CN107579818B - Communication data interaction method and communication system - Google Patents
Communication data interaction method and communication system Download PDFInfo
- Publication number
- CN107579818B CN107579818B CN201710831977.1A CN201710831977A CN107579818B CN 107579818 B CN107579818 B CN 107579818B CN 201710831977 A CN201710831977 A CN 201710831977A CN 107579818 B CN107579818 B CN 107579818B
- Authority
- CN
- China
- Prior art keywords
- target
- data
- rule
- terminal
- rule data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The embodiment of the invention provides a communication data interaction method and a communication system, belonging to the technical field of communication. The method comprises the following steps: any one of the at least two terminals is used as a target terminal, the target terminal encrypts communication information and target rule data obtained by updating the rule data according to the rule data, and sends the encrypted data obtained by encryption to each of the other terminals; at any one of the other terminals, the terminal decrypts the encrypted data according to the stored rule data to obtain the communication information and the target rule data of the target terminal, and updates the stored rule data according to the target rule data; and when any one terminal of the at least two terminals is taken as a target terminal, returning the executed operation of the target terminal according to the rule data. When the terminal is regarded as a target terminal, the terminal encrypts communication information by the updated rule data. Therefore, the encryption modes adopted in each communication are different, and the safety in the communication is greatly improved.
Description
Technical Field
The invention relates to the technical field of communication, in particular to a communication data interaction method and a communication system.
Background
At present, with people looking at personal privacy more and more, when communicating with other people, communication information needs to be encrypted so as to ensure personal privacy security.
In current encryption technologies, an encryption algorithm is often used to encrypt communication data during communication. However, if the encryption algorithm is stolen and cracked by hackers, the individual privacy of all the communication information of the user is stolen, which causes serious leakage of the privacy information of the user.
Disclosure of Invention
In view of the above, the present invention provides a communication data interaction method and a communication system, which can effectively improve the above problem.
The implementation mode of the embodiment of the invention is as follows:
in a first aspect, an embodiment of the present invention provides a communication data interaction method, which is applied to a communication system. The system comprises: and each terminal is connected with the other terminals. The method comprises the following steps: any one of the at least two terminals is used as a target terminal, the target terminal encrypts communication information and target rule data obtained by encrypting and updating the rule data according to the rule data, and sends the encrypted data obtained by encryption to each of the other terminals; at any one of the other terminals, decrypting the encrypted data according to the stored rule data by the terminal to obtain the communication information and the target rule data of the target terminal, and updating the stored rule data according to the target rule data; and when any one terminal of the at least two terminals is taken as a target terminal, returning to execute the operation of the target terminal according to the rule data.
In a second aspect, an embodiment of the present invention provides a communication system, where the system includes: and each terminal is connected with the other terminals. Any one of the at least two terminals is used as a target terminal, and the target terminal is used for encrypting communication information and target rule data obtained by encrypting and updating the rule data according to the rule data and sending the encrypted data obtained by encryption to each of the other terminals. Any one of the other terminals, configured to decrypt the encrypted data according to the stored rule data, obtain the communication information and target rule data of the target terminal, and update the stored rule data according to the target rule data; when any terminal of the at least two terminals is taken as a target terminal, returning to execute the operation of the target terminal according to the rule data
The embodiment of the invention has the beneficial effects that:
the target terminal encrypts the communication information by the rule data, encrypts target rule data obtained by updating the rule data, and transmits the encrypted data obtained by the encryption to each of the remaining terminals. Then, in any one of the other terminals, the terminal decrypts to obtain the communication information and the target rule data, and updates the rule data stored in advance according to the target rule data. When the terminal is used as a target terminal, the terminal encrypts communication information by using the updated rule data. The encryption modes adopted by each terminal in each communication with other terminals are different in the mode, and therefore the safety in the communication process is greatly improved.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the embodiments of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without creative efforts. The above and other objects, features and advantages of the present invention will become more apparent from the accompanying drawings. Like reference numerals refer to like parts throughout the drawings. The drawings are not necessarily to scale, emphasis instead being placed upon illustrating the principles of the invention.
Fig. 1 is a block diagram showing a communication system according to a first embodiment of the present invention;
fig. 2 is a flowchart illustrating a communication data interaction method according to a second embodiment of the present invention;
fig. 3 shows a sub-flowchart of step S200 in a communication data interaction method according to a second embodiment of the present invention;
fig. 4 shows a sub-flowchart of step S300 in a communication data interaction method according to a second embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures. The terms "first," "second," and the like are used solely to distinguish one from another and are not to be construed as indicating or implying relative importance.
In the description of the present invention, it should also be noted that, unless otherwise explicitly specified or limited, the terms "disposed," "mounted," "connected," and "connected" are to be construed broadly and may, for example, be fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
First embodiment
Referring to fig. 1, a first embodiment of the present invention provides a communication system 10, where the communication system 10 includes: at least two terminals 11, each terminal 11 being connected to the remaining terminals 11.
The terminal 11 may be a Personal Computer (PC), a tablet computer, a smart phone, a Personal Digital Assistant (PDA), or the like, which has signal processing, computing, and control capabilities. In this embodiment, the terminal 11 may be a personal computer. Each terminal 11 is electrically connected with other terminals 11 through a network, and each terminal 11 can communicate and interact with other terminals 11 through communication software, mails and the like.
When each terminal 11 performs interaction, any one terminal 11 of the at least two terminals 11 is used as an initiator of the interaction, and further, the terminal 11 is used as a target terminal 11. The target terminal 11 is configured to encrypt the communication information and target rule data obtained by updating the rule data, based on the stored rule data, and send the encrypted data obtained by encryption to each of the remaining terminals 11.
In any one of the other terminals 11, the terminal 11 is configured to decrypt the encrypted data according to the stored rule data to obtain the communication information and the target rule data. The terminal 11 also updates the stored rule data according to the target rule data.
After the next interaction starts, and then any one terminal 11 of the at least two terminals 11 is taken as the target terminal 11, the above operation flow is performed again.
Second embodiment
Referring to fig. 2, a first embodiment of the present invention provides a communication data interaction method, which is applied to a communication system, and the communication data interaction method includes:
step S100: any one of the at least two terminals is used as a target terminal, the target terminal encrypts communication information and target rule data obtained by encrypting and updating the rule data according to the rule data, and sends the encrypted data obtained by encryption to each of the other terminals.
Each terminal forms an interaction for data communication with the other terminal among the at least two terminals. At the beginning of each interaction, any one of the at least two terminals can be used as an interaction initiator. The conditions as interaction initiators may be: in this interaction, the terminal needs to send encrypted communication information to other terminals, and the terminal is used as a target terminal.
The target terminal prestores regular data for encryption and decryption, and updates the regular data randomly into the target regular data after acquiring the corresponding encryption mode according to the regular data. It can be understood that updating to target rule data can make the encryption mode in the next interaction process different from that of the current interaction, thereby improving the security. Then, the target terminal encrypts the communication information according to the obtained encryption method and updates the obtained target rule data to obtain encrypted data. Further, the target terminal sends the encrypted data to each of the other terminals through the electrical connection with each terminal.
Step S200: and at any one of the other terminals, decrypting the encrypted data according to the stored rule data by the terminal to obtain the communication information and the target rule data of the target terminal, and updating the stored rule data according to the target rule data.
After the target terminal transmits the encrypted data, each of the at least two terminals except the target terminal can receive the encrypted data. It is understood that each of the other terminals can perform the same processing on the received encrypted data, and in order to avoid the redundancy of the description, the embodiment is described in detail with respect to one of the terminals.
In each of the remaining terminals, after any one of the terminals receives the encrypted data, the terminal first decrypts the encrypted data. Specifically, the terminal also prestores regular data for encryption and decryption, and after the terminal acquires the corresponding decryption mode according to the regular data, the terminal decrypts the encrypted data according to the acquired encryption mode to acquire the communication information and the target regular data. The terminal can display the communication information through the display capability of the terminal so that the user of the terminal can know the communication information. In addition, the encryption mode in the next interaction process is different from that of the current interaction, so that the safety is ensured. The terminal updates the rule data of the terminal according to the target rule data, so that the updated rule data is the same as the target rule data.
Step S300: and when any one terminal of the at least two terminals is taken as a target terminal, returning to execute the operation of the target terminal according to the rule data.
In this embodiment, the target terminal for each interaction may be the same terminal or different terminals of the at least two terminals, or the number of times of the same terminal is at least two. After the last interactive process is finished, the rule data stored in each terminal are updated to the target rule data, so that consistency is kept. Since the rule data are kept consistent, when the next interaction starts, the target terminal of the current interaction is also any one of the at least two terminals as the target terminal, and then the step S100 can be executed to implement the interaction.
Referring to fig. 3, in the communication data interaction method provided in the present embodiment, the method sub-process of step S100 includes: step S110, step S120, and step S130.
Step S110: and the target terminal searches a target encryption rule corresponding to the rule data in a plurality of prestored encryption rules according to the rule data.
In this embodiment, the target terminal stores a plurality of different encryption rules in advance, and each encryption rule includes: the method comprises a steganography algorithm and an encryption algorithm, wherein the steganography algorithm inserts data from a low bit as much as possible, and changes the value of each color of a picture as little as possible, so that common people cannot judge the abnormality of the picture carrier from the surface; the aim of concealment is achieved. In addition, the encryption algorithm includes the encryption algorithm itself and a key corresponding to the encryption algorithm itself. Therefore, the target terminal is equivalent to pre-storing a plurality of different kinds of steganographic algorithms and a plurality of different kinds of encryption algorithms. Each encryption algorithm is a symmetric encryption algorithm, such as DES algorithm, 3DES algorithm, RC4 algorithm, and so on.
The current rule data stored in the target terminal includes: the encryption algorithm comprises a steganographic algorithm identifier and an encryption algorithm identifier, wherein the steganographic algorithm identifier and the encryption algorithm identifier can be any natural number or character. And the target terminal correspondingly obtains the current steganographic algorithm identifier and the encryption algorithm identifier based on the rule data. In addition, the target terminal is also preset with a table, and the table comprises the corresponding relation between each steganographic algorithm identifier and a corresponding steganographic algorithm and the corresponding relation between each encryption algorithm identifier and a corresponding encryption algorithm. It can be understood that the steganographic algorithm corresponding to each steganographic algorithm identifier is a target steganographic algorithm of the steganographic algorithm identifier, the encryption algorithm corresponding to each encryption algorithm identifier is a target encryption algorithm of the encryption algorithm identifier, and the target encryption rule includes: a target steganographic algorithm and a target encryption algorithm.
And when the target terminal needs to interact, acquiring a steganographic algorithm identifier and an encryption algorithm identifier contained in the rule data according to the current rule data. And then the target terminal searches a table according to the steganographic algorithm identifier and the encryption algorithm identifier, so that the corresponding relation between the steganographic algorithm identifier and the target steganographic algorithm is obtained, and the corresponding relation between the encryption algorithm identifier and the target encryption algorithm is obtained. Further, the target terminal obtains the corresponding relation between the rule data and the target encryption rule.
And the target terminal searches and obtains the corresponding target encryption rule in the pre-stored encryption rule based on the corresponding relation, namely, searches the corresponding target steganography algorithm and the target encryption algorithm.
Step S120: and the target terminal updates the rule data to obtain the target rule data.
In order to ensure the security of the next interaction, before the target terminal encrypts, the rule data can be updated through a preset random function to obtain updated target rule data. In this embodiment, when the target terminal updates the rule data, the target terminal re-randomly generates the steganographic algorithm identifier and the encryption algorithm identifier in the rule data according to the random function, so as to obtain the target steganographic algorithm identifier and the target encryption algorithm identifier. And replacing the previous steganographic algorithm identifier by the target steganographic algorithm identifier and replacing the previous encryption algorithm identifier by the target terminal, so that the regular data is updated into the target regular data, and the target regular data is stored.
For example, the previous steganographic algorithm identifier is 1, the target steganographic algorithm identifier 3 is regenerated, and the previous steganographic algorithm identifier 1 of the target terminal is replaced by the target steganographic algorithm identifier 3, so that updating is realized. It can be understood that the steganographic algorithm corresponding to the steganographic algorithm identifier 1 is a, the steganographic algorithm corresponding to the target steganographic algorithm identifier 3 is C, and after the steganographic algorithm identifier 3 is updated, the corresponding steganographic algorithms are different, so that the next steganographic encryption mode is different.
Step S130: and the target terminal encrypts the communication information and the target rule data according to the target encryption rule to obtain the encrypted data.
In the embodiment, the encryption is performed by adopting a steganographic algorithm and an encryption algorithm to ensure the security. And the target terminal loads the encrypted data into the picture by taking the picture as a carrier so as to realize safe transmission.
Specifically, the target terminal randomly selects one of the pre-stored picture data, and uses the picture data as the target picture data added with the encrypted data during transmission. In addition, the target picture data obtained by the target terminal can also be directly uploaded by the user. It should be noted that, in order to ensure security, the target picture used each time should be a picture with a low repetition probability with other pictures, for example, the target picture is a picture randomly taken by the user, a random screenshot of the user, or the like.
Then, the target terminal encrypts both the communication information and the target rule data. And the target terminal encrypts the communication information and the target rule data into an ASCII character string according to a corresponding target encryption algorithm, and then sequentially converts the ASCII character string into a binary system according to an ASCII code table so as to obtain the encrypted communication information and the target rule data. At this time, the target terminal inserts the encrypted communication information and the target rule data into corresponding data positions in the target picture data according to a corresponding target steganography algorithm to obtain encrypted data.
It can be understood that each pixel point in the target picture occupies 3 bytes, 3 bytes respectively correspond to R, G colors and B colors of the pixel point, and each color occupies 8 bits. Therefore, the target picture is presented in the form of target picture data in the target terminal, the target picture data is a data string formed by multi-bit binary data, and each bit is 0 or 1. Further, 8 bits represent one color in one pixel, and 24 bits represent one pixel. And the encrypted communication information and the target rule data are also presented in the target terminal in a manner that a data string is formed by multi-bit binary data. And according to a corresponding target steganography algorithm, inserting each bit of binary data in the encrypted communication information and target rule data into a corresponding data bit in the target picture data, and replacing the corresponding data bit, thereby realizing that both the communication information and the target rule data are inserted into the corresponding data position in the target picture data to obtain the encrypted data.
It will also be appreciated that the steganographic algorithm is updated such that in the next interaction, both the communication information and the target rule data are inserted into different target picture data, different from the previous data location.
Referring to fig. 4, in the communication data interaction method provided in the present embodiment, the method sub-process of step S200 includes: step S210 and step S220.
Step S210: and the terminal finds the target encryption rule corresponding to the rule data in the plurality of pre-stored encryption rules according to the stored rule data.
Except for the target terminal, each of the other terminals acquires the encrypted data sent by the target terminal. The present embodiment is explained with respect to any one of the remaining terminals. When the terminal acquires the encrypted data sent by the target terminal, the terminal needs to search a corresponding target encryption rule to decrypt the encrypted data.
Specifically, the terminal also stores a plurality of encryption rules of the same type as the target terminal, and each encryption rule also includes: steganographic algorithms and cryptographic algorithms. Therefore, the terminal is equivalent to a case where a plurality of different kinds of steganographic algorithms and a plurality of different kinds of encryption algorithms that are the same as those of the target terminal are stored in advance.
The current rule data stored in the terminal is the same as the rule data of the target terminal, and the method also comprises the following steps: a steganographic algorithm identifier and an encryption algorithm identifier. The terminal correspondingly obtains the steganographic algorithm identifier and the encryption algorithm identifier which are the same as those of the target terminal based on the rule data. In addition, the terminal is preset with a table, which is also the same as the preset table in the target terminal. The table also includes the corresponding relationship between each steganographic algorithm identifier and a corresponding steganographic algorithm, and the corresponding relationship between each encryption algorithm identifier and a corresponding encryption algorithm.
After the terminal acquires the encrypted data, the steganographic algorithm identifier and the encryption algorithm identifier contained in the rule data are acquired according to the currently stored rule data. And the target terminal searches the table according to the steganographic algorithm identifier and the encryption algorithm identifier. Further, the terminal obtains the correspondence between the stored rule data and the target encryption rule.
Based on the corresponding relation, the terminal searches and obtains the corresponding target encryption rule in a plurality of pre-stored encryption rules, namely searches the corresponding target steganography algorithm and the target encryption algorithm.
Step S220: and the terminal decrypts the encrypted data according to the target encryption rule to obtain the communication information and the target rule data.
In the process of decrypting the encrypted data by the terminal, the terminal can decrypt the encrypted data through a target steganographic algorithm. Specifically, because the target steganography algorithm of the terminal is the same as that of the target terminal, the terminal intercepts encrypted communication information and target rule data from a data position corresponding to the encrypted data according to the target steganography algorithm, so as to obtain the communication information and the target rule data in an encrypted state.
Then, the terminal can decrypt the communication information and the target rule data in the encrypted state through the target decryption algorithm. And because the target encryption algorithm of the terminal is the same as that of the target terminal, the terminal converts the communication information and the target rule data in an encrypted state into a corresponding ASCII character string from a binary system through an ASCII code table according to the target encryption algorithm. And then the ASCII character string is decrypted into the plaintext of the corresponding communication information and the target rule data, so that the decrypted communication information and the target rule data are obtained.
It should be noted that, in this embodiment, in at least two terminals, each terminal verifies the stored rule data with the rule data stored in the other terminal, so that the rule data stored in each terminal matches with the rule data stored in the other terminal. Specifically, each terminal compares the stored rule data with the rule data stored in other terminals one by one to confirm, if the comparison is the same, the data is correct, and if the comparison is different, each terminal repeatedly modifies and checks until the comparison is the same. In addition, the terminals compare each corresponding relation in the stored tables with each corresponding relation in the tables stored by other terminals one by one, and if the corresponding relations are different, each terminal also repeatedly modifies and checks until the corresponding relations are the same.
In summary, the embodiments of the present invention provide a communication data interaction method and a communication system, and the method is applied to a communication system. The system comprises: at least two terminals, each terminal is connected with the other terminals. The method comprises the following steps: any one of the at least two terminals is used as a target terminal, the target terminal encrypts communication information and target rule data obtained by updating the rule data according to the rule data, and sends the encrypted data obtained by encryption to each of the other terminals; at any one of the other terminals, the terminal decrypts the encrypted data according to the stored rule data to obtain the communication information and the target rule data of the target terminal, and updates the stored rule data according to the target rule data; and when any one terminal of the at least two terminals is taken as a target terminal, returning the executed operation of the target terminal according to the rule data.
The target terminal encrypts the communication information by the rule data, encrypts target rule data obtained by updating the rule data, and transmits the encrypted data obtained by the encryption to each of the remaining terminals. Then, in any one of the other terminals, the terminal decrypts to obtain the communication information and the target rule data, and updates the rule data stored in advance according to the target rule data. When the terminal is used as a target terminal, the terminal encrypts communication information by using the updated rule data. The encryption modes adopted by each terminal in each communication with other terminals are different in the mode, and therefore the safety in the communication process is greatly improved.
The above is only a preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes will occur to those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (10)
1. A communication data interaction method, applied to a communication system, the system comprising: at least two terminals, each of the terminals being connected to the other terminals, the method comprising:
any one of the at least two terminals is used as a target terminal, the target terminal encrypts communication information related to user privacy and target rule data obtained by encrypting and updating the rule data according to the rule data, and sends the encrypted data obtained by encryption to each of the other terminals;
at any one of the other terminals, decrypting the encrypted data according to the stored rule data by the terminal to obtain the communication information and the target rule data of the target terminal, and updating the stored rule data according to the target rule data;
when any one terminal of the at least two terminals is taken as a target terminal, returning to execute the operation of the target terminal according to the rule data;
wherein the target rule data obtained by updating the rule data by the target terminal includes:
and the target terminal randomly generates the steganographic algorithm identifier and the encryption algorithm identifier in the regular data again according to a random function so as to obtain a target steganographic algorithm identifier and a target encryption algorithm identifier, wherein the algorithm types corresponding to different algorithm identifiers are different.
2. The communication data interaction method according to claim 1, wherein the target terminal encrypts communication information and target rule data obtained by updating the rule data according to the rule data, and the method comprises the following steps:
the target terminal finds a target encryption rule corresponding to the rule data in a plurality of prestored encryption rules according to the rule data;
the target terminal updates the rule data to obtain the target rule data;
and the target terminal encrypts the communication information and the target rule data according to the target encryption rule to obtain the encrypted data.
3. The communication data interaction method according to claim 2, wherein the step of finding, by the target terminal, the target encryption rule corresponding to the rule data among the plurality of pre-stored encryption rules according to the rule data comprises:
the target terminal acquires the corresponding relation between the rule data and the target encryption rule according to the rule data;
and the target terminal searches the target encryption rule in the plurality of pre-stored encryption rules according to the corresponding relation.
4. The communication data interaction method according to claim 3, wherein the target encryption rule comprises: the target terminal encrypts the communication information and the target rule data according to the target encryption rule to obtain the encrypted data, and the method comprises the following steps:
the target terminal acquires target picture data in a plurality of picture data stored in advance;
the target terminal encrypts the communication information and the target rule data according to the target encryption algorithm in the target encryption rule;
and the target terminal inserts the encrypted communication information and the encrypted target rule data into corresponding data positions in the target picture data according to the target steganography algorithm in the target encryption rule so as to obtain the encrypted data.
5. The communication data interaction method according to claim 4, wherein the terminal decrypts the encrypted data according to the stored rule data to obtain the communication information and the target rule data of the target terminal, and comprises:
the terminal finds the target encryption rule corresponding to the rule data in the plurality of prestored encryption rules according to the stored rule data;
and the terminal decrypts the encrypted data according to the target encryption rule to obtain the communication information and the target rule data.
6. The communication data interaction method according to claim 5, wherein the finding, by the terminal, the target encryption rule corresponding to the rule data in the plurality of pre-stored encryption rules according to the stored rule data comprises:
the terminal obtains the corresponding relation between the rule data and the target encryption rule according to the stored rule data;
and the terminal searches the target encryption rule in the plurality of pre-stored encryption rules according to the corresponding relation.
7. The communication data interaction method according to claim 5, wherein the decrypting, by the terminal, the encrypted data according to the target encryption rule to obtain the communication information and the target rule data comprises:
the terminal acquires the encrypted communication information and the target rule data in the corresponding data position of the encrypted data according to the target steganography algorithm in the target encryption rule;
and the terminal decrypts both the communication information and the target rule data according to the target encryption algorithm in the target encryption rule.
8. The communication data interaction method of claim 1, further comprising:
in the at least two terminals, each terminal verifies the stored rule data with the rule data stored in other terminals, so that the rule data stored in each terminal is matched with the rule data stored in the other terminals.
9. The communication data interaction method according to claim 1, wherein the target terminal updates the rule data according to a preset random function to obtain the target rule data.
10. A communication system, the system comprising: each terminal is connected with the rest terminals;
any one of the at least two terminals is used as a target terminal, and the target terminal is used for encrypting communication information related to user privacy and target rule data obtained by encrypting and updating the rule data according to the rule data and sending the encrypted data obtained by encryption to each of the other terminals;
any one of the other terminals, configured to decrypt the encrypted data according to the stored rule data, obtain the communication information and target rule data of the target terminal, and update the stored rule data according to the target rule data; when any one terminal of the at least two terminals is taken as a target terminal, returning to execute the operation of the target terminal according to the rule data;
the target terminal is used for generating the steganographic algorithm identifier and the encryption algorithm identifier in the rule data according to a random function again randomly so as to obtain a target steganographic algorithm identifier and a target encryption algorithm identifier, wherein the algorithm types corresponding to different algorithm identifiers are different.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710831977.1A CN107579818B (en) | 2017-09-15 | 2017-09-15 | Communication data interaction method and communication system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710831977.1A CN107579818B (en) | 2017-09-15 | 2017-09-15 | Communication data interaction method and communication system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107579818A CN107579818A (en) | 2018-01-12 |
CN107579818B true CN107579818B (en) | 2020-06-30 |
Family
ID=61036151
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710831977.1A Active CN107579818B (en) | 2017-09-15 | 2017-09-15 | Communication data interaction method and communication system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107579818B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102724041A (en) * | 2012-06-07 | 2012-10-10 | 北京航空航天大学 | Steganography-based key transmission and key updating method |
CN105357003A (en) * | 2015-11-19 | 2016-02-24 | 广东小天才科技有限公司 | Data encryption method and device |
WO2017136343A1 (en) * | 2016-02-05 | 2017-08-10 | Mcafee, Inc. | Trusted indicators to secure visual outputs |
CN107343001A (en) * | 2017-07-04 | 2017-11-10 | 北京像素软件科技股份有限公司 | Data processing method and device |
-
2017
- 2017-09-15 CN CN201710831977.1A patent/CN107579818B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102724041A (en) * | 2012-06-07 | 2012-10-10 | 北京航空航天大学 | Steganography-based key transmission and key updating method |
CN105357003A (en) * | 2015-11-19 | 2016-02-24 | 广东小天才科技有限公司 | Data encryption method and device |
WO2017136343A1 (en) * | 2016-02-05 | 2017-08-10 | Mcafee, Inc. | Trusted indicators to secure visual outputs |
CN107343001A (en) * | 2017-07-04 | 2017-11-10 | 北京像素软件科技股份有限公司 | Data processing method and device |
Also Published As
Publication number | Publication date |
---|---|
CN107579818A (en) | 2018-01-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11615411B2 (en) | POS system with white box encryption key sharing | |
CN106790223B (en) | Data transmission method, equipment and system | |
CN106412862B (en) | short message reinforcement method, device and system | |
US7142674B2 (en) | Method of confirming a secure key exchange | |
CN106599723B (en) | File encryption method and device and file decryption method and device | |
CN110135176B (en) | Encryption method for printing data transmission | |
CN112738051B (en) | Data information encryption method, system and computer readable storage medium | |
CN102640448A (en) | System and method for securely identifying and authenticating devices in a symmetric encryption system | |
KR101834504B1 (en) | Apparatus and method for encrypting and decrypting | |
CN107579903B (en) | Picture message secure transmission method and system based on mobile device | |
CN112822177A (en) | Data transmission method, device, equipment and storage medium | |
CN109145613A (en) | Security encryption chip and electronic equipment containing the chip | |
CN101374251A (en) | Method for encrypting short message and used terminal equipment thereof | |
CN107579818B (en) | Communication data interaction method and communication system | |
US20140223194A1 (en) | Cryptographic System of Symmetric-Key Encryption using Large Permutation Vector Keys | |
CN107682335A (en) | Data transmission method, service end and computer-readable recording medium | |
CN111885595B (en) | Intelligent household appliance configuration networking method, device and system | |
CN112333699B (en) | Internet of things communication protocol encryption method, equipment and storage medium | |
US11533162B2 (en) | Method for verification of integrity and decryption of an encrypted message, associated cryptomodule and terminal | |
CN112468289A (en) | Key generation method | |
KR20080030266A (en) | Service method for encryption of short message and apparatus thereof | |
CN111355645A (en) | Household appliance, cloud server and corresponding data transmission method thereof | |
KR101808313B1 (en) | Method of encrypting data | |
CN115296808B (en) | Key replacing method, device, computer equipment and storage medium | |
KR20000038664A (en) | Method for updating key generation function in authentication system and method for generating secret key using the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 310052 188 Lianhui street, Xixing street, Binjiang District, Hangzhou, Zhejiang Province Applicant after: DBAPPSECURITY Ltd. Address before: Zhejiang Zhongcai Building No. 68 Binjiang District road Hangzhou City, Zhejiang Province, the 310051 and 15 layer Applicant before: DBAPPSECURITY Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |