CN107733841A - Method for message transmission and device based on multi-enciphering - Google Patents
Method for message transmission and device based on multi-enciphering Download PDFInfo
- Publication number
- CN107733841A CN107733841A CN201610665182.3A CN201610665182A CN107733841A CN 107733841 A CN107733841 A CN 107733841A CN 201610665182 A CN201610665182 A CN 201610665182A CN 107733841 A CN107733841 A CN 107733841A
- Authority
- CN
- China
- Prior art keywords
- encryption
- communication
- message
- decryption module
- party
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The application provides a kind of method for message transmission and device based on multi-enciphering, and this method can include:Obtain the message content that this end communication side generates in the local terminal client of default communication applications;By the built-in encryption/decryption module and third party's encryption/decryption module in local terminal client, multi-enciphering is carried out to message content according to predefined encryption order, obtains encryption communication message;Wherein, built-in encryption/decryption module is provided by presetting communication applications, third party's encryption/decryption module is provided by the third party for being different from default communication applications;Encryption communication message is sent to server corresponding to default communication applications, and default communication applications are forwarded to the opposite end client provided end communication side from server, wherein opposite end client by comprising built-in encryption/decryption module and third party's encryption/decryption module encryption communication message is decrypted to obtain message content.By the technical scheme of the application, security of the message content in communication process can be lifted.
Description
Technical field
The application is related to communication technique field, more particularly to a kind of method for message transmission and device based on multi-enciphering.
Background technology
In the related art, by providing encryption/decryption module by communication applications, encryption and decryption processing can be carried out to communication, that
Even if communication message occurs to leak or be stolen in communication process, the security of message content still may insure.
But because encryption/decryption module is provided by communication applications, thus when encrypted communication message should via the communication
When being forwarded with corresponding server, the server has the decryption and reading capability to the encryption communication message, causes portion
User is divided the worry to information security to be present.
The content of the invention
In view of this, the application provides a kind of method for message transmission and device based on multi-enciphering, can lift message
Security of the content in communication process.
To achieve the above object, it is as follows to provide technical scheme by the application:
According to the first aspect of the application, it is proposed that a kind of method for message transmission based on multi-enciphering, including:
Obtain the message content that this end communication side generates in the local terminal client of default communication applications;
By the built-in encryption/decryption module and third party's encryption/decryption module in the local terminal client, add according to predefined
Close order carries out multi-enciphering to the message content, obtains encryption communication message;Wherein, the built-in encryption/decryption module is by institute
State default communication applications offer, third party's encryption/decryption module is provided by the third party for being different from the default communication applications;
The encryption communication message is sent to server corresponding to the default communication applications, and turned by the server
The default communication applications are sent to the opposite end client provided end communication side, wherein the opposite end client by comprising
The encryption communication message is decrypted to obtain described disappear for the built-in encryption/decryption module and third party's encryption/decryption module
Cease content.
According to the second aspect of the application, it is proposed that a kind of method for message transmission based on multi-enciphering, including:
This end communication side receives encryption communication message, the encryption communication in the local terminal client of default communication applications
Message is from the default communication applications to the opposite end client provided end communication side;Wherein, the opposite end client passes through
Comprising built-in encryption/decryption module and third party's encryption/decryption module carry out it is a variety of encryption obtain the encryption communication message;
The built-in encryption/decryption module and third party's encryption/decryption module included by the local terminal client, according to
Predefined decryption order is decrypted successively to the encryption communication message, obtains message content;Wherein, described built-in plus solution
Close module is provided by the default communication applications, third party's encryption/decryption module is by being different from the of the default communication applications
Tripartite provides;
The message content is exported to described end communication side.
According to the third aspect of the application, it is proposed that a kind of massage transmission device based on multi-enciphering, including:
Acquiring unit, obtain the message content that this end communication side generates in the local terminal client of default communication applications;
Ciphering unit, by the built-in encryption/decryption module and third party's encryption/decryption module in the local terminal client, according to
Predefined encryption order carries out multi-enciphering to the message content, obtains encryption communication message;Wherein, described built-in plus solution
Close module is provided by the default communication applications, third party's encryption/decryption module is by being different from the of the default communication applications
Tripartite provides;
Transmitting element, the encryption communication message is sent to server corresponding to the default communication applications, and by institute
State server and be forwarded to the default communication applications to the opposite end client provided end communication side, wherein the opposite end client
By comprising the built-in encryption/decryption module and third party's encryption/decryption module the encryption communication message is decrypted
Obtain the message content.
According to the fourth aspect of the application, it is proposed that a kind of massage transmission device based on multi-enciphering, including:
Receiving unit, this end communication side receive encryption communication message, institute in the local terminal client of default communication applications
Encryption communication message is stated from the default communication applications to the opposite end client provided end communication side;Wherein, the opposite end
Client by comprising built-in encryption/decryption module and third party's encryption/decryption module carry out it is a variety of encryption obtain the encryption communication
Message;
Decryption unit, the built-in encryption/decryption module and third party's encryption and decryption included by the local terminal client
Module, the encryption communication message is decrypted successively according to predefined decryption order, obtains message content;Wherein, institute
It is described default logical by being different from by the default communication applications offer, third party's encryption/decryption module to state built-in encryption/decryption module
The third party of news application provides;
Output unit, the message content is exported to described end communication side.
From above technical scheme, the application by encryption/decryption module built in introducing and third party's encryption/decryption module, by
There is provided in third party's encryption/decryption module by the third party for being different from communication applications, thus server is connecing corresponding to the communication applications
When receiving the communication message after being encrypted via third party's encryption/decryption module, processing the communication message can not be decrypted, from
And ensure that message content can only be checked by communication two party, help to lift security of the message content in communication process.
Brief description of the drawings
Fig. 1 shows the schematic diagram of the encryption communication in correlation technique.
Fig. 2 is a kind of method for message transmission based on multi-enciphering for sender that the exemplary embodiment of the application one provides
Flow chart.
Fig. 3 is a kind of method for message transmission based on multi-enciphering for recipient that the exemplary embodiment of the application one provides
Flow chart.
Fig. 4 is a kind of flow for method for message transmission based on multi-enciphering that the exemplary embodiment of the application one provides
Figure.
Fig. 5 is a kind of schematic diagram for communication process based on multi-enciphering that the exemplary embodiment of the application one provides.
Fig. 6-12 is that a kind of interface for message transmission for realizing multi-enciphering that the exemplary embodiment of the application one provides shows
It is intended to.
Figure 13 is a kind of structural representation of the electronic equipment for sender that the exemplary embodiment of the application one provides.
Figure 14 is a kind of transmission dress of the message based on multi-enciphering for sender that the exemplary embodiment of the application one provides
The block diagram put.
Figure 15 is a kind of structural representation of the electronic equipment for recipient that the exemplary embodiment of the application one provides.
Figure 16 is a kind of transmission dress of the message based on multi-enciphering for recipient that the exemplary embodiment of the application one provides
The block diagram put.
Embodiment
Fig. 1 shows the schematic diagram of the encryption communication in correlation technique.As shown in figure 1, by taking certain communication applications as an example, it is assumed that
Telecommunication customer end 1 that user A is provided using the communication applications inputs message content, and user B is provided by the communication applications
Telecommunication customer end 2 receive message content.
Telecommunication customer end 1 stores after the message content of user A inputs is received using the message content as history message
There is provided into local data base 1, and by the message content to the built-in encryption/decryption module of telecommunication customer end 1, by the built-in plus solution
Message content is encrypted to obtain encryption communication message for close module.Then, the encryption communication message is sent out by telecommunication customer end 1
Communication server is delivered to, and the telecommunication customer end 2 of user B uses is forwarded to by communication server.
Telecommunication customer end 1 belongs to same communication applications with telecommunication customer end 2, is simply installed respectively by user A and user B
Into respective electronic equipment, but actual composition and function all same.Therefore, telecommunication customer end 2 also comprising above-mentioned built-in plus
Deciphering module so that the encryption communication message that received can be decrypted for the built-in encryption/decryption module, be disappeared accordingly
Cease content.So, on the one hand the message content is stored in local data base 2 corresponding to telecommunication customer end 2, on the other hand should
Telecommunication customer end 2 exports the message content to user B, completes the transmitting procedure of the message content.
It is encryption communication message to be handled message content by telecommunication customer end 1 so that message content is all the time with the encryption
The form of communication message is transmitted between user A and user B, then even if the encryption communication message is compromised or stolen,
The encryption and decryption mechanism used due to not knowing about built-in encryption/decryption module, thus the encryption communication message for leaking or stealing can not be entered
Row decryption obtains message content, it is ensured that information security.
But because built-in encryption/decryption module is to make to obtain by the developer of the communication applications, i.e. the communication applications
Developer understand built in encryption/decryption module use encryption and decryption mechanism, and the developer of the communication applications equally to communication
Server is safeguarded, then because communication server needs that encryption communication message is received and forwarded so that exploit person
There is the ability that the encryption communication message is decrypted in member, cause certain customers certain worry to information security to be present.
Therefore, the application is by optimizing the encipherment scheme in message transmitting procedure, above-mentioned is asked with solve in correlation technique
Topic.For the application is further described, there is provided the following example:
Fig. 2 is a kind of method for message transmission based on multi-enciphering for sender that the exemplary embodiment of the application one provides
Flow chart.As shown in Fig. 2 this method may comprise steps of:
Step 202, the message content that this end communication side generates in the local terminal client of default communication applications is obtained.
In the present embodiment, default communication applications can be any type of communication applications, such as instant messaging application etc.;
For example, the default communication applications can be enterprise instant communication application (Enterprise Instant Messaging,
, the application is limited not to this.
In the present embodiment, the multi-enciphering scheme of the application can be used for any type of message content, such as this disappears
Breath content can be that various data, the application such as word, picture, form, video, voice, file are limited not to this.
Step 204, by the built-in encryption/decryption module and third party's encryption/decryption module in the local terminal client, according to pre-
The encryption order of definition carries out multi-enciphering to the message content, obtains encryption communication message;Wherein, the built-in encryption and decryption
Module is provided by the default communication applications, third party's encryption/decryption module is by being different from the 3rd of the default communication applications
Side provides.
In the present embodiment, default communication applications can be built-in with advance in client-side program built-in encryption/decryption module and
Third party's encryption/decryption module, and the open application permission to built-in encryption/decryption module and third party's encryption/decryption module so that all
The user of the client-side program is downloaded and be mounted with, can be used based on built-in encryption/decryption module and third party's encryption/decryption module
The multi-enciphering scheme based on the application of realization.
In the present embodiment, default communication applications can be built-in with advance in client-side program built-in encryption/decryption module and
Third party's encryption/decryption module, but the application permission to built-in encryption/decryption module is only opened, and third party's encryption/decryption module is answered
Limited with authority so that when user has the application permission to third party's encryption/decryption module, can apply and be based on this Shen
Multi-enciphering scheme please.Even, default communication applications can only in client-side program preset built-in encryption/decryption module, no
Built-in third party's encryption/decryption module so that when only user is had to the application permission of third party's encryption/decryption module, can under
Carry, install and use the multi-enciphering scheme based on the application.
Such as in the above-described embodiments, in one case, this end communication side to end communication side with that can belong to same group
Body, and this end communication side is with that can be to be answered with what is operated to multi-enciphering by the administrator configurations of the group to end communication side
With authority, it is thus possible to realize above-mentioned multi-enciphering scheme.In one case, this end communication side with it is permissible to end communication side
Belong to same group, and the keeper of the group is that the group is configured with the application permission operated to multi-enciphering, then local terminal
Communication side can be sent encryption communication message to end communication side by group chat window corresponding to the group, realize the application's
Multi-enciphering scheme.
Step 206, the encryption communication message is sent to server corresponding to the default communication applications, and by described
Server is forwarded to the default communication applications to the opposite end client provided end communication side, wherein the opposite end client is led to
Cross the built-in encryption/decryption module included and the encryption communication message is decrypted third party's encryption/decryption module
To the message content.
In the present embodiment, can show to add on multiple in local terminal client by least one of following manner
Close operation prompt information, a variety of encipherment schemes based on the application are being currently used to help this end communication side to understand:
It is used to send in the communication window of the encryption communication message in the local terminal client, the operation indicating letter of the first kind is shown
Breath;Corresponding in the entrance area of the communication window in the messaging list page of the local terminal client, the second class is shown
The operation prompt information of type;In the Name area of the communication window, operation prompt information of the 3rd type etc. is added;When
So, the application is limited not to this.
In the present embodiment, message content can also be stored in the local cipher of local terminal client establishment with clear-text way
In database.Wherein, the security of the message content is on the one hand may insure by the encryption to database;On the other hand pass through
Clear-text way stores message content so that and the local cipher database supports user to perform search operaqtion in local terminal client,
It is easy to implement the quick lookup to communication message.
Correspondingly, Fig. 3 is a kind of message based on multi-enciphering for recipient that the exemplary embodiment of the application one provides
The flow chart of transmission method.As shown in figure 3, this method may comprise steps of:
Step 302, this end communication side receives encryption communication message in the local terminal client of default communication applications, described
Encryption communication message is from the default communication applications to the opposite end client provided end communication side;Wherein, the opposite end visitor
Family end by comprising built-in encryption/decryption module and third party's encryption/decryption module carry out a variety of encryptions and obtain the encryption communication and disappear
Breath.
Step 304, the built-in encryption/decryption module and third party's encryption and decryption included by the local terminal client
Module, the encryption communication message is decrypted successively according to predefined decryption order, obtains message content;Wherein, institute
It is described default logical by being different from by the default communication applications offer, third party's encryption/decryption module to state built-in encryption/decryption module
The third party of news application provides.
Step 306, the message content is exported to described end communication side.
From above technical scheme, the application by encryption/decryption module built in introducing and third party's encryption/decryption module, by
There is provided in third party's encryption/decryption module by the third party for being different from communication applications, thus server is connecing corresponding to the communication applications
When receiving the communication message after being encrypted via third party's encryption/decryption module, processing the communication message can not be decrypted, from
And ensure that message content can only be checked by communication two party, help to lift security of the message content in communication process.
Below for the message interaction process between communication two party, it is described in detail with reference to Fig. 4-5;Wherein, Fig. 4 is this
Apply for a kind of flow chart for method for message transmission based on multi-enciphering that an exemplary embodiment provides, Fig. 5 is the application one
A kind of schematic diagram for communication process based on multi-enciphering that exemplary embodiment provides.As shown in Figure 4, it is assumed that made by user A
It is message sender, user B as message receiver, user A is mounted with that enterprise instant communication should on the electronic equipment used
With nail nail (by taking " nail nail " as an example;Can certainly be other arbitrary default communication applications) nail follow closely client 1, user B exists
The nail nail client 2 of enterprise instant communication application nail nail is mounted with the electronic equipment used, then in nail nail client 1, nail
Follow closely and realize that the message of the multi-enciphering based on the application is transmitted between server and nail nail client 2;This method can include with
Lower step:
Step 402, nail nail client 1 obtains message content.
In the present embodiment, as shown in Figure 6, it is assumed that user A is nailing on the single chat window that opens with user B, then
User A can carry out message input by the single chat window, so that client 1 obtains above-mentioned message content.Wherein, in message
Appearance can be the one or more in arbitrary form, such as word, emoticon, audio, picture, video etc., and the application is not
This is limited.
Certainly, user A and user B is not limited to be communicated using single chat window.Such as shown in Fig. 7, as user A, use
When family B belongs to groups such as " committees of the Ding Ding top classes in a kindergarten ", user A and user B can be entered by group chat window corresponding to the group
Row communication, then the content that client 1 can be inputted user A by the group chat window, as above-mentioned message content;When
So, now the target communication side of the message content not only includes user B, can also include other group members such as user C, still
Message sink corresponding to each group member with processing etc. process it is consistent, only illustrated herein by taking user B as an example, other use
Family no longer repeats one by one.
Step 404, message content is stored in local cipher database by nail nail client 1.
In the present embodiment, nail nail client 1 is localling create all local data bases 1 as shown in Figure 5, the local data
Storehouse 1 is used to store the message content sent and received, that is, is used to store history message, in order to which user A is turned over afterwards
See and use.
Due to the numerous contents of history message, user A is likely to use search function in the local data base 1, to search
Rope history message interested.Therefore, local data base 1 can be stored all history messages using clear-text way, with
Realize the support to search function.Meanwhile local data base 1 itself can be encrypting database so that local data base 1 is suitable
In " safety box " of history message, protection is encrypted to history message, contributes to improving information safety.
Step 406, nail nail client 1 is encrypted by following closely nail encryption/decryption module, obtains intermediate cryptographic data 1.
In the present embodiment, nail follows closely encryption/decryption module equivalent to the built-in encryption/decryption module in embodiment illustrated in fig. 2, and this
Exemplified by place by nail due to being followed closely, thus the built-in encryption/decryption module can be specially nail nail encryption/decryption module.Nail nail encryption/decryption module
Made by the developer of enterprise instant communication application nail nail, purpose itself is:By the encryption to message content, make
It is compromised or steals even if obtaining encryption communication message, due to the external world and does not know about the encryption and decryption machine followed closely nail encryption/decryption module and used
System, thus encryption communication message can not be decrypted, it is ensured that the security of message content.
Step 408, nail nail client 1 is encrypted by third party's encryption/decryption module, intermediate cryptographic data 1 are handled is
Encryption communication message.
In the present embodiment, message content is encrypted by following closely nail encryption/decryption module first, obtains middle add
Ciphertext data, then the intermediate cryptographic data are encrypted by third party's encryption/decryption module, obtain final encryption communication
Message.The order of above-mentioned " nail nail encryption/decryption module → third party's encryption/decryption module " why is used, is that client 1 is followed closely by nail
The order being pre-configured with is determined;In fact, random order is configurable between multiple encryption/decryption modules, as long as ensuring each
Encryption/decryption module was performed encryption at least once;For example, it can be offseted first by third party's encryption/decryption module
Breath content is encrypted, and obtains intermediate cryptographic data, and then the intermediate cryptographic data are carried out by nail nail encryption/decryption module
Encryption, obtain final encryption communication message.
In the present embodiment, the operation on multi-enciphering can be shown in local terminal client (i.e. nail nail client 1)
Prompt message so that the user A as this end communication side recognizes that communication message is by a variety of encipherment protections, in ten
Divide in the communication environment of safety.The operation prompt information can be accomplished in several ways, such as:
In one case, it can be used to send in the communication window of encryption communication message in local terminal client, show
A type of operation prompt information.Such as in the group chat communication window shown in the single chat communication window or Fig. 7 shown in Fig. 6,
It can show such as " message in this chat will be encrypted by third party, and cryptographic services ... are provided jointly by the close shields of XX and nail nail "
Deng prompt text, as a type of operation prompt information;Wherein " the close shields of XX " is different from the third party of nail nail, by this
" the close shields of XX " realizes a variety of encryptions to communication message with nail nail jointly.
In another case, another type of operation indicating letter can be added in the Name area of communication window
Breath.For example in the communication window shown in Fig. 6, one mark can be shown on the right side of title " B ", it is another type of as this
Operation prompt information;And in the communication window shown in Fig. 7, one mark can be shown on the right side of title " committee of the Ding Ding top classes in a kindergarten "
Know, as the another type of operation prompt information.
Step 410, nail nail client 1, which sends encryption communication message to nail, follows closely server.
Step 412, encryption communication message is transmitted to the nail that user B uses and follows closely client 2 by nail nail server, at the same will plus
Close communication message is stored in service end encrypting database.
In the present embodiment, third party's encryption/decryption module is carried by the third party for being different from enterprise instant communication application nail nail
For " being different from " here should be understood to:What nail nail client 1 or other nail nail clients were provided by built-in third party
SDK (Software Development Kit, Software tool kit), using the SDK as above-mentioned third party's encryption and decryption mould
Block is used, to realize the encryption (and follow-up decryption processing) based on third party's encryption/decryption module, and this
Between tripartite and enterprise instant communication application nail nail independently of each other, developer, nail nail client or the nail nail of nail are either followed closely
Server, it can not understand encryption and decryption mechanism used by third party's encryption/decryption module.
So only above-mentioned third party's encryption/decryption module can realize decryption processing, and third party's encryption/decryption module
Only it is configured in nail nail client, such as in the nail nail client 2 used as the user B to end communication side so that nail nail visitor
Encryption communication message can be decrypted to obtain message content for family end 2, and provide to user B and checked.And followed closely for nail
For server, it can only complete:On the one hand, encryption communication message is forwarded directly to end communication side, such as forwarded
The nail used to user B follows closely client 2;On the other hand, encryption communication message is stored so that user A or user B is used
During other electronic equipments, or by local data base 1, local data base 2 etc. surprisingly empty after, can pass through download nail nail service
The encryption communication message stored in device, realize the recovery to history message and check.
And for third party:On the one hand, although third party understands the encryption and decryption mechanism of third party's encryption/decryption module,
But encryption communication message is only transmitted between nail nail client and nail nail server so that third party can not obtain encryption communication
Message, thus processing encryption communication message can not be decrypted;On the other hand, even if third party obtains encryption communication message,
But third party and the encryption and decryption mechanism for not knowing about nail nail encryption/decryption module, thus can not decrypt to obtain in final message
Hold, it is ensured that the Information Security of message content.
So encryption communication message is merely able to be got by the nail nail client for using end communication side, and pass through calling
Processing is decrypted in third party's encryption/decryption module and nail nail encryption/decryption module, obtains final message content;And in addition without
Method obtains the encryption communication message, even if also processing can not be decrypted to the encryption communication message after obtaining, is greatly lifted
Information Security in communication process.
In the present embodiment, the communication process between nail nail client and nail nail server, such as nail client 1 is followed closely to nail
Follow closely the process that server sends the process of encryption communication message, nail nail server sends encryption communication message to nail nail client 2
Deng, it can be transmitted by the encrypted tunnel based on security protocol, such as based on TLS (Transport Layer
Security, secure transport layers) agreement privately owned encrypted tunnel, so that it is guaranteed that encryption communication message will not be by transmitting procedure
The external world is stolen, and further improves communication security.
Step 414, processing is decrypted by third party's encryption/decryption module in nail nail client 2, obtains intermediate cryptographic data
2.Wherein, when decrypting process is smoothed out, the intermediate cryptographic data 2 should be consistent with above-mentioned intermediate decrypted data 1.
Step 416, processing is decrypted by following closely nail encryption/decryption module in nail nail client 2, obtains message content.
In the present embodiment, step 414-416 execution sequence is consistent with step 406-408 execution sequence, depends on
In encryption or the decryption order being pre-configured with, here is omitted.
Step 418, message content is stored in local cipher database by nail nail client 2.
In the present embodiment, local cipher database can be local data base 2 shown in Fig. 5 etc..The local data base 2
It is similar with above-mentioned local data base 1, by the way that communication message is stored in local data base 2 with clear-text way, in order to prop up
Hold user B retrieval behavior.
Step 420, nail follows closely client 2 to user's B output message contents.
In the present embodiment, in the communication window of nail nail client 2 as shown in Figure 8, with the communication window shown in Fig. 7
Similar, it again may be by showing that such as " message in this chat will be encrypted by third party, common by the close shields of XX and nail nail
Cryptographic services ... are provided " etc. prompt text, on the right side of title " committee of the Ding Ding top classes in a kindergarten " modes such as one mark can be shown, to right
The user B of end communication side is prompted, and it is understood Current communications and is under security context.
Further, it is also possible to another type is shown corresponding in the entrance area of communication window in the messaging list page
Operation prompt information;Such as Fig. 9 shows the messaging list page corresponding to nail nail client 2, in communication window " the Ding Ding top classes in a kindergarten
Committee ", " C " etc. entrance area in, such as on the right side of title " committee of the Ding Ding top classes in a kindergarten ", " C " etc., a mark can be shown, with work
For the operation prompt information of another type.
In the present embodiment, user A, user B (or this end communication side in other communication process with to end communication side) exist
Download and after pilot nail nail client, can obtain the application permission to built-in nail nail encryption/decryption module;And for the 3rd
The application permission of square encryption/decryption module, it is understood that there may be a variety of situations:
In one case, user A, user B or other any users are after download and pilot nail nail client, can be with
The application permission to third party's encryption/decryption module is obtained, so as to realize the multi-enciphering scheme of the application.
In another case, user A, user B can be configured to third party after download and pilot nail nail client
The application permission of encryption/decryption module, and and it is non-automatic acquisition the application permission.For example, when user A, user B belong to same group
When " AA companies ", the keeper of the group can be configured by for example " XX by all administration pages as shown in Figure 10 for the group
Third party's encryption/decryption module that close shield " provides.
Wherein, keeper can be application of member of community's configuration to third party's encryption/decryption module under group " AA companies "
Authority.Such as keeper can set the page by the chat shown in Figure 11, configure the user A to third party's encryption/decryption module
" message third party encryption " option in application permission, such as Figure 11 is shown as " not opening ", show user A now be not present pair
The application permission of third party's encryption/decryption module.Similarly, keeper can also be that other members of community such as user B are configured,
Here is omitted.
Keeper can also be application permission of the group's configuration under group " AA companies " to third party's encryption/decryption module.Example
As keeper can configure the group " committee of the Ding Ding top classes in a kindergarten " to third party's encryption/decryption module by group's setting page shown in Figure 12
Application permission, such as " message third party encryption " option in Figure 12 is shown as " having turned on ", shows " the Ding Ding top classes in a kindergarten of group
Committee " has to the application permission of third party's encryption/decryption module, all communication messages via the group " committee of the Ding Ding top classes in a kindergarten " transmission,
Safe transmission is carried out using the multi-enciphering scheme applied substantially.
Certainly, keeper can also carry out rights management by other dimensions, and the application is limited not to this.Example
Such as, the communication message that can be directed to some types such as picture, video, file assigns authority so that the communication message of these types
Force to carry out communication transfer using the multi-enciphering scheme based on the application, and for the other kinds of communication message such as word then
Authority is not assigned, communication biography can be carried out only with the encipherment scheme (such as only using built-in encryption/decryption module) in correlation technique
It is defeated.For another example the organizational structure information of group can be combined, only for the portions such as " manager's room " in group, " development department "
Door assigns application permission so that the group employee of these departments forces to be led to using the multi-enciphering scheme based on the application
News, and the group employee of other departments does not assign authority then.
Figure 13 shows the schematic configuration diagram of the electronic equipment of the exemplary embodiment according to the application.It refer to figure
13, in hardware view, the electronic equipment include processor 1302, internal bus 1304, network interface 1306, internal memory 1308 and
Nonvolatile memory 1310, the hardware being also possible that certainly required for other business.Processor 1302 is deposited from non-volatile
Computer program corresponding to reading into internal memory 1302 and then is run in reservoir 1310, is formed on logic level and is added based on multiple
Close massage transmission device.Certainly, in addition to software realization mode, the application is not precluded from other implementations, for example patrols
Collect mode of device or software and hardware combining etc., that is to say, that the executive agent of following handling process is not limited to each patrol
Collect unit or hardware or logical device.
Figure 14 is refer to, in Software Implementation, being somebody's turn to do the massage transmission device based on multi-enciphering can include obtaining
Unit 1402, ciphering unit 1404 and transmitting element 1406.Wherein:
Acquiring unit 1402, obtain in the message that this end communication side generates in the local terminal client of default communication applications
Hold;
Ciphering unit 1404, by the built-in encryption/decryption module and third party's encryption/decryption module in the local terminal client,
Multi-enciphering is carried out to the message content according to predefined encryption order, obtains encryption communication message;Wherein, it is described built-in
Encryption/decryption module is provided by the default communication applications, third party's encryption/decryption module is by being different from the default communication applications
Third party provide;
Transmitting element 1406, the encryption communication message is sent to server corresponding to the default communication applications, and
The default communication applications are forwarded to the opposite end client provided end communication side from the server, wherein the opposite end is objective
Family end by comprising the built-in encryption/decryption module and third party's encryption/decryption module the encryption communication message is carried out
Decryption obtains the message content.
Optionally, in addition to:
Tip element 1408, by least one of following manner, shown in the local terminal client on described more
The operation prompt information of re-encryption:
It is used to send in the communication window of the encryption communication message in the local terminal client, the first kind is shown
Operation prompt information;
Corresponding in the entrance area of the communication window in the messaging list page of the local terminal client, the is shown
The operation prompt information of two types;
In the Name area of the communication window, the operation prompt information of the 3rd type is added.
Optionally, described end communication side belongs to same group, described end communication side and institute to end communication side with described
State to end communication side by the administrator configurations of the group as with the application permission operated to the multi-enciphering.
Optionally, described end communication side belongs to same group to end communication side with described, and the keeper of the group is
The group is configured with the application permission to multi-enciphering operation;Wherein, the encryption communication message is led to by the local terminal
News side is sent to described to end communication side by group chat window corresponding to the group.
Optionally, in addition to:
Memory cell 1410, the local that the message content is stored in the local terminal client establishment with clear-text way add
In ciphertext data storehouse.
Figure 15 shows the schematic configuration diagram of the electronic equipment of the exemplary embodiment according to the application.It refer to figure
15, in hardware view, the electronic equipment include processor 1502, internal bus 1504, network interface 1506, internal memory 1508 and
Nonvolatile memory 1510, the hardware being also possible that certainly required for other business.Processor 1502 is deposited from non-volatile
Computer program corresponding to reading into internal memory 1502 and then is run in reservoir 1510, is formed on logic level and is added based on multiple
Close massage transmission device.Certainly, in addition to software realization mode, the application is not precluded from other implementations, for example patrols
Collect mode of device or software and hardware combining etc., that is to say, that the executive agent of following handling process is not limited to each patrol
Collect unit or hardware or logical device.
Figure 16 is refer to, in Software Implementation, being somebody's turn to do the massage transmission device based on multi-enciphering can include receiving
Unit 1602, decryption unit 1604 and output unit 1606.Wherein:
Receiving unit 1602, this end communication side receive encryption communication in the local terminal client of default communication applications and disappeared
Breath, the encryption communication message is from the default communication applications to the opposite end client provided end communication side;Wherein, it is described
Opposite end client by comprising built-in encryption/decryption module and third party's encryption/decryption module carry out it is a variety of encryption obtain the encryption
Communication message;
Decryption unit 1604, the built-in encryption/decryption module and the third party included by the local terminal client add
Deciphering module, the encryption communication message is decrypted successively according to predefined decryption order, obtains message content;Its
In, the built-in encryption/decryption module is provided by the default communication applications, third party's encryption/decryption module is described by being different from
The third party of default communication applications provides;
Output unit 1606, the message content is exported to described end communication side.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net
Network interface and internal memory.
Internal memory may include computer-readable medium in volatile memory, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM).Internal memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moved
State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable
Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM),
Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus
Or any other non-transmission medium, the information that can be accessed by a computing device available for storage.Define, calculate according to herein
Machine computer-readable recording medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, term " comprising ", "comprising" or its any other variant are intended to nonexcludability
Comprising so that process, method, commodity or equipment including a series of elements not only include those key elements, but also wrapping
Include the other element being not expressly set out, or also include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that wanted including described
Other identical element also be present in the process of element, method, commodity or equipment.
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to
During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with the application.On the contrary, they be only with it is such as appended
The example of the consistent apparatus and method of some aspects be described in detail in claims, the application.
It is only merely for the purpose of description specific embodiment in term used in this application, and is not intended to be limiting the application.
" one kind " of singulative used in the application and appended claims, " described " and "the" are also intended to including majority
Form, unless context clearly shows that other implications.It is also understood that term "and/or" used herein refers to and wrapped
Containing the associated list items purpose of one or more, any or all may be combined.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the application
A little information should not necessarily be limited by these terms.These terms are only used for same type of information being distinguished from each other out.For example, do not departing from
In the case of the application scope, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as
One information.Depending on linguistic context, word as used in this " if " can be construed to " ... when " or " when ...
When " or " in response to determining ".
The preferred embodiment of the application is the foregoing is only, not limiting the application, all essences in the application
God any modification, equivalent substitution and improvements done etc., should be included within the scope of the application protection with principle.
Claims (12)
- A kind of 1. method for message transmission based on multi-enciphering, it is characterised in that including:Obtain the message content that this end communication side generates in the local terminal client of default communication applications;It is suitable according to predefined encryption by the built-in encryption/decryption module and third party's encryption/decryption module in the local terminal client Message content described in ordered pair carries out multi-enciphering, obtains encryption communication message;Wherein, the built-in encryption/decryption module is by described pre- If communication applications are provided, third party's encryption/decryption module is provided by the third party for being different from the default communication applications;The encryption communication message is sent to server corresponding to the default communication applications, and is forwarded to by the server The default communication applications are to the opposite end client provided end communication side, wherein the opposite end client passes through comprising described in Built-in encryption/decryption module and third party's encryption/decryption module are decrypted to obtain in the message to the encryption communication message Hold.
- 2. according to the method for claim 1, it is characterised in that also include:By at least one of following manner, described Operation prompt information on the multi-enciphering is shown in local terminal client:It is used to send in the communication window of the encryption communication message in the local terminal client, the operation of the first kind is shown Prompt message;Corresponding in the entrance area of the communication window in the messaging list page of the local terminal client, the second class is shown The operation prompt information of type;In the Name area of the communication window, the operation prompt information of the 3rd type is added.
- 3. according to the method for claim 1, it is characterised in that described end communication side belongs to same with described to end communication side One group, described end communication side with it is described to end communication side by the administrator configurations of the group be with to described multiple plus The application permission of close operation.
- 4. according to the method for claim 1, it is characterised in that described end communication side belongs to same with described to end communication side One group, the keeper of the group are configured with the application permission to multi-enciphering operation for the group;Wherein, it is described Encryption communication message group chat window as corresponding to described end communication side by the group is sent to described to end communication side.
- 5. according to the method for claim 1, it is characterised in that also include:The message content is stored in the local cipher database that the local terminal client creates with clear-text way.
- A kind of 6. method for message transmission based on multi-enciphering, it is characterised in that including:This end communication side receives encryption communication message, the encryption communication message in the local terminal client of default communication applications From the default communication applications to the opposite end client provided end communication side;Wherein, the opposite end client by comprising Built-in encryption/decryption module and third party's encryption/decryption module carry out it is a variety of encryption obtain the encryption communication message;The built-in encryption/decryption module and third party's encryption/decryption module included by the local terminal client, according to predetermined The decryption order of justice is decrypted successively to the encryption communication message, obtains message content;Wherein, the built-in encryption and decryption mould Block is provided by the default communication applications, third party's encryption/decryption module is by being different from the third parties of the default communication applications There is provided;The message content is exported to described end communication side.
- A kind of 7. massage transmission device based on multi-enciphering, it is characterised in that including:Acquiring unit, obtain the message content that this end communication side generates in the local terminal client of default communication applications;Ciphering unit, by the built-in encryption/decryption module and third party's encryption/decryption module in the local terminal client, according to predetermined The encryption order of justice carries out multi-enciphering to the message content, obtains encryption communication message;Wherein, the built-in encryption and decryption mould Block is provided by the default communication applications, third party's encryption/decryption module is by being different from the third parties of the default communication applications There is provided;Transmitting element, the encryption communication message is sent to server corresponding to the default communication applications, and by the clothes Business device is forwarded to the default communication applications to the opposite end client provided end communication side, wherein the opposite end client passes through Comprising the built-in encryption/decryption module and third party's encryption/decryption module the encryption communication message is decrypted to obtain The message content.
- 8. device according to claim 7, it is characterised in that also include:Tip element, by least one of following manner, shown in the local terminal client on the multi-enciphering Operation prompt information:It is used to send in the communication window of the encryption communication message in the local terminal client, the operation of the first kind is shown Prompt message;Corresponding in the entrance area of the communication window in the messaging list page of the local terminal client, the second class is shown The operation prompt information of type;In the Name area of the communication window, the operation prompt information of the 3rd type is added.
- 9. device according to claim 7, it is characterised in that described end communication side belongs to same with described to end communication side One group, described end communication side with it is described to end communication side by the administrator configurations of the group be with to described multiple plus The application permission of close operation.
- 10. device according to claim 7, it is characterised in that described end communication side belongs to described to end communication side Same group, the keeper of the group are configured with the application permission to multi-enciphering operation for the group;Wherein, institute Encryption communication message group chat window as corresponding to described end communication side by the group is stated to send to described to end communication side.
- 11. device according to claim 7, it is characterised in that also include:Memory cell, the message content is stored in the local cipher database of the local terminal client establishment with clear-text way In.
- A kind of 12. massage transmission device based on multi-enciphering, it is characterised in that including:Receiving unit, this end communication side receives encryption communication message in the local terminal client of default communication applications, described to add Close communication message is from the default communication applications to the opposite end client provided end communication side;Wherein, the opposite end client End by comprising built-in encryption/decryption module and third party's encryption/decryption module carry out it is a variety of encryption obtain the encryption communication message;Decryption unit, the built-in encryption/decryption module included by the local terminal client and third party's encryption and decryption mould Block, the encryption communication message is decrypted successively according to predefined decryption order, obtains message content;Wherein, it is described Built-in encryption/decryption module is provided by the default communication applications, third party's encryption/decryption module is by being different from the default communication The third party of application provides;Output unit, the message content is exported to described end communication side.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610665182.3A CN107733841B (en) | 2016-08-12 | 2016-08-12 | Message transmission method and device based on multiple encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610665182.3A CN107733841B (en) | 2016-08-12 | 2016-08-12 | Message transmission method and device based on multiple encryption |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107733841A true CN107733841A (en) | 2018-02-23 |
CN107733841B CN107733841B (en) | 2021-01-26 |
Family
ID=61201462
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610665182.3A Active CN107733841B (en) | 2016-08-12 | 2016-08-12 | Message transmission method and device based on multiple encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107733841B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111368271A (en) * | 2020-03-10 | 2020-07-03 | 山东汇贸电子口岸有限公司 | Method and system for realizing password management based on multiple encryption |
CN114978564A (en) * | 2021-04-20 | 2022-08-30 | 中移互联网有限公司 | Data transmission method and device based on multiple encryption |
CN116112458A (en) * | 2023-02-09 | 2023-05-12 | 网易(杭州)网络有限公司 | Communication method, device, equipment and storage medium |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101141243A (en) * | 2006-09-08 | 2008-03-12 | 飞塔信息科技(北京)有限公司 | Device and method for carrying out security check and content filtering on communication data |
CN103152362A (en) * | 2013-03-28 | 2013-06-12 | 胡祥义 | Cloud-computing-based encrypted transmission method for large data files |
CN103179114A (en) * | 2013-03-15 | 2013-06-26 | 华中科技大学 | Fine-grained access control method for data in cloud storage |
CN103258168A (en) * | 2012-02-17 | 2013-08-21 | 西门子公司 | Encryption system and encryption method for programmable logic controller (PLC) |
US8713311B1 (en) * | 2012-11-07 | 2014-04-29 | Google Inc. | Encryption using alternate authentication key |
CN104580086A (en) * | 2013-10-17 | 2015-04-29 | 腾讯科技(深圳)有限公司 | Information transmission method, client side, server and system |
CN105007254A (en) * | 2014-04-17 | 2015-10-28 | 腾讯科技(深圳)有限公司 | Data transmission method and system, and terminal |
CN105262772A (en) * | 2015-11-06 | 2016-01-20 | 腾讯科技(深圳)有限公司 | Data transmission method, data transmission system and related apparatus for data transmission method and system |
CN105281907A (en) * | 2014-07-11 | 2016-01-27 | 腾讯科技(深圳)有限公司 | Encrypted data processing method and apparatus |
CN105635144A (en) * | 2015-12-29 | 2016-06-01 | 普奥云信息科技(北京)有限公司 | Cloud-platform-server-based data processing method and system |
CN105847261A (en) * | 2016-03-29 | 2016-08-10 | 江苏翔晟信息技术股份有限公司 | Bluetooth wireless encryption and decryption-based electronic signature method |
-
2016
- 2016-08-12 CN CN201610665182.3A patent/CN107733841B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101141243A (en) * | 2006-09-08 | 2008-03-12 | 飞塔信息科技(北京)有限公司 | Device and method for carrying out security check and content filtering on communication data |
CN103258168A (en) * | 2012-02-17 | 2013-08-21 | 西门子公司 | Encryption system and encryption method for programmable logic controller (PLC) |
US8713311B1 (en) * | 2012-11-07 | 2014-04-29 | Google Inc. | Encryption using alternate authentication key |
CN103179114A (en) * | 2013-03-15 | 2013-06-26 | 华中科技大学 | Fine-grained access control method for data in cloud storage |
CN103152362A (en) * | 2013-03-28 | 2013-06-12 | 胡祥义 | Cloud-computing-based encrypted transmission method for large data files |
CN104580086A (en) * | 2013-10-17 | 2015-04-29 | 腾讯科技(深圳)有限公司 | Information transmission method, client side, server and system |
CN105007254A (en) * | 2014-04-17 | 2015-10-28 | 腾讯科技(深圳)有限公司 | Data transmission method and system, and terminal |
CN105281907A (en) * | 2014-07-11 | 2016-01-27 | 腾讯科技(深圳)有限公司 | Encrypted data processing method and apparatus |
CN105262772A (en) * | 2015-11-06 | 2016-01-20 | 腾讯科技(深圳)有限公司 | Data transmission method, data transmission system and related apparatus for data transmission method and system |
CN105635144A (en) * | 2015-12-29 | 2016-06-01 | 普奥云信息科技(北京)有限公司 | Cloud-platform-server-based data processing method and system |
CN105847261A (en) * | 2016-03-29 | 2016-08-10 | 江苏翔晟信息技术股份有限公司 | Bluetooth wireless encryption and decryption-based electronic signature method |
Non-Patent Citations (3)
Title |
---|
于成刚: "《Web数据库的安全模型研究与应用》", 《中国硕士学位论文全文数据库 信息技术辑》 * |
张恺悌: "《基于SET协议的网络电子支付系统的研究》", 《中国硕士学位论文全文数据库 信息技术辑》 * |
邹彬: "《基于RSA加密算法的电子奖券系统的研究与设计》", 《中国硕士学位论文全文数据库 信息技术辑》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111368271A (en) * | 2020-03-10 | 2020-07-03 | 山东汇贸电子口岸有限公司 | Method and system for realizing password management based on multiple encryption |
CN114978564A (en) * | 2021-04-20 | 2022-08-30 | 中移互联网有限公司 | Data transmission method and device based on multiple encryption |
CN114978564B (en) * | 2021-04-20 | 2023-07-14 | 中移互联网有限公司 | Data transmission method and device based on multiple encryption |
CN116112458A (en) * | 2023-02-09 | 2023-05-12 | 网易(杭州)网络有限公司 | Communication method, device, equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN107733841B (en) | 2021-01-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11973860B1 (en) | Systems and methods for encryption and provision of information security using platform services | |
US9619659B1 (en) | Systems and methods for providing information security using context-based keys | |
CN107026824B (en) | A kind of message encryption, decryption method and device | |
US8806200B2 (en) | Method and system for securing electronic data | |
CN106650482A (en) | Electronic file encryption method and device, electronic file decryption method and device and electronic file encryption and decryption system | |
CN101083524A (en) | Method and system for encrypting and deciphering E-mail | |
CN106992851A (en) | TrustZone-based database file password encryption and decryption method and device and terminal equipment | |
US20200145389A1 (en) | Controlling Access to Data | |
Hemalatha et al. | A comparative analysis of encryption techniques and data security issues in cloud computing | |
Daniel et al. | A computer security system for cloud computing based on encryption technique | |
CN107733841A (en) | Method for message transmission and device based on multi-enciphering | |
CN104601820A (en) | Mobile terminal information protection method based on TF password card | |
CN101106451B (en) | A data transmission method and device | |
CN108494724A (en) | Cloud storage encryption system based on more authorized organization's encryption attribute algorithms and method | |
US11997191B2 (en) | System and method for protecting secret data items using multiple tiers of encryption and secure element | |
Kaur et al. | A Comparative Review on Data Security Challenges in Cloud Computing | |
US8601603B1 (en) | Secure information transmission over a network | |
US11483136B2 (en) | Wrapped keys with access control predicates | |
Malik et al. | Cloud computing security improvement using Diffie Hellman and AES | |
CN102647428A (en) | Encrypting and decrypting system and method adopting trusteeship control based on communication network | |
US20150089217A1 (en) | Method and System for Data Protection | |
Adkinson-Orellana et al. | Sharing secure documents in the cloud-a secure layer for Google Docs | |
Abur et al. | Privacy protection and collusion avoidance solution for cloud computing users | |
US11683159B2 (en) | Hybrid content protection architecture | |
WO2021129681A1 (en) | Scheduling method and apparatus, and medium and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1251369 Country of ref document: HK |
|
GR01 | Patent grant | ||
GR01 | Patent grant |