CN106973072A - Network link encryption method and system based on terminal - Google Patents

Network link encryption method and system based on terminal Download PDF

Info

Publication number
CN106973072A
CN106973072A CN201710373335.1A CN201710373335A CN106973072A CN 106973072 A CN106973072 A CN 106973072A CN 201710373335 A CN201710373335 A CN 201710373335A CN 106973072 A CN106973072 A CN 106973072A
Authority
CN
China
Prior art keywords
encryption
packet
terminal
network link
sent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710373335.1A
Other languages
Chinese (zh)
Inventor
罗英杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen City Network Technology Co Ltd
Original Assignee
Shenzhen City Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen City Network Technology Co Ltd filed Critical Shenzhen City Network Technology Co Ltd
Priority to CN201710373335.1A priority Critical patent/CN106973072A/en
Publication of CN106973072A publication Critical patent/CN106973072A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a kind of network link encryption method and system based on terminal, methods described comprises the following steps:Obtain packet to be sent;By the quantity of interpolation data bag in the header field of the packet;It is encrypted using the encryption secret key pair packet, the packet after encryption is sent.The technical scheme that the present invention is provided has the advantages that user experience is high.

Description

Network link encryption method and system based on terminal
Technical field
The present invention relates to the communications field, more particularly to a kind of network link encryption method and system based on terminal.
Background technology
Network linking is the link of transmission data in network, and the transmission of existing link is based on node, existing network Link does not have encryption, influences security, and then influence customer experience degree.
The content of the invention
A kind of network link encryption method based on terminal is provided, the customer experience degree difference for which solving prior art lacks Point.
On the one hand there is provided a kind of network link encryption method based on terminal, methods described comprises the following steps:
Obtain packet to be sent;
Type according to the packet determines encryption key;
It is encrypted using the encryption secret key pair packet, the packet after encryption is sent.
Optionally, methods described also includes:
Key to encryption is indicated.
Optionally, methods described also includes:
The algorithm of the encryption is indicated in packet.
Second aspect includes there is provided a kind of network link encryption system based on terminal, methods described:
Receiving unit, the packet to be sent for obtaining;
Determining unit, encryption key is determined for the type according to the packet;
Control unit, for being encrypted using the encryption secret key pair packet, is sent to the packet after encryption.
Optionally, the system also includes:
Control unit, is indicated for the key to encryption.
Optionally, the system also includes:
Control unit, the algorithm for indicating the encryption in packet.
The third aspect is stored thereon with computer program there is provided a kind of computer-readable recording medium, and the program is processed Device realizes the above-mentioned network link encryption method based on terminal when performing.
There is provided a kind of terminal, including one or more processors, memory, transceiver, and one or many for fourth aspect Individual program, one or more of programs are stored in the memory, and are configured by one or more of processing Device is performed, and described program includes the instruction for being used to perform the step in the above-mentioned network link encryption method based on terminal.
The technical scheme that the specific embodiment of the invention is provided obtains packet to be sent, the type according to the packet It is determined that encryption key, it is encrypted, the packet after encryption is sent, so it has using the encryption secret key pair packet Type according to packet determines encryption key, improves security, improves the advantage of user experience.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with Other accompanying drawings are obtained according to these accompanying drawings.
A kind of flow chart for network link encryption method based on terminal that Fig. 1 provides for the present invention.
A kind of structure chart for network link encryption system based on terminal that Fig. 2 provides for the present invention.
A kind of hardware architecture diagram for terminal that Fig. 3 provides for the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made Embodiment, belongs to the scope of protection of the invention.
Refering to Fig. 1, a kind of network link encryption side based on terminal that Fig. 1 provides for the first better embodiment of the invention The flow chart of method, this method is completed by a node, and this method is as shown in figure 1, comprise the following steps:
Step S101, acquisition packet to be sent;
Step S102, the type according to the packet determine encryption key;
Step S103, it is encrypted using the encryption secret key pair packet, the packet after encryption is sent.
The technical scheme that the specific embodiment of the invention is provided obtains packet to be sent, the type according to the packet It is determined that encryption key, it is encrypted, the packet after encryption is sent, so it has using the encryption secret key pair packet Type according to packet determines encryption key, improves security, improves the advantage of user experience.
Optionally, it can also include after above-mentioned steps S103:
Key to encryption is indicated.
Optionally, it can also include after above-mentioned steps S103:
The algorithm of the encryption is indicated in packet.
Refering to Fig. 2, Fig. 2 encrypts system for a kind of network link based on terminal that the second better embodiment of the invention is provided System, the system as shown in Fig. 2 including:
Receiving unit 201, the packet to be sent for obtaining;
Determining unit 202, encryption key is determined for the type according to the packet;
Control unit 203, for being encrypted using the encryption secret key pair packet, is sent to the packet after encryption.
The technical scheme that the specific embodiment of the invention is provided obtains packet to be sent, the type according to the packet It is determined that encryption key, it is encrypted, the packet after encryption is sent, so it has using the encryption secret key pair packet Type according to packet determines encryption key, improves security, improves the advantage of user experience.
Optionally, said system can also include:
Control unit 203, is indicated for the key to encryption.
Optionally, said system can also include:
Control unit 203, the algorithm for indicating the encryption in packet.
It should be noted that for foregoing each method embodiment or embodiment, in order to be briefly described, therefore by its all table State as a series of combination of actions, but those skilled in the art should know, the present invention is not by described sequence of movement Limitation because according to the present invention, some steps can be carried out using other orders or simultaneously.Secondly, people in the art Member should also know that embodiment or embodiment described in the specification belong to preferred embodiment, involved action and list Necessary to the member not necessarily present invention.
The specific embodiment of the invention also provides a kind of computer-readable recording medium, is stored thereon with computer program, The program realizes the above-mentioned network link encryption method based on terminal when being executed by processor.
The specific embodiment of the invention also provides a kind of terminal, as shown in figure 3, including one or more processors 302, depositing Reservoir 301, transceiver 303, and one or more programs, one or more of programs are stored in the memory, And it is configured by one or more of computing devices, described program includes being used to perform the above-mentioned lattice chain based on terminal The instruction of step in the encryption method of road.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion being described in detail in some embodiment Point, it may refer to the associated description of other embodiment.
Step in present invention method can be sequentially adjusted, merged and deleted according to actual needs.
Unit in device of the embodiment of the present invention can be combined, divided and deleted according to actual needs.This area Not be the same as Example and the feature of non-be the same as Example described in this specification can be combined or combined by technical staff.
Through the above description of the embodiments, it is apparent to those skilled in the art that the present invention can be with Realized with hardware, or firmware is realized, or combinations thereof mode is realized.When implemented in software, can be by above-mentioned functions It is stored in computer-readable medium or is transmitted as one or more instructions on computer-readable medium or code.Meter Calculation machine computer-readable recording medium includes computer-readable storage medium and communication media, and wherein communication media includes being easy to from a place to another Any medium of individual place transmission computer program.Storage medium can be any usable medium that computer can be accessed.With Exemplified by this but it is not limited to:Computer-readable medium can include random access memory (Random Access Memory, RAM), read-only storage (Read-Only Memory, ROM), EEPROM (Electrically Erasable Programmable Read-Only Memory, EEPROM), read-only optical disc (Compact Disc Read- Only Memory, CD-ROM) or other optical disc storages, magnetic disk storage medium or other magnetic storage apparatus or can use In carry or storage with instruction or data structure form desired program code and can by computer access it is any its His medium.In addition.Any connection can be suitably turn into computer-readable medium.If for example, software be using coaxial cable, Optical fiber cable, twisted-pair feeder, Digital Subscriber Line (Digital Subscriber Line, DSL) or such as infrared ray, radio Transmitted with the wireless technology of microwave etc from website, server or other remote sources, then coaxial cable, optical fiber cable, The wireless technology of twisted-pair feeder, DSL or such as infrared ray, wireless and microwave etc be included in belonging to medium it is fixing in.Such as this Used in invention, disk (Disk) and dish (disc) include compression laser disc (CD), laser disc, laser disc, Digital Versatile Disc (DVD), floppy disk and Blu-ray Disc, the replicate data of the usual magnetic of which disk, and dish is then with laser come optical replicate data.On The combination in face should also be as being included within the protection domain of computer-readable medium.
In a word, the preferred embodiment of technical solution of the present invention is the foregoing is only, is not intended to limit the present invention's Protection domain.Within the spirit and principles of the invention, any modification, equivalent substitution and improvements made etc., should be included in Within protection scope of the present invention.

Claims (8)

1. a kind of network link encryption method based on terminal, it is characterised in that methods described comprises the following steps:
Obtain packet to be sent;
Type according to the packet determines encryption key;
It is encrypted using the encryption secret key pair packet, the packet after encryption is sent.
2. according to the method described in claim 1, it is characterised in that methods described also includes:
Key to encryption is indicated.
3. according to the method described in claim 1, it is characterised in that methods described also includes:
The algorithm of the encryption is indicated in packet.
4. a kind of network link encryption system based on terminal, it is characterised in that methods described includes:
Receiving unit, the packet to be sent for obtaining;
Determining unit, encryption key is determined for the type according to the packet,;
Control unit, for being encrypted using the encryption secret key pair packet, is sent to the packet after encryption.
5. system according to claim 4, it is characterised in that
Described control unit, is indicated for the key to encryption.
6. system according to claim 4, it is characterised in that
Described control unit, the algorithm for indicating the encryption in packet.
7. a kind of computer-readable recording medium, is stored thereon with computer program, realized such as when the program is executed by processor The network link encryption method based on terminal described in claim 1-3 any one.
8. a kind of terminal, it is characterised in that including one or more processors, memory, transceiver, and one or more journeys Sequence, one or more of programs are stored in the memory, and are configured to be held by one or more of processors OK, described program includes being used to perform the step in the network link encryption method based on terminal described in 1-3 any one Instruction.
CN201710373335.1A 2017-05-24 2017-05-24 Network link encryption method and system based on terminal Pending CN106973072A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710373335.1A CN106973072A (en) 2017-05-24 2017-05-24 Network link encryption method and system based on terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710373335.1A CN106973072A (en) 2017-05-24 2017-05-24 Network link encryption method and system based on terminal

Publications (1)

Publication Number Publication Date
CN106973072A true CN106973072A (en) 2017-07-21

Family

ID=59325924

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710373335.1A Pending CN106973072A (en) 2017-05-24 2017-05-24 Network link encryption method and system based on terminal

Country Status (1)

Country Link
CN (1) CN106973072A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107360566A (en) * 2017-07-25 2017-11-17 深圳市盛路物联通讯技术有限公司 Upstream data control extension method and device of the internet-of-things terminal based on type
WO2018214061A1 (en) * 2017-05-24 2018-11-29 深圳市乃斯网络科技有限公司 Terminal-based network link encryption method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102281261A (en) * 2010-06-10 2011-12-14 杭州华三通信技术有限公司 Data transmission method, system and apparatus
CN103795715A (en) * 2014-01-20 2014-05-14 冯丽娟 Privacy protection method, privacy recovery method and privacy protection system
CN104182697A (en) * 2014-08-15 2014-12-03 小米科技有限责任公司 File encryption method and device
CN105357007A (en) * 2014-08-21 2016-02-24 深圳市中兴微电子技术有限公司 Encryption communication method and communication terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102281261A (en) * 2010-06-10 2011-12-14 杭州华三通信技术有限公司 Data transmission method, system and apparatus
CN103795715A (en) * 2014-01-20 2014-05-14 冯丽娟 Privacy protection method, privacy recovery method and privacy protection system
CN104182697A (en) * 2014-08-15 2014-12-03 小米科技有限责任公司 File encryption method and device
CN105357007A (en) * 2014-08-21 2016-02-24 深圳市中兴微电子技术有限公司 Encryption communication method and communication terminal

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018214061A1 (en) * 2017-05-24 2018-11-29 深圳市乃斯网络科技有限公司 Terminal-based network link encryption method and system
CN107360566A (en) * 2017-07-25 2017-11-17 深圳市盛路物联通讯技术有限公司 Upstream data control extension method and device of the internet-of-things terminal based on type
CN107360566B (en) * 2017-07-25 2020-11-27 深圳市盛路物联通讯技术有限公司 Type-based uplink data encryption control method and device for Internet of things terminal

Similar Documents

Publication Publication Date Title
CN107171955A (en) The system of selection of data link and system in network
CN107158700A (en) Organizing method and system of the online game based on positioning
CN107070729A (en) Main equipment elects method and system in network linking
CN107105482A (en) Terminal wifi connection control methods and system
CN107196821A (en) The method of calibration and system of time delay in network link
CN107229875A (en) Terminal method for secret protection and system
CN107135108A (en) The update method and system of network connection list
CN107146081A (en) Terminal quick payment method and system based on positioning
CN106971575A (en) The distribution method and system in intelligent transportation tide track
CN106973072A (en) Network link encryption method and system based on terminal
CN107180109A (en) Location-based Condom recommends method and system
CN106992905A (en) Long-distance service method and system after network link failure
CN107204897A (en) The fault detection method and system of network link
CN106992998A (en) The safety implementation method and system of network link
CN107096222A (en) Location path method and system for planning in game
CN107145374A (en) App renewal realization method and system in terminal
CN107071090A (en) Application process and system of the virtual network address in the link of networking
CN107249177A (en) The reminding method and system of children's wrist-watch position in terminal
CN106973169A (en) The information-reading method and system of short message
CN107155183A (en) The data ciphering method and system of smart home
CN107148001A (en) Wechat friend invitation method and system based on positioning
CN106971550A (en) The detection method and system of intelligent transportation map Bridge
CN107086943A (en) The computational methods and system of packet loss in network linking
CN107197195A (en) The sharing method and system of cross-platform destination
CN107101646A (en) The application process and system positioned in self-driving

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170721

RJ01 Rejection of invention patent application after publication