CN106027530A - Instant message encryption system based on smartphone and implementation method thereof - Google Patents
Instant message encryption system based on smartphone and implementation method thereof Download PDFInfo
- Publication number
- CN106027530A CN106027530A CN201610352600.3A CN201610352600A CN106027530A CN 106027530 A CN106027530 A CN 106027530A CN 201610352600 A CN201610352600 A CN 201610352600A CN 106027530 A CN106027530 A CN 106027530A
- Authority
- CN
- China
- Prior art keywords
- module
- system control
- control module
- data
- deciphering
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/088—Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3273—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses an instant message encryption system based on a smartphone and an implementation method thereof. The instant message encryption system comprises a system control module, a user data interaction module, a message content transceiving module, a data encryption/decryption module, a secret key management module, a user setting management module and a user account management module. Through the mode of encrypting the transceived data of the instant message, the problems of possible data loss and privacy leak are solved. The instant message text, picture, voice and video can be encrypted through application software without replacing the hardware terminal. Furthermore, the security of the user instant message data can be further promoted through the encryption of a default secret key in the system or the secret key set by the user; the plaintext for decryption is protected, and a safe strategy of burning after reading is defaultedly started for the message content, the actual application requirement of a user with high requirement on personal privacy is satisfied.
Description
Technical field
The invention belongs to immediate news enciphering systems technology field, be specifically related to a kind of immediate news enciphering based on smart mobile phone
System and its implementation.
Background technology
Instant message (IM, i.e. Instant Messaging) refers to immediately send and receive the business of internet message etc..Mesh
Before, instant message application software is no longer a simple chat tool, it have developed into collection exchange, information, amusement,
The synthesization information platform that search, ecommerce, office cooperation and corporate client service etc. are integrated.Along with mobile Internet
Development, the development of internet instant message also to mobile expand.As using the network software that frequency is the highest, immediately
Chat has breached the limit as technical tool it is considered to be the symbol of modern AC mode, and builds a kind of new
Social relations.It is up to now human society life to be changed the most deep a kind of network neomorph, does not has the ditch of the limit
Lead to and will bring the life not having the limit.
But, the life offer being us at instant messages application software is various simultaneously easily, also brings some and asks safely
Topic.This is embodied in the data etc. being saved in the local chat record of subscriber equipment, transmitting over the data link, all suffers from using
The risk of family privacy compromise.Additionally, improving constantly along with computing power, the safety of network cipher can be made to reduce,
Adequate measures must be taked to protect the safety of confidential data.For solving the protection problem of data-privacy, common method is
By user, data are encrypted, the cipher-text information after encryption is stored in service end.
But current instant message application software does not the most possess the function of data protection, or simply uses simple user name
Protect with password, do not accomplish real all information datas being encrypted.Part uses simple algorithm encryption software
The most do not accomplish safety certification, the legitimacy of system can not get effectively protecting, and safe class is relatively low, be very easy to by illegally
User obtains and utilizes, and the data information security hidden danger of user can not get effectively solving.
And the most much cryptographic means is required for changing intelligent mobile phone terminal or adding terminal hardware equipment, not only adds
User cost, and use to user and bring very big inconvenience.
Summary of the invention
The invention provides a kind of immediate news enciphering system based on smart mobile phone and its implementation, the present invention is without more
On the premise of changing or adding any terminal hardware equipment, close by adding many general commercialization in data transmission and storing process
Code algorithm carries out protecting data encryption, it is achieved the instant message of safety preserves, sends and reception process, it is to avoid there may be
Data message and the problem of privacy leakage, solve existing instant message application exist potential safety hazard, described below:
A kind of immediate news enciphering system based on smart mobile phone, described system includes: system control module, data encrypting and deciphering
Module and user setup management module,
During the Account Registration of user, system control module is used for calling user setup management module and completes user key name and key
Setting;
During the Account Closure of user, system control module is used for calling user setup management module and completes user key name and key
Removing;
When sending encryption instant message, system control module is used for calling data encrypting and deciphering module and carries out two-way legitimacy certification,
Call user setup management module and obtain the encryption key name arranged;
When receiving encryption instant message, system control module is used for calling data encrypting and deciphering module and carries out two-way legitimacy certification,
Call user setup management module and obtain the decruption key name arranged;
The general commercial cipher algorithm used in described data encrypting and deciphering module is that SHA1, SHA-256, DES, AES calculate
Method.
Described data encrypting and deciphering module includes: hash algorithm module, data encryption module and data decryption module;
Described hash algorithm module is for calculating the hash of key value;Data are carried out by described data encryption module for realization
Encryption;Described data decryption module is for realizing data deciphering.
Described system control module realizes the two-way legitimacy certification sum with described data encrypting and deciphering module by communication interface
According to communication.
Described system also includes: user data interactive module, message content transceiver module, user account management module and key
Management module;
Described system control module and described data encrypting and deciphering module realize data communication;Described system control module is close with described
Key management module realizes data communication;Described system control module realizes data communication with described user setup management module;Institute
State system control module and realize data communication with described user data interactive module;In described system control module and described message
Hold transceiver module and realize data communication;Described system control module and described user account management module realize data communication.
A kind of implementation method of immediate news enciphering system based on smart mobile phone, described implementation method comprises the following steps:
The process of the user account registration of described immediate news enciphering system;The user account note of described immediate news enciphering system
The process of pin;
The process sending encryption instant message of described immediate news enciphering system;The reception of described immediate news enciphering system adds
The process of close instant message;
Wherein, the process sending encryption instant message of described immediate news enciphering system is:
Described system control module realizes the input of instant message content, described system control by described user data interactive module
Molding block calls described data encrypting and deciphering module and carries out two-way legitimacy certification, and described system control module sets according to described user
The encryption key name putting management module setting obtains the encryption key of encryption, described system by calling described key management module
System control module will need the content sent and encryption key transmission to described data encrypting and deciphering module, described data encrypting and deciphering mould
Block completes instant message content-encrypt, described system control module call described message content transceiver module will after encryption i.e.
Time message send, complete instant message send process;
Wherein, the process receiving encryption instant message of described immediate news enciphering system is:
Described system control module receives the content of instant message, described system control by calling described message content transceiver module
Molding block calls described data encrypting and deciphering module and carries out two-way legitimacy certification, and described system control module sets according to described user
The decruption key name putting management module setting calls the decruption key of described key management module acquisition deciphering, described system control
The content received and decruption key are transmitted to described data encrypting and deciphering module by molding block, and described data encrypting and deciphering module will add
Close instant message content is deciphered, and described system control module is by the clear content transmission extremely mutual mould of described user data after deciphering
Block carries out content displaying, completes instant message and receives process.
Described two-way legitimacy certification includes internal authentication process and external authentication process.
Described internal authentication process realizes step:
(1) system control module generates 8 byte randoms number, and sends to data encrypting and deciphering module;
(2) data encrypting and deciphering module DES algorithm and internal authentication double secret key 8 byte random number are encrypted, and are encrypted
After 8 byte datas;
(3) 8 byte datas after encryption are sent to system control module by data encrypting and deciphering module;
(4) 8 byte datas after system control module DES algorithm and internal authentication key pair encryption are decrypted, and obtain
8 byte datas after deciphering;
(5) 8 byte datas after 8 byte randoms number and deciphering are compared by system control module, if consistent, internal
Certification is passed through, and data encrypting and deciphering module is legal, and otherwise data encrypting and deciphering module is illegal, exits immediate news enciphering operation;
(6) internal authentication process is completed.
Described external authentication process realizes step:
(1) system control module obtains 8 byte randoms number from data encrypting and deciphering module;
(2) 8 byte randoms number are encrypted, after being encrypted by system control module DES algorithm and external authentication key
8 byte datas;
(3) 8 byte datas after encryption are sent to data encrypting and deciphering module by system control module;
(4) 8 byte datas after encryption are decrypted by data encrypting and deciphering module DES algorithm and external authentication key,
8 byte datas after deciphering;
(5) 8 byte datas after 8 byte randoms number and deciphering are compared by data encrypting and deciphering module, if consistent, outside
Portion's certification is passed through, and system control module is legal, and otherwise system control module is illegal;
(6) data encrypting and deciphering module will assert that result sends to system control module, completes external authentication process.
The technical scheme that the present invention provides provides the benefit that:
1, the present invention carries out data add by adding multiple commercial cipher algorithm in local datastore and data transmission procedure
Privacy protection, it is to avoid data protection that may be present and the problem of privacy leakage, thoroughly solves the application of existing instant message and deposits
Potential safety hazard;
2, user is without changing or adding any terminal hardware equipment, it is achieved user data carries out high safety and encrypts, have
High safety grade, the data after only transmission is encrypted on network, fundamentally ensure that the security reliability of user data;
3, all data being stored in this locality also take cipher mode to store, even if equipment is by malware attacks, it is possible to really
The safety of warranty user data;
4, the present invention provides clear, succinct user interface to show and the sound of necessity is warned, and user is clearly understood that
The transmission state of message and progress, can be widely used for the industry-by-industries such as government bodies, military affairs, finance, telecommunications.
Accompanying drawing explanation
The structural representation of a kind of based on smart mobile phone the immediate news enciphering system that Fig. 1 provides for the present invention;
Fig. 2 is the flow chart of user account registration in implementation method of the present invention;
Fig. 3 is the flow chart that in implementation method of the present invention, user account is nullified;
Fig. 4 is the flow chart sending encryption instant message in implementation method of the present invention;
Fig. 5 is the flow chart receiving encryption instant message in implementation method of the present invention;
Fig. 6 is the flow chart of internal authentication process in implementation method of the present invention;
Fig. 7 is the flow chart of implementation method peripheral verification process of the present invention.
In accompanying drawing, the list of parts representated by each label is as follows:
1: system control module;2: user data interactive module;
3: message content transceiver module;4: data encrypting and deciphering module;
5: key management module;6: user setup management module;
7: user account management module.
Detailed description of the invention
For making the object, technical solutions and advantages of the present invention clearer, below embodiment of the present invention is made the most detailed
Thin description.
Embodiment 1
Embodiments provide a kind of immediate news enciphering system based on smart mobile phone, see Fig. 1, this instant message
Encryption system includes: system control module 1, user data interactive module 2, message content transceiver module 3, data encrypting and deciphering
Module 4, key management module 5, user setup management module 6 and user account management module 7.
System control module 1 and user data interactive module 2 realize data communication;System control module 1 is received with message content
Send out module 3 and realize data communication;System control module 1 realizes data communication by general-purpose interface and data encrypting and deciphering module 4;
System control module 1 and key management module 5 realize data communication;System control module 1 manages module 6 with user setup
Realize data communication;System control module 1 and user account management module 7 realize data communication.
During user account registration, system control module 1 realizes the input of subscriber data registration by user data interactive module 2,
System control module 1 calls user setup management module 6 and completes the setting of user key name and key, and system control module 1 is adjusted
The registration of user is completed with user account management module 7 and server communication.
When user account is nullified, system control module 1 initiates user log off by user data interactive module 2 asks, system control
Molding block 1 calls user setup management module 6 and completes the removing of user key name and key, and system control module 1 calls user
Account management module 7 and server communication complete the cancellation of user.
When sending encryption instant message, system control module 1 realizes the defeated of instant message content by user data interactive module 2
Entering, system control module 1 calls data encrypting and deciphering module 4 to carry out two-way legitimacy certification and determines the integrity that system uses, and is
The encryption key name that system control module 1 is arranged according to user setup management module 6 obtains encryption by calling key management module 5
Key, system control module 1 will need send content and cipher key delivery to data encrypting and deciphering module 4, data encrypting and deciphering
Module 4 uses general commercial cipher algorithm to complete the encryption of instant message content, by the instant message content message call of encryption
Content transceiver module 4 sends, and completes instant message and sends process.
When receiving encryption instant message, system control module 1 receives the interior of instant message by message call content transceiver module 4
Holding, system control module 1 calls data encrypting and deciphering module 4 to carry out two-way legitimacy certification and determines the integrity that system uses, and is
System control module 1 is called key management module 5 according to the decruption key name that user setup management module 6 is arranged and is obtained deciphering
Key, the content having been received by and decruption key are transmitted to data encrypting and deciphering module 4, data deciphering by system control module 1
Module 4 uses general commercial cipher algorithm to complete the deciphering of instant message content, and system control module 1 is by the plaintext after deciphering
Hold transmission and carry out content displaying to user data interactive module 2, complete instant message and receive process.
Two-way legitimacy certification includes: internal authentication process and external authentication process.It is system control module that internal authentication realizes
The legitimacy certification of 1 pair of data encryption/decryption module 4;It is that data encrypting and deciphering module 4 is to system control module 1 that external authentication realizes
Legitimacy certification.
System control module 1 realizes calling modules, realizes encrypting transmission and the function of reception of instant message.
User data interactive module 2 is mainly used in the message content data editor of user being inputted and the function of output.Work as user
When encrypting instant message and checking, the plaintext after deciphering is deposited in another interim catalogue.When user completes to check behaviour
Make, switch to Another Application interface or return system desktop time, user data interactive module 2 can empty temp directory, reach
The effect of burn-after-reading.
Message content transceiver module 3 is mainly used in being transmitted and receiving instant message.
Data encrypting and deciphering module 4 is the core of immediate news enciphering system, it is achieved instant message content is carried out encryption and decryption
Operation.Data encrypting and deciphering module 4 includes: hash algorithm module 41, data encryption module 42 and data decryption module 43.Miscellaneous
Gather algoritic module 41 for the hash of key value is calculated;Data encryption module 42 uses general business to uploading data acquisition for realizing
It is encrypted with cryptographic algorithm and shows with encrypted state;Data decryption module 43 is for realizing downloading the general commercialization of data acquisition
Cryptographic algorithm is decrypted, store and decrypted state shows.
Data encrypting and deciphering module 4 in the embodiment of the present invention uses general commercial cipher algorithm to realize, and uses software design to realize,
Without adding hardware terminal equipment.The general commercial cipher algorithm used is SHA1, SHA-256, DES, aes algorithm.
The encryption and decryption that key management module 5 is data provides the key of encryption and decryption application.Meanwhile, user passes through this module, can
To add voluntarily, change, to delete key value, particular group of users or unique user object can be applied to, thus realize close
The uniqueness of key, improves the safety of encryption.
User setup management module 6 is mainly used in realizing the setting of user's corresponding informance and management function, including corresponding close of user
Key name and encryption and decryption key.
Registration that user account management module 7 is mainly used in user account, the function nullified and manage.
Embodiment 2
Embodiments provide the implementation method of a kind of immediate news enciphering system based on smart mobile phone, as detailed below retouch
State:
See Fig. 1 and Fig. 2, the process that in the present invention, the user account of immediate news enciphering system is registered as:
During user account registration, system control module 1 realizes the input of subscriber data registration by user data interactive module 2,
System control module 1 calls user setup management module 6 and completes the setting of user key name and key, and system control module 1 is adjusted
The registration of user is completed with user account management module 7 and server communication.
The implementation method of this user account registration specifically includes following steps:
(1) system control module 1 shows user's register interface by calling user data interactive module 2, it is achieved subscriber data
The input of registration;
(2) user data interactive module 2 judges that the new subscriber data of input and parameter are the most legal, if message is legal, holds
Go next step, otherwise, continue executing with step (1);
(3) system control module 1 calls user setup management module 6 and carries out the setting of user key name and key;
(4) system control module 1 calls user account management module 7 and server communication and completes the registration of user;
(5) system control module 1 shows login interface by calling user data interactive module 2, waits user operation.
(6) the user account registration process of encryption instant message terminates.
Seeing Fig. 1 and Fig. 3, the process that in the present invention, the user account of immediate news enciphering system is nullified is:
When user account is nullified, system control module 1 initiates user log off by user data interactive module 2 asks, system control
Molding block 1 calls user setup management module 6 and completes the removing of user key name and key, and system control module 1 calls user
Account management module 7 and server communication complete the cancellation of user.
The implementation method that this user account is nullified specifically includes following steps:
(1) system control module 1 initiates user log off request by calling user data interactive module 2;
(2) user data interactive module 2 judge input user log off request the most legal, if ask legal, under execution
One step, otherwise, continues executing with step (1);
(3) system control module 1 calls user setup management module 6 and carries out the removing of user key name and key;
(4) system control module 1 calls user account management module 7 and server communication and completes the cancellation of user;
(5) system control module 1 closes cancellation dialog box by calling user data interactive module 2, exits user operation.
(6) the user account log off procedure of encryption instant message terminates.
Embodiment 3
Embodiments provide the implementation method of a kind of immediate news enciphering system based on smart mobile phone, as detailed below retouch
State:
Seeing Fig. 1 and Fig. 4, in the present invention, the process sending encryption instant message of immediate news enciphering system is:
System control module 1 realizes the input of instant message content by user data interactive module 2, and wherein user data is mutual
Module 2 determines that the legitimacy of user data, system control module 1 are called data encrypting and deciphering module 4 and carried out two-way legitimacy certification
(inside and outside certification) determines the integrity that system uses, and system control module 1 is according to adding that user setup management module 6 is arranged
Decryption key name by call key management module 5 obtain encryption key, system control module 1 by need send content and
Cipher key delivery to data encrypting and deciphering module 4, data encrypting and deciphering module 4 by this key by hash algorithm (such as SHA1 or
SHA-256) carrying out computing, instant message content is used general business men to use by data encrypting and deciphering module 4 value obtained after computing
Cryptographic algorithm (such as DES or AES) is encrypted, and obtains encrypting the ciphertext data of instant message content, and system controls mould
Instant message after encryption is sent by block 1 message call content transceiver module 3, completes instant message and sends process.
The implementation method of this transmission encryption instant message specifically includes following steps:
(1) system control module 1 realizes sending the input of instant message content by calling user data interactive module 2;
(2) (content of message includes word, picture, language to the instant message content of user data interactive module 2 judgement input
Sound, file type message, and necessary when, show that file selects interface to choose multimedia file to be sent) be
No legal, if message is legal, perform next step, otherwise, continue executing with step (1);
(3) system control module 1 calls data encrypting and deciphering module 4 and carries out two-way legitimacy certification, determines that system uses complete
Whole property, if it is decided that system is complete, performs next step, otherwise, exits encryption instant message and sends operation;
(4) system control module 1 call key management module 5 according to user setup management module 6 arrange encryption key name obtain
Take the key of encryption;
(5) system control module 1 will need the content sent and cipher key delivery to data encrypting and deciphering module 4;
(6) this key is carried out computing by hash algorithm (such as SHA1 or SHA-256) by data encrypting and deciphering module 4,
New key values after computing;
(7) data encrypting and deciphering module 4 uses new key values that instant message content is used general commercial cipher algorithm (such as DES
Or AES) be encrypted, obtain the encryption instant message comprising cipher-text information;
(8) instant message after encryption is sent to server by system control module 1 message call content transceiver module 3;
(9) the transmission process of encryption instant message terminates.
Seeing Fig. 1 and Fig. 5, in the present invention, the process receiving encryption instant message of immediate news enciphering system is:
System control module 1 receives the content of instant message by message call content transceiver module 3, and system control module 1 is adjusted
Carrying out two-way legitimacy certification by data encrypting and deciphering module 4 and determine the integrity that system uses, system control module 1 is according to user
The decruption key name arranging management module 6 setting calls the key of key management module 5 acquisition deciphering, system control module 1
Transmitting the content having been received by and decruption key to data encrypting and deciphering module 4, this key is passed through by data encrypting and deciphering module 4
Hash algorithm (such as SHA1 or SHA-256) carries out computing, and the value obtained after computing is made with encryption instant message content
It is decrypted with general commercial cipher algorithm (such as DES or AES), the instant message original plaintext content after being deciphered,
Clear content transmission after deciphering is carried out content displaying to user data interactive module 2 by system control module 1, completes immediately to disappear
Breath reception process.
The implementation method of this reception encryption instant message specifically includes following steps:
(1) system control module 1 receives the content of instant message by message call content transceiver module 3, newly disappears if had
Breath, performs next step, otherwise continues executing with step (1);
(2) system control module 1 calls data encrypting and deciphering module 4 and carries out two-way legitimacy certification, determines that system uses complete
Whole property, if it is decided that system is complete, performs next step, otherwise, exits encryption instant message and receives operation;
(3) system control module 1 call key management module 3 according to user setup management module 6 arrange decruption key name obtain
Take the key of deciphering;
(4) the encryption instant message content received and decruption key that need deciphering are transmitted to data by system control module 1
Encryption/decryption module 4;
(5) this key is carried out computing by hash algorithm (such as SHA1 or SHA-256) by data encrypting and deciphering module 4,
New key values after computing;
(5) data encrypting and deciphering module 4 uses new key values that the instant message content of encryption is used general commercial cipher algorithm
(such as DES or AES) is decrypted, the instant message original plaintext content after being deciphered;
(6) the instant message original plaintext content after deciphering is transmitted to user data interactive module 2 by system control module 1;
(7) user data interactive module 2 is decrypted the judgement of success or not, if successful decryption, then shows instant message
Content, for checking, continues executing with next step, otherwise prompting message mistake;
(8) system control module 1 calls the operation of user data interactive module 2 monitoring users, when user switches application, exits
Program or when returning to system desktop, deletes the plaintext deciphered, empties temp directory;
(9) the reception process of encryption instant message terminates.
Embodiment 4
Embodiments provide the implementation method of a kind of immediate news enciphering system based on smart mobile phone, as detailed below retouch
State:
Seeing Fig. 1 and Fig. 6, the step that realizes of internal authentication process is:
(1) system control module 1 generates 8 byte randoms number, and sends to data encrypting and deciphering module 4;
(2) data encrypting and deciphering module 4 DES algorithm and internal authentication double secret key 8 byte random number is encrypted, and is encrypted
After 8 byte datas;
(3) 8 byte datas after encryption are sent to system control module 1 by data encrypting and deciphering module 4;
(4) system control module 18 byte datas after DES algorithm and internal authentication key pair encryption are decrypted, and obtain
8 byte datas after deciphering;
(5) 8 byte datas after the 8 byte randoms number generated and deciphering are compared, if unanimously by system control module 1
Then internal authentication passes through, and assert that this data encrypting and deciphering module 4 is legal, proceeds next step operation, otherwise assert these data
Encryption/decryption module 4 is illegal, exits immediate news enciphering operation;
(6) internal authentication process is completed.
Seeing Fig. 1 and Fig. 7, the step that realizes of external authentication process is:
(1) system control module 1 obtains 8 byte randoms number from data encrypting and deciphering module 4;
(2) 8 byte randoms number are encrypted, after being encrypted by system control module 1 DES algorithm and external authentication key
8 byte datas;
(3) 8 byte datas after encryption are sent to data encrypting and deciphering module 4 by system control module 1;
(4) 8 byte datas after encryption are decrypted by data encrypting and deciphering module 4 DES algorithm and external authentication key,
8 byte datas after deciphering;
(5) 8 byte datas after the 8 byte randoms number generated and deciphering are compared by data encrypting and deciphering module 4, if one
Causing, external authentication is passed through, and assert that this system control module 1 is legal, can continue executing with other operation, otherwise assert this system
Control module 1 is illegal, no longer performs other operation;
(6) data encrypting and deciphering module 4 will assert that result sends to system control module 1, completes external authentication process.
The embodiment of the present invention is to the model of each device in addition to doing specified otherwise, and the model of other devices does not limits, as long as
The device of above-mentioned functions can be completed.
It will be appreciated by those skilled in the art that accompanying drawing is the schematic diagram of a preferred embodiment, the invention described above embodiment sequence number
Just to describing, do not represent the quality of embodiment.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all in the spirit and principles in the present invention
Within, any modification, equivalent substitution and improvement etc. made, should be included within the scope of the present invention.
Claims (8)
1. an immediate news enciphering system based on smart mobile phone, it is characterised in that described system includes: system controls
Module, data encrypting and deciphering module and user setup management module,
During the Account Registration of user, system control module is used for calling user setup management module and completes user key name and key
Setting;
During the Account Closure of user, system control module is used for calling user setup management module and completes user key name and key
Removing;
When sending encryption instant message, system control module is used for calling data encrypting and deciphering module and carries out two-way legitimacy certification,
Call user setup management module and obtain the encryption key name arranged;
When receiving encryption instant message, system control module is used for calling data encrypting and deciphering module and carries out two-way legitimacy certification,
Call user setup management module and obtain the decruption key name arranged;
The general commercial cipher algorithm used in described data encrypting and deciphering module is that SHA1, SHA-256, DES, AES calculate
Method.
A kind of immediate news enciphering system based on smart mobile phone the most according to claim 1, it is characterised in that institute
State data encrypting and deciphering module to include: hash algorithm module, data encryption module and data decryption module;
Described hash algorithm module is for calculating the hash of key value;Data are carried out by described data encryption module for realization
Encryption;Data are decrypted by described data decryption module for realization.
A kind of immediate news enciphering system based on smart mobile phone the most according to claim 1, it is characterised in that institute
State system control module and realize the two-way legitimacy certification with described data encrypting and deciphering module and data communication by communication interface.
A kind of immediate news enciphering system based on smart mobile phone the most according to claim 1, it is characterised in that institute
System of stating also includes: user data interactive module, message content transceiver module, user account management module and key management mould
Block;
Described system control module and described data encrypting and deciphering module realize data communication;Described system control module is close with described
Key management module realizes data communication;Described system control module realizes data communication with described user setup management module;Institute
State system control module and realize data communication with described user data interactive module;In described system control module and described message
Hold transceiver module and realize data communication;Described system control module and described user account management module realize data communication.
5. according to a kind of based on smart mobile phone the immediate news enciphering system described in any claim in claim 1-4
Implementation method, it is characterised in that described implementation method comprises the following steps:
The process of the user account registration of described immediate news enciphering system;The user account note of described immediate news enciphering system
The process of pin;
The process sending encryption instant message of described immediate news enciphering system;The reception of described immediate news enciphering system adds
The process of close instant message;
Wherein, the process sending encryption instant message of described immediate news enciphering system is:
Described system control module realizes the input of instant message content, described system control by described user data interactive module
Molding block calls described data encrypting and deciphering module and carries out two-way legitimacy certification, and described system control module sets according to described user
Put the encryption key name that management module is arranged, the encryption key obtaining encryption by calling described key management module, described
System control module will need the content sent and encryption key transmission to described data encrypting and deciphering module, described data encrypting and deciphering
Module completes instant message content-encrypt, and described system control module calls described message content transceiver module by after encryption
Instant message sends, and completes instant message and sends process;
Wherein, the process receiving encryption instant message of described immediate news enciphering system is:
Described system control module receives the content of instant message, described system control by calling described message content transceiver module
Molding block calls described data encrypting and deciphering module and carries out two-way legitimacy certification, and described system control module sets according to described user
Put the decruption key name that management module is arranged, the decruption key calling the acquisition deciphering of described key management module, described system
The content received and decruption key are transmitted to described data encrypting and deciphering module by control module, and described data encrypting and deciphering module will
Encryption instant message content deciphering, described system control module is by mutual to described user data for the clear content transmission after deciphering
Module carries out content displaying, completes instant message and receives process.
The implementation method of a kind of immediate news enciphering system based on smart mobile phone the most according to claim 5, its feature
Being, described two-way legitimacy certification includes internal authentication process and external authentication process.
The implementation method of a kind of immediate news enciphering system based on smart mobile phone the most according to claim 6, its feature
Being, described internal authentication process realizes step and is:
(1) system control module generates 8 byte randoms number, and sends to data encrypting and deciphering module;
(2) data encrypting and deciphering module DES algorithm and internal authentication double secret key 8 byte random number are encrypted, and are encrypted
After 8 byte datas;
(3) 8 byte datas after encryption are sent to system control module by data encrypting and deciphering module;
(4) 8 byte datas after system control module DES algorithm and internal authentication key pair encryption are decrypted, and obtain
8 byte datas after deciphering;
(5) 8 byte datas after 8 byte randoms number and deciphering are compared by system control module, if consistent, internal
Certification is passed through, and data encrypting and deciphering module is legal, and otherwise data encrypting and deciphering module is illegal, exits immediate news enciphering operation;
(6) internal authentication process is completed.
The implementation method of a kind of immediate news enciphering system based on smart mobile phone the most according to claim 6, its feature
Being, described external authentication process realizes step and is:
(1) system control module obtains 8 byte randoms number from data encrypting and deciphering module;
(2) 8 byte randoms number are encrypted, after being encrypted by system control module DES algorithm and external authentication key
8 byte datas;
(3) 8 byte datas after encryption are sent to data encrypting and deciphering module by system control module;
(4) 8 byte datas after encryption are decrypted by data encrypting and deciphering module DES algorithm and external authentication key,
8 byte datas after deciphering;
(5) 8 byte datas after 8 byte randoms number and deciphering are compared by data encrypting and deciphering module, if consistent, outside
Portion's certification is passed through, and system control module is legal, and otherwise system control module is illegal;
(6) data encrypting and deciphering module will assert that result sends to system control module, completes external authentication process.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610352600.3A CN106027530A (en) | 2016-05-25 | 2016-05-25 | Instant message encryption system based on smartphone and implementation method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610352600.3A CN106027530A (en) | 2016-05-25 | 2016-05-25 | Instant message encryption system based on smartphone and implementation method thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106027530A true CN106027530A (en) | 2016-10-12 |
Family
ID=57093865
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610352600.3A Pending CN106027530A (en) | 2016-05-25 | 2016-05-25 | Instant message encryption system based on smartphone and implementation method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106027530A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106487659A (en) * | 2016-10-20 | 2017-03-08 | 宇龙计算机通信科技(深圳)有限公司 | Information ciphering method and device, information decryption method and device and terminal |
CN107749846A (en) * | 2017-10-23 | 2018-03-02 | 深圳市比量科技传媒有限公司 | The processing method and system that partial information is encrypted in a kind of common channel |
CN108111711A (en) * | 2017-12-27 | 2018-06-01 | 上海闻泰电子科技有限公司 | The method and device that safety of image is shared |
CN114050936A (en) * | 2021-11-15 | 2022-02-15 | 南方电网数字电网研究院有限公司 | User privacy protection method based on combination of big data analysis and cloud computing |
CN115001713A (en) * | 2022-06-10 | 2022-09-02 | 王爽 | Instant message encryption system based on commercial cryptographic algorithm in medical field |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102413132A (en) * | 2011-11-16 | 2012-04-11 | 北京数码视讯软件技术发展有限公司 | Two-way-security-authentication-based data downloading method and system |
US20130036302A1 (en) * | 2003-02-20 | 2013-02-07 | Marathon Solutions | Secure instant messaging system |
CN104394530A (en) * | 2014-12-09 | 2015-03-04 | 天津光电安辰信息技术有限公司 | Wechat content encryption system based on smartphone and implementation method of wechat content encryption system |
CN104951409A (en) * | 2015-06-12 | 2015-09-30 | 中国科学院信息工程研究所 | System and method for full disk encryption based on hardware |
CN105323254A (en) * | 2015-11-23 | 2016-02-10 | 天津光电安辰信息技术有限公司 | A mail encryption system based on a domestic commercial cipher code chip and an implementation method thereof |
CN105471711A (en) * | 2015-11-23 | 2016-04-06 | 天津光电安辰信息技术有限公司 | Mail encryption system based on intelligent mobile phone and realization method thereof |
CN105472584A (en) * | 2015-11-23 | 2016-04-06 | 天津光电安辰信息技术有限公司 | Short message encryption system based on intelligent mobile phone and realization method thereof |
CN105516943A (en) * | 2015-11-23 | 2016-04-20 | 天津光电安辰信息技术有限公司 | Short message encryption system on the basis of domestic commercial crypto chip and realization method thereof |
-
2016
- 2016-05-25 CN CN201610352600.3A patent/CN106027530A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130036302A1 (en) * | 2003-02-20 | 2013-02-07 | Marathon Solutions | Secure instant messaging system |
CN102413132A (en) * | 2011-11-16 | 2012-04-11 | 北京数码视讯软件技术发展有限公司 | Two-way-security-authentication-based data downloading method and system |
CN104394530A (en) * | 2014-12-09 | 2015-03-04 | 天津光电安辰信息技术有限公司 | Wechat content encryption system based on smartphone and implementation method of wechat content encryption system |
CN104951409A (en) * | 2015-06-12 | 2015-09-30 | 中国科学院信息工程研究所 | System and method for full disk encryption based on hardware |
CN105323254A (en) * | 2015-11-23 | 2016-02-10 | 天津光电安辰信息技术有限公司 | A mail encryption system based on a domestic commercial cipher code chip and an implementation method thereof |
CN105471711A (en) * | 2015-11-23 | 2016-04-06 | 天津光电安辰信息技术有限公司 | Mail encryption system based on intelligent mobile phone and realization method thereof |
CN105472584A (en) * | 2015-11-23 | 2016-04-06 | 天津光电安辰信息技术有限公司 | Short message encryption system based on intelligent mobile phone and realization method thereof |
CN105516943A (en) * | 2015-11-23 | 2016-04-20 | 天津光电安辰信息技术有限公司 | Short message encryption system on the basis of domestic commercial crypto chip and realization method thereof |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106487659A (en) * | 2016-10-20 | 2017-03-08 | 宇龙计算机通信科技(深圳)有限公司 | Information ciphering method and device, information decryption method and device and terminal |
CN106487659B (en) * | 2016-10-20 | 2022-12-20 | 宇龙计算机通信科技(深圳)有限公司 | Information encryption method, information encryption device and terminal |
CN107749846A (en) * | 2017-10-23 | 2018-03-02 | 深圳市比量科技传媒有限公司 | The processing method and system that partial information is encrypted in a kind of common channel |
CN108111711A (en) * | 2017-12-27 | 2018-06-01 | 上海闻泰电子科技有限公司 | The method and device that safety of image is shared |
CN114050936A (en) * | 2021-11-15 | 2022-02-15 | 南方电网数字电网研究院有限公司 | User privacy protection method based on combination of big data analysis and cloud computing |
CN115001713A (en) * | 2022-06-10 | 2022-09-02 | 王爽 | Instant message encryption system based on commercial cryptographic algorithm in medical field |
CN115001713B (en) * | 2022-06-10 | 2023-08-25 | 深圳市马博士网络科技有限公司 | Instant message encryption system based on commercial cryptographic algorithm in medical field |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106656476B (en) | Password protection method and device and computer readable storage medium | |
CN104917759B (en) | Based on third-party secure file storage and shared system and method | |
CN105101183B (en) | The method and system that privacy content on mobile terminal is protected | |
CN104394530A (en) | Wechat content encryption system based on smartphone and implementation method of wechat content encryption system | |
CN106027530A (en) | Instant message encryption system based on smartphone and implementation method thereof | |
CN101815091A (en) | Cipher providing equipment, cipher authentication system and cipher authentication method | |
CN103763308A (en) | Method and device for having access to webpage safely and downloading data through intelligent terminal | |
WO2016045464A1 (en) | Decryption method and mobile terminal | |
CN105516943A (en) | Short message encryption system on the basis of domestic commercial crypto chip and realization method thereof | |
US20140079219A1 (en) | System and a method enabling secure transmission of sms | |
CN107579903B (en) | Picture message secure transmission method and system based on mobile device | |
CN104202736A (en) | Mobile terminal short message end-to-end encryption method oriented to Android system | |
CN107666395A (en) | One population file management method, user terminal, group chat system | |
CN103973543B (en) | Instant communicating method and device | |
CN108390755B (en) | Safety input method of SIM (subscriber identity Module) film-pasting card based on built-in safety chip | |
CN104601820A (en) | Mobile terminal information protection method based on TF password card | |
KR101358375B1 (en) | Prevention security system and method for smishing | |
CN110166403A (en) | A kind of safety method of key and ciphertext separated transmission | |
CN105656870A (en) | Data transmission method, device and system | |
CN105812251A (en) | Instant messaging encryption system based on domestic commercial cryptography algorithms and implementation method of instant messaging encryption system based on domestic commercial cryptography algorithms | |
CN104994498B (en) | The method and system that a kind of terminal applies are interacted with mobile phone card application | |
CN106789000A (en) | A kind of secret phone system and method based on TEE technologies and wearable device | |
CN105323254A (en) | A mail encryption system based on a domestic commercial cipher code chip and an implementation method thereof | |
CN105262759A (en) | Method and system for encrypted communication | |
CN108737087A (en) | The guard method of Email Accounts password and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161012 |