CN106604275A - Information transmission, encryption and decryption method and system based on mobile internet - Google Patents

Information transmission, encryption and decryption method and system based on mobile internet Download PDF

Info

Publication number
CN106604275A
CN106604275A CN201710053671.8A CN201710053671A CN106604275A CN 106604275 A CN106604275 A CN 106604275A CN 201710053671 A CN201710053671 A CN 201710053671A CN 106604275 A CN106604275 A CN 106604275A
Authority
CN
China
Prior art keywords
information
encryption
base station
ciphertext
mobile internet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710053671.8A
Other languages
Chinese (zh)
Other versions
CN106604275B (en
Inventor
孙庆山
孟庆云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Sanzhen Intelligent Technology Co ltd
Original Assignee
Wuhan Huitongyun Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Huitongyun Information Technology Co Ltd filed Critical Wuhan Huitongyun Information Technology Co Ltd
Priority to CN201710053671.8A priority Critical patent/CN106604275B/en
Publication of CN106604275A publication Critical patent/CN106604275A/en
Application granted granted Critical
Publication of CN106604275B publication Critical patent/CN106604275B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to an information transmission, encryption and decryption method and an information transmission, encryption and decryption system based on a mobile internet. The information transmission, encryption and decryption method comprises the steps that: a transmitting terminal transmits information to a transmitting end base station, the transmitting end base station extracts partial data from the information according to a preset extraction rule and encrypts the partial data to obtain a ciphertext, the partial data in the information is replaced with the ciphertext so as to generate encrypted information, and the encrypted information is transmitted to a receiving end base station; and the receiving end base station extracts the ciphertext in the encrypted information according to a rule corresponding to the preset extraction rule, decrypts the ciphertext by adopting a cryptographic algorithm corresponding to encryption to obtain restored data, replaces the ciphertext in the encrypted information with the restored data so as to generate restored information, and transmits the restored information to a receiving terminal. According to the information transmission, encryption and decryption method and the information transmission, encryption and decryption system, only partial data in the information is encrypted and decrypted, thereby ensuring that an interceptor cannot know content of the information when the information transmitted from the transmitting end base station to the receiving end base station is intercepted, reducing calculation load of encryption and decryption, decreasing information transmission delay caused by encryption and decryption, and improving the immediacy of information transmission.

Description

A kind of information transfer encryption and decryption method and system based on mobile Internet
Technical field
The present invention relates to information encryption and decryption technology field, more particularly to a kind of information transfer based on mobile Internet adds solution Decryption method and system.
Background technology
In mobile Internet, relay station of the base station as information remote wireless transmission, information need to be encrypted after Can be transmitted using radio channel, otherwise will appear from information and intercepted by other wireless stations, cause information content to be revealed.It is logical Generation encryption information is encrypted to information for transmitting terminal base station often, receiving terminal base station will using cryptographic algorithm corresponding with encryption Encryption information is decrypted acquisition restored data;But it is as information transfer instantaneity is required, traditional to information whole encryption and decryption Mode, necessarily bring the delay of information transfer.
The content of the invention
It is an object of the present invention to provide a kind of information transfer encryption and decryption method and system based on mobile Internet, solves existing The problems referred to above present in technology.
The technical scheme that the present invention solves above-mentioned technical problem is as follows:
A kind of information transfer encipher-decipher method based on mobile Internet, comprises the steps:
Step 1, sends terminal and transmits information to transmitting terminal base station, and transmitting terminal base station is by default extracting rule from the letter In breath, extraction partial data is encrypted and obtains ciphertext, and the partial data generation ciphertext replaced in described information adds Confidential information, and the encryption information is transmitted to receiving terminal base station;
Step 2, the institute in the encryption information as described in Rule Extraction corresponding with the default extracting rule of receiving terminal base station Ciphertext is stated, and restored data is obtained using being decrypted the ciphertext with the corresponding cryptographic algorithm of encryption, by the restored data Replace the ciphertext in the encryption information and generate recovery information, and by the recovery information transfer to receiving terminal.
The invention has the beneficial effects as follows:Encryption and decryption is carried out to the partial data in information only, transmitting terminal base station has both been can guarantee that Be transferred to receiving terminal base station information be intercepted after, due to which part data it is encrypted, interceptor cannot awareness information content, The operand of encryption and decryption is reduced again, is reduced as the information transfer brought by encryption and decryption postpones, is improved the instant of information transfer Property.
On the basis of above-mentioned technical proposal, the present invention can also do following improvement.
Further, the encryption and decryption are using symmetric cryptography mode.
Using the beneficial effect of above-mentioned further scheme it is:Due to the stationarity of base station, can be in advance by encryption key distribution to each Base station, in symmetric cryptography mode, encryption and decryption processes adopt same key, have both been easy to the distribution of key, reduce again plus solution Close computational complexity, further reduces the information transfer delay brought by encryption and decryption, improves the instantaneity of information transfer.
Further, the symmetric cryptography mode is AES (Advanced Encryption Standard) mode.
Using the beneficial effect of above-mentioned further scheme it is:, used as conventional symmetric cipher mode, its algorithm is simple for AES, peace Quan Xinggao.
Further, the default extracting rule is the extracting rule in units of byte.
Using the beneficial effect of above-mentioned further scheme it is:It is easy to the extraction of data.
Further, the default extracting rule is the extraction that the second predetermined word joint number is extracted at interval of the first predetermined word joint number Rule.
Using the beneficial effect of above-mentioned further scheme it is:Interval same word joint number extracts the data of same word joint number, enters One step is easy to the extraction of data, and can adjust interval byte number and extract byte number, adapt to according to the level of security of transmission information In the information transfer of different level of securitys.
Another technical scheme of the present invention is as follows:
A kind of information transfer encrypting and deciphering system based on mobile Internet, including send terminal, transmitting terminal base station, receiving terminal Base station and receiving terminal;
The transmission terminal, which is used to transmit information to transmitting terminal base station;
The transmitting terminal base station, which is used to partial data is extracted from described information by default extracting rule and is encrypted To ciphertext, the ciphertext is replaced the partial data in described information and generates encryption information, and the encryption information is passed Transport to receiving terminal base station;
The receiving terminal base station, which is used in the encryption information as described in Rule Extraction corresponding with the default extracting rule The ciphertext, obtain restored data using being decrypted the ciphertext with the corresponding cryptographic algorithm of encryption, by the recovery Data are replaced the ciphertext in the encryption information and generate recovery information, and by the recovery information transfer to receiving terminal;
The receiving terminal, which is used to receive the recovery information.
On the basis of above-mentioned technical proposal, the present invention can also do following improvement.
Further, the encryption and decryption are using symmetric cryptography mode.
Further, the symmetric cryptography mode is AES modes.
Further, the default extracting rule is the extracting rule in units of byte.
Further, the default extracting rule is the extraction that the second predetermined word joint number is extracted at interval of the first predetermined word joint number Rule.
Description of the drawings
Fig. 1 is a kind of flow chart of the information transfer encipher-decipher method based on mobile Internet of the present invention;
Fig. 2 is a kind of theory diagram of the information transfer encrypting and deciphering system based on mobile Internet of the present invention.
Specific embodiment
The principle and feature of the present invention are described below in conjunction with accompanying drawing, example is served only for explaining the present invention, and It is non-for limiting the scope of the present invention.
As shown in figure 1, a kind of information transfer encipher-decipher method based on mobile Internet described in the embodiment of the present invention 1, bag Include following steps:
Step 1, sends terminal and transmits information to transmitting terminal base station, and transmitting terminal base station is by default extracting rule from the letter In breath, extraction partial data is encrypted and obtains ciphertext, and the partial data generation ciphertext replaced in described information adds Confidential information, and the encryption information is transmitted to receiving terminal base station;
Step 2, the institute in the encryption information as described in Rule Extraction corresponding with the default extracting rule of receiving terminal base station Ciphertext is stated, and restored data is obtained using being decrypted the ciphertext with the corresponding cryptographic algorithm of encryption, by the restored data Replace the ciphertext in the encryption information and generate recovery information, and by the recovery information transfer to receiving terminal.
A kind of information transfer encipher-decipher method based on mobile Internet described in the embodiment of the present invention 2, in the base of embodiment 1 On plinth, the encryption and decryption are using symmetric cryptography mode.
A kind of information transfer encipher-decipher method based on mobile Internet described in the embodiment of the present invention 3, in the base of embodiment 2 On plinth, the symmetric cryptography mode is AES modes.
A kind of information transfer encipher-decipher method based on mobile Internet described in the embodiment of the present invention 4, in embodiment 1 to 3 On the basis of any embodiment, the default extracting rule is the extracting rule in units of byte.
A kind of information transfer encipher-decipher method based on mobile Internet described in the embodiment of the present invention 5, in the base of embodiment 4 On plinth, the default extracting rule is the extracting rule that the second predetermined word joint number is extracted at interval of the first predetermined word joint number.
A kind of information transfer encrypting and deciphering system based on mobile Internet described in the embodiment of the present invention 6, including transmission terminal, Transmitting terminal base station, receiving terminal base station and receiving terminal;
The transmission terminal, which is used to transmit information to transmitting terminal base station;
The transmitting terminal base station, which is used to partial data is extracted from described information by default extracting rule and is encrypted To ciphertext, the ciphertext is replaced the partial data in described information and generates encryption information, and the encryption information is passed Transport to receiving terminal base station;
The receiving terminal base station, which is used in the encryption information as described in Rule Extraction corresponding with the default extracting rule The ciphertext, obtain restored data using being decrypted the ciphertext with the corresponding cryptographic algorithm of encryption, by the recovery Data are replaced the ciphertext in the encryption information and generate recovery information, and by the recovery information transfer to receiving terminal;
The receiving terminal, which is used to receive the recovery information.
A kind of information transfer encrypting and deciphering system based on mobile Internet described in the embodiment of the present invention 7, in the base of embodiment 6 On plinth, the encryption and decryption are using symmetric cryptography mode.
A kind of information transfer encrypting and deciphering system based on mobile Internet described in the embodiment of the present invention 8, in the base of embodiment 7 On plinth, the symmetric cryptography mode is AES modes.
A kind of information transfer encrypting and deciphering system based on mobile Internet described in the embodiment of the present invention 9, in embodiment 6 to 8 On the basis of any embodiment, the default extracting rule is the extracting rule in units of byte.
A kind of information transfer encrypting and deciphering system based on mobile Internet described in the embodiment of the present invention 10, in embodiment 9 On the basis of, the default extracting rule is the extracting rule that the second predetermined word joint number is extracted at interval of the first predetermined word joint number.
The foregoing is only presently preferred embodiments of the present invention, not to limit the present invention, all spirit in the present invention and Within principle, any modification, equivalent substitution and improvements made etc. should be included within the scope of the present invention.

Claims (10)

1. a kind of information transfer encipher-decipher method based on mobile Internet, it is characterised in that comprise the steps:
Step 1, sends terminal and transmits information to transmitting terminal base station, and transmitting terminal base station is by default extracting rule from described information Extraction partial data is encrypted and obtains ciphertext, the ciphertext is replaced the partial data in described information and generates encryption letter Breath, and the encryption information is transmitted to receiving terminal base station;
Step 2, it is described close in the encryption information as described in Rule Extraction corresponding with the default extracting rule of receiving terminal base station Text, obtains restored data using being decrypted the ciphertext with the corresponding cryptographic algorithm of encryption, and the restored data is replaced The ciphertext in the encryption information generates recovery information, and by the recovery information transfer to receiving terminal.
2. a kind of information transfer encipher-decipher method based on mobile Internet according to claim 1, it is characterised in that described Encryption and decryption are using symmetric cryptography mode.
3. a kind of information transfer encipher-decipher method based on mobile Internet according to claim 2, it is characterised in that described Symmetric cryptography mode is AES modes.
4., according to a kind of arbitrary information transfer encipher-decipher method based on mobile Internet of claims 1 to 3, its feature exists In the default extracting rule is the extracting rule in units of byte.
5. a kind of information transfer encipher-decipher method based on mobile Internet according to claim 4, it is characterised in that described Default extracting rule is the extracting rule that the second predetermined word joint number is extracted at interval of the first predetermined word joint number.
6. a kind of information transfer encrypting and deciphering system based on mobile Internet, it is characterised in that including sending terminal, send end group Stand, receiving terminal base station and receiving terminal;
The transmission terminal, which is used to transmit information to transmitting terminal base station;
The transmitting terminal base station, which is used to partial data is extracted from described information by default extracting rule to be encrypted and obtains close Text, the ciphertext is replaced the partial data in described information and generates encryption information, and by the encryption information transmit to Receiving terminal base station;
The receiving terminal base station, its institute being used in the encryption information as described in Rule Extraction corresponding with the default extracting rule Ciphertext is stated, and restored data is obtained using being decrypted the ciphertext with the corresponding cryptographic algorithm of encryption, by the restored data Replace the ciphertext in the encryption information and generate recovery information, and by the recovery information transfer to receiving terminal;
The receiving terminal, which is used to receive the recovery information.
7. a kind of information transfer encrypting and deciphering system based on mobile Internet according to claim 6, it is characterised in that described Encryption and decryption are using symmetric cryptography mode.
8. a kind of information transfer encrypting and deciphering system based on mobile Internet according to claim 7, it is characterised in that described Symmetric cryptography mode is AES modes.
9., according to a kind of arbitrary information transfer encrypting and deciphering system based on mobile Internet of claim 6 to 8, its feature exists In the default extracting rule is the extracting rule in units of byte.
10. a kind of information transfer encrypting and deciphering system based on mobile Internet according to claim 9, it is characterised in that institute It is the extracting rule that the second predetermined word joint number is extracted at interval of the first predetermined word joint number to state default extracting rule.
CN201710053671.8A 2017-01-22 2017-01-22 Information transmission encryption and decryption method and system based on mobile internet Active CN106604275B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710053671.8A CN106604275B (en) 2017-01-22 2017-01-22 Information transmission encryption and decryption method and system based on mobile internet

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710053671.8A CN106604275B (en) 2017-01-22 2017-01-22 Information transmission encryption and decryption method and system based on mobile internet

Publications (2)

Publication Number Publication Date
CN106604275A true CN106604275A (en) 2017-04-26
CN106604275B CN106604275B (en) 2020-08-04

Family

ID=58585954

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710053671.8A Active CN106604275B (en) 2017-01-22 2017-01-22 Information transmission encryption and decryption method and system based on mobile internet

Country Status (1)

Country Link
CN (1) CN106604275B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107302538A (en) * 2017-07-14 2017-10-27 深圳市盛路物联通讯技术有限公司 Internet of Things AP receives the subset encryption method and device of data
AU2022203651A1 (en) * 2021-12-14 2023-06-29 Intuit Inc. Rule-based targeted extraction and encryption of sensitive document features

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1774755A (en) * 2003-04-11 2006-05-17 索尼株式会社 Digital data storage/reproduction method and device
CN1812541A (en) * 2005-12-27 2006-08-02 浪潮电子信息产业股份有限公司 Digital copyright and digital watermark protecting method for video program
CN101132273A (en) * 2006-08-24 2008-02-27 北京大唐高鸿软件技术有限公司 Safe transmission method for text transport protocol message
CN105426701A (en) * 2014-09-23 2016-03-23 北大方正集团有限公司 Methods and apparatuses for encrypting and offline reading of electronic book and electronic book copyright protection system
US20160182952A1 (en) * 2014-12-23 2016-06-23 Microsoft Technology Licensing, Llc Protected Media Decoding System Supporting Metadata

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1774755A (en) * 2003-04-11 2006-05-17 索尼株式会社 Digital data storage/reproduction method and device
CN1812541A (en) * 2005-12-27 2006-08-02 浪潮电子信息产业股份有限公司 Digital copyright and digital watermark protecting method for video program
CN101132273A (en) * 2006-08-24 2008-02-27 北京大唐高鸿软件技术有限公司 Safe transmission method for text transport protocol message
CN105426701A (en) * 2014-09-23 2016-03-23 北大方正集团有限公司 Methods and apparatuses for encrypting and offline reading of electronic book and electronic book copyright protection system
US20160182952A1 (en) * 2014-12-23 2016-06-23 Microsoft Technology Licensing, Llc Protected Media Decoding System Supporting Metadata

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107302538A (en) * 2017-07-14 2017-10-27 深圳市盛路物联通讯技术有限公司 Internet of Things AP receives the subset encryption method and device of data
WO2019010796A1 (en) * 2017-07-14 2019-01-17 深圳市盛路物联通讯技术有限公司 Sub-device encryption method and device for receiving data of internet of things ap
CN107302538B (en) * 2017-07-14 2020-07-03 深圳市盛路物联通讯技术有限公司 Sub-equipment encryption method and device for data received by AP (Access Point) of Internet of things
AU2022203651A1 (en) * 2021-12-14 2023-06-29 Intuit Inc. Rule-based targeted extraction and encryption of sensitive document features
AU2022203651B2 (en) * 2021-12-14 2024-04-04 Intuit Inc. Rule-based targeted extraction and encryption of sensitive document features

Also Published As

Publication number Publication date
CN106604275B (en) 2020-08-04

Similar Documents

Publication Publication Date Title
CN107113287B (en) Method of performing device-to-device communication between user equipments
CN106254327A (en) Information processor and method
CN107800537B (en) Encryption database system and method based on quantum key distribution technology, storage method and query method
CN109005027B (en) Random data encryption and decryption method, device and system
CN106549939B (en) Data processing method and device for intelligent access control system
CN103338437A (en) Encryption method and system of mobile instant message
CN101707767B (en) Data transmission method and devices
CN102256170A (en) Encryption method and decryption method based on no-card CA (Certificate Authority)
CN104038336A (en) Data encryption method based on 3DES
CN107249002B (en) Method, system and device for improving safety of intelligent electric energy meter
CN105323249B (en) A kind of encrypting and decrypting communication system and its encrypting and decrypting method
KR20180096189A (en) LPWA Module performing Encrypted Communication and method thereof
CN109005151A (en) A kind of encryption of information, decryption processing method and processing terminal
CN104735094A (en) Information separation based data security transmission system and method
CN106604275A (en) Information transmission, encryption and decryption method and system based on mobile internet
CN104486756A (en) Encryption and decryption method and system for secret letter short message
CN112738037B (en) Data encryption communication method
CN104113410A (en) Method and device for data encryption transmission based on multi-table encryption method
CN116743505B (en) Safety transmission encryption method based on national secret
CN109587149A (en) A kind of safety communicating method and device of data
CN104579645B (en) Key updating method based on AES encryption system
CN104158788A (en) Method of end-to-end data transmission
CN101500146A (en) Digital television receiving control method and apparatus based on bi-directional network
CN102761417A (en) Method for processing data transmission of terminals and terminal
CN101330513A (en) Method for synchronizing initiation vectors IV in an applied block cipher operation mode

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240731

Address after: Room 903-54, Building 59, Xiangshan Huijing Business Center, No. 2, Houtang Road, the Taihu Lake National Tourism Resort, Suzhou, Jiangsu Province, 215000

Patentee after: Suzhou Sanzhen Intelligent Technology Co.,Ltd.

Country or region after: China

Address before: No. 01, 7th Floor, Building A3, Phase 4.1, Software Industry Park, No.1 Guanshan Avenue, Donghu High tech Zone Development Zone, Hongshan District, Wuhan City, Hubei Province 430000

Patentee before: WUHAN HUITONGYUN INFORMATION TECHNOLOGY Co.,Ltd.

Country or region before: China