CN107733841A - Method for message transmission and device based on multi-enciphering - Google Patents

Method for message transmission and device based on multi-enciphering Download PDF

Info

Publication number
CN107733841A
CN107733841A CN201610665182.3A CN201610665182A CN107733841A CN 107733841 A CN107733841 A CN 107733841A CN 201610665182 A CN201610665182 A CN 201610665182A CN 107733841 A CN107733841 A CN 107733841A
Authority
CN
China
Prior art keywords
encryption
communication
message
decryption module
party
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610665182.3A
Other languages
Chinese (zh)
Other versions
CN107733841B (en
Inventor
罗锋
赵璐
喻莉英
叶严杰
陈再翔
吴忠谦
林录生
李政甫
周吉莉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201610665182.3A priority Critical patent/CN107733841B/en
Publication of CN107733841A publication Critical patent/CN107733841A/en
Application granted granted Critical
Publication of CN107733841B publication Critical patent/CN107733841B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application provides a kind of method for message transmission and device based on multi-enciphering, and this method can include:Obtain the message content that this end communication side generates in the local terminal client of default communication applications;By the built-in encryption/decryption module and third party's encryption/decryption module in local terminal client, multi-enciphering is carried out to message content according to predefined encryption order, obtains encryption communication message;Wherein, built-in encryption/decryption module is provided by presetting communication applications, third party's encryption/decryption module is provided by the third party for being different from default communication applications;Encryption communication message is sent to server corresponding to default communication applications, and default communication applications are forwarded to the opposite end client provided end communication side from server, wherein opposite end client by comprising built-in encryption/decryption module and third party's encryption/decryption module encryption communication message is decrypted to obtain message content.By the technical scheme of the application, security of the message content in communication process can be lifted.

Description

Method for message transmission and device based on multi-enciphering
Technical field
The application is related to communication technique field, more particularly to a kind of method for message transmission and device based on multi-enciphering.
Background technology
In the related art, by providing encryption/decryption module by communication applications, encryption and decryption processing can be carried out to communication, that Even if communication message occurs to leak or be stolen in communication process, the security of message content still may insure.
But because encryption/decryption module is provided by communication applications, thus when encrypted communication message should via the communication When being forwarded with corresponding server, the server has the decryption and reading capability to the encryption communication message, causes portion User is divided the worry to information security to be present.
The content of the invention
In view of this, the application provides a kind of method for message transmission and device based on multi-enciphering, can lift message Security of the content in communication process.
To achieve the above object, it is as follows to provide technical scheme by the application:
According to the first aspect of the application, it is proposed that a kind of method for message transmission based on multi-enciphering, including:
Obtain the message content that this end communication side generates in the local terminal client of default communication applications;
By the built-in encryption/decryption module and third party's encryption/decryption module in the local terminal client, add according to predefined Close order carries out multi-enciphering to the message content, obtains encryption communication message;Wherein, the built-in encryption/decryption module is by institute State default communication applications offer, third party's encryption/decryption module is provided by the third party for being different from the default communication applications;
The encryption communication message is sent to server corresponding to the default communication applications, and turned by the server The default communication applications are sent to the opposite end client provided end communication side, wherein the opposite end client by comprising The encryption communication message is decrypted to obtain described disappear for the built-in encryption/decryption module and third party's encryption/decryption module Cease content.
According to the second aspect of the application, it is proposed that a kind of method for message transmission based on multi-enciphering, including:
This end communication side receives encryption communication message, the encryption communication in the local terminal client of default communication applications Message is from the default communication applications to the opposite end client provided end communication side;Wherein, the opposite end client passes through Comprising built-in encryption/decryption module and third party's encryption/decryption module carry out it is a variety of encryption obtain the encryption communication message;
The built-in encryption/decryption module and third party's encryption/decryption module included by the local terminal client, according to Predefined decryption order is decrypted successively to the encryption communication message, obtains message content;Wherein, described built-in plus solution Close module is provided by the default communication applications, third party's encryption/decryption module is by being different from the of the default communication applications Tripartite provides;
The message content is exported to described end communication side.
According to the third aspect of the application, it is proposed that a kind of massage transmission device based on multi-enciphering, including:
Acquiring unit, obtain the message content that this end communication side generates in the local terminal client of default communication applications;
Ciphering unit, by the built-in encryption/decryption module and third party's encryption/decryption module in the local terminal client, according to Predefined encryption order carries out multi-enciphering to the message content, obtains encryption communication message;Wherein, described built-in plus solution Close module is provided by the default communication applications, third party's encryption/decryption module is by being different from the of the default communication applications Tripartite provides;
Transmitting element, the encryption communication message is sent to server corresponding to the default communication applications, and by institute State server and be forwarded to the default communication applications to the opposite end client provided end communication side, wherein the opposite end client By comprising the built-in encryption/decryption module and third party's encryption/decryption module the encryption communication message is decrypted Obtain the message content.
According to the fourth aspect of the application, it is proposed that a kind of massage transmission device based on multi-enciphering, including:
Receiving unit, this end communication side receive encryption communication message, institute in the local terminal client of default communication applications Encryption communication message is stated from the default communication applications to the opposite end client provided end communication side;Wherein, the opposite end Client by comprising built-in encryption/decryption module and third party's encryption/decryption module carry out it is a variety of encryption obtain the encryption communication Message;
Decryption unit, the built-in encryption/decryption module and third party's encryption and decryption included by the local terminal client Module, the encryption communication message is decrypted successively according to predefined decryption order, obtains message content;Wherein, institute It is described default logical by being different from by the default communication applications offer, third party's encryption/decryption module to state built-in encryption/decryption module The third party of news application provides;
Output unit, the message content is exported to described end communication side.
From above technical scheme, the application by encryption/decryption module built in introducing and third party's encryption/decryption module, by There is provided in third party's encryption/decryption module by the third party for being different from communication applications, thus server is connecing corresponding to the communication applications When receiving the communication message after being encrypted via third party's encryption/decryption module, processing the communication message can not be decrypted, from And ensure that message content can only be checked by communication two party, help to lift security of the message content in communication process.
Brief description of the drawings
Fig. 1 shows the schematic diagram of the encryption communication in correlation technique.
Fig. 2 is a kind of method for message transmission based on multi-enciphering for sender that the exemplary embodiment of the application one provides Flow chart.
Fig. 3 is a kind of method for message transmission based on multi-enciphering for recipient that the exemplary embodiment of the application one provides Flow chart.
Fig. 4 is a kind of flow for method for message transmission based on multi-enciphering that the exemplary embodiment of the application one provides Figure.
Fig. 5 is a kind of schematic diagram for communication process based on multi-enciphering that the exemplary embodiment of the application one provides.
Fig. 6-12 is that a kind of interface for message transmission for realizing multi-enciphering that the exemplary embodiment of the application one provides shows It is intended to.
Figure 13 is a kind of structural representation of the electronic equipment for sender that the exemplary embodiment of the application one provides.
Figure 14 is a kind of transmission dress of the message based on multi-enciphering for sender that the exemplary embodiment of the application one provides The block diagram put.
Figure 15 is a kind of structural representation of the electronic equipment for recipient that the exemplary embodiment of the application one provides.
Figure 16 is a kind of transmission dress of the message based on multi-enciphering for recipient that the exemplary embodiment of the application one provides The block diagram put.
Embodiment
Fig. 1 shows the schematic diagram of the encryption communication in correlation technique.As shown in figure 1, by taking certain communication applications as an example, it is assumed that Telecommunication customer end 1 that user A is provided using the communication applications inputs message content, and user B is provided by the communication applications Telecommunication customer end 2 receive message content.
Telecommunication customer end 1 stores after the message content of user A inputs is received using the message content as history message There is provided into local data base 1, and by the message content to the built-in encryption/decryption module of telecommunication customer end 1, by the built-in plus solution Message content is encrypted to obtain encryption communication message for close module.Then, the encryption communication message is sent out by telecommunication customer end 1 Communication server is delivered to, and the telecommunication customer end 2 of user B uses is forwarded to by communication server.
Telecommunication customer end 1 belongs to same communication applications with telecommunication customer end 2, is simply installed respectively by user A and user B Into respective electronic equipment, but actual composition and function all same.Therefore, telecommunication customer end 2 also comprising above-mentioned built-in plus Deciphering module so that the encryption communication message that received can be decrypted for the built-in encryption/decryption module, be disappeared accordingly Cease content.So, on the one hand the message content is stored in local data base 2 corresponding to telecommunication customer end 2, on the other hand should Telecommunication customer end 2 exports the message content to user B, completes the transmitting procedure of the message content.
It is encryption communication message to be handled message content by telecommunication customer end 1 so that message content is all the time with the encryption The form of communication message is transmitted between user A and user B, then even if the encryption communication message is compromised or stolen, The encryption and decryption mechanism used due to not knowing about built-in encryption/decryption module, thus the encryption communication message for leaking or stealing can not be entered Row decryption obtains message content, it is ensured that information security.
But because built-in encryption/decryption module is to make to obtain by the developer of the communication applications, i.e. the communication applications Developer understand built in encryption/decryption module use encryption and decryption mechanism, and the developer of the communication applications equally to communication Server is safeguarded, then because communication server needs that encryption communication message is received and forwarded so that exploit person There is the ability that the encryption communication message is decrypted in member, cause certain customers certain worry to information security to be present.
Therefore, the application is by optimizing the encipherment scheme in message transmitting procedure, above-mentioned is asked with solve in correlation technique Topic.For the application is further described, there is provided the following example:
Fig. 2 is a kind of method for message transmission based on multi-enciphering for sender that the exemplary embodiment of the application one provides Flow chart.As shown in Fig. 2 this method may comprise steps of:
Step 202, the message content that this end communication side generates in the local terminal client of default communication applications is obtained.
In the present embodiment, default communication applications can be any type of communication applications, such as instant messaging application etc.; For example, the default communication applications can be enterprise instant communication application (Enterprise Instant Messaging, , the application is limited not to this.
In the present embodiment, the multi-enciphering scheme of the application can be used for any type of message content, such as this disappears Breath content can be that various data, the application such as word, picture, form, video, voice, file are limited not to this.
Step 204, by the built-in encryption/decryption module and third party's encryption/decryption module in the local terminal client, according to pre- The encryption order of definition carries out multi-enciphering to the message content, obtains encryption communication message;Wherein, the built-in encryption and decryption Module is provided by the default communication applications, third party's encryption/decryption module is by being different from the 3rd of the default communication applications Side provides.
In the present embodiment, default communication applications can be built-in with advance in client-side program built-in encryption/decryption module and Third party's encryption/decryption module, and the open application permission to built-in encryption/decryption module and third party's encryption/decryption module so that all The user of the client-side program is downloaded and be mounted with, can be used based on built-in encryption/decryption module and third party's encryption/decryption module The multi-enciphering scheme based on the application of realization.
In the present embodiment, default communication applications can be built-in with advance in client-side program built-in encryption/decryption module and Third party's encryption/decryption module, but the application permission to built-in encryption/decryption module is only opened, and third party's encryption/decryption module is answered Limited with authority so that when user has the application permission to third party's encryption/decryption module, can apply and be based on this Shen Multi-enciphering scheme please.Even, default communication applications can only in client-side program preset built-in encryption/decryption module, no Built-in third party's encryption/decryption module so that when only user is had to the application permission of third party's encryption/decryption module, can under Carry, install and use the multi-enciphering scheme based on the application.
Such as in the above-described embodiments, in one case, this end communication side to end communication side with that can belong to same group Body, and this end communication side is with that can be to be answered with what is operated to multi-enciphering by the administrator configurations of the group to end communication side With authority, it is thus possible to realize above-mentioned multi-enciphering scheme.In one case, this end communication side with it is permissible to end communication side Belong to same group, and the keeper of the group is that the group is configured with the application permission operated to multi-enciphering, then local terminal Communication side can be sent encryption communication message to end communication side by group chat window corresponding to the group, realize the application's Multi-enciphering scheme.
Step 206, the encryption communication message is sent to server corresponding to the default communication applications, and by described Server is forwarded to the default communication applications to the opposite end client provided end communication side, wherein the opposite end client is led to Cross the built-in encryption/decryption module included and the encryption communication message is decrypted third party's encryption/decryption module To the message content.
In the present embodiment, can show to add on multiple in local terminal client by least one of following manner Close operation prompt information, a variety of encipherment schemes based on the application are being currently used to help this end communication side to understand: It is used to send in the communication window of the encryption communication message in the local terminal client, the operation indicating letter of the first kind is shown Breath;Corresponding in the entrance area of the communication window in the messaging list page of the local terminal client, the second class is shown The operation prompt information of type;In the Name area of the communication window, operation prompt information of the 3rd type etc. is added;When So, the application is limited not to this.
In the present embodiment, message content can also be stored in the local cipher of local terminal client establishment with clear-text way In database.Wherein, the security of the message content is on the one hand may insure by the encryption to database;On the other hand pass through Clear-text way stores message content so that and the local cipher database supports user to perform search operaqtion in local terminal client, It is easy to implement the quick lookup to communication message.
Correspondingly, Fig. 3 is a kind of message based on multi-enciphering for recipient that the exemplary embodiment of the application one provides The flow chart of transmission method.As shown in figure 3, this method may comprise steps of:
Step 302, this end communication side receives encryption communication message in the local terminal client of default communication applications, described Encryption communication message is from the default communication applications to the opposite end client provided end communication side;Wherein, the opposite end visitor Family end by comprising built-in encryption/decryption module and third party's encryption/decryption module carry out a variety of encryptions and obtain the encryption communication and disappear Breath.
Step 304, the built-in encryption/decryption module and third party's encryption and decryption included by the local terminal client Module, the encryption communication message is decrypted successively according to predefined decryption order, obtains message content;Wherein, institute It is described default logical by being different from by the default communication applications offer, third party's encryption/decryption module to state built-in encryption/decryption module The third party of news application provides.
Step 306, the message content is exported to described end communication side.
From above technical scheme, the application by encryption/decryption module built in introducing and third party's encryption/decryption module, by There is provided in third party's encryption/decryption module by the third party for being different from communication applications, thus server is connecing corresponding to the communication applications When receiving the communication message after being encrypted via third party's encryption/decryption module, processing the communication message can not be decrypted, from And ensure that message content can only be checked by communication two party, help to lift security of the message content in communication process.
Below for the message interaction process between communication two party, it is described in detail with reference to Fig. 4-5;Wherein, Fig. 4 is this Apply for a kind of flow chart for method for message transmission based on multi-enciphering that an exemplary embodiment provides, Fig. 5 is the application one A kind of schematic diagram for communication process based on multi-enciphering that exemplary embodiment provides.As shown in Figure 4, it is assumed that made by user A It is message sender, user B as message receiver, user A is mounted with that enterprise instant communication should on the electronic equipment used With nail nail (by taking " nail nail " as an example;Can certainly be other arbitrary default communication applications) nail follow closely client 1, user B exists The nail nail client 2 of enterprise instant communication application nail nail is mounted with the electronic equipment used, then in nail nail client 1, nail Follow closely and realize that the message of the multi-enciphering based on the application is transmitted between server and nail nail client 2;This method can include with Lower step:
Step 402, nail nail client 1 obtains message content.
In the present embodiment, as shown in Figure 6, it is assumed that user A is nailing on the single chat window that opens with user B, then User A can carry out message input by the single chat window, so that client 1 obtains above-mentioned message content.Wherein, in message Appearance can be the one or more in arbitrary form, such as word, emoticon, audio, picture, video etc., and the application is not This is limited.
Certainly, user A and user B is not limited to be communicated using single chat window.Such as shown in Fig. 7, as user A, use When family B belongs to groups such as " committees of the Ding Ding top classes in a kindergarten ", user A and user B can be entered by group chat window corresponding to the group Row communication, then the content that client 1 can be inputted user A by the group chat window, as above-mentioned message content;When So, now the target communication side of the message content not only includes user B, can also include other group members such as user C, still Message sink corresponding to each group member with processing etc. process it is consistent, only illustrated herein by taking user B as an example, other use Family no longer repeats one by one.
Step 404, message content is stored in local cipher database by nail nail client 1.
In the present embodiment, nail nail client 1 is localling create all local data bases 1 as shown in Figure 5, the local data Storehouse 1 is used to store the message content sent and received, that is, is used to store history message, in order to which user A is turned over afterwards See and use.
Due to the numerous contents of history message, user A is likely to use search function in the local data base 1, to search Rope history message interested.Therefore, local data base 1 can be stored all history messages using clear-text way, with Realize the support to search function.Meanwhile local data base 1 itself can be encrypting database so that local data base 1 is suitable In " safety box " of history message, protection is encrypted to history message, contributes to improving information safety.
Step 406, nail nail client 1 is encrypted by following closely nail encryption/decryption module, obtains intermediate cryptographic data 1.
In the present embodiment, nail follows closely encryption/decryption module equivalent to the built-in encryption/decryption module in embodiment illustrated in fig. 2, and this Exemplified by place by nail due to being followed closely, thus the built-in encryption/decryption module can be specially nail nail encryption/decryption module.Nail nail encryption/decryption module Made by the developer of enterprise instant communication application nail nail, purpose itself is:By the encryption to message content, make It is compromised or steals even if obtaining encryption communication message, due to the external world and does not know about the encryption and decryption machine followed closely nail encryption/decryption module and used System, thus encryption communication message can not be decrypted, it is ensured that the security of message content.
Step 408, nail nail client 1 is encrypted by third party's encryption/decryption module, intermediate cryptographic data 1 are handled is Encryption communication message.
In the present embodiment, message content is encrypted by following closely nail encryption/decryption module first, obtains middle add Ciphertext data, then the intermediate cryptographic data are encrypted by third party's encryption/decryption module, obtain final encryption communication Message.The order of above-mentioned " nail nail encryption/decryption module → third party's encryption/decryption module " why is used, is that client 1 is followed closely by nail The order being pre-configured with is determined;In fact, random order is configurable between multiple encryption/decryption modules, as long as ensuring each Encryption/decryption module was performed encryption at least once;For example, it can be offseted first by third party's encryption/decryption module Breath content is encrypted, and obtains intermediate cryptographic data, and then the intermediate cryptographic data are carried out by nail nail encryption/decryption module Encryption, obtain final encryption communication message.
In the present embodiment, the operation on multi-enciphering can be shown in local terminal client (i.e. nail nail client 1) Prompt message so that the user A as this end communication side recognizes that communication message is by a variety of encipherment protections, in ten Divide in the communication environment of safety.The operation prompt information can be accomplished in several ways, such as:
In one case, it can be used to send in the communication window of encryption communication message in local terminal client, show A type of operation prompt information.Such as in the group chat communication window shown in the single chat communication window or Fig. 7 shown in Fig. 6, It can show such as " message in this chat will be encrypted by third party, and cryptographic services ... are provided jointly by the close shields of XX and nail nail " Deng prompt text, as a type of operation prompt information;Wherein " the close shields of XX " is different from the third party of nail nail, by this " the close shields of XX " realizes a variety of encryptions to communication message with nail nail jointly.
In another case, another type of operation indicating letter can be added in the Name area of communication window Breath.For example in the communication window shown in Fig. 6, one mark can be shown on the right side of title " B ", it is another type of as this Operation prompt information;And in the communication window shown in Fig. 7, one mark can be shown on the right side of title " committee of the Ding Ding top classes in a kindergarten " Know, as the another type of operation prompt information.
Step 410, nail nail client 1, which sends encryption communication message to nail, follows closely server.
Step 412, encryption communication message is transmitted to the nail that user B uses and follows closely client 2 by nail nail server, at the same will plus Close communication message is stored in service end encrypting database.
In the present embodiment, third party's encryption/decryption module is carried by the third party for being different from enterprise instant communication application nail nail For " being different from " here should be understood to:What nail nail client 1 or other nail nail clients were provided by built-in third party SDK (Software Development Kit, Software tool kit), using the SDK as above-mentioned third party's encryption and decryption mould Block is used, to realize the encryption (and follow-up decryption processing) based on third party's encryption/decryption module, and this Between tripartite and enterprise instant communication application nail nail independently of each other, developer, nail nail client or the nail nail of nail are either followed closely Server, it can not understand encryption and decryption mechanism used by third party's encryption/decryption module.
So only above-mentioned third party's encryption/decryption module can realize decryption processing, and third party's encryption/decryption module Only it is configured in nail nail client, such as in the nail nail client 2 used as the user B to end communication side so that nail nail visitor Encryption communication message can be decrypted to obtain message content for family end 2, and provide to user B and checked.And followed closely for nail For server, it can only complete:On the one hand, encryption communication message is forwarded directly to end communication side, such as forwarded The nail used to user B follows closely client 2;On the other hand, encryption communication message is stored so that user A or user B is used During other electronic equipments, or by local data base 1, local data base 2 etc. surprisingly empty after, can pass through download nail nail service The encryption communication message stored in device, realize the recovery to history message and check.
And for third party:On the one hand, although third party understands the encryption and decryption mechanism of third party's encryption/decryption module, But encryption communication message is only transmitted between nail nail client and nail nail server so that third party can not obtain encryption communication Message, thus processing encryption communication message can not be decrypted;On the other hand, even if third party obtains encryption communication message, But third party and the encryption and decryption mechanism for not knowing about nail nail encryption/decryption module, thus can not decrypt to obtain in final message Hold, it is ensured that the Information Security of message content.
So encryption communication message is merely able to be got by the nail nail client for using end communication side, and pass through calling Processing is decrypted in third party's encryption/decryption module and nail nail encryption/decryption module, obtains final message content;And in addition without Method obtains the encryption communication message, even if also processing can not be decrypted to the encryption communication message after obtaining, is greatly lifted Information Security in communication process.
In the present embodiment, the communication process between nail nail client and nail nail server, such as nail client 1 is followed closely to nail Follow closely the process that server sends the process of encryption communication message, nail nail server sends encryption communication message to nail nail client 2 Deng, it can be transmitted by the encrypted tunnel based on security protocol, such as based on TLS (Transport Layer Security, secure transport layers) agreement privately owned encrypted tunnel, so that it is guaranteed that encryption communication message will not be by transmitting procedure The external world is stolen, and further improves communication security.
Step 414, processing is decrypted by third party's encryption/decryption module in nail nail client 2, obtains intermediate cryptographic data 2.Wherein, when decrypting process is smoothed out, the intermediate cryptographic data 2 should be consistent with above-mentioned intermediate decrypted data 1.
Step 416, processing is decrypted by following closely nail encryption/decryption module in nail nail client 2, obtains message content.
In the present embodiment, step 414-416 execution sequence is consistent with step 406-408 execution sequence, depends on In encryption or the decryption order being pre-configured with, here is omitted.
Step 418, message content is stored in local cipher database by nail nail client 2.
In the present embodiment, local cipher database can be local data base 2 shown in Fig. 5 etc..The local data base 2 It is similar with above-mentioned local data base 1, by the way that communication message is stored in local data base 2 with clear-text way, in order to prop up Hold user B retrieval behavior.
Step 420, nail follows closely client 2 to user's B output message contents.
In the present embodiment, in the communication window of nail nail client 2 as shown in Figure 8, with the communication window shown in Fig. 7 Similar, it again may be by showing that such as " message in this chat will be encrypted by third party, common by the close shields of XX and nail nail Cryptographic services ... are provided " etc. prompt text, on the right side of title " committee of the Ding Ding top classes in a kindergarten " modes such as one mark can be shown, to right The user B of end communication side is prompted, and it is understood Current communications and is under security context.
Further, it is also possible to another type is shown corresponding in the entrance area of communication window in the messaging list page Operation prompt information;Such as Fig. 9 shows the messaging list page corresponding to nail nail client 2, in communication window " the Ding Ding top classes in a kindergarten Committee ", " C " etc. entrance area in, such as on the right side of title " committee of the Ding Ding top classes in a kindergarten ", " C " etc., a mark can be shown, with work For the operation prompt information of another type.
In the present embodiment, user A, user B (or this end communication side in other communication process with to end communication side) exist Download and after pilot nail nail client, can obtain the application permission to built-in nail nail encryption/decryption module;And for the 3rd The application permission of square encryption/decryption module, it is understood that there may be a variety of situations:
In one case, user A, user B or other any users are after download and pilot nail nail client, can be with The application permission to third party's encryption/decryption module is obtained, so as to realize the multi-enciphering scheme of the application.
In another case, user A, user B can be configured to third party after download and pilot nail nail client The application permission of encryption/decryption module, and and it is non-automatic acquisition the application permission.For example, when user A, user B belong to same group When " AA companies ", the keeper of the group can be configured by for example " XX by all administration pages as shown in Figure 10 for the group Third party's encryption/decryption module that close shield " provides.
Wherein, keeper can be application of member of community's configuration to third party's encryption/decryption module under group " AA companies " Authority.Such as keeper can set the page by the chat shown in Figure 11, configure the user A to third party's encryption/decryption module " message third party encryption " option in application permission, such as Figure 11 is shown as " not opening ", show user A now be not present pair The application permission of third party's encryption/decryption module.Similarly, keeper can also be that other members of community such as user B are configured, Here is omitted.
Keeper can also be application permission of the group's configuration under group " AA companies " to third party's encryption/decryption module.Example As keeper can configure the group " committee of the Ding Ding top classes in a kindergarten " to third party's encryption/decryption module by group's setting page shown in Figure 12 Application permission, such as " message third party encryption " option in Figure 12 is shown as " having turned on ", shows " the Ding Ding top classes in a kindergarten of group Committee " has to the application permission of third party's encryption/decryption module, all communication messages via the group " committee of the Ding Ding top classes in a kindergarten " transmission, Safe transmission is carried out using the multi-enciphering scheme applied substantially.
Certainly, keeper can also carry out rights management by other dimensions, and the application is limited not to this.Example Such as, the communication message that can be directed to some types such as picture, video, file assigns authority so that the communication message of these types Force to carry out communication transfer using the multi-enciphering scheme based on the application, and for the other kinds of communication message such as word then Authority is not assigned, communication biography can be carried out only with the encipherment scheme (such as only using built-in encryption/decryption module) in correlation technique It is defeated.For another example the organizational structure information of group can be combined, only for the portions such as " manager's room " in group, " development department " Door assigns application permission so that the group employee of these departments forces to be led to using the multi-enciphering scheme based on the application News, and the group employee of other departments does not assign authority then.
Figure 13 shows the schematic configuration diagram of the electronic equipment of the exemplary embodiment according to the application.It refer to figure 13, in hardware view, the electronic equipment include processor 1302, internal bus 1304, network interface 1306, internal memory 1308 and Nonvolatile memory 1310, the hardware being also possible that certainly required for other business.Processor 1302 is deposited from non-volatile Computer program corresponding to reading into internal memory 1302 and then is run in reservoir 1310, is formed on logic level and is added based on multiple Close massage transmission device.Certainly, in addition to software realization mode, the application is not precluded from other implementations, for example patrols Collect mode of device or software and hardware combining etc., that is to say, that the executive agent of following handling process is not limited to each patrol Collect unit or hardware or logical device.
Figure 14 is refer to, in Software Implementation, being somebody's turn to do the massage transmission device based on multi-enciphering can include obtaining Unit 1402, ciphering unit 1404 and transmitting element 1406.Wherein:
Acquiring unit 1402, obtain in the message that this end communication side generates in the local terminal client of default communication applications Hold;
Ciphering unit 1404, by the built-in encryption/decryption module and third party's encryption/decryption module in the local terminal client, Multi-enciphering is carried out to the message content according to predefined encryption order, obtains encryption communication message;Wherein, it is described built-in Encryption/decryption module is provided by the default communication applications, third party's encryption/decryption module is by being different from the default communication applications Third party provide;
Transmitting element 1406, the encryption communication message is sent to server corresponding to the default communication applications, and The default communication applications are forwarded to the opposite end client provided end communication side from the server, wherein the opposite end is objective Family end by comprising the built-in encryption/decryption module and third party's encryption/decryption module the encryption communication message is carried out Decryption obtains the message content.
Optionally, in addition to:
Tip element 1408, by least one of following manner, shown in the local terminal client on described more The operation prompt information of re-encryption:
It is used to send in the communication window of the encryption communication message in the local terminal client, the first kind is shown Operation prompt information;
Corresponding in the entrance area of the communication window in the messaging list page of the local terminal client, the is shown The operation prompt information of two types;
In the Name area of the communication window, the operation prompt information of the 3rd type is added.
Optionally, described end communication side belongs to same group, described end communication side and institute to end communication side with described State to end communication side by the administrator configurations of the group as with the application permission operated to the multi-enciphering.
Optionally, described end communication side belongs to same group to end communication side with described, and the keeper of the group is The group is configured with the application permission to multi-enciphering operation;Wherein, the encryption communication message is led to by the local terminal News side is sent to described to end communication side by group chat window corresponding to the group.
Optionally, in addition to:
Memory cell 1410, the local that the message content is stored in the local terminal client establishment with clear-text way add In ciphertext data storehouse.
Figure 15 shows the schematic configuration diagram of the electronic equipment of the exemplary embodiment according to the application.It refer to figure 15, in hardware view, the electronic equipment include processor 1502, internal bus 1504, network interface 1506, internal memory 1508 and Nonvolatile memory 1510, the hardware being also possible that certainly required for other business.Processor 1502 is deposited from non-volatile Computer program corresponding to reading into internal memory 1502 and then is run in reservoir 1510, is formed on logic level and is added based on multiple Close massage transmission device.Certainly, in addition to software realization mode, the application is not precluded from other implementations, for example patrols Collect mode of device or software and hardware combining etc., that is to say, that the executive agent of following handling process is not limited to each patrol Collect unit or hardware or logical device.
Figure 16 is refer to, in Software Implementation, being somebody's turn to do the massage transmission device based on multi-enciphering can include receiving Unit 1602, decryption unit 1604 and output unit 1606.Wherein:
Receiving unit 1602, this end communication side receive encryption communication in the local terminal client of default communication applications and disappeared Breath, the encryption communication message is from the default communication applications to the opposite end client provided end communication side;Wherein, it is described Opposite end client by comprising built-in encryption/decryption module and third party's encryption/decryption module carry out it is a variety of encryption obtain the encryption Communication message;
Decryption unit 1604, the built-in encryption/decryption module and the third party included by the local terminal client add Deciphering module, the encryption communication message is decrypted successively according to predefined decryption order, obtains message content;Its In, the built-in encryption/decryption module is provided by the default communication applications, third party's encryption/decryption module is described by being different from The third party of default communication applications provides;
Output unit 1606, the message content is exported to described end communication side.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net Network interface and internal memory.
Internal memory may include computer-readable medium in volatile memory, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM).Internal memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moved State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM), Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus Or any other non-transmission medium, the information that can be accessed by a computing device available for storage.Define, calculate according to herein Machine computer-readable recording medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, term " comprising ", "comprising" or its any other variant are intended to nonexcludability Comprising so that process, method, commodity or equipment including a series of elements not only include those key elements, but also wrapping Include the other element being not expressly set out, or also include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that wanted including described Other identical element also be present in the process of element, method, commodity or equipment.
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the application.On the contrary, they be only with it is such as appended The example of the consistent apparatus and method of some aspects be described in detail in claims, the application.
It is only merely for the purpose of description specific embodiment in term used in this application, and is not intended to be limiting the application. " one kind " of singulative used in the application and appended claims, " described " and "the" are also intended to including majority Form, unless context clearly shows that other implications.It is also understood that term "and/or" used herein refers to and wrapped Containing the associated list items purpose of one or more, any or all may be combined.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the application A little information should not necessarily be limited by these terms.These terms are only used for same type of information being distinguished from each other out.For example, do not departing from In the case of the application scope, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as One information.Depending on linguistic context, word as used in this " if " can be construed to " ... when " or " when ... When " or " in response to determining ".
The preferred embodiment of the application is the foregoing is only, not limiting the application, all essences in the application God any modification, equivalent substitution and improvements done etc., should be included within the scope of the application protection with principle.

Claims (12)

  1. A kind of 1. method for message transmission based on multi-enciphering, it is characterised in that including:
    Obtain the message content that this end communication side generates in the local terminal client of default communication applications;
    It is suitable according to predefined encryption by the built-in encryption/decryption module and third party's encryption/decryption module in the local terminal client Message content described in ordered pair carries out multi-enciphering, obtains encryption communication message;Wherein, the built-in encryption/decryption module is by described pre- If communication applications are provided, third party's encryption/decryption module is provided by the third party for being different from the default communication applications;
    The encryption communication message is sent to server corresponding to the default communication applications, and is forwarded to by the server The default communication applications are to the opposite end client provided end communication side, wherein the opposite end client passes through comprising described in Built-in encryption/decryption module and third party's encryption/decryption module are decrypted to obtain in the message to the encryption communication message Hold.
  2. 2. according to the method for claim 1, it is characterised in that also include:By at least one of following manner, described Operation prompt information on the multi-enciphering is shown in local terminal client:
    It is used to send in the communication window of the encryption communication message in the local terminal client, the operation of the first kind is shown Prompt message;
    Corresponding in the entrance area of the communication window in the messaging list page of the local terminal client, the second class is shown The operation prompt information of type;
    In the Name area of the communication window, the operation prompt information of the 3rd type is added.
  3. 3. according to the method for claim 1, it is characterised in that described end communication side belongs to same with described to end communication side One group, described end communication side with it is described to end communication side by the administrator configurations of the group be with to described multiple plus The application permission of close operation.
  4. 4. according to the method for claim 1, it is characterised in that described end communication side belongs to same with described to end communication side One group, the keeper of the group are configured with the application permission to multi-enciphering operation for the group;Wherein, it is described Encryption communication message group chat window as corresponding to described end communication side by the group is sent to described to end communication side.
  5. 5. according to the method for claim 1, it is characterised in that also include:
    The message content is stored in the local cipher database that the local terminal client creates with clear-text way.
  6. A kind of 6. method for message transmission based on multi-enciphering, it is characterised in that including:
    This end communication side receives encryption communication message, the encryption communication message in the local terminal client of default communication applications From the default communication applications to the opposite end client provided end communication side;Wherein, the opposite end client by comprising Built-in encryption/decryption module and third party's encryption/decryption module carry out it is a variety of encryption obtain the encryption communication message;
    The built-in encryption/decryption module and third party's encryption/decryption module included by the local terminal client, according to predetermined The decryption order of justice is decrypted successively to the encryption communication message, obtains message content;Wherein, the built-in encryption and decryption mould Block is provided by the default communication applications, third party's encryption/decryption module is by being different from the third parties of the default communication applications There is provided;
    The message content is exported to described end communication side.
  7. A kind of 7. massage transmission device based on multi-enciphering, it is characterised in that including:
    Acquiring unit, obtain the message content that this end communication side generates in the local terminal client of default communication applications;
    Ciphering unit, by the built-in encryption/decryption module and third party's encryption/decryption module in the local terminal client, according to predetermined The encryption order of justice carries out multi-enciphering to the message content, obtains encryption communication message;Wherein, the built-in encryption and decryption mould Block is provided by the default communication applications, third party's encryption/decryption module is by being different from the third parties of the default communication applications There is provided;
    Transmitting element, the encryption communication message is sent to server corresponding to the default communication applications, and by the clothes Business device is forwarded to the default communication applications to the opposite end client provided end communication side, wherein the opposite end client passes through Comprising the built-in encryption/decryption module and third party's encryption/decryption module the encryption communication message is decrypted to obtain The message content.
  8. 8. device according to claim 7, it is characterised in that also include:
    Tip element, by least one of following manner, shown in the local terminal client on the multi-enciphering Operation prompt information:
    It is used to send in the communication window of the encryption communication message in the local terminal client, the operation of the first kind is shown Prompt message;
    Corresponding in the entrance area of the communication window in the messaging list page of the local terminal client, the second class is shown The operation prompt information of type;
    In the Name area of the communication window, the operation prompt information of the 3rd type is added.
  9. 9. device according to claim 7, it is characterised in that described end communication side belongs to same with described to end communication side One group, described end communication side with it is described to end communication side by the administrator configurations of the group be with to described multiple plus The application permission of close operation.
  10. 10. device according to claim 7, it is characterised in that described end communication side belongs to described to end communication side Same group, the keeper of the group are configured with the application permission to multi-enciphering operation for the group;Wherein, institute Encryption communication message group chat window as corresponding to described end communication side by the group is stated to send to described to end communication side.
  11. 11. device according to claim 7, it is characterised in that also include:
    Memory cell, the message content is stored in the local cipher database of the local terminal client establishment with clear-text way In.
  12. A kind of 12. massage transmission device based on multi-enciphering, it is characterised in that including:
    Receiving unit, this end communication side receives encryption communication message in the local terminal client of default communication applications, described to add Close communication message is from the default communication applications to the opposite end client provided end communication side;Wherein, the opposite end client End by comprising built-in encryption/decryption module and third party's encryption/decryption module carry out it is a variety of encryption obtain the encryption communication message;
    Decryption unit, the built-in encryption/decryption module included by the local terminal client and third party's encryption and decryption mould Block, the encryption communication message is decrypted successively according to predefined decryption order, obtains message content;Wherein, it is described Built-in encryption/decryption module is provided by the default communication applications, third party's encryption/decryption module is by being different from the default communication The third party of application provides;
    Output unit, the message content is exported to described end communication side.
CN201610665182.3A 2016-08-12 2016-08-12 Message transmission method and device based on multiple encryption Active CN107733841B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610665182.3A CN107733841B (en) 2016-08-12 2016-08-12 Message transmission method and device based on multiple encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610665182.3A CN107733841B (en) 2016-08-12 2016-08-12 Message transmission method and device based on multiple encryption

Publications (2)

Publication Number Publication Date
CN107733841A true CN107733841A (en) 2018-02-23
CN107733841B CN107733841B (en) 2021-01-26

Family

ID=61201462

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610665182.3A Active CN107733841B (en) 2016-08-12 2016-08-12 Message transmission method and device based on multiple encryption

Country Status (1)

Country Link
CN (1) CN107733841B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111368271A (en) * 2020-03-10 2020-07-03 山东汇贸电子口岸有限公司 Method and system for realizing password management based on multiple encryption
CN114978564A (en) * 2021-04-20 2022-08-30 中移互联网有限公司 Data transmission method and device based on multiple encryption
CN116112458A (en) * 2023-02-09 2023-05-12 网易(杭州)网络有限公司 Communication method, device, equipment and storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101141243A (en) * 2006-09-08 2008-03-12 飞塔信息科技(北京)有限公司 Device and method for carrying out security check and content filtering on communication data
CN103152362A (en) * 2013-03-28 2013-06-12 胡祥义 Cloud-computing-based encrypted transmission method for large data files
CN103179114A (en) * 2013-03-15 2013-06-26 华中科技大学 Fine-grained access control method for data in cloud storage
CN103258168A (en) * 2012-02-17 2013-08-21 西门子公司 Encryption system and encryption method for programmable logic controller (PLC)
US8713311B1 (en) * 2012-11-07 2014-04-29 Google Inc. Encryption using alternate authentication key
CN104580086A (en) * 2013-10-17 2015-04-29 腾讯科技(深圳)有限公司 Information transmission method, client side, server and system
CN105007254A (en) * 2014-04-17 2015-10-28 腾讯科技(深圳)有限公司 Data transmission method and system, and terminal
CN105262772A (en) * 2015-11-06 2016-01-20 腾讯科技(深圳)有限公司 Data transmission method, data transmission system and related apparatus for data transmission method and system
CN105281907A (en) * 2014-07-11 2016-01-27 腾讯科技(深圳)有限公司 Encrypted data processing method and apparatus
CN105635144A (en) * 2015-12-29 2016-06-01 普奥云信息科技(北京)有限公司 Cloud-platform-server-based data processing method and system
CN105847261A (en) * 2016-03-29 2016-08-10 江苏翔晟信息技术股份有限公司 Bluetooth wireless encryption and decryption-based electronic signature method

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101141243A (en) * 2006-09-08 2008-03-12 飞塔信息科技(北京)有限公司 Device and method for carrying out security check and content filtering on communication data
CN103258168A (en) * 2012-02-17 2013-08-21 西门子公司 Encryption system and encryption method for programmable logic controller (PLC)
US8713311B1 (en) * 2012-11-07 2014-04-29 Google Inc. Encryption using alternate authentication key
CN103179114A (en) * 2013-03-15 2013-06-26 华中科技大学 Fine-grained access control method for data in cloud storage
CN103152362A (en) * 2013-03-28 2013-06-12 胡祥义 Cloud-computing-based encrypted transmission method for large data files
CN104580086A (en) * 2013-10-17 2015-04-29 腾讯科技(深圳)有限公司 Information transmission method, client side, server and system
CN105007254A (en) * 2014-04-17 2015-10-28 腾讯科技(深圳)有限公司 Data transmission method and system, and terminal
CN105281907A (en) * 2014-07-11 2016-01-27 腾讯科技(深圳)有限公司 Encrypted data processing method and apparatus
CN105262772A (en) * 2015-11-06 2016-01-20 腾讯科技(深圳)有限公司 Data transmission method, data transmission system and related apparatus for data transmission method and system
CN105635144A (en) * 2015-12-29 2016-06-01 普奥云信息科技(北京)有限公司 Cloud-platform-server-based data processing method and system
CN105847261A (en) * 2016-03-29 2016-08-10 江苏翔晟信息技术股份有限公司 Bluetooth wireless encryption and decryption-based electronic signature method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
于成刚: "《Web数据库的安全模型研究与应用》", 《中国硕士学位论文全文数据库 信息技术辑》 *
张恺悌: "《基于SET协议的网络电子支付系统的研究》", 《中国硕士学位论文全文数据库 信息技术辑》 *
邹彬: "《基于RSA加密算法的电子奖券系统的研究与设计》", 《中国硕士学位论文全文数据库 信息技术辑》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111368271A (en) * 2020-03-10 2020-07-03 山东汇贸电子口岸有限公司 Method and system for realizing password management based on multiple encryption
CN114978564A (en) * 2021-04-20 2022-08-30 中移互联网有限公司 Data transmission method and device based on multiple encryption
CN114978564B (en) * 2021-04-20 2023-07-14 中移互联网有限公司 Data transmission method and device based on multiple encryption
CN116112458A (en) * 2023-02-09 2023-05-12 网易(杭州)网络有限公司 Communication method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN107733841B (en) 2021-01-26

Similar Documents

Publication Publication Date Title
US11973860B1 (en) Systems and methods for encryption and provision of information security using platform services
US9619659B1 (en) Systems and methods for providing information security using context-based keys
CN107026824B (en) A kind of message encryption, decryption method and device
US8806200B2 (en) Method and system for securing electronic data
CN106650482A (en) Electronic file encryption method and device, electronic file decryption method and device and electronic file encryption and decryption system
CN101083524A (en) Method and system for encrypting and deciphering E-mail
CN106992851A (en) TrustZone-based database file password encryption and decryption method and device and terminal equipment
US20200145389A1 (en) Controlling Access to Data
Hemalatha et al. A comparative analysis of encryption techniques and data security issues in cloud computing
Daniel et al. A computer security system for cloud computing based on encryption technique
CN107733841A (en) Method for message transmission and device based on multi-enciphering
CN104601820A (en) Mobile terminal information protection method based on TF password card
CN101106451B (en) A data transmission method and device
CN108494724A (en) Cloud storage encryption system based on more authorized organization's encryption attribute algorithms and method
US11997191B2 (en) System and method for protecting secret data items using multiple tiers of encryption and secure element
Kaur et al. A Comparative Review on Data Security Challenges in Cloud Computing
US8601603B1 (en) Secure information transmission over a network
US11483136B2 (en) Wrapped keys with access control predicates
Malik et al. Cloud computing security improvement using Diffie Hellman and AES
CN102647428A (en) Encrypting and decrypting system and method adopting trusteeship control based on communication network
US20150089217A1 (en) Method and System for Data Protection
Adkinson-Orellana et al. Sharing secure documents in the cloud-a secure layer for Google Docs
Abur et al. Privacy protection and collusion avoidance solution for cloud computing users
US11683159B2 (en) Hybrid content protection architecture
WO2021129681A1 (en) Scheduling method and apparatus, and medium and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1251369

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant