only according to this reader in the identity coding that carries of intelligent encryption card or equipment self encrypt; Server in station is preserved the key of the reader corresponding with this server in station so that this information is deciphered, and this server in station is forwarded to this data center after this information is resolved; The travel position information that reader reports will be encrypted according to the corresponding key of identity coding that intelligent encryption card or equipment self in the reader carry, and this server in station is not resolved this information and directly this information is forwarded to this data center.
9. the encryption method that is applied to the data communication of intelligent container system as claimed in claim 8 is characterized in that: the key that this reader and/or server in station adopted is stored in the intelligent encryption card that cooperates this reader and/or server in station use.
10. the encryption method that is applied to the data communication of intelligent container system as claimed in claim 5; It is characterized in that: the authentication of reader is divided into authentication of reader legitimacy and the authentication of reader application intelligent terminal key legitimacy; This data center is through the intelligent encryption card information sent out on the reader and user name, password are confirmed, to confirm the legitimacy of reader; For reader application intelligent terminal key, the legitimacy of this reader is at first judged by this data center, again according to the classification of reader and operating right check and approve whether issue this intelligent terminal key to reader.
CN2007101969296A 2007-12-06 2007-12-06 Encrypting method for applying to container data communication Active CN101452536B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2007101969296A CN101452536B (en) 2007-12-06 2007-12-06 Encrypting method for applying to container data communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2007101969296A CN101452536B (en) 2007-12-06 2007-12-06 Encrypting method for applying to container data communication

Publications (2)

Publication Number Publication Date
CN101452536A CN101452536A (en) 2009-06-10
CN101452536B true CN101452536B (en) 2012-03-21

Family

ID=40734755

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2007101969296A Active CN101452536B (en) 2007-12-06 2007-12-06 Encrypting method for applying to container data communication

Country Status (1)

Country Link
CN (1) CN101452536B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102591264B (en) * 2011-01-14 2014-06-11 深圳中集智能科技有限公司 Freight transport safety monitoring system
CN104301325A (en) * 2014-10-29 2015-01-21 成都汉康信息产业有限公司 Encryption type telemetry terminal
US20180176187A1 (en) * 2016-12-16 2018-06-21 Amazon Technologies, Inc. Secure data ingestion for sensitive data across networks
US11159498B1 (en) 2018-03-21 2021-10-26 Amazon Technologies, Inc. Information security proxy service

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1540583A (en) * 2003-10-27 2004-10-27 江苏瑞福智能科技有限公司 Method of safe using and anti false discriminating stored type electronic label
US20070115859A1 (en) * 2005-11-14 2007-05-24 System Planning Corporation System and method for communications of cargo containers in a container security system using wireless ad-hoc networking techniques

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1540583A (en) * 2003-10-27 2004-10-27 江苏瑞福智能科技有限公司 Method of safe using and anti false discriminating stored type electronic label
US20070115859A1 (en) * 2005-11-14 2007-05-24 System Planning Corporation System and method for communications of cargo containers in a container security system using wireless ad-hoc networking techniques

Also Published As

Publication number Publication date
CN101452536A (en) 2009-06-10

Similar Documents

Publication Publication Date Title
CN101873588B (en) Method and system for realizing service application safety
CN108055235B (en) Control method of intelligent lock, related equipment and system
CN101426012B (en) Software module management device
CN106357400B (en) Establish the method and system in channel between TBOX terminal and TSP platform
CN102065148A (en) Memory system access authorizing method based on communication network
CN104580233A (en) Internet of Things smart home security gateway system
CN105139499A (en) Mobile phone door lock system based on asymmetric secret key and realization method thereof
CN106506149B (en) Key generation method and system between a kind of TBOX terminal and TSP platform
CN107911370A (en) A kind of data ciphering method and device, data decryption method and device
CN104778141A (en) Control system trusted architecture-based TPCM (Trusted Platform Control Module) and trusted detection technology
CN106572106A (en) Method of transmitting message between TBOX terminal and TSP platform
US20170230365A1 (en) Method and system for securing electronic data exchange between an industrial programmable device and a portable programmable device
CN1997953A (en) Method and device for protecting digital content in mobile applications
CN107800537A (en) Encrypting database system and method, storage method and querying method based on quantum key distribution technology
CN106789024A (en) A kind of remote de-locking method, device and system
CN104282060B (en) A kind of method for unlocking of safety intelligent lock system
CN103856321A (en) Data encryption and decryption method and system
CN101452536B (en) Encrypting method for applying to container data communication
CN103561091A (en) Document outgoing control system and method
CN105471902A (en) Data encryption method and system based on issued encryption algorithm
CN100410829C (en) Granting an access to a computer-based object
CN105577673A (en) Data encryption method and data encryption server based on issuing encryption algorithm
CN101594589A (en) Be used to protect the method and system of privacy of user
CN105191332A (en) Method and device to embed watermark in uncompressed video data
CN102904723A (en) Privacy protection method of radio frequency identification device (RFID) system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20160928

Address after: 518000 Guangdong city of Shenzhen province Nanshan District Nanhai Road No. 1057 technology building two Room 102 building A

Patentee after: Shenzhen Zhongji Intelligent Technology Co., Ltd.

Address before: No. 2 Shekou Harbour Road in Shenzhen city of Guangdong Province in 518000

Patentee before: Chinese International Marine Container (Group) Co., Ltd.