CN112367323A - Text end-to-end encryption and decryption system and method of intelligent terminal - Google Patents

Text end-to-end encryption and decryption system and method of intelligent terminal Download PDF

Info

Publication number
CN112367323A
CN112367323A CN202011249003.0A CN202011249003A CN112367323A CN 112367323 A CN112367323 A CN 112367323A CN 202011249003 A CN202011249003 A CN 202011249003A CN 112367323 A CN112367323 A CN 112367323A
Authority
CN
China
Prior art keywords
decryption
text
encryption
module
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011249003.0A
Other languages
Chinese (zh)
Other versions
CN112367323B (en
Inventor
高原英
王文庆
邓楠轶
董夏昕
介银娟
刘超飞
毕玉冰
朱博迪
崔逸群
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Thermal Power Research Institute Co Ltd
Original Assignee
Xian Thermal Power Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Thermal Power Research Institute Co Ltd filed Critical Xian Thermal Power Research Institute Co Ltd
Priority to CN202011249003.0A priority Critical patent/CN112367323B/en
Publication of CN112367323A publication Critical patent/CN112367323A/en
Application granted granted Critical
Publication of CN112367323B publication Critical patent/CN112367323B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates

Abstract

The invention discloses a text end-to-end encryption and decryption system and a text end-to-end encryption and decryption method for an intelligent terminal, wherein the system comprises an input monitoring module, a decryption module and an encryption module, and the text encryption and decryption system is interacted with a screen, a keyboard/input method and a text selector in the intelligent terminal through the input monitoring module; the input monitoring module captures the input of a keyboard/input method, transmits the captured plaintext data to the encryption module for text encryption, receives encrypted text data returned by the encryption module, and replaces the plaintext input by the keyboard/input method with the encrypted text; the input monitoring module receives the ciphertext text data of the text selector as input, transmits the ciphertext text data to the decryption module, receives a decryption result returned by the decryption module, and displays the decryption result on a screen of the intelligent terminal device; the system and the method of the invention do not depend on specific communication application, and the user can use the system and the method under any communication application.

Description

Text end-to-end encryption and decryption system and method of intelligent terminal
Technical Field
The invention relates to the technical field of intelligent terminals, in particular to a text end-to-end encryption and decryption system and method of an intelligent terminal.
Background
With the increasingly widespread use of smart terminals such as smart phones and tablet computers in daily life, the smart terminals are inseparable from the lives of people. Among them, the most widely and frequently used are various instant messaging applications, and text information is the most commonly used communication method for people. However, during the use of the instant messaging application, the privacy information of the user, especially the chat information, is at risk of being stolen or collected. The end-to-end encryption built in the communication application cannot technically guarantee that the application cannot collect user privacy, and the encryption and decryption scheme independent of the communication application is used for requiring the user to switch between different applications.
Disclosure of Invention
In order to overcome the problems in the prior art, the invention aims to provide a system and a method for end-to-end encryption and decryption of text information, which are convenient and easy to use in an intelligent terminal, do not depend on specific communication applications, and can be used by users under any communication applications.
In order to achieve the purpose, the invention adopts the following technical scheme:
a text end-to-end encryption and decryption system of an intelligent terminal comprises an input monitoring module 111, a decryption module 112 and an encryption module 113, wherein a text encryption and decryption system 11 interacts with a screen 101, a keyboard/input method 102 and a text selector 103 in the intelligent terminal 10 through the input monitoring module 111;
the input monitoring module 111 captures the input of the keyboard/input method 102, transmits the captured plaintext data to the encryption module 113 for text encryption, receives the encrypted text data returned by the encryption module 113, and replaces the plaintext input by the keyboard/input method 102 with the encrypted text; the input monitoring module 111 receives the ciphertext text data of the text selector 103 as input, transmits the ciphertext text data to the decryption module 112, receives a decryption result returned by the decryption module 112, and displays the decryption result on the screen 101 of the intelligent terminal device;
the decryption module 112 stores public keys of other encryption and decryption systems input by a user, receives encrypted text information input to the monitoring module 111, decrypts the encrypted text information by using the public keys of the other encryption and decryption systems stored in the decryption module 112 to obtain a plaintext text set, scores the plaintext text set, and transmits a decryption result back to the input monitoring module 111;
the encryption module 113 is used to generate and store a private key/public key pair of the system, and provide the public key of the system to the user, so that the user can transmit the public key to encryption and decryption systems in other terminals; the encryption module 113 receives the plaintext data captured by the input monitoring module 111, encrypts the received plaintext data using the local private key stored in the encryption module 113, and transmits the encrypted result back to the input monitoring module 111.
The encryption and decryption method of the text end-to-end encryption and decryption system of the intelligent terminal comprises the following steps:
step 1: before text encryption and decryption, two intelligent terminals for communication need to perform preparation work:
1) the two intelligent terminals respectively use the encryption module 113 to generate private key/public key pairs of respective encryption and decryption systems;
2) users of the two intelligent terminals respectively transmit the public keys of the terminal to the user of the opposite terminal through a trusted channel;
3) the users of the two terminals respectively input the public keys of the opposite terminals into the decryption module 112 of the terminal;
step 2: the text end-to-end encryption process of the intelligent terminal specifically comprises the following steps:
1) when the text encryption is started and the keyboard/input method 102 is awakened, the input monitoring module 111 captures the user input and transmits the input plaintext data to the encryption module 113;
2) the encryption module 113 encrypts the received plaintext by using the stored private key, and returns the encryption result to the input monitoring module 111;
3) the input monitoring module 111 replaces the plaintext input by the keyboard/input method 102 with the ciphertext text, and at this time, the plaintext text in the input frame seen by the user is replaced by the ciphertext text for display;
4) the user can directly send the ciphertext text information;
and step 3: the text end-to-end decryption process of the intelligent terminal specifically comprises the following steps:
1) after receiving the ciphertext text information sent by other encryption and decryption systems, the user uses the text selector 103 to select to decrypt the ciphertext text information;
2) the decryption module 112 uses the public keys of other encryption and decryption systems stored therein, centralizes each public key to decrypt the ciphertext text information respectively, and obtains a plaintext text set;
3) the decryption module 112 uses the common character set of the current system language to score each plaintext in the plaintext text set, and examines whether the result is a successful decryption result;
4) judging whether the score of the plaintext exceeds a set value or not;
5) if so, the decryption is considered to be successful, the plaintext information with the highest score is a correct result, and the result is directly displayed on the screen 101 for the user to check;
6) otherwise, the decryption module of the system is determined to not store the public key capable of decrypting the ciphertext text, the decryption fails, and the decryption failure of the user is prompted on the screen 101;
7) when the decryption fails or is unnecessary after the decryption succeeds, inquiring whether the user wants to appoint a public key to decrypt the ciphertext text;
8) when the user selects to decrypt using the specified public key, the plaintext information decrypted by the specified public key is displayed on the screen 101.
Compared with the prior art, the invention has the following advantages:
compared with an end-to-end encryption and decryption method built in the communication application, the method is independent of the communication application, and eliminates the risk of communication information collection by the communication application.
Compared with an independent encryption and decryption system, the encryption and decryption system is convenient to use, can be embedded into any communication application to be implemented in the using process, and enables a user not to switch between the encryption and decryption system and the communication application back and forth.
Drawings
Fig. 1 is a structural diagram of a text end-to-end encryption and decryption system of an intelligent terminal.
Fig. 2 is a flowchart of public key exchange in the encryption and decryption method of the intelligent terminal in the embodiment.
Fig. 3 is a flowchart of an encryption and information transmission by an information transmitting end in the encryption and decryption method of the intelligent terminal in the embodiment.
Fig. 4 is a flowchart of information decryption by an information receiving end in the encryption and decryption method of the intelligent terminal in the embodiment.
Detailed Description
The invention is further explained with reference to the drawings and the embodiments.
As shown in fig. 1, the text end-to-end encryption and decryption system of an intelligent terminal according to the present invention, the text encryption and decryption system 11 includes an input monitoring module 111, a decryption module 112 and an encryption module 113, and the text encryption and decryption system 11 interacts with a screen 101, a keyboard/input method 102 and a text selector 103 in the intelligent terminal 10 through the input monitoring module 111.
The screen 101 is a hardware device commonly used in the smart terminal device, and is used for displaying the terminal information and the data processing result to the user.
Keyboard/input method 102 is an intelligent terminal input component, and may be a soft keyboard or an input method, or may be a hardware keyboard.
The text selector 103 is a software component of the intelligent terminal and is used for selecting a text segment and popping up an option to operate on the text.
The input monitoring module 111 captures the input of the keyboard/input method 102, transmits the captured plaintext data to the encryption module 113 for text encryption, receives the encrypted text data returned by the encryption module 113, and replaces the plaintext input by the keyboard/input method 102 with the encrypted text; the input monitoring module 111 receives the ciphertext text data of the text selector 103 as input, transmits the ciphertext text data to the decryption module 112, receives a decryption result returned by the decryption module 112, and displays the decryption result on the screen 101 of the intelligent terminal device.
The decryption module 112 stores public keys of other encryption and decryption systems input by the user, receives the encrypted text information input to the monitoring module 111, decrypts the encrypted text information by using the public keys of the other encryption and decryption systems stored in the decryption module 112 to obtain a plaintext text set, scores the plaintext text set, and transmits a decryption result back to the input monitoring module 111.
The encryption module 113 is used to generate and store a private key/public key pair of the system, and provide the public key of the system to the user, so that the user can transmit the public key to the encryption and decryption system in other terminals; the encryption module 113 receives the plaintext data captured by the input monitoring module 111, encrypts the received plaintext data using the local private key stored in the encryption module 113, and transmits the encrypted result back to the input monitoring module 111.
Fig. 2 shows preparation work required by two intelligent terminals for communication before text encryption and decryption.
Step 1: the two intelligent terminals respectively use the encryption module 113 to generate private key/public key pairs of the respective encryption and decryption systems.
Step 2: and the users of the two intelligent terminals respectively transmit the public keys of the terminal to the user of the opposite terminal through a trusted channel.
And step 3: the users of the two terminals input the public keys of the opposite terminals into the decryption module 112 of the terminal.
Fig. 3 is a flowchart of a text end-to-end encryption method for an intelligent terminal according to an embodiment, which mainly includes the following steps:
step 301, when the keyboard/input method 102 is awakened when the text encryption is turned on, the input monitoring module 111 captures the user input and transmits the input plaintext data to the encryption module 113.
In step 302, the encryption module 113 encrypts the received plaintext using the stored private key, and returns the encryption result to the input monitoring module 111.
Step 303, the input monitoring module 111 replaces the plaintext input by the keyboard/input method 102 with the ciphertext text, and at this time, the plaintext text in the input box seen by the user is replaced by the ciphertext text for displaying.
Step 304, the user can directly send the ciphertext text message.
Fig. 4 is a flowchart of an end-to-end decryption method for a text of an intelligent terminal according to an embodiment, which mainly includes the following steps:
step 401, after receiving the ciphertext text information sent by other encryption and decryption systems, the user uses the text selector 103 to select to decrypt the ciphertext text information.
In step 402, the decryption module 112 uses the public keys of other encryption and decryption systems stored therein, and each public key in the set is used to decrypt the ciphertext text information to obtain a plaintext text set.
In step 403, the decryption module 112 scores each plaintext in the plaintext text set using the common character set C of the current system language L, and examines whether the result is a successful decryption result.
Step 404, determining whether the score of the plaintext exceeds a set value S.
And 405, if so, determining that the decryption is successful, and directly displaying the plaintext information with the highest score on the screen 101 for the user to view, wherein the plaintext information with the highest score is a correct result.
Step 406, otherwise, it is determined that the public key capable of decrypting the ciphertext text is not stored in the decryption module of the system, and the decryption fails, and the decryption failure is prompted to the user on the screen 101.
Step 407, when the decryption fails, or the decryption is not necessary after the decryption succeeds, inquiring whether the user wants to specify a public key to decrypt the ciphertext text.
Step 408, when the user selects to use the specified public key for decryption, the plaintext information decrypted by the specified public key is displayed on the screen 101.

Claims (2)

1. A text end-to-end encryption and decryption system of an intelligent terminal is characterized in that: the intelligent terminal comprises an input monitoring module (111), a decryption module (112) and an encryption module (113), wherein a text encryption and decryption system (11) interacts with a screen (101), a keyboard/input method (102) and a text selector (103) in the intelligent terminal (10) through the input monitoring module (111);
the input monitoring module (111) captures the input of the keyboard/input method (102), transmits the captured plaintext data to the encryption module (113) for text encryption, receives encrypted text data transmitted back by the encryption module (113), and replaces the plaintext input by the keyboard/input method (102) with the encrypted text; the input monitoring module (111) receives the ciphertext text data of the text selector (103) as input, transmits the ciphertext text data to the decryption module (112), receives a decryption result returned by the decryption module (112), and displays the decryption result on a screen (101) of the intelligent terminal device;
the decryption module (112) stores public keys of other encryption and decryption systems input by a user, receives the encrypted text information input to the monitoring module (111), decrypts the encrypted text information by using the public keys of the other encryption and decryption systems stored in the decryption module (112) to obtain a plaintext text set, scores the plaintext text set, and transmits a decryption result back to the input monitoring module (111);
the encryption module (113) is used for generating and storing a private key/public key pair of the system, and providing the public key of the system for a user so that the user can transmit the public key to encryption and decryption systems in other terminals; the encryption module (113) receives the plaintext data captured by the input monitoring module (111), encrypts the received plaintext data using the local private key stored in the encryption module (113), and transmits the encrypted result back to the input monitoring module (111).
2. The encryption and decryption method of the text end-to-end encryption and decryption system of the intelligent terminal according to claim 1, characterized in that: the method comprises the following steps:
step 1: before text encryption and decryption, two intelligent terminals for communication need to perform preparation work:
1) the two intelligent terminals respectively use the encryption module (113) to generate private key/public key pairs of respective encryption and decryption systems;
2) users of the two intelligent terminals respectively transmit the public keys of the terminal to the user of the opposite terminal through a trusted channel;
3) the users of the two terminals respectively input the public keys of the opposite terminals into a decryption module (112) of the terminal;
step 2: the text end-to-end encryption process of the intelligent terminal specifically comprises the following steps:
1) when text encryption is started and the keyboard/input method (102) is awakened, the input monitoring module (111) captures user input and transmits input plaintext text data to the encryption module (113);
2) the encryption module (113) encrypts the received plaintext by using the stored private key and transmits the encrypted result back to the input monitoring module (111);
3) the input monitoring module (111) replaces the plaintext input by the keyboard/input method (102) with the ciphertext text, and the plaintext text in the input frame seen by the user is replaced by the ciphertext text for display;
4) the user can directly send the ciphertext text information;
and step 3: the text end-to-end decryption process of the intelligent terminal specifically comprises the following steps:
1) after receiving the ciphertext text information sent by other encryption and decryption systems, the user uses a text selector (103) to select to decrypt the ciphertext text information;
2) the decryption module (112) uses the public keys of other encryption and decryption systems stored in the decryption module, and each public key is concentrated to decrypt the ciphertext text information respectively to obtain a plaintext text set;
3) the decryption module (112) scores each plaintext in the plaintext text set by using the common character set of the current system language, and whether the result is a successful decryption result is examined;
4) judging whether the score of the plaintext exceeds a set value or not;
5) if yes, the decryption is considered to be successful, the plaintext information with the highest score is a correct result, and the plaintext information is directly displayed on a screen (101) for a user to check;
6) otherwise, the decryption module of the system is determined to not store the public key capable of decrypting the ciphertext text, the decryption fails, and the decryption failure of the user is prompted on the screen (101);
7) when the decryption fails or is unnecessary after the decryption succeeds, inquiring whether the user wants to appoint a public key to decrypt the ciphertext text;
8) when the user selects to decrypt using the specified public key, the plaintext information decrypted by the specified public key is displayed on a screen (101).
CN202011249003.0A 2020-11-10 2020-11-10 Text end-to-end encryption and decryption system and method of intelligent terminal Active CN112367323B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011249003.0A CN112367323B (en) 2020-11-10 2020-11-10 Text end-to-end encryption and decryption system and method of intelligent terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011249003.0A CN112367323B (en) 2020-11-10 2020-11-10 Text end-to-end encryption and decryption system and method of intelligent terminal

Publications (2)

Publication Number Publication Date
CN112367323A true CN112367323A (en) 2021-02-12
CN112367323B CN112367323B (en) 2023-04-25

Family

ID=74508632

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011249003.0A Active CN112367323B (en) 2020-11-10 2020-11-10 Text end-to-end encryption and decryption system and method of intelligent terminal

Country Status (1)

Country Link
CN (1) CN112367323B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113709024A (en) * 2021-07-20 2021-11-26 荣耀终端有限公司 Data transmission method, medium and electronic device thereof

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104270517A (en) * 2014-09-23 2015-01-07 中兴通讯股份有限公司 Information encryption method and mobile terminal
WO2015093898A1 (en) * 2013-12-20 2015-06-25 삼성전자주식회사 Method and apparatus for transmitting and receiving encrypted message between terminals
CN105516157A (en) * 2015-12-16 2016-04-20 上海交通大学 Independent encryption based network information safe input system and method
US20160360402A1 (en) * 2013-12-20 2016-12-08 Samsung Electronics Co., Ltd. Method and apparatus for transmitting and receiving encrypted message between terminals
WO2017080356A1 (en) * 2015-11-09 2017-05-18 国民技术股份有限公司 Secure input method, device and system
CN111212068A (en) * 2019-12-31 2020-05-29 熵加网络科技(北京)有限公司 Method for encrypting and decrypting characters by input method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015093898A1 (en) * 2013-12-20 2015-06-25 삼성전자주식회사 Method and apparatus for transmitting and receiving encrypted message between terminals
US20160360402A1 (en) * 2013-12-20 2016-12-08 Samsung Electronics Co., Ltd. Method and apparatus for transmitting and receiving encrypted message between terminals
CN104270517A (en) * 2014-09-23 2015-01-07 中兴通讯股份有限公司 Information encryption method and mobile terminal
WO2017080356A1 (en) * 2015-11-09 2017-05-18 国民技术股份有限公司 Secure input method, device and system
CN105516157A (en) * 2015-12-16 2016-04-20 上海交通大学 Independent encryption based network information safe input system and method
CN111212068A (en) * 2019-12-31 2020-05-29 熵加网络科技(北京)有限公司 Method for encrypting and decrypting characters by input method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113709024A (en) * 2021-07-20 2021-11-26 荣耀终端有限公司 Data transmission method, medium and electronic device thereof

Also Published As

Publication number Publication date
CN112367323B (en) 2023-04-25

Similar Documents

Publication Publication Date Title
US20200084621A1 (en) Wireless network connection method, apparatus, and system
CN1098581C (en) Use of an encryption server for encrypting messages
CN104660589B (en) Method, system and terminal for encrypting control and information analysis of information
US10791124B2 (en) Method and terminal device for encrypting message
CN104270516B (en) Decryption method and mobile terminal
CN107579903B (en) Picture message secure transmission method and system based on mobile device
CN108390755B (en) Safety input method of SIM (subscriber identity Module) film-pasting card based on built-in safety chip
CN114257562B (en) Instant messaging method, device, electronic equipment and computer readable storage medium
CN102098307A (en) Password type instant message (IM) encryption method and system in self-service bank
JP2004147006A (en) Information transmitting method and portable terminal
CN101841785B (en) Method for sending encrypted message by cellphone and system thereof
CN112367323B (en) Text end-to-end encryption and decryption system and method of intelligent terminal
CN112243000B (en) Application data processing method and device, computer equipment and storage medium
CN111818466A (en) Information sending and receiving method and device, electronic equipment and readable storage medium
CN115776413B (en) Iris encryption-based data transmission method and system
CN106972928B (en) Bastion machine private key management method, device and system
CN115051790A (en) Data encryption method, data decryption method and device, and storage medium
CN106385684B (en) Method and device for sharing wireless network and method and device for accessing wireless network
CN104994160B (en) Document transmission method and relevant apparatus and Transmission system
CN109104361B (en) Instant messaging method, instant messaging device, electronic equipment and storage medium
WO2018082237A1 (en) Password input method and apparatus
EP3310017A1 (en) Electronic device for two factor authentication
CN113452530B (en) Information transmission method and device
CN115277192B (en) Information encryption method and device and electronic equipment
KR20180135732A (en) Contents exchange method based on interaction between users and system performing the same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant