CN101582885A - Encryption and authentication method for communication software - Google Patents

Encryption and authentication method for communication software Download PDF

Info

Publication number
CN101582885A
CN101582885A CNA2009100596409A CN200910059640A CN101582885A CN 101582885 A CN101582885 A CN 101582885A CN A2009100596409 A CNA2009100596409 A CN A2009100596409A CN 200910059640 A CN200910059640 A CN 200910059640A CN 101582885 A CN101582885 A CN 101582885A
Authority
CN
China
Prior art keywords
transmit leg
recipient
communication system
feature
identification cipher
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2009100596409A
Other languages
Chinese (zh)
Inventor
卢军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Yuyin Technology Co., Ltd.
Original Assignee
Sichuan Ucwis Information & Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Ucwis Information & Technology Co Ltd filed Critical Sichuan Ucwis Information & Technology Co Ltd
Priority to CNA2009100596409A priority Critical patent/CN101582885A/en
Publication of CN101582885A publication Critical patent/CN101582885A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The invention relates to an encryption and authentication method for communication software, which is applicable to encryption and authentication for intercommunication software. The applied environment of the invention requires that a receiver can obtain the characteristics of a sender when the receiver receives the communication message sent by the sender in the communication system. The invention is applicable to communication between part A and part B, the process of part B sending message to part A is the same as that of part A sending message to part B. The keypoint of the invention is that in every process of the communication, identity authentication is carried out on the sender by the receiver, if identity password sent by the sender is wrong, the receiver discards the received communication message so that illegal sender cannot send messages correctly. The method in the invention ensures that if the software of the sender is decrypted, the decrypted software of the sender can not be in normal use as long as the software of the receiver is not decrypted.

Description

A kind of encryption and authentication method for communication software
Technical field
The present invention relates to software technology field.
Technical background
Encrypt, just might be decrypted.Common encryption method is as long as the cracker deciphers the function that just can use encryption software behind the software of own use.
At communication software, this encryption method has overcome this drawback.In communication software, this encryption method can all will prevent that transmit leg from using decryption software through a transmit leg validity checking when each communication.
Even if cracked the communication software that self uses so this encryption method can be guaranteed the cracker, but as long as recipient's communication software is not cracked, the cracker also can't use normally to crack and send message to the recipient so.
The characteristics of this encryption and authentication method are exactly: each communication all can be carried out the transmit leg authentication by the recipient.Unless this has guaranteed all recipient's software is all cracked, otherwise can't guarantee that the recipient can normally receive the message that sends from a transmit leg that cracks.
Summary of the invention
For solving the decrypted problem of communication software, the invention provides a kind of communication software encrypted authentication system, comprising: communication system S, transmit leg A, recipient B, transmit leg identification cipher P A, recipient's identification cipher P B, transmit leg feature V A, recipient's feature V B, encryption algorithm F, transmission content T.
Described communication system S is used to described transmit leg A and described recipient B that a kind of platform of communication capacity is provided;
Described transmit leg A is used for described transmit leg identification cipher P AWith send the communication end point that content T sends to the described communication system S of described recipient B;
Described recipient B, whether be used to receive message and can analyze described transmit leg A is the communication end point of the described communication system S of validated user;
Described transmit leg feature V A, be used for character pair at the described transmit leg A of described communication system S sign;
Described recipient's feature V B, be used for character pair at the described recipient B of described communication system S sign;
Described transmit leg identification cipher P A, whether be used at the described transmit leg A of described communication system S sign is one group of information of validated user;
Described recipient's identification cipher P B, whether be used at the described recipient B of described communication system S sign is one group of information of validated user;
Described encryption algorithm F is used for described communication system S, utilizes described transmit leg feature V A(or described recipient's feature V B) calculate transmit leg identification cipher P A(or recipient's identification cipher P B) a kind of cryptographic algorithm.
Wherein, described transmit leg A will send the identification cipher P of described transmit leg ASo that whether described recipient B can judge described transmit leg A is validated user.
Wherein, described recipient B can receive the identification cipher P that comprises described transmit leg AInformation and can be according to described transmit leg feature V AComputations goes out the identification cipher F (V of described transmit leg A A), and the identification cipher F (V of the described transmit leg A that will calculate A) with the identification cipher P of the described transmit leg that receives ACompare, judge whether transmit leg is validated user.
If it is legitimate sender that described recipient B judges described transmit leg A, then receive message.Otherwise dropping packets.
Description of drawings
Fig. 1 is the implementation process of system among the embodiment.
Embodiment
1, encryption algorithm F has all been realized in transmit leg A and recipient B inside.Encryption algorithm F is maintained secrecy to the user.Transmit leg A to the message content that recipient B sends is: identification cipher P A+ transmission content T;
2, after recipient B received communication message, recipient B was at first with the S of query communication system, thus the feature V of acquisition transmit leg A, recipient B uses the feature V of encryption algorithm F according to transmit leg then AComputations goes out its identification cipher F (V A), recipient B compares F (V then A) and P AIf, F (V A)=P A, transmit leg A is exactly a validated user so, and recipient B can receive this message, otherwise transmit leg A is exactly the disabled user, and recipient B abandons this message.
The present invention judges the identity of transmit leg by the recipient at every turn in communication process, thereby the software that can avoid being cracked uses normal communication function.

Claims (6)

1, a kind of encryption and authentication method for communication software is characterized in that, comprising: communication system S, transmit leg A, recipient B, transmit leg identification cipher P A, recipient's identification cipher P B, transmit leg feature V A, recipient's feature V B, encryption algorithm F, transmission content T.
Described communication system S is used to described transmit leg A and described recipient B that a kind of platform of communication capacity is provided;
Described transmit leg A is used for described transmit leg identification cipher P AWith send the communication end point that content T sends to the described communication system S of described recipient B;
Described recipient B, whether be used to receive message and can analyze described transmit leg A is the communication end point of the described communication system S of validated user;
Described transmit leg feature V A, be used for character pair at the described transmit leg A of described communication system S sign;
Described recipient's feature V B, be used for character pair at the described recipient B of described communication system S sign;
Described transmit leg identification cipher P A, whether be used at the described transmit leg A of described communication system S sign is one group of information of validated user;
Described recipient's identification cipher P B, whether be used at the described recipient B of described communication system S sign is one group of information of validated user;
Described transmission content T is used to fill the message that described transmit leg A sends to described recipient B;
Described encryption algorithm F is used for described communication system S, utilizes described transmit leg feature V A(or described recipient's feature V B) calculate transmit leg identification cipher P A(or recipient's identification cipher P B) a kind of cryptographic algorithm.
2, system according to claim 1 is characterized in that, described transmit leg A will send described transmit leg identification cipher P ASo that whether described recipient B can judge described transmit leg A is validated user.
3, system according to claim 1 is characterized in that, described recipient B can receive and comprise described transmit leg identification cipher P ACommunication message and can inquire about described communication system S and obtain described transmit leg feature V A, utilize described encryption algorithm F to calculate the identification cipher F (V of described transmit leg A then A), and with the identification cipher F (V that calculates A) with the described transmit leg identification cipher P that receives ACompare, judge whether described transmit leg A is validated user.
4, system according to claim 1 is characterized in that, described communication system S must have a kind of feature of the described transmit leg A of a group id (or described recipient B), promptly described transmit leg feature V A(or described recipient's feature V B).
5, according to claim 2, it is characterized in that described transmit leg identification cipher P A(or described transmit leg identification cipher P B) be that whether the described transmit leg A of a group id (or described recipient B) is one group of information of validated user among the described communication system S.
6, according to claim 3, it is characterized in that, in described communication system S, can provide inquiry service for the recipient, make described recipient B when receiving message, obtain the described transmit leg feature V of described transmit leg A A
CNA2009100596409A 2009-06-17 2009-06-17 Encryption and authentication method for communication software Pending CN101582885A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2009100596409A CN101582885A (en) 2009-06-17 2009-06-17 Encryption and authentication method for communication software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2009100596409A CN101582885A (en) 2009-06-17 2009-06-17 Encryption and authentication method for communication software

Publications (1)

Publication Number Publication Date
CN101582885A true CN101582885A (en) 2009-11-18

Family

ID=41364848

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2009100596409A Pending CN101582885A (en) 2009-06-17 2009-06-17 Encryption and authentication method for communication software

Country Status (1)

Country Link
CN (1) CN101582885A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105262759A (en) * 2015-10-29 2016-01-20 桂林力拓信息科技有限公司 Method and system for encrypted communication

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105262759A (en) * 2015-10-29 2016-01-20 桂林力拓信息科技有限公司 Method and system for encrypted communication
CN105262759B (en) * 2015-10-29 2018-11-27 桂林力拓信息科技有限公司 A kind of method and system of coded communication

Similar Documents

Publication Publication Date Title
CN103166958B (en) A kind of guard method of file and system
US10084760B2 (en) Secure messages for internet of things devices
IL261137A (en) System and method for performing secure communications
CN101272616B (en) Safety access method of wireless metropolitan area network
WO2013032671A4 (en) Methods and apparatus for source authentication of messages that are secured with a group key
CN108737323B (en) Digital signature method, device and system
CN102006303B (en) Method and terminal for increasing data transmission safety by using multi-encryption method
CN104506515A (en) Firmware protection method and firmware protection device
TWI581599B (en) Key generation system, data signature and encryption system and method
HRP20090506T1 (en) A method of encrypting and transferring data between a sender and a receiver using a network
CN101715638A (en) Secure electronic messaging system requiring key retrieval for deriving decryption key
KR101675332B1 (en) Data commincaiton method for vehicle, Electronic Control Unit and system thereof
CN103338437A (en) Encryption method and system of mobile instant message
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
WO2012087692A4 (en) System and method for secure communications in a communication system
CN112491550B (en) Mobile terminal equipment credibility authentication method and system based on Internet of vehicles
CN105141635A (en) Method and system for safe communication of group sending messages
CN104009842A (en) Communication data encryption and decryption method based on DES encryption algorithm, RSA encryption algorithm and fragile digital watermarking
CN106549858B (en) Instant messaging encryption method based on identification password
CN103167494B (en) Method for sending information and system
Thomas et al. An encryption protocol for end-to-end secure transmission of SMS
CN109600374A (en) Secure user data sending method and its system based on block chain
KR102567737B1 (en) Method providing secure message service and apparatus therefor
CN108964895B (en) User-to-User identity authentication system and method based on group key pool and improved Kerberos
KR101481403B1 (en) Data certification and acquisition method for vehicle

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: CHENGDU YUYIN TECHNOLOGY CO., LTD.

Free format text: FORMER OWNER: SICHUAN HUATING WEISI INFORMATION TECHNOLOGY CO., LTD.

Effective date: 20100205

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20100205

Address after: Sichuan city in Chengdu Province Road A Times Square No. 2 room 1807 post encoding: 610016

Applicant after: Chengdu Yuyin Technology Co., Ltd.

Address before: 401, North building, Jinjiang times garden, 107 west Jinli Street Road, Sichuan, Chengdu Province, China: 610041

Applicant before: Sichuan UCWIS Information & Technology Co., Ltd.

DD01 Delivery of document by public notice

Addressee: Chengdu Yuyin Technology Co., Ltd. Tan Gang

Document name: the First Notification of an Office Action

DD01 Delivery of document by public notice

Addressee: Chengdu Yuyin Technology Co., Ltd. Tan Gang

Document name: Notification that Application Deemed to be Withdrawn

C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20091118