Search

CN-122028034-A - Encryption method for transmission data of through-the-earth wireless detonator controller

CN122028034ACN 122028034 ACN122028034 ACN 122028034ACN-122028034-A

Abstract

The application relates to the technical field of wireless detonators. The encryption method for the transmission data of the through-the-earth wireless detonator controller comprises the steps that the controller sends a new round of operation instruction and a key generation triggering instruction to the controller, the controller information and date information are synchronously sent to obtain a plurality of RSA public keys generated by the wireless detonator, the controller generates random numbers to serve as AES keys, the acquired RSA public keys are used for encrypting the AES keys to generate an RSA encryption key package, the controller sends the RSA encryption key package to the wireless detonator, the wireless detonator calls an RSA decryption module, the RSA encryption key package is decrypted by a reserved RSA private key to extract the AES keys, and the AES keys are stored in the AES decryption module in the wireless detonator, so that original data sent by the controller are obtained when the controller sends frame structure data to the wireless detonator.

Inventors

  • WANG WEI
  • CHI YONG
  • ZHU JIANYONG
  • JI YOUZHE
  • YUAN YE
  • XU HONGYAO
  • ZHOU XINHE

Assignees

  • 融硅思创(北京)科技有限公司

Dates

Publication Date
20260512
Application Date
20260410

Claims (10)

  1. 1. The encryption method for the transmission data of the through-the-earth wireless detonator controller is characterized by comprising the following steps of: The controller acquires a plurality of wireless detonator information; According to the wireless detonator information, the controller sends a new round of operation instruction and a key generation triggering instruction to the wireless detonator information, the controller information and the date information are synchronously sent to obtain RSA public keys generated by the wireless detonators, wherein the RSA public keys represent the wireless detonators, the RSA public keys and RSA private keys are generated according to the controller information and the date information sent to the wireless detonators by the controller through a built-in algorithm, the RSA public keys are fed back to the controller, and the RSA private keys are reserved in the wireless detonators; The controller generates a random number as an AES key, invokes an RSA encryption module, encrypts the AES key by using the acquired RSA public key, and generates an RSA encryption key package; The controller sends the RSA encryption key packet to the wireless detonator, the wireless detonator calls an RSA decryption module, decrypts the RSA encryption key packet by using a reserved RSA private key, and extracts an AES key; And storing the AES key in an AES decryption module in the wireless detonator, wherein when the controller sends frame structure data to the wireless detonator, the wireless detonator can decrypt by using the AES key in the AES decryption module to obtain the original data sent by the controller.
  2. 2. The method for encrypting data transmitted by a through-the-earth wireless detonator controller as claimed in claim 1 wherein said controller obtaining a plurality of wireless detonator information comprises: The controller is connected with the wireless detonators in a wired communication mode, and acquires the identity information of each wireless detonator one by one in a serial bus communication mode to finish acquisition of the information of the plurality of wireless detonators.
  3. 3. The method for encrypting data transmitted by a through-the-earth wireless detonator controller according to claim 1, wherein the step of transmitting the controller information and date information synchronously to obtain RSA public keys generated by a plurality of wireless detonators comprises the steps of: The controller sends a new round of operation instruction and a key generation triggering instruction to each wireless detonator in a wired communication mode, and synchronously transmits equipment information and date information of the controller; Generating a pair of 1024-bit RSA key pairs by combining the received device information and date information of the controller through a built-in algorithm, wherein the RSA key pairs comprise RSA public keys and RSA private keys, and each wireless detonator locally reserves the RSA private keys; And each wireless detonator feeds the generated RSA public key back to the controller in a wired communication mode, the controller receives the RSA public key of each wireless detonator, the controller checks each RSA public key in a hair-by-hair mode, the corresponding RSA public key is reserved when the RSA public keys are checked to be consistent, and the registration process is terminated when the RSA public keys are not matched.
  4. 4. The method for encrypting data transmitted by a through-the-earth wireless detonator controller as claimed in claim 1 wherein said controller generates a random number as an AES key and invokes an RSA encryption module to encrypt said AES key with the obtained RSA public key, and generating an RSA encryption key package comprises: The controller generates 128-bit random numbers through a built-in true random number generator, and uses the 128-bit random numbers as AES keys to call a built-in RSA encryption module, and encrypts the generated AES keys by utilizing RSA public keys corresponding to the wireless detonators to generate 1024-bit RSA encryption key packets.
  5. 5. The method for encrypting data transmitted by a through-the-earth wireless detonator controller as claimed in claim 1 wherein said controller transmits said RSA encryption key package to said wireless detonator, said wireless detonator invokes an RSA decryption module and decrypts the RSA encryption key package with a stored RSA private key, and the step of extracting the AES key comprises: The controller sends a data frame to the corresponding wireless detonator in a serial port communication mode of wired communication, wherein the data frame comprises a frame header, an RSA encryption key packet and a frame tail; after the wireless detonator receives the data frame, carrying out validity verification on the frame head and the frame tail, if the verification is passed, executing decryption operation, and if the verification is failed, discarding the data frame; And when the verification is passed, the wireless detonator calls an RSA decryption module built in the wireless detonator, and the RSA encryption key packet in the data frame is decrypted by utilizing a locally reserved RSA private key, so that a 128-bit AES key is extracted.
  6. 6. The method for encrypting data transmitted by a through-the-earth wireless detonator controller according to claim 1, wherein in the wireless detonator, the AES key is stored in an AES decryption module, and when the controller transmits frame structure data to the wireless detonator, the wireless detonator can decrypt the data by using the AES key in the AES decryption module, thereby obtaining the original data transmitted by the controller, comprising the steps of: the wireless detonator loads and configures the extracted 128-bit AES key in a built-in AES decryption module thereof; The controller performs data transmission through a wireless very low frequency ground penetrating channel with the frequency of 10K-100K, randomly generates an initialization vector with 16 bytes, invokes an AES encryption module built in the controller, encrypts original data to be transmitted through the AES key in a CBC mode to generate encrypted data, and packages a frame header, the initialization vector, the encrypted data and a frame tail into ground penetrating communication frame structure data to be transmitted to the wireless detonator; And the wireless detonator receives the data of the through-the-earth communication frame structure, performs validity verification on the frame head and the frame tail, extracts an initialization vector and encrypted data in the frame after the verification is passed, calls a built-in AES decryption module, decrypts the encrypted data by combining the loaded AES key and the initialization vector, and restores the encrypted data to obtain the original data sent by the controller.
  7. 7. The method for encrypting data transmitted by a through-the-earth wireless detonator controller as claimed in claim 6 wherein said step of storing said AES key in said wireless detonator in an AES decryption module, said wireless detonator being capable of decrypting using said AES key in said AES decryption module when said controller transmits frame structure data to said wireless detonator, to obtain original data transmitted by said controller, comprises, after the step of: after the wireless detonator executes the operation corresponding to the original data, the feedback state data is processed by the same AES encryption mode and then is transmitted back to the controller.
  8. 8. The method for encrypting data transmitted by a through-the-earth wireless detonator controller as claimed in claim 6 further comprising the step of key timeliness management: the controller configures the effective duration of the AES key, records the key generation time when generating 128-bit AES key, checks the time interval between the current time and the key generation time before sending the data of the through-the-earth communication frame structure to the wireless detonator each time, and automatically triggers the registration flow of RSA key generation and AES key encryption transmission of a new round if the time interval exceeds the configured effective duration.
  9. 9. The method for encrypting data transmitted by a through-the-earth wireless detonator controller according to claim 2, wherein the communication connection mode established between the controller and a plurality of wireless detonators is a wired communication connection or a Near Field Communication (NFC) connection; When the NFC connection is adopted, the NFC connection replaces the wire communication connection to complete all registration link communication operations of the identification information acquisition of the wireless detonator, the transmission of the operation command and the key generation triggering command, the synchronization of the controller information and the date information, the RSA public key feedback and the transmission of the RSA encryption key package.
  10. 10. The method for encrypting data transmitted by a through-the-earth wireless detonator controller according to claim 6, wherein the data of the through-the-earth communication frame structure encapsulated by the controller further comprises CRC16 check bits, and the frame structure comprises a frame header, the initialization vector, encrypted data, CRC16 check bits and a frame tail; The wireless detonator receives the through-the-earth communication frame structure data, calculates CRC16 check values of an initialization vector and encrypted data in the frame, compares the CRC16 check values with CRC16 check bits in a frame body, performs frame head and frame tail validity verification after the comparison is consistent, and directly discards the through-the-earth communication frame structure data when the comparison is inconsistent; the AES key generated by the controller is a 256-bit random number, the RSA key pair generated by the wireless detonator is 2048-bit in specification, the controller calls the RSA encryption module to encrypt the 256-bit AES key to generate a 2048-bit RSA encryption key package, and the wireless detonator decrypts and extracts the 256-bit AES key to finish loading and storing.

Description

Encryption method for transmission data of through-the-earth wireless detonator controller Technical Field The application relates to the technical field of wireless detonators, in particular to a transmission data encryption method of a through-the-earth wireless detonator controller. Background In the existing through-the-earth wireless detonator communication scheme, the transmission data are encrypted by adopting traditional encryption algorithms such as DES, 3DES and the like, the key transmission links are sent by a plaintext or simple symmetrical encryption mode, and part of schemes do not even encrypt the data in a through-the-earth transmission mode, so that the security of the data transmission is ignored. Therefore, the prior art has the problems of low encryption security, high key transmission risk and poor security suitability. Disclosure of Invention The application mainly aims to provide a transmission data encryption method for a through-the-earth wireless detonator controller, which aims to solve the technical problems in the background technology. In order to achieve the above object, the present application provides a method for encrypting transmission data of a through-the-earth wireless detonator controller, comprising: The controller acquires a plurality of wireless detonator information; According to the wireless detonator information, the controller sends a new round of operation instruction and a key generation triggering instruction to the wireless detonator information, the controller information and the date information are synchronously sent to obtain RSA public keys generated by the wireless detonators, wherein the RSA public keys represent the wireless detonators, the RSA public keys and RSA private keys are generated according to the controller information and the date information sent to the wireless detonators by the controller through a built-in algorithm, the RSA public keys are fed back to the controller, and the RSA private keys are reserved in the wireless detonators; The controller generates a random number as an AES key, invokes an RSA encryption module, encrypts the AES key by using the acquired RSA public key, and generates an RSA encryption key package; The controller sends the RSA encryption key packet to the wireless detonator, the wireless detonator calls an RSA decryption module, decrypts the RSA encryption key packet by using a reserved RSA private key, and extracts an AES key; And storing the AES key in an AES decryption module in the wireless detonator, wherein when the controller sends frame structure data to the wireless detonator, the wireless detonator can decrypt by using the AES key in the AES decryption module to obtain the original data sent by the controller. In some implementations, the step of obtaining the plurality of wireless detonator information by the controller includes: The controller is connected with the wireless detonators in a wired communication mode, and acquires the identity information of each wireless detonator one by one in a serial bus communication mode to finish acquisition of the information of the plurality of wireless detonators. In some embodiments, the step of sending, by the controller, a new round of operation instruction and a key generation trigger instruction to the wireless detonator according to a plurality of pieces of wireless detonator information, and sending the controller information and date information synchronously to obtain RSA public keys generated by the plurality of wireless detonators includes: The controller sends a new round of operation instruction and a key generation triggering instruction to each wireless detonator in a wired communication mode, and synchronously transmits equipment information and date information of the controller; Generating a pair of 1024-bit RSA key pairs by combining the received device information and date information of the controller through a built-in algorithm, wherein the RSA key pairs comprise RSA public keys and RSA private keys, and each wireless detonator locally reserves the RSA private keys; And each wireless detonator feeds the generated RSA public key back to the controller in a wired communication mode, the controller receives the RSA public key of each wireless detonator, the controller checks each RSA public key in a hair-by-hair mode, the corresponding RSA public key is reserved when the RSA public keys are checked to be consistent, and the registration process is terminated when the RSA public keys are not matched. In some implementations, the controller generates a random number as the AES key, and invokes an RSA encryption module to encrypt the AES key with the obtained RSA public key, and generating the RSA encryption key package includes: The controller generates 128-bit random numbers through a built-in true random number generator, and uses the 128-bit random numbers as AES keys to call a built-in RSA encryption module, and encrypts the generated