CN106027530A - Instant message encryption system based on smartphone and implementation method thereof - Google Patents

Instant message encryption system based on smartphone and implementation method thereof Download PDF

Info

Publication number
CN106027530A
CN106027530A CN201610352600.3A CN201610352600A CN106027530A CN 106027530 A CN106027530 A CN 106027530A CN 201610352600 A CN201610352600 A CN 201610352600A CN 106027530 A CN106027530 A CN 106027530A
Authority
CN
China
Prior art keywords
module
system control
control module
data
deciphering
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610352600.3A
Other languages
Chinese (zh)
Inventor
吕前进
梁友仁
程贝贝
胡双喜
刘健旭
肖文瀚
张学静
朱清晨
吴彤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TOEC ANCHEN INFORMATION TECHNOLOGY Co Ltd
Original Assignee
TOEC ANCHEN INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TOEC ANCHEN INFORMATION TECHNOLOGY Co Ltd filed Critical TOEC ANCHEN INFORMATION TECHNOLOGY Co Ltd
Priority to CN201610352600.3A priority Critical patent/CN106027530A/en
Publication of CN106027530A publication Critical patent/CN106027530A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an instant message encryption system based on a smartphone and an implementation method thereof. The instant message encryption system comprises a system control module, a user data interaction module, a message content transceiving module, a data encryption/decryption module, a secret key management module, a user setting management module and a user account management module. Through the mode of encrypting the transceived data of the instant message, the problems of possible data loss and privacy leak are solved. The instant message text, picture, voice and video can be encrypted through application software without replacing the hardware terminal. Furthermore, the security of the user instant message data can be further promoted through the encryption of a default secret key in the system or the secret key set by the user; the plaintext for decryption is protected, and a safe strategy of burning after reading is defaultedly started for the message content, the actual application requirement of a user with high requirement on personal privacy is satisfied.

Description

A kind of immediate news enciphering system based on smart mobile phone and its implementation
Technical field
The invention belongs to immediate news enciphering systems technology field, be specifically related to a kind of immediate news enciphering based on smart mobile phone System and its implementation.
Background technology
Instant message (IM, i.e. Instant Messaging) refers to immediately send and receive the business of internet message etc..Mesh Before, instant message application software is no longer a simple chat tool, it have developed into collection exchange, information, amusement, The synthesization information platform that search, ecommerce, office cooperation and corporate client service etc. are integrated.Along with mobile Internet Development, the development of internet instant message also to mobile expand.As using the network software that frequency is the highest, immediately Chat has breached the limit as technical tool it is considered to be the symbol of modern AC mode, and builds a kind of new Social relations.It is up to now human society life to be changed the most deep a kind of network neomorph, does not has the ditch of the limit Lead to and will bring the life not having the limit.
But, the life offer being us at instant messages application software is various simultaneously easily, also brings some and asks safely Topic.This is embodied in the data etc. being saved in the local chat record of subscriber equipment, transmitting over the data link, all suffers from using The risk of family privacy compromise.Additionally, improving constantly along with computing power, the safety of network cipher can be made to reduce, Adequate measures must be taked to protect the safety of confidential data.For solving the protection problem of data-privacy, common method is By user, data are encrypted, the cipher-text information after encryption is stored in service end.
But current instant message application software does not the most possess the function of data protection, or simply uses simple user name Protect with password, do not accomplish real all information datas being encrypted.Part uses simple algorithm encryption software The most do not accomplish safety certification, the legitimacy of system can not get effectively protecting, and safe class is relatively low, be very easy to by illegally User obtains and utilizes, and the data information security hidden danger of user can not get effectively solving.
And the most much cryptographic means is required for changing intelligent mobile phone terminal or adding terminal hardware equipment, not only adds User cost, and use to user and bring very big inconvenience.
Summary of the invention
The invention provides a kind of immediate news enciphering system based on smart mobile phone and its implementation, the present invention is without more On the premise of changing or adding any terminal hardware equipment, close by adding many general commercialization in data transmission and storing process Code algorithm carries out protecting data encryption, it is achieved the instant message of safety preserves, sends and reception process, it is to avoid there may be Data message and the problem of privacy leakage, solve existing instant message application exist potential safety hazard, described below:
A kind of immediate news enciphering system based on smart mobile phone, described system includes: system control module, data encrypting and deciphering Module and user setup management module,
During the Account Registration of user, system control module is used for calling user setup management module and completes user key name and key Setting;
During the Account Closure of user, system control module is used for calling user setup management module and completes user key name and key Removing;
When sending encryption instant message, system control module is used for calling data encrypting and deciphering module and carries out two-way legitimacy certification, Call user setup management module and obtain the encryption key name arranged;
When receiving encryption instant message, system control module is used for calling data encrypting and deciphering module and carries out two-way legitimacy certification, Call user setup management module and obtain the decruption key name arranged;
The general commercial cipher algorithm used in described data encrypting and deciphering module is that SHA1, SHA-256, DES, AES calculate Method.
Described data encrypting and deciphering module includes: hash algorithm module, data encryption module and data decryption module;
Described hash algorithm module is for calculating the hash of key value;Data are carried out by described data encryption module for realization Encryption;Described data decryption module is for realizing data deciphering.
Described system control module realizes the two-way legitimacy certification sum with described data encrypting and deciphering module by communication interface According to communication.
Described system also includes: user data interactive module, message content transceiver module, user account management module and key Management module;
Described system control module and described data encrypting and deciphering module realize data communication;Described system control module is close with described Key management module realizes data communication;Described system control module realizes data communication with described user setup management module;Institute State system control module and realize data communication with described user data interactive module;In described system control module and described message Hold transceiver module and realize data communication;Described system control module and described user account management module realize data communication.
A kind of implementation method of immediate news enciphering system based on smart mobile phone, described implementation method comprises the following steps:
The process of the user account registration of described immediate news enciphering system;The user account note of described immediate news enciphering system The process of pin;
The process sending encryption instant message of described immediate news enciphering system;The reception of described immediate news enciphering system adds The process of close instant message;
Wherein, the process sending encryption instant message of described immediate news enciphering system is:
Described system control module realizes the input of instant message content, described system control by described user data interactive module Molding block calls described data encrypting and deciphering module and carries out two-way legitimacy certification, and described system control module sets according to described user The encryption key name putting management module setting obtains the encryption key of encryption, described system by calling described key management module System control module will need the content sent and encryption key transmission to described data encrypting and deciphering module, described data encrypting and deciphering mould Block completes instant message content-encrypt, described system control module call described message content transceiver module will after encryption i.e. Time message send, complete instant message send process;
Wherein, the process receiving encryption instant message of described immediate news enciphering system is:
Described system control module receives the content of instant message, described system control by calling described message content transceiver module Molding block calls described data encrypting and deciphering module and carries out two-way legitimacy certification, and described system control module sets according to described user The decruption key name putting management module setting calls the decruption key of described key management module acquisition deciphering, described system control The content received and decruption key are transmitted to described data encrypting and deciphering module by molding block, and described data encrypting and deciphering module will add Close instant message content is deciphered, and described system control module is by the clear content transmission extremely mutual mould of described user data after deciphering Block carries out content displaying, completes instant message and receives process.
Described two-way legitimacy certification includes internal authentication process and external authentication process.
Described internal authentication process realizes step:
(1) system control module generates 8 byte randoms number, and sends to data encrypting and deciphering module;
(2) data encrypting and deciphering module DES algorithm and internal authentication double secret key 8 byte random number are encrypted, and are encrypted After 8 byte datas;
(3) 8 byte datas after encryption are sent to system control module by data encrypting and deciphering module;
(4) 8 byte datas after system control module DES algorithm and internal authentication key pair encryption are decrypted, and obtain 8 byte datas after deciphering;
(5) 8 byte datas after 8 byte randoms number and deciphering are compared by system control module, if consistent, internal Certification is passed through, and data encrypting and deciphering module is legal, and otherwise data encrypting and deciphering module is illegal, exits immediate news enciphering operation;
(6) internal authentication process is completed.
Described external authentication process realizes step:
(1) system control module obtains 8 byte randoms number from data encrypting and deciphering module;
(2) 8 byte randoms number are encrypted, after being encrypted by system control module DES algorithm and external authentication key 8 byte datas;
(3) 8 byte datas after encryption are sent to data encrypting and deciphering module by system control module;
(4) 8 byte datas after encryption are decrypted by data encrypting and deciphering module DES algorithm and external authentication key, 8 byte datas after deciphering;
(5) 8 byte datas after 8 byte randoms number and deciphering are compared by data encrypting and deciphering module, if consistent, outside Portion's certification is passed through, and system control module is legal, and otherwise system control module is illegal;
(6) data encrypting and deciphering module will assert that result sends to system control module, completes external authentication process.
The technical scheme that the present invention provides provides the benefit that:
1, the present invention carries out data add by adding multiple commercial cipher algorithm in local datastore and data transmission procedure Privacy protection, it is to avoid data protection that may be present and the problem of privacy leakage, thoroughly solves the application of existing instant message and deposits Potential safety hazard;
2, user is without changing or adding any terminal hardware equipment, it is achieved user data carries out high safety and encrypts, have High safety grade, the data after only transmission is encrypted on network, fundamentally ensure that the security reliability of user data;
3, all data being stored in this locality also take cipher mode to store, even if equipment is by malware attacks, it is possible to really The safety of warranty user data;
4, the present invention provides clear, succinct user interface to show and the sound of necessity is warned, and user is clearly understood that The transmission state of message and progress, can be widely used for the industry-by-industries such as government bodies, military affairs, finance, telecommunications.
Accompanying drawing explanation
The structural representation of a kind of based on smart mobile phone the immediate news enciphering system that Fig. 1 provides for the present invention;
Fig. 2 is the flow chart of user account registration in implementation method of the present invention;
Fig. 3 is the flow chart that in implementation method of the present invention, user account is nullified;
Fig. 4 is the flow chart sending encryption instant message in implementation method of the present invention;
Fig. 5 is the flow chart receiving encryption instant message in implementation method of the present invention;
Fig. 6 is the flow chart of internal authentication process in implementation method of the present invention;
Fig. 7 is the flow chart of implementation method peripheral verification process of the present invention.
In accompanying drawing, the list of parts representated by each label is as follows:
1: system control module;2: user data interactive module;
3: message content transceiver module;4: data encrypting and deciphering module;
5: key management module;6: user setup management module;
7: user account management module.
Detailed description of the invention
For making the object, technical solutions and advantages of the present invention clearer, below embodiment of the present invention is made the most detailed Thin description.
Embodiment 1
Embodiments provide a kind of immediate news enciphering system based on smart mobile phone, see Fig. 1, this instant message Encryption system includes: system control module 1, user data interactive module 2, message content transceiver module 3, data encrypting and deciphering Module 4, key management module 5, user setup management module 6 and user account management module 7.
System control module 1 and user data interactive module 2 realize data communication;System control module 1 is received with message content Send out module 3 and realize data communication;System control module 1 realizes data communication by general-purpose interface and data encrypting and deciphering module 4; System control module 1 and key management module 5 realize data communication;System control module 1 manages module 6 with user setup Realize data communication;System control module 1 and user account management module 7 realize data communication.
During user account registration, system control module 1 realizes the input of subscriber data registration by user data interactive module 2, System control module 1 calls user setup management module 6 and completes the setting of user key name and key, and system control module 1 is adjusted The registration of user is completed with user account management module 7 and server communication.
When user account is nullified, system control module 1 initiates user log off by user data interactive module 2 asks, system control Molding block 1 calls user setup management module 6 and completes the removing of user key name and key, and system control module 1 calls user Account management module 7 and server communication complete the cancellation of user.
When sending encryption instant message, system control module 1 realizes the defeated of instant message content by user data interactive module 2 Entering, system control module 1 calls data encrypting and deciphering module 4 to carry out two-way legitimacy certification and determines the integrity that system uses, and is The encryption key name that system control module 1 is arranged according to user setup management module 6 obtains encryption by calling key management module 5 Key, system control module 1 will need send content and cipher key delivery to data encrypting and deciphering module 4, data encrypting and deciphering Module 4 uses general commercial cipher algorithm to complete the encryption of instant message content, by the instant message content message call of encryption Content transceiver module 4 sends, and completes instant message and sends process.
When receiving encryption instant message, system control module 1 receives the interior of instant message by message call content transceiver module 4 Holding, system control module 1 calls data encrypting and deciphering module 4 to carry out two-way legitimacy certification and determines the integrity that system uses, and is System control module 1 is called key management module 5 according to the decruption key name that user setup management module 6 is arranged and is obtained deciphering Key, the content having been received by and decruption key are transmitted to data encrypting and deciphering module 4, data deciphering by system control module 1 Module 4 uses general commercial cipher algorithm to complete the deciphering of instant message content, and system control module 1 is by the plaintext after deciphering Hold transmission and carry out content displaying to user data interactive module 2, complete instant message and receive process.
Two-way legitimacy certification includes: internal authentication process and external authentication process.It is system control module that internal authentication realizes The legitimacy certification of 1 pair of data encryption/decryption module 4;It is that data encrypting and deciphering module 4 is to system control module 1 that external authentication realizes Legitimacy certification.
System control module 1 realizes calling modules, realizes encrypting transmission and the function of reception of instant message.
User data interactive module 2 is mainly used in the message content data editor of user being inputted and the function of output.Work as user When encrypting instant message and checking, the plaintext after deciphering is deposited in another interim catalogue.When user completes to check behaviour Make, switch to Another Application interface or return system desktop time, user data interactive module 2 can empty temp directory, reach The effect of burn-after-reading.
Message content transceiver module 3 is mainly used in being transmitted and receiving instant message.
Data encrypting and deciphering module 4 is the core of immediate news enciphering system, it is achieved instant message content is carried out encryption and decryption Operation.Data encrypting and deciphering module 4 includes: hash algorithm module 41, data encryption module 42 and data decryption module 43.Miscellaneous Gather algoritic module 41 for the hash of key value is calculated;Data encryption module 42 uses general business to uploading data acquisition for realizing It is encrypted with cryptographic algorithm and shows with encrypted state;Data decryption module 43 is for realizing downloading the general commercialization of data acquisition Cryptographic algorithm is decrypted, store and decrypted state shows.
Data encrypting and deciphering module 4 in the embodiment of the present invention uses general commercial cipher algorithm to realize, and uses software design to realize, Without adding hardware terminal equipment.The general commercial cipher algorithm used is SHA1, SHA-256, DES, aes algorithm.
The encryption and decryption that key management module 5 is data provides the key of encryption and decryption application.Meanwhile, user passes through this module, can To add voluntarily, change, to delete key value, particular group of users or unique user object can be applied to, thus realize close The uniqueness of key, improves the safety of encryption.
User setup management module 6 is mainly used in realizing the setting of user's corresponding informance and management function, including corresponding close of user Key name and encryption and decryption key.
Registration that user account management module 7 is mainly used in user account, the function nullified and manage.
Embodiment 2
Embodiments provide the implementation method of a kind of immediate news enciphering system based on smart mobile phone, as detailed below retouch State:
See Fig. 1 and Fig. 2, the process that in the present invention, the user account of immediate news enciphering system is registered as:
During user account registration, system control module 1 realizes the input of subscriber data registration by user data interactive module 2, System control module 1 calls user setup management module 6 and completes the setting of user key name and key, and system control module 1 is adjusted The registration of user is completed with user account management module 7 and server communication.
The implementation method of this user account registration specifically includes following steps:
(1) system control module 1 shows user's register interface by calling user data interactive module 2, it is achieved subscriber data The input of registration;
(2) user data interactive module 2 judges that the new subscriber data of input and parameter are the most legal, if message is legal, holds Go next step, otherwise, continue executing with step (1);
(3) system control module 1 calls user setup management module 6 and carries out the setting of user key name and key;
(4) system control module 1 calls user account management module 7 and server communication and completes the registration of user;
(5) system control module 1 shows login interface by calling user data interactive module 2, waits user operation.
(6) the user account registration process of encryption instant message terminates.
Seeing Fig. 1 and Fig. 3, the process that in the present invention, the user account of immediate news enciphering system is nullified is:
When user account is nullified, system control module 1 initiates user log off by user data interactive module 2 asks, system control Molding block 1 calls user setup management module 6 and completes the removing of user key name and key, and system control module 1 calls user Account management module 7 and server communication complete the cancellation of user.
The implementation method that this user account is nullified specifically includes following steps:
(1) system control module 1 initiates user log off request by calling user data interactive module 2;
(2) user data interactive module 2 judge input user log off request the most legal, if ask legal, under execution One step, otherwise, continues executing with step (1);
(3) system control module 1 calls user setup management module 6 and carries out the removing of user key name and key;
(4) system control module 1 calls user account management module 7 and server communication and completes the cancellation of user;
(5) system control module 1 closes cancellation dialog box by calling user data interactive module 2, exits user operation.
(6) the user account log off procedure of encryption instant message terminates.
Embodiment 3
Embodiments provide the implementation method of a kind of immediate news enciphering system based on smart mobile phone, as detailed below retouch State:
Seeing Fig. 1 and Fig. 4, in the present invention, the process sending encryption instant message of immediate news enciphering system is:
System control module 1 realizes the input of instant message content by user data interactive module 2, and wherein user data is mutual Module 2 determines that the legitimacy of user data, system control module 1 are called data encrypting and deciphering module 4 and carried out two-way legitimacy certification (inside and outside certification) determines the integrity that system uses, and system control module 1 is according to adding that user setup management module 6 is arranged Decryption key name by call key management module 5 obtain encryption key, system control module 1 by need send content and Cipher key delivery to data encrypting and deciphering module 4, data encrypting and deciphering module 4 by this key by hash algorithm (such as SHA1 or SHA-256) carrying out computing, instant message content is used general business men to use by data encrypting and deciphering module 4 value obtained after computing Cryptographic algorithm (such as DES or AES) is encrypted, and obtains encrypting the ciphertext data of instant message content, and system controls mould Instant message after encryption is sent by block 1 message call content transceiver module 3, completes instant message and sends process.
The implementation method of this transmission encryption instant message specifically includes following steps:
(1) system control module 1 realizes sending the input of instant message content by calling user data interactive module 2;
(2) (content of message includes word, picture, language to the instant message content of user data interactive module 2 judgement input Sound, file type message, and necessary when, show that file selects interface to choose multimedia file to be sent) be No legal, if message is legal, perform next step, otherwise, continue executing with step (1);
(3) system control module 1 calls data encrypting and deciphering module 4 and carries out two-way legitimacy certification, determines that system uses complete Whole property, if it is decided that system is complete, performs next step, otherwise, exits encryption instant message and sends operation;
(4) system control module 1 call key management module 5 according to user setup management module 6 arrange encryption key name obtain Take the key of encryption;
(5) system control module 1 will need the content sent and cipher key delivery to data encrypting and deciphering module 4;
(6) this key is carried out computing by hash algorithm (such as SHA1 or SHA-256) by data encrypting and deciphering module 4, New key values after computing;
(7) data encrypting and deciphering module 4 uses new key values that instant message content is used general commercial cipher algorithm (such as DES Or AES) be encrypted, obtain the encryption instant message comprising cipher-text information;
(8) instant message after encryption is sent to server by system control module 1 message call content transceiver module 3;
(9) the transmission process of encryption instant message terminates.
Seeing Fig. 1 and Fig. 5, in the present invention, the process receiving encryption instant message of immediate news enciphering system is:
System control module 1 receives the content of instant message by message call content transceiver module 3, and system control module 1 is adjusted Carrying out two-way legitimacy certification by data encrypting and deciphering module 4 and determine the integrity that system uses, system control module 1 is according to user The decruption key name arranging management module 6 setting calls the key of key management module 5 acquisition deciphering, system control module 1 Transmitting the content having been received by and decruption key to data encrypting and deciphering module 4, this key is passed through by data encrypting and deciphering module 4 Hash algorithm (such as SHA1 or SHA-256) carries out computing, and the value obtained after computing is made with encryption instant message content It is decrypted with general commercial cipher algorithm (such as DES or AES), the instant message original plaintext content after being deciphered, Clear content transmission after deciphering is carried out content displaying to user data interactive module 2 by system control module 1, completes immediately to disappear Breath reception process.
The implementation method of this reception encryption instant message specifically includes following steps:
(1) system control module 1 receives the content of instant message by message call content transceiver module 3, newly disappears if had Breath, performs next step, otherwise continues executing with step (1);
(2) system control module 1 calls data encrypting and deciphering module 4 and carries out two-way legitimacy certification, determines that system uses complete Whole property, if it is decided that system is complete, performs next step, otherwise, exits encryption instant message and receives operation;
(3) system control module 1 call key management module 3 according to user setup management module 6 arrange decruption key name obtain Take the key of deciphering;
(4) the encryption instant message content received and decruption key that need deciphering are transmitted to data by system control module 1 Encryption/decryption module 4;
(5) this key is carried out computing by hash algorithm (such as SHA1 or SHA-256) by data encrypting and deciphering module 4, New key values after computing;
(5) data encrypting and deciphering module 4 uses new key values that the instant message content of encryption is used general commercial cipher algorithm (such as DES or AES) is decrypted, the instant message original plaintext content after being deciphered;
(6) the instant message original plaintext content after deciphering is transmitted to user data interactive module 2 by system control module 1;
(7) user data interactive module 2 is decrypted the judgement of success or not, if successful decryption, then shows instant message Content, for checking, continues executing with next step, otherwise prompting message mistake;
(8) system control module 1 calls the operation of user data interactive module 2 monitoring users, when user switches application, exits Program or when returning to system desktop, deletes the plaintext deciphered, empties temp directory;
(9) the reception process of encryption instant message terminates.
Embodiment 4
Embodiments provide the implementation method of a kind of immediate news enciphering system based on smart mobile phone, as detailed below retouch State:
Seeing Fig. 1 and Fig. 6, the step that realizes of internal authentication process is:
(1) system control module 1 generates 8 byte randoms number, and sends to data encrypting and deciphering module 4;
(2) data encrypting and deciphering module 4 DES algorithm and internal authentication double secret key 8 byte random number is encrypted, and is encrypted After 8 byte datas;
(3) 8 byte datas after encryption are sent to system control module 1 by data encrypting and deciphering module 4;
(4) system control module 18 byte datas after DES algorithm and internal authentication key pair encryption are decrypted, and obtain 8 byte datas after deciphering;
(5) 8 byte datas after the 8 byte randoms number generated and deciphering are compared, if unanimously by system control module 1 Then internal authentication passes through, and assert that this data encrypting and deciphering module 4 is legal, proceeds next step operation, otherwise assert these data Encryption/decryption module 4 is illegal, exits immediate news enciphering operation;
(6) internal authentication process is completed.
Seeing Fig. 1 and Fig. 7, the step that realizes of external authentication process is:
(1) system control module 1 obtains 8 byte randoms number from data encrypting and deciphering module 4;
(2) 8 byte randoms number are encrypted, after being encrypted by system control module 1 DES algorithm and external authentication key 8 byte datas;
(3) 8 byte datas after encryption are sent to data encrypting and deciphering module 4 by system control module 1;
(4) 8 byte datas after encryption are decrypted by data encrypting and deciphering module 4 DES algorithm and external authentication key, 8 byte datas after deciphering;
(5) 8 byte datas after the 8 byte randoms number generated and deciphering are compared by data encrypting and deciphering module 4, if one Causing, external authentication is passed through, and assert that this system control module 1 is legal, can continue executing with other operation, otherwise assert this system Control module 1 is illegal, no longer performs other operation;
(6) data encrypting and deciphering module 4 will assert that result sends to system control module 1, completes external authentication process.
The embodiment of the present invention is to the model of each device in addition to doing specified otherwise, and the model of other devices does not limits, as long as The device of above-mentioned functions can be completed.
It will be appreciated by those skilled in the art that accompanying drawing is the schematic diagram of a preferred embodiment, the invention described above embodiment sequence number Just to describing, do not represent the quality of embodiment.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all in the spirit and principles in the present invention Within, any modification, equivalent substitution and improvement etc. made, should be included within the scope of the present invention.

Claims (8)

1. an immediate news enciphering system based on smart mobile phone, it is characterised in that described system includes: system controls Module, data encrypting and deciphering module and user setup management module,
During the Account Registration of user, system control module is used for calling user setup management module and completes user key name and key Setting;
During the Account Closure of user, system control module is used for calling user setup management module and completes user key name and key Removing;
When sending encryption instant message, system control module is used for calling data encrypting and deciphering module and carries out two-way legitimacy certification, Call user setup management module and obtain the encryption key name arranged;
When receiving encryption instant message, system control module is used for calling data encrypting and deciphering module and carries out two-way legitimacy certification, Call user setup management module and obtain the decruption key name arranged;
The general commercial cipher algorithm used in described data encrypting and deciphering module is that SHA1, SHA-256, DES, AES calculate Method.
A kind of immediate news enciphering system based on smart mobile phone the most according to claim 1, it is characterised in that institute State data encrypting and deciphering module to include: hash algorithm module, data encryption module and data decryption module;
Described hash algorithm module is for calculating the hash of key value;Data are carried out by described data encryption module for realization Encryption;Data are decrypted by described data decryption module for realization.
A kind of immediate news enciphering system based on smart mobile phone the most according to claim 1, it is characterised in that institute State system control module and realize the two-way legitimacy certification with described data encrypting and deciphering module and data communication by communication interface.
A kind of immediate news enciphering system based on smart mobile phone the most according to claim 1, it is characterised in that institute System of stating also includes: user data interactive module, message content transceiver module, user account management module and key management mould Block;
Described system control module and described data encrypting and deciphering module realize data communication;Described system control module is close with described Key management module realizes data communication;Described system control module realizes data communication with described user setup management module;Institute State system control module and realize data communication with described user data interactive module;In described system control module and described message Hold transceiver module and realize data communication;Described system control module and described user account management module realize data communication.
5. according to a kind of based on smart mobile phone the immediate news enciphering system described in any claim in claim 1-4 Implementation method, it is characterised in that described implementation method comprises the following steps:
The process of the user account registration of described immediate news enciphering system;The user account note of described immediate news enciphering system The process of pin;
The process sending encryption instant message of described immediate news enciphering system;The reception of described immediate news enciphering system adds The process of close instant message;
Wherein, the process sending encryption instant message of described immediate news enciphering system is:
Described system control module realizes the input of instant message content, described system control by described user data interactive module Molding block calls described data encrypting and deciphering module and carries out two-way legitimacy certification, and described system control module sets according to described user Put the encryption key name that management module is arranged, the encryption key obtaining encryption by calling described key management module, described System control module will need the content sent and encryption key transmission to described data encrypting and deciphering module, described data encrypting and deciphering Module completes instant message content-encrypt, and described system control module calls described message content transceiver module by after encryption Instant message sends, and completes instant message and sends process;
Wherein, the process receiving encryption instant message of described immediate news enciphering system is:
Described system control module receives the content of instant message, described system control by calling described message content transceiver module Molding block calls described data encrypting and deciphering module and carries out two-way legitimacy certification, and described system control module sets according to described user Put the decruption key name that management module is arranged, the decruption key calling the acquisition deciphering of described key management module, described system The content received and decruption key are transmitted to described data encrypting and deciphering module by control module, and described data encrypting and deciphering module will Encryption instant message content deciphering, described system control module is by mutual to described user data for the clear content transmission after deciphering Module carries out content displaying, completes instant message and receives process.
The implementation method of a kind of immediate news enciphering system based on smart mobile phone the most according to claim 5, its feature Being, described two-way legitimacy certification includes internal authentication process and external authentication process.
The implementation method of a kind of immediate news enciphering system based on smart mobile phone the most according to claim 6, its feature Being, described internal authentication process realizes step and is:
(1) system control module generates 8 byte randoms number, and sends to data encrypting and deciphering module;
(2) data encrypting and deciphering module DES algorithm and internal authentication double secret key 8 byte random number are encrypted, and are encrypted After 8 byte datas;
(3) 8 byte datas after encryption are sent to system control module by data encrypting and deciphering module;
(4) 8 byte datas after system control module DES algorithm and internal authentication key pair encryption are decrypted, and obtain 8 byte datas after deciphering;
(5) 8 byte datas after 8 byte randoms number and deciphering are compared by system control module, if consistent, internal Certification is passed through, and data encrypting and deciphering module is legal, and otherwise data encrypting and deciphering module is illegal, exits immediate news enciphering operation;
(6) internal authentication process is completed.
The implementation method of a kind of immediate news enciphering system based on smart mobile phone the most according to claim 6, its feature Being, described external authentication process realizes step and is:
(1) system control module obtains 8 byte randoms number from data encrypting and deciphering module;
(2) 8 byte randoms number are encrypted, after being encrypted by system control module DES algorithm and external authentication key 8 byte datas;
(3) 8 byte datas after encryption are sent to data encrypting and deciphering module by system control module;
(4) 8 byte datas after encryption are decrypted by data encrypting and deciphering module DES algorithm and external authentication key, 8 byte datas after deciphering;
(5) 8 byte datas after 8 byte randoms number and deciphering are compared by data encrypting and deciphering module, if consistent, outside Portion's certification is passed through, and system control module is legal, and otherwise system control module is illegal;
(6) data encrypting and deciphering module will assert that result sends to system control module, completes external authentication process.
CN201610352600.3A 2016-05-25 2016-05-25 Instant message encryption system based on smartphone and implementation method thereof Pending CN106027530A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610352600.3A CN106027530A (en) 2016-05-25 2016-05-25 Instant message encryption system based on smartphone and implementation method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610352600.3A CN106027530A (en) 2016-05-25 2016-05-25 Instant message encryption system based on smartphone and implementation method thereof

Publications (1)

Publication Number Publication Date
CN106027530A true CN106027530A (en) 2016-10-12

Family

ID=57093865

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610352600.3A Pending CN106027530A (en) 2016-05-25 2016-05-25 Instant message encryption system based on smartphone and implementation method thereof

Country Status (1)

Country Link
CN (1) CN106027530A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106487659A (en) * 2016-10-20 2017-03-08 宇龙计算机通信科技(深圳)有限公司 Information ciphering method and device, information decryption method and device and terminal
CN107749846A (en) * 2017-10-23 2018-03-02 深圳市比量科技传媒有限公司 The processing method and system that partial information is encrypted in a kind of common channel
CN108111711A (en) * 2017-12-27 2018-06-01 上海闻泰电子科技有限公司 The method and device that safety of image is shared
CN114050936A (en) * 2021-11-15 2022-02-15 南方电网数字电网研究院有限公司 User privacy protection method based on combination of big data analysis and cloud computing
CN115001713A (en) * 2022-06-10 2022-09-02 王爽 Instant message encryption system based on commercial cryptographic algorithm in medical field

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102413132A (en) * 2011-11-16 2012-04-11 北京数码视讯软件技术发展有限公司 Two-way-security-authentication-based data downloading method and system
US20130036302A1 (en) * 2003-02-20 2013-02-07 Marathon Solutions Secure instant messaging system
CN104394530A (en) * 2014-12-09 2015-03-04 天津光电安辰信息技术有限公司 Wechat content encryption system based on smartphone and implementation method of wechat content encryption system
CN104951409A (en) * 2015-06-12 2015-09-30 中国科学院信息工程研究所 System and method for full disk encryption based on hardware
CN105323254A (en) * 2015-11-23 2016-02-10 天津光电安辰信息技术有限公司 A mail encryption system based on a domestic commercial cipher code chip and an implementation method thereof
CN105472584A (en) * 2015-11-23 2016-04-06 天津光电安辰信息技术有限公司 Short message encryption system based on intelligent mobile phone and realization method thereof
CN105471711A (en) * 2015-11-23 2016-04-06 天津光电安辰信息技术有限公司 Mail encryption system based on intelligent mobile phone and realization method thereof
CN105516943A (en) * 2015-11-23 2016-04-20 天津光电安辰信息技术有限公司 Short message encryption system on the basis of domestic commercial crypto chip and realization method thereof

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130036302A1 (en) * 2003-02-20 2013-02-07 Marathon Solutions Secure instant messaging system
CN102413132A (en) * 2011-11-16 2012-04-11 北京数码视讯软件技术发展有限公司 Two-way-security-authentication-based data downloading method and system
CN104394530A (en) * 2014-12-09 2015-03-04 天津光电安辰信息技术有限公司 Wechat content encryption system based on smartphone and implementation method of wechat content encryption system
CN104951409A (en) * 2015-06-12 2015-09-30 中国科学院信息工程研究所 System and method for full disk encryption based on hardware
CN105323254A (en) * 2015-11-23 2016-02-10 天津光电安辰信息技术有限公司 A mail encryption system based on a domestic commercial cipher code chip and an implementation method thereof
CN105472584A (en) * 2015-11-23 2016-04-06 天津光电安辰信息技术有限公司 Short message encryption system based on intelligent mobile phone and realization method thereof
CN105471711A (en) * 2015-11-23 2016-04-06 天津光电安辰信息技术有限公司 Mail encryption system based on intelligent mobile phone and realization method thereof
CN105516943A (en) * 2015-11-23 2016-04-20 天津光电安辰信息技术有限公司 Short message encryption system on the basis of domestic commercial crypto chip and realization method thereof

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106487659A (en) * 2016-10-20 2017-03-08 宇龙计算机通信科技(深圳)有限公司 Information ciphering method and device, information decryption method and device and terminal
CN106487659B (en) * 2016-10-20 2022-12-20 宇龙计算机通信科技(深圳)有限公司 Information encryption method, information encryption device and terminal
CN107749846A (en) * 2017-10-23 2018-03-02 深圳市比量科技传媒有限公司 The processing method and system that partial information is encrypted in a kind of common channel
CN108111711A (en) * 2017-12-27 2018-06-01 上海闻泰电子科技有限公司 The method and device that safety of image is shared
CN114050936A (en) * 2021-11-15 2022-02-15 南方电网数字电网研究院有限公司 User privacy protection method based on combination of big data analysis and cloud computing
CN115001713A (en) * 2022-06-10 2022-09-02 王爽 Instant message encryption system based on commercial cryptographic algorithm in medical field
CN115001713B (en) * 2022-06-10 2023-08-25 深圳市马博士网络科技有限公司 Instant message encryption system based on commercial cryptographic algorithm in medical field

Similar Documents

Publication Publication Date Title
CN106656476B (en) Password protection method and device and computer readable storage medium
CN104917759B (en) Based on third-party secure file storage and shared system and method
CN104394530A (en) Wechat content encryption system based on smartphone and implementation method of wechat content encryption system
CN105101183B (en) The method and system that privacy content on mobile terminal is protected
CN106027530A (en) Instant message encryption system based on smartphone and implementation method thereof
CN103647784B (en) A kind of method and apparatus of public and private isolation
CN105812332A (en) Data protection method
CN103763308A (en) Method and device for having access to webpage safely and downloading data through intelligent terminal
WO2016045464A1 (en) Decryption method and mobile terminal
CN105516943A (en) Short message encryption system on the basis of domestic commercial crypto chip and realization method thereof
CN107579903B (en) Picture message secure transmission method and system based on mobile device
US20140079219A1 (en) System and a method enabling secure transmission of sms
CN104202736A (en) Mobile terminal short message end-to-end encryption method oriented to Android system
CN107666395A (en) One population file management method, user terminal, group chat system
CN103973543B (en) Instant communicating method and device
CN108390755B (en) Safety input method of SIM (subscriber identity Module) film-pasting card based on built-in safety chip
CN105281897A (en) File encryption method and device and file decryption method and device
KR101358375B1 (en) Prevention security system and method for smishing
CN110166403A (en) A kind of safety method of key and ciphertext separated transmission
CN105656870A (en) Data transmission method, device and system
CN107315934A (en) Communication message processing method, mobile terminal and storage device
CN105812251A (en) Instant messaging encryption system based on domestic commercial cryptography algorithms and implementation method of instant messaging encryption system based on domestic commercial cryptography algorithms
CN104994498B (en) The method and system that a kind of terminal applies are interacted with mobile phone card application
CN106789000A (en) A kind of secret phone system and method based on TEE technologies and wearable device
CN101754209A (en) Method for protecting contents of mobile phone

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20161012