CN107135213A - Data communications method - Google Patents
Data communications method Download PDFInfo
- Publication number
- CN107135213A CN107135213A CN201710286846.XA CN201710286846A CN107135213A CN 107135213 A CN107135213 A CN 107135213A CN 201710286846 A CN201710286846 A CN 201710286846A CN 107135213 A CN107135213 A CN 107135213A
- Authority
- CN
- China
- Prior art keywords
- data
- several
- character string
- communications method
- algorithms
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1074—Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
- H04L67/1078—Resource delivery mechanisms
- H04L67/108—Resource delivery mechanisms characterised by resources being split in blocks or fragments
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of data communications method, this method is applied in server/transmission terminal and receiving terminal/user terminal;It comprises the following steps:(1)Data sectional, several data segments are divided into by continuous Data-Link chain successively;(2)Individual data section is encoded respectively respectively;(3)Respectively to the individual data section after coding using symmetric encipherment algorithm encryption;(4)Several data segments after encoding and encrypting are sent to user terminal interval, several data segments point are sent at least twice;(5)User terminal receiving step(4)In data segment and it is decrypted and decoded respectively;(6)Decoded multiple data segments are combined.
Description
Technical field
The present invention relates to computer communication technology field, more particularly to a kind of data communications method.
Background technology
Current society comes into the epoch full of competition, while being also an information knowledge and intellectual property
The epoch of change, information acquisition mode source and obtain information number all largely become we can more smoothly more
The outstanding key point that must be completed work and be won the victory in keen competition, thus certainly will have many private or business or its
Its secret information needs to carry out safety measure, and carries out necessary security work, this security just to data transmission procedure
Propose higher requirement, it is well known that encrypting and decrypting system is current with most one of extensive and most important application system.
At work, it would be desirable to by encryption and decryption technique to occurring extremely important to unit one belongs in work and needing ten code insurances
Close data or file is encrypted, to ensure that the interests of itself are not encroached on;Militarily, in order to preferably protect oneself,
Retain more military science technologies used in us, and do not allow opponent excessively to understand our attacking and defending strategy and tactics and weapon dress
For, it is necessary to be configured safeguard protection to related data.It can be seen that, the every aspect of today's society increasingly focuses on number
According to the security of transmission.
The content of the invention
It is an object of the invention to overcome the deficiencies in the prior art, real needs are adapted to, a kind of data communications method is disclosed.
In order to realize the purpose of the present invention, the technical solution adopted in the present invention is:
A kind of data communications method is designed, this method is applied in server/transmission terminal and receiving terminal/user terminal;
It comprises the following steps:
(1)Data sectional, several data segments are divided into by continuous Data-Link chain successively;
(2)Individual data section is encoded respectively respectively;
(3)Respectively to the individual data section after coding using symmetric encipherment algorithm encryption;
(4)Several data segments after encoding and encrypting are sent to user terminal interval, several data segments point are sent out at least twice
Send;
(5)User terminal receiving step(4)In data segment and it is decrypted and decoded respectively;
(6)Decoded multiple data segments are combined.
It is preferred that, step(1)In, there is a sequence notation character respectively before each data segment in several data segments
String;Step(6)In, tab character string is combined successively to several data segments in sequence.
It is preferred that, step(1)In, several data segments are divided into continuous Data-Link in units of byte, wherein often
The byte number of individual data segment is different, and each the byte number of data segment is any one natural number between 8 to 20.
It is preferred that, step(3)In, using one of symmetric encipherment algorithm in several symmetric encipherment algorithm to coding
Individual data section afterwards is encrypted, and sets continuous Data-Link and is divided into N number of data segment, N is more than or equal to 2;During encryption, the
First, two ... N number of data segments are selected a kind of symmetric encipherment algorithm and are encrypted at random from several symmetric encipherment algorithm.
It is preferred that, the several symmetric encipherment algorithm includes but is not limited to DES algorithms, 3DES algorithms, TDEA algorithms,
Blowfish algorithms, RC5 algorithms, IDEA algorithms.
It is preferred that, there is a mutually different tab character respectively after each data segment in several described data segments
String.
It is preferred that, step(2)It is preceding also to include being used for sequence notation character string and marker word on each data segment after separation
The step of symbol string distribution.
It is preferred that, step(5)In to each data segment after decryption also include each data segment is marked character string checking
The step of, it is previously implanted by the tab character string data storehouse containing tab character string in the receiving terminal/user terminal.
It is preferred that, the tab character string is eight bit character string, and wherein first six digits character is string of binary characters, latter two
Character is random two letters in 26 English alphabets.
It is preferred that, step(5)In, when user terminal is decrypted, corresponding key algorithm is found from cipher key store to each encryption
Data segment afterwards is decrypted respectively, and a variety of keys being decrypted for several symmetric encipherment algorithm are contained in cipher key store and are calculated
Method, cipher key store is previously implanted in receiving terminal/user terminal.
The beneficial effects of the present invention are:
The method of the present invention is novel in design, and can data be carried out with the transmission of safety in implementation, can data transfer process
In can ensure the safety of transmitted data, can apply in the numerous areas such as business, individual, military affairs.
Brief description of the drawings
Fig. 1 illustrates schematic diagram for the principle of the present invention.
Embodiment
The present invention is further described with reference to the accompanying drawings and examples:
Embodiment 1:A kind of data communications method, referring to Fig. 1;This method is applied to server/transmission terminal 101 and received
In terminal/subscriber terminal 102, it can be server, the intelligent terminal that any one sends data to the opposing party to send terminal 101
Etc. equipment, and user terminal 102 can receive any server, computer, the smart machine of data;Specifically
, this method it comprise the following steps:
(1)Data sectional, several data segments 105 are divided into units of byte to continuous Data-Link 103, wherein per number
Byte number according to section 105 is different, and each the byte number of data segment 15 is any one natural number between 8 to 20;
(2)There is a sequence notation character string 104 respectively before each data segment in several data segments;Meanwhile, several
There is a mutually different tab character string 106 respectively after each data segment 105 in data segment;Step(1)It is right respectively afterwards
Sequence notation character string on each data segment 105 and tab character string after separation are allocated, and the tab character string of distribution is
Eight bit character string, wherein first six digits character are string of binary characters, and rear two characters are selecting at random in 26 English alphabets
Two letters.
(3)Individual data section is encoded respectively respectively;
(4)The individual data section after coding is carried out using one of symmetric encipherment algorithm in several symmetric encipherment algorithm
Encryption, sets continuous Data-Link and is divided into N number of data segment, N is more than or equal to 2;During encryption, first and second ... N number of data segment
A kind of symmetric encipherment algorithm is selected at random from several symmetric encipherment algorithm to be encrypted;Several symmetrical in the present invention plus
Close algorithm includes but is not limited to DES algorithms, 3DES algorithms, TDEA algorithms, Blowfish algorithms, RC5 algorithms, IDEA algorithms.
(5)Several data segments after encoding and encrypting are sent to user terminal interval, several data segments are divided at least two
It is secondary to send;
(6)User terminal receiving step(5)In data segment and it is decrypted respectively;When user terminal is decrypted, from key
Corresponding key algorithm is found in storehouse, the data segment after each encryption is decrypted respectively afterwards, is directed to if containing in cipher key store
A variety of key algorithms that dry kind of symmetric encipherment algorithm is decrypted, cipher key store is previously implanted in receiving terminal/user terminal;
(7)Decoding;Each data segment after decryption is marked in character string checking, receiving terminal/user terminal and be previously implanted
By the tab character string data storehouse containing tab character string, rear data segment not yet in effect is verified, the data segment of authentication failed is
Invalid data section is lost.
(8)The corresponding serial number of tab character string 104 is arranged several decoded data segments successively in sequence
Sequence is combined.
To sum up, method of the invention is novel in design, and data can be carried out with the transmission of safety in implementation, can be passed in data
The safety of transmitted data can be ensured in defeated process, be can apply in the numerous areas such as business, individual, military affairs.
What embodiments of the invention were announced is preferred embodiment, but is not limited thereto, the ordinary skill people of this area
Member, easily according to above-described embodiment, understands the spirit of the present invention, and makes different amplifications and change, but as long as not departing from this
The spirit of invention, all within the scope of the present invention.
Claims (10)
1. a kind of data communications method, it is characterised in that:This method is applied to server/transmission terminal and receiving terminal/use
In the terminal of family;It comprises the following steps:
(1) data sectional, several data segments are divided into by continuous Data-Link chain successively;
(2) individual data section is encoded respectively respectively;
(3) respectively to the individual data section after coding using symmetric encipherment algorithm encryption;
(4) several data segments after encoding and encrypting are sent to user terminal interval, several data segments point are sent out at least twice
Send;
(5) data segment in user terminal receiving step (4) is simultaneously decrypted and decoded respectively to it;
(6) decoded multiple data segments are combined.
2. data communications method as claimed in claim 1, it is characterised in that:It is each in several data segments in step (1)
There is a sequence notation character string respectively before data segment;In step (6), tab character string is to several data segments in sequence
It is combined successively.
3. data communications method as claimed in claim 1, it is characterised in that:In step (1), to continuous in units of byte
Data-Link is divided into several data segments, wherein the byte number of each data segment is different, and the byte number of each data segment
For any one natural number between 8 to 20.
4. data communications method as claimed in claim 1, it is characterised in that:In step (3), calculated using several symmetric cryptography
Individual data section after coding is encrypted one of symmetric encipherment algorithm in method, sets continuous Data-Link and is divided
For N number of data segment, N is more than or equal to 2;During encryption, first and second ... N number of data segment is random from several symmetric encipherment algorithm
A kind of symmetric encipherment algorithm is selected to be encrypted.
5. data communications method as claimed in claim 4, it is characterised in that:The several symmetric encipherment algorithm is included but not
It is limited to DES algorithms, 3DES algorithms, TDEA algorithms, Blowfish algorithms, RC5 algorithms, IDEA algorithms.
6. data communications method as claimed in claim 5, it is characterised in that:In step (5), when user terminal is decrypted, from close
Corresponding key algorithm is found in key storehouse the data segment after each encryption is decrypted respectively, contain in cipher key store for several
A variety of key algorithms that symmetric encipherment algorithm is decrypted, cipher key store is previously implanted in receiving terminal/user terminal.
7. data communications method as claimed in claim 2, it is characterised in that:Each data segment in several described data segments
There is a mutually different tab character string respectively afterwards.
8. data communications method as claimed in claim 7, it is characterised in that:Also include before step (2) after being used for separation
The step of sequence notation character string and tab character string are distributed on each data segment.
9. data communications method as claimed in claim 8, it is characterised in that:In step (5) to each data segment after decryption also
Including each data segment is marked in the step of character string is verified, the receiving terminal/user terminal be previously implanted by containing
The tab character string data storehouse of tab character string.
10. data communications method as claimed in claim 8, it is characterised in that:The tab character string is eight bit character string, its
Middle first six digits character is string of binary characters, and rear two characters are random two letters in 26 English alphabets.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710286846.XA CN107135213A (en) | 2017-04-27 | 2017-04-27 | Data communications method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710286846.XA CN107135213A (en) | 2017-04-27 | 2017-04-27 | Data communications method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107135213A true CN107135213A (en) | 2017-09-05 |
Family
ID=59715334
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710286846.XA Pending CN107135213A (en) | 2017-04-27 | 2017-04-27 | Data communications method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107135213A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111327641A (en) * | 2020-03-24 | 2020-06-23 | 湖南瑞利德信息科技有限公司 | Linear segmented symmetric encryption coding and decoding method |
CN113722742A (en) * | 2021-09-13 | 2021-11-30 | 青岛海信宽带多媒体技术有限公司 | Terminal and method for encrypting and storing firmware file of optical module MCU (microprogrammed control Unit) by terminal |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101035253A (en) * | 2006-11-14 | 2007-09-12 | 北京中星微电子有限公司 | Encryption or decryption implementing method, device and system |
JP2011259506A (en) * | 2011-09-26 | 2011-12-22 | Nippon Telegr & Teleph Corp <Ntt> | Encoding device and method, encoding/decoding system, and decoding method |
CN102594548A (en) * | 2012-03-22 | 2012-07-18 | 山东泰信电子有限公司 | Method capable of achieving data sectional encryption and decryption |
CN105763315A (en) * | 2014-12-16 | 2016-07-13 | 展讯通信(深圳)有限公司 | Data encryption and decryption method and apparatus thereof, and communication system |
-
2017
- 2017-04-27 CN CN201710286846.XA patent/CN107135213A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101035253A (en) * | 2006-11-14 | 2007-09-12 | 北京中星微电子有限公司 | Encryption or decryption implementing method, device and system |
JP2011259506A (en) * | 2011-09-26 | 2011-12-22 | Nippon Telegr & Teleph Corp <Ntt> | Encoding device and method, encoding/decoding system, and decoding method |
CN102594548A (en) * | 2012-03-22 | 2012-07-18 | 山东泰信电子有限公司 | Method capable of achieving data sectional encryption and decryption |
CN105763315A (en) * | 2014-12-16 | 2016-07-13 | 展讯通信(深圳)有限公司 | Data encryption and decryption method and apparatus thereof, and communication system |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111327641A (en) * | 2020-03-24 | 2020-06-23 | 湖南瑞利德信息科技有限公司 | Linear segmented symmetric encryption coding and decoding method |
CN113722742A (en) * | 2021-09-13 | 2021-11-30 | 青岛海信宽带多媒体技术有限公司 | Terminal and method for encrypting and storing firmware file of optical module MCU (microprogrammed control Unit) by terminal |
CN113722742B (en) * | 2021-09-13 | 2024-04-16 | 青岛海信宽带多媒体技术有限公司 | Terminal and firmware file encryption storage method of optical module MCU (micro control Unit) by terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103778590B (en) | Using digital picture storage and the method and apparatus of transmission information | |
US10673830B2 (en) | Devices for transmitting and communicating randomized data utilizing sub-channels | |
CN106506487A (en) | A kind of information Encrypt and Decrypt method and device | |
Jabeen et al. | A lightweight genetic based algorithm for data security in wireless body area networks | |
CN103684772B (en) | Dynamic deficiency encryption system | |
US20140270165A1 (en) | Cryptographic system based on reproducible random sequences | |
US6640303B1 (en) | System and method for encryption using transparent keys | |
CN105119924B (en) | A kind of information transferring method | |
CN104396182A (en) | Method of encrypting data | |
Aung et al. | A complex transformation of monoalphabetic cipher to polyalphabetic cipher:(Vigenère-Affine cipher) | |
Kumar et al. | A novel approach of symmetric key cryptography | |
Hamad | Novel Implementation of an Extended 8x8 Playfair Cipher Using Interweaving on DNA-encoded Data. | |
CN106357608A (en) | Method for encrypting and decrypting private data for personal healthcare data | |
Sermeno et al. | Modified Vigenere cryptosystem: An integrated data encryption module for learning management system | |
CN107135213A (en) | Data communications method | |
CN107819760A (en) | Symmetric key generation and the secret signalling of distribution based on radio channel characteristic | |
CN105119923B (en) | A kind of information decoding method and terminal | |
Hamad et al. | A modified playfair cipher for encrypting digital images | |
US20080219448A1 (en) | Multiple-layers encryption/decryption and distribution of copyrighted contents | |
CN105718978A (en) | QR code generation method and apparatus, and decoding method and apparatus | |
US8681972B2 (en) | Method of executing a cryptographic calculation | |
CN110061832B (en) | Method for realizing symmetric cipher algorithm using Chinese character as cipher | |
Biswas et al. | Fully blind data hiding by embedding within DNA sequences using various ciphering and generic complimentary base substitutions | |
Gulappagol et al. | Secured data transmission using knight and LSB technique | |
CN110581759A (en) | UOEC-HEX symmetric encryption algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170905 |
|
RJ01 | Rejection of invention patent application after publication |