CN106027560A - Intelligent terminal oriented security transmission method and system - Google Patents
Intelligent terminal oriented security transmission method and system Download PDFInfo
- Publication number
- CN106027560A CN106027560A CN201610527630.3A CN201610527630A CN106027560A CN 106027560 A CN106027560 A CN 106027560A CN 201610527630 A CN201610527630 A CN 201610527630A CN 106027560 A CN106027560 A CN 106027560A
- Authority
- CN
- China
- Prior art keywords
- encryption
- sender
- data
- information
- encryption end
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/164—Implementing security features at a particular protocol layer at the network layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Small-Scale Networks (AREA)
Abstract
The invention discloses an intelligent terminal oriented security transmission method and system. The method comprises the following step: 1) an encryption end of a sender intercepts a data packet sent out by a client end of the sender, and takes out information of the data packet; 2) the encryption end of the sender splits the information of the data packet, and encrypts the data information; 3) the encryption end of the sender sends the encrypted data information to a receiver; 4) the encryption end of the receiver decrypts the received data information, and recombines the decrypted data according to a splitting rule to restore the original information; and 5) the encryption end of the receiver sends the restored original data information to the client end of the receiver. The intelligent terminal oriented security transmission method and system disclosed by the invention have the following beneficial effects: the method can encrypt and transmit the data information via multiple channels, so the possibility that the data information is intercepted completely is reduced; and in addition, by employing multi-channel transmission, the data volume transmitted by each communication channel can be decreased, and the time of data transmission is reduced; and therefore, the security is improved, and the transmission efficiency is improved.
Description
Technical field
The present invention relates to technical field of network security, it particularly relates to a kind of safe transmission method towards intelligent terminal and system.
Background technology
Smart mobile phone and the appearance of various bluetooth peripheral equipment, significantly increase people's demand for communication, and along with the most numerous and diverse mobile phone system and the appearance of miscellaneous cell phone software, the problem that inevitably there will be some safeties.The such as defect of some application protocols itself can allow assailant have opportunity, utilizes the leak of agreement to go to encroach on other people interests.Especially when utilizing mobile communications network to transmit some important information, safety is particularly important.The bank card password of oneself, private photos and some other important information are often issued other people by mobile network by cellie, and mobile phone itself does not provide the cryptographic services of data.Along with the application of the Internet is more and more extensive, bank also promotes mobile banking service in mobile terminal, can send, to user, the information that identifying code one class is important when website registration or payment, and once these information are trapped, and will bring loss difficult to the appraisal to user.
Mobile communication system set up some security mechanisms, but it is not enough to resist the various means of stealing secret information emerged in an endless stream, the attack means of hackers is more and more diversified now, and is merely capable of ensureing the integrity of data in basic mobile communication system, and the cryptographic means carried is the weakest.The power of opposing is almost had no in face of attack means now.The development in pluralism of mobile communication business, as the hugest in the data scale such as online transaction, online game, and the requirement to safety is the highest, and emerge in an endless stream especially more susceptible to malicious attack, the example that various important informations are stolen in mobile terminal itself.Therefore in point-to-point communication, how to identify the identity of the other side during communication, maintain secrecy the data communicated, on the premise of affecting communication efficiency minimum, improving safety as far as possible is the primary goal that we are to be done.
For the problem in correlation technique, effective solution is the most not yet proposed.
Summary of the invention
For the above-mentioned technical problem in correlation technique, the present invention proposes a kind of safe transmission method towards intelligent terminal and system, it is possible to increase the safety of data transmission, can also improve the efficiency of data transmission simultaneously.
For realizing above-mentioned technical purpose, the technical scheme is that and be achieved in that:
A kind of safe transmission method towards intelligent terminal, comprises the following steps:
The packet that the client of sender is sent by the encryption end of S1 sender is intercepted and captured, and is taken apart by the packet of intercepting and capturing, takes out the information of packet;
The information of described packet is split by the encryption end of S2 sender, and is encrypted the data message after splitting;
Data message after encryption is issued recipient by the encryption end of S3 sender;
The data message received is decrypted by the encryption end of S4 recipient, and the data of deciphering is recombinated according to splitting rule, restores raw information;
The primary data information (pdi) of reduction is sent to the client of recipient by the encryption end of S5 recipient.
Preferably, in step s 2, the information of packet is split into different numbers by the quantity of the communications conduit that the encryption end of sender uses according to current intelligent terminal, and is encrypted the data message after splitting.
Further, in step s3, the data message after encryption is sent by the encryption end of sender by different passage channels.
Preferably, in step s3, the data message after encryption is sent to recipient by WiFi, GPRS, bluetooth and note channel by the encryption end of sender.
Further, the data message sent by WiFi Yu GPRS is transmitted to recipient by WiFi/GPRS server.
Further, encryption end is provided with bluetooth server, is transferred directly in the encryption end of recipient by the data of Bluetooth transmission.
Further, the data transmitted by note channel are sent to the inbox of recipient by mobile or operator of UNICOM platform server, then are extracted from inbox by the encryption end of recipient.
Further, in step s 4, the encryption end of recipient will be decrypted from the data of each channel reception respectively according to fractionation and encryption rule and recombinate.
A kind of secure transmission system towards intelligent terminal, including:
The encryption end of sender, its packet sending the client of sender is intercepted and captured, and is taken apart by the packet of intercepting and capturing, takes out the information of packet, the information of described packet is split by the encryption end of described sender, and is encrypted the data message after splitting;
Server, it receives the data message after the encryption end encryption of described sender;
The encryption end of recipient, it receives the data message after the encryption end encryption of the described sender that described server forwards, and the data message received is decrypted, according to splitting rule, the data of deciphering are recombinated, restore raw information, and the primary data information (pdi) of reduction is sent to the client of recipient.
Beneficial effects of the present invention: this method can pass through multiple channel encryption transmitting data information, reduce the possibility that data message is all intercepted and captured, and the data volume using channel transmission that each communications conduit can be made to be transmitted diminishes, reduce the time of data transmission;Both improve safety, improve again efficiency of transmission.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, the accompanying drawing used required in embodiment will be briefly described below, apparently, accompanying drawing in describing below is only some embodiments of the present invention, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is encrypted transmission pathway figure according to embodiments of the present invention;
Fig. 2 is encryption end internal cryptographic transmission principle figure according to embodiments of the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments.Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art are obtained, broadly fall into the scope of protection of the invention.
As shown in Figure 1-2, a kind of safe transmission method towards intelligent terminal described according to embodiments of the present invention, comprise the following steps:
The packet that the client of sender is sent by the encryption end of S1 sender is intercepted and captured, and is taken apart by the packet of intercepting and capturing, takes out the information of packet;
The information of described packet is split by the encryption end of S2 sender, and is encrypted the data message after splitting;
Data message after encryption is issued recipient by the encryption end of S3 sender;
The data message received is decrypted by the encryption end of S4 recipient, and the data of deciphering is recombinated according to splitting rule, restores raw information;
The primary data information (pdi) of reduction is sent to the client of recipient by the encryption end of S5 recipient.
In one embodiment of the invention, in step s 2, the information of packet is split into different numbers by the quantity of the communications conduit that the encryption end of sender uses according to current intelligent terminal, and is encrypted the data message after splitting.
Further, in step s3, the data message after encryption is sent by the encryption end of sender by different passage channels.
In one embodiment of the invention, in step s3, the data message after encryption is sent to recipient by WiFi, GPRS, bluetooth and note channel by the encryption end of sender.
Wherein, the data message sent by WiFi Yu GPRS is transmitted to recipient by WiFi/GPRS server.
Wherein, encryption end is provided with bluetooth server, is transferred directly in the encryption end of recipient by the data of Bluetooth transmission.
Wherein, the data transmitted by note channel are sent to the inbox of recipient by mobile or operator of UNICOM platform server, then are extracted from inbox by the encryption end of recipient.
Further, in step s 4, the encryption end of recipient will be decrypted from the data of each channel reception respectively according to fractionation and encryption rule and recombinate.
On the other hand, a kind of secure transmission system towards intelligent terminal, including:
The encryption end of sender, its packet sending the client of sender is intercepted and captured, and is taken apart by the packet of intercepting and capturing, takes out the information of packet, the information of described packet is split by the encryption end of described sender, and is encrypted the data message after splitting;
Server, it receives the data message after the encryption end encryption of described sender;
The encryption end of recipient, it receives the data message after the encryption end encryption of the described sender that described server forwards, and the data message received is decrypted, according to splitting rule, the data of deciphering are recombinated, restore raw information, and the primary data information (pdi) of reduction is sent to the client of recipient.
Data are encrypted by the present invention now according to multiple communication channel, combined by the fractionation of data, make to steal single channel or fail to crack completely all channels AES or can not be according to splitting sequential combination data, steal information person all will be made to obtain less than complete cleartext information, substantially increase safety, however, it may instead be that while having ensured safety, the most complicated communications conduit and AES bring white elephant all can to the efficiency of transmission of data.So mobile terminal is under different physical environments, the suitable encryption method of suitable selection is particularly important.
In sum, technique scheme by means of the present invention, this method can pass through multiple channel encryption transmitting data information, reduce the possibility that data message is all intercepted and captured, and the data volume using channel transmission that each communications conduit can be made to be transmitted diminishes, reduce the time of data transmission;Both improve safety, improve again efficiency of transmission.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all within the spirit and principles in the present invention, any modification, equivalent substitution and improvement etc. made, should be included within the scope of the present invention.
Claims (9)
1. the safe transmission method towards intelligent terminal, it is characterised in that comprise the following steps:
The packet that the client of sender is sent by the encryption end of S1 sender is intercepted and captured, and is taken apart by the packet of intercepting and capturing, takes out the information of packet;
The information of described packet is split by the encryption end of S2 sender, and is encrypted the data message after splitting;
Data message after encryption is issued recipient by the encryption end of S3 sender;
The data message received is decrypted by the encryption end of S4 recipient, and the data of deciphering is recombinated according to splitting rule, restores raw information;
The primary data information (pdi) of reduction is sent to the client of recipient by the encryption end of S5 recipient.
Safe transmission method towards intelligent terminal the most according to claim 1, it is characterized in that, in step s 2, the information of packet is split into different numbers by the quantity of the communications conduit that the encryption end of sender uses according to current intelligent terminal, and is encrypted the data message after splitting.
Safe transmission method towards intelligent terminal the most according to claim 2, it is characterised in that in step s3, the data message after encryption is sent by the encryption end of sender by different passage channels.
Safe transmission method towards intelligent terminal the most according to claim 3, it is characterised in that in step s3, the data message after encryption is sent to recipient by WiFi, GPRS, bluetooth and note channel by the encryption end of sender.
Safe transmission method towards intelligent terminal the most according to claim 4, it is characterised in that the data message sent by WiFi Yu GPRS is transmitted to recipient by WiFi/GPRS server.
Safe transmission method towards intelligent terminal the most according to claim 4, it is characterised in that be provided with bluetooth server in encryption end, be transferred directly in the encryption end of recipient by the data of Bluetooth transmission.
Safe transmission method towards intelligent terminal the most according to claim 4, it is characterized in that, the data transmitted by note channel are sent to the inbox of recipient by mobile or operator of UNICOM platform server, then are extracted from inbox by the encryption end of recipient.
Safe transmission method towards intelligent terminal the most according to claim 3, it is characterised in that in step s 4, the encryption end of recipient will be decrypted from the data of each channel reception respectively according to fractionation and encryption rule and recombinate.
9. the secure transmission system towards intelligent terminal, it is characterised in that including:
The encryption end of sender, its packet sending the client of sender is intercepted and captured, and is taken apart by the packet of intercepting and capturing, takes out the information of packet, the information of described packet is split by the encryption end of described sender, and is encrypted the data message after splitting;
Server, it receives the data message after the encryption end encryption of described sender;
The encryption end of recipient, it receives the data message after the encryption end encryption of the described sender that described server forwards, and the data message received is decrypted, according to splitting rule, the data of deciphering are recombinated, restore raw information, and the primary data information (pdi) of reduction is sent to the client of recipient.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610527630.3A CN106027560A (en) | 2016-07-06 | 2016-07-06 | Intelligent terminal oriented security transmission method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610527630.3A CN106027560A (en) | 2016-07-06 | 2016-07-06 | Intelligent terminal oriented security transmission method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106027560A true CN106027560A (en) | 2016-10-12 |
Family
ID=57107988
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610527630.3A Pending CN106027560A (en) | 2016-07-06 | 2016-07-06 | Intelligent terminal oriented security transmission method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106027560A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106603559A (en) * | 2016-12-30 | 2017-04-26 | 深圳市天辰防务通信技术有限公司 | Wireless communication terminal data transmission anti-interception method |
CN109117678A (en) * | 2018-08-10 | 2019-01-01 | 天地融科技股份有限公司 | A kind of information transferring method and system |
CN109195145A (en) * | 2018-10-25 | 2019-01-11 | 苏州格目软件技术有限公司 | A kind of Bluetooth data transfer method and its system based on network security |
CN109257744A (en) * | 2018-11-05 | 2019-01-22 | 广东工业大学 | 5G data transmission method, system and 5G data send and receive device |
CN109344608A (en) * | 2018-08-10 | 2019-02-15 | 天地融科技股份有限公司 | A kind of information transferring method and system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101783789A (en) * | 2009-01-16 | 2010-07-21 | 深圳市维信联合科技有限公司 | Method, device and system for transmitting and processing network packet |
CN103209191A (en) * | 2013-05-08 | 2013-07-17 | 天津工业大学 | Method for realizing physical partition of internal and external networks |
CN103237036A (en) * | 2013-05-08 | 2013-08-07 | 天津工业大学 | Device for realizing physical partition of internal and external networks |
CN103780375A (en) * | 2012-10-19 | 2014-05-07 | 中国电信股份有限公司 | Data transmitting method and device, and data receiving method and device |
CN104071333A (en) * | 2014-06-27 | 2014-10-01 | 梧州学院 | Big dipper and 4G-based unmanned aerial vehicle |
CN204537471U (en) * | 2015-03-20 | 2015-08-05 | 四川信能科技发展有限公司 | A kind of ground base navigation system for aviation aircraft |
-
2016
- 2016-07-06 CN CN201610527630.3A patent/CN106027560A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101783789A (en) * | 2009-01-16 | 2010-07-21 | 深圳市维信联合科技有限公司 | Method, device and system for transmitting and processing network packet |
CN103780375A (en) * | 2012-10-19 | 2014-05-07 | 中国电信股份有限公司 | Data transmitting method and device, and data receiving method and device |
CN103209191A (en) * | 2013-05-08 | 2013-07-17 | 天津工业大学 | Method for realizing physical partition of internal and external networks |
CN103237036A (en) * | 2013-05-08 | 2013-08-07 | 天津工业大学 | Device for realizing physical partition of internal and external networks |
CN104071333A (en) * | 2014-06-27 | 2014-10-01 | 梧州学院 | Big dipper and 4G-based unmanned aerial vehicle |
CN204537471U (en) * | 2015-03-20 | 2015-08-05 | 四川信能科技发展有限公司 | A kind of ground base navigation system for aviation aircraft |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106603559A (en) * | 2016-12-30 | 2017-04-26 | 深圳市天辰防务通信技术有限公司 | Wireless communication terminal data transmission anti-interception method |
CN106603559B (en) * | 2016-12-30 | 2019-09-06 | 深圳市天辰防务通信技术有限公司 | A kind of method of wireless communication terminal data transmission anti-intercepting and capturing |
CN109117678A (en) * | 2018-08-10 | 2019-01-01 | 天地融科技股份有限公司 | A kind of information transferring method and system |
CN109344608A (en) * | 2018-08-10 | 2019-02-15 | 天地融科技股份有限公司 | A kind of information transferring method and system |
CN109344608B (en) * | 2018-08-10 | 2021-09-21 | 天地融科技股份有限公司 | Information transmission method and system |
CN109195145A (en) * | 2018-10-25 | 2019-01-11 | 苏州格目软件技术有限公司 | A kind of Bluetooth data transfer method and its system based on network security |
CN109257744A (en) * | 2018-11-05 | 2019-01-22 | 广东工业大学 | 5G data transmission method, system and 5G data send and receive device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102271035B (en) | Password transmission method and device | |
CN109347635A (en) | A kind of Internet of Things security certification system and authentication method based on national secret algorithm | |
CN106027560A (en) | Intelligent terminal oriented security transmission method and system | |
CN110062382B (en) | Identity verification method, client, relay equipment and server | |
CN104301115B (en) | Mobile phone and Bluetooth key signature verification ciphertext communication method | |
CN101262349A (en) | SMS-based identity authentication method and device | |
CN102045715B (en) | Method, device and system for realizing mobile signature | |
CN102664898A (en) | Fingerprint identification-based encrypted transmission method, fingerprint identification-based encrypted transmission device and fingerprint identification-based encrypted transmission system | |
CN104901935A (en) | Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem) | |
CN107679847A (en) | A kind of move transaction method for secret protection based on near-field communication bidirectional identity authentication | |
CN104219054B (en) | A kind of Point-to-Point Data Transmission method based on NFC | |
CN102833244A (en) | Communication method for authentication by fingerprint information | |
CN103906052A (en) | Mobile terminal authentication method, service access method and equipment | |
CN106792700A (en) | The method for building up and system of a kind of secure communication environment of wearable device | |
CN108401494B (en) | Method and system for transmitting data | |
CN106100980A (en) | Instant messaging communication means end to end and device | |
CN102647279A (en) | Encryption method, encryption card, terminal equipment and machine-card interlocking device | |
CN113507372A (en) | Bidirectional authentication method for interface request | |
CN105407467A (en) | Short message encryption methods, devices and system | |
CN102869009B (en) | Communication encryption application process and communication system | |
CN104301886A (en) | Short message reading method and system, terminal and wearable device | |
CN103458401B (en) | A kind of voice encryption communication system and communication means | |
CN103139179A (en) | Multi-channel active type network identity verification system and network identity verification device | |
CN108390755A (en) | The safe input method of SIM pasting cards based on built-in security chip | |
CN102811369A (en) | Security authentication method during video sharing and handheld equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 100094 room 3, 23 building, 68 Beiqing Road, Haidian District, Beijing 304 Applicant after: Beijing Lianshan Polytron Technologies Inc Address before: 100094 room 3, 23 building, 68 Beiqing Road, Haidian District, Beijing 304 Applicant before: Caroline control (Beijing) Information Technology Co., Ltd. |
|
CB02 | Change of applicant information | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161012 |
|
RJ01 | Rejection of invention patent application after publication |