CN106973072A - Network link encryption method and system based on terminal - Google Patents

Network link encryption method and system based on terminal Download PDF

Info

Publication number
CN106973072A
CN106973072A CN201710373335.1A CN201710373335A CN106973072A CN 106973072 A CN106973072 A CN 106973072A CN 201710373335 A CN201710373335 A CN 201710373335A CN 106973072 A CN106973072 A CN 106973072A
Authority
CN
China
Prior art keywords
encryption
packet
terminal
network link
characterised
Prior art date
Application number
CN201710373335.1A
Other languages
Chinese (zh)
Inventor
罗英杰
Original Assignee
深圳市乃斯网络科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市乃斯网络科技有限公司 filed Critical 深圳市乃斯网络科技有限公司
Priority to CN201710373335.1A priority Critical patent/CN106973072A/en
Publication of CN106973072A publication Critical patent/CN106973072A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Abstract

The invention provides a kind of network link encryption method and system based on terminal, methods described comprises the following steps:Obtain packet to be sent;By the quantity of interpolation data bag in the header field of the packet;It is encrypted using the encryption secret key pair packet, the packet after encryption is sent.The technical scheme that the present invention is provided has the advantages that user experience is high.

Description

Network link encryption method and system based on terminal

Technical field

The present invention relates to the communications field, more particularly to a kind of network link encryption method and system based on terminal.

Background technology

Network linking is the link of transmission data in network, and the transmission of existing link is based on node, existing network Link does not have encryption, influences security, and then influence customer experience degree.

The content of the invention

A kind of network link encryption method based on terminal is provided, the customer experience degree difference for which solving prior art lacks Point.

On the one hand there is provided a kind of network link encryption method based on terminal, methods described comprises the following steps:

Obtain packet to be sent;

Type according to the packet determines encryption key;

It is encrypted using the encryption secret key pair packet, the packet after encryption is sent.

Optionally, methods described also includes:

Key to encryption is indicated.

Optionally, methods described also includes:

The algorithm of the encryption is indicated in packet.

Second aspect includes there is provided a kind of network link encryption system based on terminal, methods described:

Receiving unit, the packet to be sent for obtaining;

Determining unit, encryption key is determined for the type according to the packet;

Control unit, for being encrypted using the encryption secret key pair packet, is sent to the packet after encryption.

Optionally, the system also includes:

Control unit, is indicated for the key to encryption.

Optionally, the system also includes:

Control unit, the algorithm for indicating the encryption in packet.

The third aspect is stored thereon with computer program there is provided a kind of computer-readable recording medium, and the program is processed Device realizes the above-mentioned network link encryption method based on terminal when performing.

There is provided a kind of terminal, including one or more processors, memory, transceiver, and one or many for fourth aspect Individual program, one or more of programs are stored in the memory, and are configured by one or more of processing Device is performed, and described program includes the instruction for being used to perform the step in the above-mentioned network link encryption method based on terminal.

The technical scheme that the specific embodiment of the invention is provided obtains packet to be sent, the type according to the packet It is determined that encryption key, it is encrypted, the packet after encryption is sent, so it has using the encryption secret key pair packet Type according to packet determines encryption key, improves security, improves the advantage of user experience.

Brief description of the drawings

In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with Other accompanying drawings are obtained according to these accompanying drawings.

A kind of flow chart for network link encryption method based on terminal that Fig. 1 provides for the present invention.

A kind of structure chart for network link encryption system based on terminal that Fig. 2 provides for the present invention.

A kind of hardware architecture diagram for terminal that Fig. 3 provides for the present invention.

Embodiment

Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made Embodiment, belongs to the scope of protection of the invention.

Refering to Fig. 1, a kind of network link encryption side based on terminal that Fig. 1 provides for the first better embodiment of the invention The flow chart of method, this method is completed by a node, and this method is as shown in figure 1, comprise the following steps:

Step S101, acquisition packet to be sent;

Step S102, the type according to the packet determine encryption key;

Step S103, it is encrypted using the encryption secret key pair packet, the packet after encryption is sent.

The technical scheme that the specific embodiment of the invention is provided obtains packet to be sent, the type according to the packet It is determined that encryption key, it is encrypted, the packet after encryption is sent, so it has using the encryption secret key pair packet Type according to packet determines encryption key, improves security, improves the advantage of user experience.

Optionally, it can also include after above-mentioned steps S103:

Key to encryption is indicated.

Optionally, it can also include after above-mentioned steps S103:

The algorithm of the encryption is indicated in packet.

Refering to Fig. 2, Fig. 2 encrypts system for a kind of network link based on terminal that the second better embodiment of the invention is provided System, the system as shown in Fig. 2 including:

Receiving unit 201, the packet to be sent for obtaining;

Determining unit 202, encryption key is determined for the type according to the packet;

Control unit 203, for being encrypted using the encryption secret key pair packet, is sent to the packet after encryption.

The technical scheme that the specific embodiment of the invention is provided obtains packet to be sent, the type according to the packet It is determined that encryption key, it is encrypted, the packet after encryption is sent, so it has using the encryption secret key pair packet Type according to packet determines encryption key, improves security, improves the advantage of user experience.

Optionally, said system can also include:

Control unit 203, is indicated for the key to encryption.

Optionally, said system can also include:

Control unit 203, the algorithm for indicating the encryption in packet.

It should be noted that for foregoing each method embodiment or embodiment, in order to be briefly described, therefore by its all table State as a series of combination of actions, but those skilled in the art should know, the present invention is not by described sequence of movement Limitation because according to the present invention, some steps can be carried out using other orders or simultaneously.Secondly, people in the art Member should also know that embodiment or embodiment described in the specification belong to preferred embodiment, involved action and list Necessary to the member not necessarily present invention.

The specific embodiment of the invention also provides a kind of computer-readable recording medium, is stored thereon with computer program, The program realizes the above-mentioned network link encryption method based on terminal when being executed by processor.

The specific embodiment of the invention also provides a kind of terminal, as shown in figure 3, including one or more processors 302, depositing Reservoir 301, transceiver 303, and one or more programs, one or more of programs are stored in the memory, And it is configured by one or more of computing devices, described program includes being used to perform the above-mentioned lattice chain based on terminal The instruction of step in the encryption method of road.

In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion being described in detail in some embodiment Point, it may refer to the associated description of other embodiment.

Step in present invention method can be sequentially adjusted, merged and deleted according to actual needs.

Unit in device of the embodiment of the present invention can be combined, divided and deleted according to actual needs.This area Not be the same as Example and the feature of non-be the same as Example described in this specification can be combined or combined by technical staff.

Through the above description of the embodiments, it is apparent to those skilled in the art that the present invention can be with Realized with hardware, or firmware is realized, or combinations thereof mode is realized.When implemented in software, can be by above-mentioned functions It is stored in computer-readable medium or is transmitted as one or more instructions on computer-readable medium or code.Meter Calculation machine computer-readable recording medium includes computer-readable storage medium and communication media, and wherein communication media includes being easy to from a place to another Any medium of individual place transmission computer program.Storage medium can be any usable medium that computer can be accessed.With Exemplified by this but it is not limited to:Computer-readable medium can include random access memory (Random Access Memory, RAM), read-only storage (Read-Only Memory, ROM), EEPROM (Electrically Erasable Programmable Read-Only Memory, EEPROM), read-only optical disc (Compact Disc Read- Only Memory, CD-ROM) or other optical disc storages, magnetic disk storage medium or other magnetic storage apparatus or can use In carry or storage with instruction or data structure form desired program code and can by computer access it is any its His medium.In addition.Any connection can be suitably turn into computer-readable medium.If for example, software be using coaxial cable, Optical fiber cable, twisted-pair feeder, Digital Subscriber Line (Digital Subscriber Line, DSL) or such as infrared ray, radio Transmitted with the wireless technology of microwave etc from website, server or other remote sources, then coaxial cable, optical fiber cable, The wireless technology of twisted-pair feeder, DSL or such as infrared ray, wireless and microwave etc be included in belonging to medium it is fixing in.Such as this Used in invention, disk (Disk) and dish (disc) include compression laser disc (CD), laser disc, laser disc, Digital Versatile Disc (DVD), floppy disk and Blu-ray Disc, the replicate data of the usual magnetic of which disk, and dish is then with laser come optical replicate data.On The combination in face should also be as being included within the protection domain of computer-readable medium.

In a word, the preferred embodiment of technical solution of the present invention is the foregoing is only, is not intended to limit the present invention's Protection domain.Within the spirit and principles of the invention, any modification, equivalent substitution and improvements made etc., should be included in Within protection scope of the present invention.

Claims (8)

1. a kind of network link encryption method based on terminal, it is characterised in that methods described comprises the following steps:
Obtain packet to be sent;
Type according to the packet determines encryption key;
It is encrypted using the encryption secret key pair packet, the packet after encryption is sent.
2. according to the method described in claim 1, it is characterised in that methods described also includes:
Key to encryption is indicated.
3. according to the method described in claim 1, it is characterised in that methods described also includes:
The algorithm of the encryption is indicated in packet.
4. a kind of network link encryption system based on terminal, it is characterised in that methods described includes:
Receiving unit, the packet to be sent for obtaining;
Determining unit, encryption key is determined for the type according to the packet,;
Control unit, for being encrypted using the encryption secret key pair packet, is sent to the packet after encryption.
5. system according to claim 4, it is characterised in that
Described control unit, is indicated for the key to encryption.
6. system according to claim 4, it is characterised in that
Described control unit, the algorithm for indicating the encryption in packet.
7. a kind of computer-readable recording medium, is stored thereon with computer program, realized such as when the program is executed by processor The network link encryption method based on terminal described in claim 1-3 any one.
8. a kind of terminal, it is characterised in that including one or more processors, memory, transceiver, and one or more journeys Sequence, one or more of programs are stored in the memory, and are configured to be held by one or more of processors OK, described program includes being used to perform the step in the network link encryption method based on terminal described in 1-3 any one Instruction.
CN201710373335.1A 2017-05-24 2017-05-24 Network link encryption method and system based on terminal CN106973072A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710373335.1A CN106973072A (en) 2017-05-24 2017-05-24 Network link encryption method and system based on terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710373335.1A CN106973072A (en) 2017-05-24 2017-05-24 Network link encryption method and system based on terminal

Publications (1)

Publication Number Publication Date
CN106973072A true CN106973072A (en) 2017-07-21

Family

ID=59325924

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710373335.1A CN106973072A (en) 2017-05-24 2017-05-24 Network link encryption method and system based on terminal

Country Status (1)

Country Link
CN (1) CN106973072A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018214061A1 (en) * 2017-05-24 2018-11-29 深圳市乃斯网络科技有限公司 Terminal-based network link encryption method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102281261A (en) * 2010-06-10 2011-12-14 杭州华三通信技术有限公司 A data transmission method, system and apparatus
CN103795715A (en) * 2014-01-20 2014-05-14 冯丽娟 Privacy protection method, privacy recovery method and privacy protection system
CN104182697A (en) * 2014-08-15 2014-12-03 小米科技有限责任公司 File encryption method and device
CN105357007A (en) * 2014-08-21 2016-02-24 深圳市中兴微电子技术有限公司 Encryption communication method and communication terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102281261A (en) * 2010-06-10 2011-12-14 杭州华三通信技术有限公司 A data transmission method, system and apparatus
CN103795715A (en) * 2014-01-20 2014-05-14 冯丽娟 Privacy protection method, privacy recovery method and privacy protection system
CN104182697A (en) * 2014-08-15 2014-12-03 小米科技有限责任公司 File encryption method and device
CN105357007A (en) * 2014-08-21 2016-02-24 深圳市中兴微电子技术有限公司 Encryption communication method and communication terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018214061A1 (en) * 2017-05-24 2018-11-29 深圳市乃斯网络科技有限公司 Terminal-based network link encryption method and system

Similar Documents

Publication Publication Date Title
Ahmed et al. Integrating Wireless Sensor Networks with Cloud Computing.
US20110167114A1 (en) Automatically synchronizing new contacts across multiple social networking sites
US20120271766A1 (en) Request money social networking applications
CN105099673A (en) Authorization method, authorization requesting method and devices
US20180218292A1 (en) Authenticated checkin via passive nfc
US20160358135A1 (en) Digital currency management method and digital currency node apparatus
CN104580253B (en) A kind of method and device of processes user data
CN103765423B (en) Gathering transaction data associated with locally stored data files
DE112013000865T5 (en) Consolidate different cloud service data and behaviors based on trust relationships between cloud services
US9413735B1 (en) Managing distribution and retrieval of security key fragments among proxy storage devices
CN106134143B (en) Method, apparatus and system for dynamic network access-in management
US9450936B2 (en) Method of processing requests for digital services
CN104137587B (en) A kind of method and terminal device for sending, receiving user data
US9306922B2 (en) System and method for common on-behalf authorization protocol infrastructure
WO2017129083A1 (en) Method, device, and system for message processing and computer storage medium
CN103716326A (en) Resource access method and URG
CN104113534A (en) System and method for logging in applications (APPs)
CN104320377B (en) The anti-stealing link method and equipment of a kind of files in stream media
US9401911B2 (en) One-time password certificate renewal
CN103873454A (en) Authentication method and equipment
CN105409188A (en) Method and system for associating internet protocol (IP) address, media access control (MAC) address and location for a user device
US9762552B2 (en) Efficient sensor data delivery
US9998441B2 (en) Client authentication using social relationship data
CN104954322B (en) A kind of binding processing method of account, apparatus and system
CN103986752B (en) The method, apparatus and system of information are inputted in the inputting interface of intelligent television

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination