CN103546274A - Method for achieving dynamic short message encryption between cell-phone application procedure and host - Google Patents

Method for achieving dynamic short message encryption between cell-phone application procedure and host Download PDF

Info

Publication number
CN103546274A
CN103546274A CN201310519870.5A CN201310519870A CN103546274A CN 103546274 A CN103546274 A CN 103546274A CN 201310519870 A CN201310519870 A CN 201310519870A CN 103546274 A CN103546274 A CN 103546274A
Authority
CN
China
Prior art keywords
note
mobile phone
time
timestamp
short message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310519870.5A
Other languages
Chinese (zh)
Other versions
CN103546274B (en
Inventor
曾连军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Xinyang Electronic Technology Co ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201310519870.5A priority Critical patent/CN103546274B/en
Publication of CN103546274A publication Critical patent/CN103546274A/en
Application granted granted Critical
Publication of CN103546274B publication Critical patent/CN103546274B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a method for achieving dynamic short message encryption between a cell-phone application procedure and a host. The cell-phone App sends a control short message to the host, and the content of the short message can be changed along with a timestamp, so that encryption is achieved; when the control short message is sent to the host by the cell-phone App, the content of the short message is changed along with change of time; due to the fact that the content of the short message is encrypted along with change of the time, the user cannot directly read the content of the short message, and the same short message cannot be used continuously after five minutes, so that the short message is prevented from being intercepted by other people for illegal use. The method is further suitable for data interaction in a non-short-message mode.

Description

The implementation method of dynamic encryption note between a kind of application program of mobile phone and main frame
Technical field
The present invention relates to single-chip microcomputer and built-in field, be applicable to the implementation method of dynamic encryption note between a kind of application program of mobile phone (App) of safety-security area and main frame.
Background technology
The mode that alarm host machine is in the market controlled by application program of mobile phone (App) mostly adopts note form to carry out parameter configuration or control to alarm host machine, because note is that clear-text way sends, be easy to like this allow other people grasp password or other confidentiality data of main frame.If do not adopt the form of SMS encryption, the communications protocol between note main control system is also just easy to allow other people obtain.The application program of mobile phone that the cost that enterprise costs a lot of money is made (App), will freely be shared by other people.And the master chip of the product of general security protection class mostly adopts single-chip microcomputer or embedded IC, especially adopt the main frame of single-chip microcomputer, because resource is few, can not bear complicated encryption method, and that this method takies resource is few, be particularly suitable for adopting the main frame of single-chip microcomputer or embedded IC.
Summary of the invention
Technical problem to be solved by this invention is to provide a kind of application program of mobile phone (App) and sends and control note to main frame, and short message content can stab variation in time, thus the implementation method of dynamic encryption note between the application program of mobile phone that realization is encrypted and main frame.
The present invention is achieved through the following technical solutions: the implementation method of dynamic encryption note between a kind of application program of mobile phone and main frame, application program of mobile phone (App) sends and controls note to main frame, short message content can stab variation in time, thereby realize, encrypts.
The implementation method of dynamic encryption note between application program of mobile phone and main frame, its concrete encrypting step is as follows:
Step 1: application program of mobile phone (APP) is write the text of controlling alarm host machine;
Step 2: obtain the current time of mobile phone, extract wherein time, minute, second, day, the moon be as the timestamp of dynamic encryption;
Step 3: step 1 and step 2 are carried out to XOR, realize for the first time and encrypting;
Step 4: the result of fixed password and step 3 is carried out to XOR, realize for the second time and encrypting;
Step 5: add to encrypt boot flag " $ $ 111 " and the character length of encryption section, form complete note.
An implementation method for dynamic encryption note between application program of mobile phone (App) and main frame, its concrete decryption step is as follows:
Step 1: obtain band " $ $ 111 " sign note;
Step 2: the character of fixed password and step 1 is carried out to XOR, realize deciphering for the first time;
Step 3: the timestamp after obtaining step two deciphering in text;
Step 4: whether the timestamp of determining step three and the error amount of current time in system in 5 minutes, if surpassed, are not just processed this note;
Step 5: the text after the timestamp of step 3 and timestamp is carried out to XOR, realize deciphering for the second time, obtain controlling really the text of alarm host machine.
As preferred technical scheme, the text of note is followed timestamp and is changed, and same note is only effective in 5 minutes.
The invention has the beneficial effects as follows: when application program of mobile phone (App) sends control note to main frame, the content of note is understood temporal evolution and is changed, because short message content temporal evolution is encrypted, therefore the direct content of short message reading of user, and same note, after 5 minutes, can not continue to use, prevent that other people from intercepting note and doing illegal use, and the also data interaction of applicable non-short message mode of this method.
Accompanying drawing explanation
For ease of explanation, the present invention is described in detail by following specific embodiment and accompanying drawing.
Fig. 1 is encryption flow figure of the present invention;
Fig. 2 is deciphering flow chart of the present invention.
Embodiment
As depicted in figs. 1 and 2, the implementation method of dynamic encryption note between a kind of application program of mobile phone of the present invention and main frame, application program of mobile phone (App) sends and controls note to main frame, and short message content can stab variation in time, thereby realize, encrypts.
The implementation method of dynamic encryption note between application program of mobile phone and main frame, its concrete encrypting step is as follows:
Step 1: application program of mobile phone (APP) is write the text of controlling alarm host machine;
Step 2: obtain the current time of mobile phone, extract wherein time, minute, second, day, the moon be as the timestamp of dynamic encryption;
Step 3: step 1 and step 2 are carried out to XOR, realize for the first time and encrypting;
Step 4: the result of fixed password and step 3 is carried out to XOR, realize for the second time and encrypting;
Step 5: add to encrypt boot flag " $ $ 111 " and the character length of encryption section, form complete note.
An implementation method for dynamic encryption note between application program of mobile phone (App) and main frame, its concrete decryption step is as follows:
Step 1: obtain band " $ $ 111 " sign note;
Step 2: the character of fixed password and step 1 is carried out to XOR, realize deciphering for the first time;
Step 3: the timestamp after obtaining step two deciphering in text;
Step 4: whether the timestamp of determining step three and the error amount of current time in system in 5 minutes, if surpassed, are not just processed this note;
Step 5: the text after the timestamp of step 3 and timestamp is carried out to XOR, realize deciphering for the second time, obtain controlling really the text of alarm host machine.
Wherein, the text of note is followed timestamp and is changed, and same note is only effective in 5 minutes.
Embodiment 1:
Table 1: transformat
Figure BSA0000096813700000031
Figure BSA0000096813700000041
Concrete implementation step is as follows:
One, dynamic encryption note is comprised of unencrypted note head (PackHead) and encryption section (Content) two parts, and complete dynamic encryption messaging format is in Table 1;
Two, establish the password that will encrypt, suppose that password is for " dinsafe ";
Three, timestamp binary-coded decimal: high 4 while being used for depositing, the minute, second of byte, day, month tens, low 4 while being used for depositing, the minute, second of byte, day, month units, the form of being write as 10 bit times stamps such as the time " 16:30:56 December 31 " for " 1630563112 ", the timestamp array of binary-coded decimal is " 16 30 56 31 12 ";
Four, the Content in binary-coded decimal timestamp and table 1 is partly carried out to XOR, realize the encryption to content for the first time;
Five, will in password " dinsafe " and table 1, can carry out XOR by encryption section, realize for the second time and encrypting, the object of encrypting is for the second time mainly that timestamp is encrypted;
Six, for example: current time " 16:30:56 December 31 ", the text of host computer control be " 123456#ZONE01=door " (totally 24 bytes), according to the form of table 1, the text before unencryption should for " 1630563112123456#ZONE01=door open! ".
Seven, encrypt for the first time (encryption to content), first by timestamp " 16 30 56 31 12 " and text " 123456#ZONE01=door " carry out XOR, can obtain new array (24 bytes) " 27 02 65 05 27 20 13 0C 7E 5C 53 00 67 0C 76 79 5F 24 11 7D 6,655 38 10 ";
Eight, encrypt for the second time (to encrypting again of timestamp and content), by fixed password " dinsafe " with timestamp and the array that after encrypting for the first time, content produces carry out XOR, can obtain 29 new byte arrays " 72 59 38 42 73 41 67 01 6C 49 53 72 6A 1B 38 3A 6E 14 6D10 1C 3B 4D 7F 0E 07 33 5D 74 ";
Nine, the text that array is converted to 58 bytes for "
72593842734167016C4953726A1B383A6E146D101C3B4D7F0E07335D74”;
Ten, add note labeling head " $ $ 111 " and 58 bytes of character length, complete transmission content is
“$$11105872593842734167016C4953726A1B383A6E146D101C3B4D7F0E07335D74”。
The invention has the beneficial effects as follows: when application program of mobile phone (App) sends control note to main frame, the content of note is understood temporal evolution and is changed, because short message content temporal evolution is encrypted, therefore the direct content of short message reading of user, and same note, after 5 minutes, can not continue to use, prevent that other people from intercepting note and doing illegal use, and the also data interaction of applicable non-short message mode of this method.
The above, be only the specific embodiment of the present invention, but protection scope of the present invention is not limited to this, and any variation of expecting without creative work or replacement, within all should being encompassed in protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range that claims were limited.

Claims (4)

1. an implementation method for dynamic encryption note between application program of mobile phone and main frame, is characterized in that: application program of mobile phone (App) sends and controls note to main frame, and short message content can stab variation in time, thereby realize, encrypts.
2. the implementation method of dynamic encryption note between application program of mobile phone according to claim 1 and main frame, its concrete encrypting step is as follows:
Step 1: application program of mobile phone (APP) is write the text of controlling alarm host machine;
Step 2: obtain the current time of mobile phone, extract wherein time, minute, second, day, the moon be as the timestamp of dynamic encryption;
Step 3: step 1 and step 2 are carried out to XOR, realize for the first time and encrypting;
Step 4: the result of fixed password and step 3 is carried out to XOR, realize for the second time and encrypting;
Step 5: add to encrypt boot flag " $ $ 111 " and the character length of encryption section, form complete note.
3. the implementation method of dynamic encryption note between application program of mobile phone according to claim 1 (App) and main frame, its concrete decryption step is as follows:
Step 1: obtain band " $ $ 111 " sign note;
Step 2: the character of fixed password and step 1 is carried out to XOR, realize deciphering for the first time;
Step 3: the timestamp after obtaining step two deciphering in text;
Step 4: whether the timestamp of determining step three and the error amount of current time in system in 5 minutes, if surpassed, are not just processed this note;
Step 5: the text after the timestamp of step 3 and timestamp is carried out to XOR, realize deciphering for the second time, obtain controlling really the text of alarm host machine.
4. the implementation method of dynamic encryption note between application program of mobile phone according to claim 1 (App) and main frame, is characterized in that: the text of note is followed timestamp and changed, and same note is only effective in 5 minutes.
CN201310519870.5A 2013-10-28 2013-10-28 Method for achieving dynamic short message encryption between cell-phone application procedure and host Active CN103546274B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310519870.5A CN103546274B (en) 2013-10-28 2013-10-28 Method for achieving dynamic short message encryption between cell-phone application procedure and host

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310519870.5A CN103546274B (en) 2013-10-28 2013-10-28 Method for achieving dynamic short message encryption between cell-phone application procedure and host

Publications (2)

Publication Number Publication Date
CN103546274A true CN103546274A (en) 2014-01-29
CN103546274B CN103546274B (en) 2017-02-08

Family

ID=49969357

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310519870.5A Active CN103546274B (en) 2013-10-28 2013-10-28 Method for achieving dynamic short message encryption between cell-phone application procedure and host

Country Status (1)

Country Link
CN (1) CN103546274B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106156571A (en) * 2015-03-31 2016-11-23 深圳指芯智能科技有限公司 Encrypting fingerprint instrument, encrypting fingerprint instrument encrypting and deciphering system and encipher-decipher method
CN113489589A (en) * 2021-09-06 2021-10-08 蜂巢能源科技有限公司 Data encryption and decryption method and device and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090214034A1 (en) * 2008-02-26 2009-08-27 Rohit Mehrotra Systems and methods for enabling electronic messaging with recipient-specific content
CN102905011A (en) * 2011-07-29 2013-01-30 康佳集团股份有限公司 Method for controlling computer to open and close by utilizing mobile phone
CN103517224A (en) * 2012-06-27 2014-01-15 中兴通讯股份有限公司 Method and system for controlling short message forwarding

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090214034A1 (en) * 2008-02-26 2009-08-27 Rohit Mehrotra Systems and methods for enabling electronic messaging with recipient-specific content
CN102905011A (en) * 2011-07-29 2013-01-30 康佳集团股份有限公司 Method for controlling computer to open and close by utilizing mobile phone
CN103517224A (en) * 2012-06-27 2014-01-15 中兴通讯股份有限公司 Method and system for controlling short message forwarding

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李昭,王跃武,雷灵光,张中文: "《基于动态密钥的Android短信加密方案》", 《中国科学院研究生院学报》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106156571A (en) * 2015-03-31 2016-11-23 深圳指芯智能科技有限公司 Encrypting fingerprint instrument, encrypting fingerprint instrument encrypting and deciphering system and encipher-decipher method
CN106156571B (en) * 2015-03-31 2019-08-09 深圳指芯智能科技有限公司 Encrypting fingerprint tool, encrypting fingerprint tool encrypting and deciphering system and encipher-decipher method
CN113489589A (en) * 2021-09-06 2021-10-08 蜂巢能源科技有限公司 Data encryption and decryption method and device and electronic equipment

Also Published As

Publication number Publication date
CN103546274B (en) 2017-02-08

Similar Documents

Publication Publication Date Title
CN104852922B (en) Big data encipher-decipher method based on distributed file system
US10735186B2 (en) Revocable stream ciphers for upgrading encryption in a shared resource environment
CN104113528A (en) Pre-posed gateway-based method and system for preventing sensitive information leakage
CN102567688B (en) File confidentiality keeping system and file confidentiality keeping method on Android operating system
KR102000244B1 (en) Blockchain system based on Zero Knowledge Proofs with Format-Preserving Encryption and control method thereof
CN104063334A (en) Encryption method and system based on data attributions
US20140136842A1 (en) Method and system for generating a secure message as a url message
US20160323100A1 (en) Key generation device, terminal device, and data signature and encryption method
CN104219234A (en) Security method of personal data in cloud storage
CN107483192A (en) A kind of data transmission method and device based on quantum communication
CN105447394A (en) Intelligent password key with local data encryption function
CN103559453A (en) Hardware encryption protection method and system for cellphone data
CN112291268A (en) Information transmission method, device, equipment and storage medium
US10972253B2 (en) Virtual enigma cipher
GB2529342A (en) Method and system for exchanging encrypted messages between computing devices in a communication network
CN203930840U (en) A kind of hardware encryption card
CN103546274A (en) Method for achieving dynamic short message encryption between cell-phone application procedure and host
CN204669402U (en) A kind of cloud data message encrypting and decrypting system based on USB flash disk
CN103458101A (en) Hardware encryption storage method and system of mobile phone private contacts
CN103336920A (en) Security system for wireless sensor network SOC
CN103577771A (en) Virtual desktop data leakage-preventive protection technology on basis of disk encryption
CN103605927A (en) Encryption and decryption method based on embedded Linux system
CN106845254A (en) A kind of encrypted data transmission line for computer
KR20140089703A (en) Method and apparatus for security of mobile data
CN102882897A (en) Cookie protecting method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20180802

Address after: 518000 turn over road 83, 501, Baoan District Xin'an street, Shenzhen, Guangdong

Patentee after: SHENZHEN GUZHUHUA INTELLIGENT TECHNOLOGY Co.,Ltd.

Address before: 516211 Huizhou, Huiyang, Guangdong province Zhen Long town Huang Hole Village Luo Li Wanli District 8 houses 703 rooms

Patentee before: Zeng Lianjun

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240205

Address after: Room 3501, No. 5 Fuchang Road, Haizhu District, Guangzhou City, Guangdong Province, 510000

Patentee after: GUANGZHOU XINYANG ELECTRONIC TECHNOLOGY Co.,Ltd.

Country or region after: China

Address before: 518000 turn over road 83, 501, Baoan District Xin'an street, Shenzhen, Guangdong

Patentee before: SHENZHEN GUZHUHUA INTELLIGENT TECHNOLOGY Co.,Ltd.

Country or region before: China