CN108833083A - One kind being based on time and space communications content transmission method - Google Patents
One kind being based on time and space communications content transmission method Download PDFInfo
- Publication number
- CN108833083A CN108833083A CN201810675519.8A CN201810675519A CN108833083A CN 108833083 A CN108833083 A CN 108833083A CN 201810675519 A CN201810675519 A CN 201810675519A CN 108833083 A CN108833083 A CN 108833083A
- Authority
- CN
- China
- Prior art keywords
- casually
- time
- letter
- read
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses one kind in field of information transmission to be based on time and space communications content transmission method, includes the following steps:Edit mail;Letter time conditions are read in setting;Letter steric requirements is read in setting;It reads and casually enables condition:Password is arranged to mail in sender, and is encrypted using the irreversible encryption mode of MD5, and addressee is received to after mail, it is necessary to input correct password, can open mail;Time, space, content and the password chain of rings encrypt;A chain of decryption time, space, content are casually enabled according to readding:When readding for addressee's input casually enables readding for the sender stored in comparison database casually enable, the reversible decryption for carrying out time, space, content is casually enabled after exact matching further according to readding before irreversible encryption, judge again addressee whether meet read the letter time, read the condition in letter space after show communications content, the present invention improves the safety of mail delivery process, confidentiality, can be used in information transmission.
Description
Technical field
The present invention relates to a kind of mail encryption methods, in particular to a kind of to be based on time and space communications content transmission side
Method.
Background technique
Information-technology age is arrived, and instant communicating system is increasingly various, powerful;But in instant messaging for user
The safety and secret protection of the mail and chat content that are transmitted do not obtain enough attention, the user of most communication system
Secret protection and communication security also all only rest on user account number level, for the safety of data in the transmission itself and reliably
Property be not affected by attention always, once the account number of user is stolen, that is, face the personal secrets problem such as leakage of information;At this point, data pass
Defeated safety and reliability becomes the important method of protection privacy of user;Binding time and space, and in data structure and
Transportation level carries out rigorous Encryption Algorithm, is the important method for realizing this target.
Summary of the invention
The object of the present invention is to provide one kind to be based on time and space communications content transmission method, realizes that communications content is passing
Holding in close confidence during defeated reaches the characteristic of data transmission, the anti-modification in storing process and strong impact resistant, final to realize
Secret protection to user information safety.
The object of the present invention is achieved like this:One kind being based on time and space communications content transmission method, including following
Step:
S1 edits mail:Sender according to the word content of self-demand editor's mail, can uploading pictures, background sound may be selected
It is happy;
S2 reads letter time conditions:The time of mail opening is arranged in sender according to demand, and addressee is only at defined time point
Mail can be just opened afterwards;
S3 reads letter steric requirements:The spatial position of mail opening is arranged in sender according to demand, and addressee must be in regulation space
Position can just open mail;
S4, which is read, casually enables condition:Password is arranged to mail in sender, and is encrypted using the irreversible encryption mode of MD5, receives
Part people is received to after mail, it is necessary to input correct password, can open mail;
S5 time, space, content and the password chain of rings encrypt:After sender has edited communications content and reading condition, according to outbox
Readding for people's setting casually enables, and system will read letter time conditions and store according to casually order progress DES reversible encryption is read into database;
System will read letter steric requirements and store according to casually order progress DES reversible encryption is read into database;System is by the content of mail
Progress DES reversible encryption is casually enabled to store into database according to readding;It reads casually to enable and be additionally stored in server in itself;
S6 casually enables a chain of decryption time, space, content according to readding:When readding for addressee's input casually enables MD5 irreversible encryption
The data of the sender stored in data comparison database afterwards read after casually enabling MD5 irreversible encryption, after exact matching again
The reversible decryption for carrying out time, space, content is casually enabled according to readding before irreversible encryption, then is judged whether addressee meets and read
The letter time shows communications content after readding the condition in letter space.
It is further limited as of the invention, S1 edits mail and is specially:
S11:Sender carries out the copy editor of communications content by input method, can be can choose in mail with uploading pictures
The background music of mail keeps the expression-form of communications content more diversified.
It is further limited as of the invention, S2 reads letter time conditions and is specially:
S21:The time of mail is opened, when not reaching specified time node, addressee can not open mail and check content, with clothes
It is engaged in subject to the device time, to guarantee that the time reference standard of sender and addressee are consistent.
It is further limited as of the invention, S3 reads letter steric requirements and is specially:
S31:The spatial position of addressee, addressee must carry out mail opening in the designated space place selected by mail, consult,
System addressee's space address is compared with mail address by LBS technological means, space encrypt apart from design error
Value can be set, and set error amount as 5-15M, if mail can be checked, letter otherwise can not be opened in regulation spatial dimension
Part.
It is further limited as of the invention, S4, which is read, casually enables the condition be specially:
S41:Password encryption is arranged to mail in sender, and addressee is received to after mail, it is necessary to input correct password, ability
Enough triggerings read letter time conditions, read letter steric requirements.
It is further limited as of the invention, S5 time, space, content and the password chain of rings are encrypted as:
S51:Password encryption, system carry out cryptographic calculation to the casually order of readding that sender is arranged using the Encryption Algorithm of MD5, should add
Close algorithm belongs to irreversible encryption;
S52:Read letter time conditions encryption, system according to read casually enable using des encryption algorithm to read letter time conditions carry out can
Reverse encryption carries out storage safeguard protection to letter time conditions are read;
S53:Read letter steric requirements encryption, system according to read casually enable using des encryption algorithm to read letter steric requirements carry out can
Reverse encryption carries out storage safeguard protection to letter steric requirements is read;
S54:Content-encrypt, system uses des encryption algorithm to carry out reversible encryption to communications content according to casually order is read, to mail
Content carries out storage safeguard protection.
It is further limited as of the invention, S6 is according to casually order chain of rings decryption time, space, content is read:
S61:Decryption relies on, and reads letter time conditions, reads the reversible decryption password of DES of letter steric requirements, communications content dependent on readding
Casually enable;And readding for system storage casually enables as the irreversible data of MD5;So only readding for addressee's input casually enables MD5
The data of the sender stored in irreversible comparing database read after casually enabling MD5 irreversible encryption, exact matching
The reversible decryption for carrying out time, space, content is casually enabled further according to readding before irreversible encryption afterwards;
S62:It after casually order is correctly read in addressee's input, then matches and reads letter time conditions, read letter steric requirements, can show letter
Part content.
Compared with prior art, the beneficial effects of the present invention are for the maximum protection of user data privacy;Even if service
Device, source code, the exposure of database whole will not reveal the communications content of user.
Detailed description of the invention
Fig. 1 is data encryption flow diagram in the present invention.
Fig. 2 is data deciphering flow diagram in the present invention.
Specific embodiment
The present invention will be further described combined with specific embodiments below.
By taking the whole process of mail transmitting as an example:Mail generates, mail encryption, mail delivery, mail decryption, and mail is looked into
It reads.
Sender passes through the main contents of editor editor mail, including text, image and sound;It is answering
With layer, sender can be by being arranged password, mail opening time, and mail is opened the elements such as space address and made by oneself to mail
Justice encryption;In data Layer, system using password in plain text as the communications content that key edits sender by des encryption algorithm into
Row cryptographic calculation carries out cryptographic calculation to the password that sender is arranged by MD5 irreversible encryption algorithm in plain text;Addressee receives
After mail, it is necessary to which the time specified in sender and space input correct password, the original contents of mail just can be in by system
In face of present addressee, the present invention has carried out effectively encryption to mail data and has calculated either in application layer or data Layer
Method, so that entire data transmission be made to become safe and reliable.
One kind as shown in Figs. 1-2 is based on time and space communications content transmission method, includes the following steps:
S1 edits mail:Sender carries out the copy editor of communications content by input method, can be with uploading pictures in mail, can
To select the background music of mail, keep the expression-form of communications content more diversified;
S2 reads letter time conditions:The time of mail opening is arranged in sender according to demand, when not reaching specified time node,
Addressee can not open mail and check content, be subject to server time, to guarantee the time of sender and addressee referring to mark
Standard is consistent;
S3 reads letter steric requirements:The spatial position of mail opening is arranged in sender according to demand, and addressee must be selected by the mail
Designated space place carry out mail opening, consult, system is by LBS technological means, by addressee's space address and mail
Location is compared, and being set apart from design error value for space encryption sets error amount as 5-15M, if in regulation space
In range, mail can be checked, otherwise can not open mail;
S4, which is read, casually enables condition:Password is arranged to mail in sender, and is encrypted using the irreversible encryption mode of MD5, receives
Part people is received to after mail, it is necessary to input correct password, can trigger and read letter time conditions, read letter steric requirements;
S5 time, space, content and the password chain of rings encrypt:After sender has edited communications content and reading condition, according to outbox
Readding for people's setting casually enables, and system will read letter time conditions and store according to casually order progress DES reversible encryption is read into database;
System will read letter steric requirements and store according to casually order progress DES reversible encryption is read into database;System is by the content of mail
Progress DES reversible encryption is casually enabled to store into database according to readding;It reads casually to enable and be additionally stored in server in itself, specifically
Including:
S51:Password encryption, system carry out cryptographic calculation to the casually order of readding that sender is arranged using the Encryption Algorithm of MD5, should add
Close algorithm belongs to irreversible encryption;
S52:Read letter time conditions encryption, system according to read casually enable using des encryption algorithm to read letter time conditions carry out can
Reverse encryption carries out storage safeguard protection to letter time conditions are read;
S53:Read letter steric requirements encryption, system according to read casually enable using des encryption algorithm to read letter steric requirements carry out can
Reverse encryption carries out storage safeguard protection to letter steric requirements is read;
S54:Content-encrypt, system uses des encryption algorithm to carry out reversible encryption to communications content according to casually order is read, to mail
Content carries out storage safeguard protection;
S6 casually enables a chain of decryption time, space, content according to readding:When readding for addressee's input casually enables MD5 irreversible encryption
The data of the sender stored in data comparison database afterwards read after casually enabling MD5 irreversible encryption, after exact matching again
The reversible decryption for carrying out time, space, content is casually enabled according to readding before irreversible encryption, then is judged whether addressee meets and read
The letter time shows communications content after readding the condition in letter space;It specifically includes:
S61:Decryption relies on, and reads letter time conditions, reads the reversible decryption password of DES of letter steric requirements, communications content dependent on readding
Casually enable;And readding for system storage casually enables as the irreversible data of MD5;So only readding for addressee's input casually enables MD5
The data of the sender stored in irreversible comparing database read after casually enabling MD5 irreversible encryption, exact matching
The reversible decryption for carrying out time, space, content is casually enabled further according to readding before irreversible encryption afterwards;
S62:It after casually order is correctly read in addressee's input, then matches and reads letter time conditions, read letter steric requirements, can show letter
Part content.
The present invention is not limited to the above embodiments, on the basis of technical solution disclosed by the invention, the skill of this field
For art personnel according to disclosed technology contents, one can be made to some of which technical characteristic by not needing creative labor
A little replacements and deformation, these replacements and deformation are within the scope of the invention.
Claims (7)
1. one kind is based on time and space communications content transmission method, which is characterized in that include the following steps:
S1 edits mail:Sender according to the word content of self-demand editor's mail, can uploading pictures, background sound may be selected
It is happy;
S2 reads letter time conditions:The time of mail opening is arranged in sender according to demand, and addressee is only at defined time point
Mail can be just opened afterwards;
S3 reads letter steric requirements:The spatial position of mail opening is arranged in sender according to demand, and addressee must be in regulation space
Position can just open mail;
S4, which is read, casually enables condition:Password is arranged to mail in sender, and is encrypted using the irreversible encryption mode of MD5, receives
Part people is received to after mail, it is necessary to input correct password, can open mail;
S5 time, space, content and the password chain of rings encrypt:After sender has edited communications content and reading condition, according to outbox
Readding for people's setting casually enables, and system will read letter time conditions and store according to casually order progress DES reversible encryption is read into database;
System will read letter steric requirements and store according to casually order progress DES reversible encryption is read into database;System is by the content of mail
Progress DES reversible encryption is casually enabled to store into database according to readding;It reads casually to enable and be additionally stored in server in itself;
S6 casually enables a chain of decryption time, space, content according to readding:When readding for addressee's input casually enables MD5 irreversible encryption
The data of the sender stored in data comparison database afterwards read after casually enabling MD5 irreversible encryption, after exact matching again
The reversible decryption for carrying out time, space, content is casually enabled according to readding before irreversible encryption, then is judged whether addressee meets and read
The letter time shows communications content after readding the condition in letter space.
2. according to claim 1 a kind of based on time and space communications content transmission method, which is characterized in that S1 is edited
Mail is specially:
S11:Sender carries out the copy editor of communications content by input method, can be can choose in mail with uploading pictures
The background music of mail keeps the expression-form of communications content more diversified.
3. according to claim 1 a kind of based on time and space communications content transmission method, which is characterized in that S2 reads letter
Time conditions are specially:
S21:The time of mail is opened, when not reaching specified time node, addressee can not open mail and check content, with clothes
It is engaged in subject to the device time, to guarantee that the time reference standard of sender and addressee are consistent.
4. according to claim 1 a kind of based on time and space communications content transmission method, which is characterized in that S3 reads letter
Steric requirements is specially:
S31:The spatial position of addressee, addressee must carry out mail opening in the designated space place selected by mail, consult,
System addressee's space address is compared with mail address by LBS technological means, space encrypt apart from design error
Value can be set, and set error amount as 5-15M, if mail can be checked, letter otherwise can not be opened in regulation spatial dimension
Part.
5. according to claim 1 a kind of based on time and space communications content transmission method, which is characterized in that S4 reads letter
Password condition is specially:
S41:Password encryption is arranged to mail in sender, and addressee is received to after mail, it is necessary to input correct password, ability
Enough triggerings read letter time conditions, read letter steric requirements.
6. according to claim 1 a kind of based on time and space communications content transmission method, which is characterized in that when S5
Between, space, content and the password chain of rings be encrypted as:
S51:Password encryption, system carry out cryptographic calculation to the casually order of readding that sender is arranged using the Encryption Algorithm of MD5, should add
Close algorithm belongs to irreversible encryption;
S52:Read letter time conditions encryption, system according to read casually enable using des encryption algorithm to read letter time conditions carry out can
Reverse encryption carries out storage safeguard protection to letter time conditions are read;
S53:Read letter steric requirements encryption, system according to read casually enable using des encryption algorithm to read letter steric requirements carry out can
Reverse encryption carries out storage safeguard protection to letter steric requirements is read;
S54:Content-encrypt, system uses des encryption algorithm to carry out reversible encryption to communications content according to casually order is read, to mail
Content carries out storage safeguard protection.
A kind of be based on time and space communications content transmission method 7. according to claim 1, which is characterized in that S6 according to
Readding casually order chain of rings decryption time, space, content is:
S61:Decryption relies on, and reads letter time conditions, reads the reversible decryption password of DES of letter steric requirements, communications content dependent on readding
Casually enable;And readding for system storage casually enables as the irreversible data of MD5;So only readding for addressee's input casually enables MD5
The data of the sender stored in irreversible comparing database read after casually enabling MD5 irreversible encryption, exact matching
The reversible decryption for carrying out time, space, content is casually enabled further according to readding before irreversible encryption afterwards;
S62:It after casually order is correctly read in addressee's input, then matches and reads letter time conditions, read letter steric requirements, can show letter
Part content.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810675519.8A CN108833083A (en) | 2018-06-27 | 2018-06-27 | One kind being based on time and space communications content transmission method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810675519.8A CN108833083A (en) | 2018-06-27 | 2018-06-27 | One kind being based on time and space communications content transmission method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108833083A true CN108833083A (en) | 2018-11-16 |
Family
ID=64138899
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810675519.8A Pending CN108833083A (en) | 2018-06-27 | 2018-06-27 | One kind being based on time and space communications content transmission method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108833083A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110958173A (en) * | 2019-11-29 | 2020-04-03 | 腾讯科技(深圳)有限公司 | Mail sending method, device, equipment and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105101120A (en) * | 2014-05-19 | 2015-11-25 | 比亚迪股份有限公司 | Short message transmitting method, short message receiving method and devices |
CN106603388A (en) * | 2016-12-21 | 2017-04-26 | 北京奇虎科技有限公司 | Email sending method, email check method, email view control method and devices |
-
2018
- 2018-06-27 CN CN201810675519.8A patent/CN108833083A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105101120A (en) * | 2014-05-19 | 2015-11-25 | 比亚迪股份有限公司 | Short message transmitting method, short message receiving method and devices |
CN106603388A (en) * | 2016-12-21 | 2017-04-26 | 北京奇虎科技有限公司 | Email sending method, email check method, email view control method and devices |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110958173A (en) * | 2019-11-29 | 2020-04-03 | 腾讯科技(深圳)有限公司 | Mail sending method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20080019530A1 (en) | Message archival assurance for encrypted communications | |
US9325675B2 (en) | Secure delivery of files to authorized recipients | |
US11412385B2 (en) | Methods for a secure mobile text message and object sharing application and system | |
US20090164506A1 (en) | System and Method for Content-Based Email Authentication | |
US9015483B2 (en) | Method and system for secured data storage and sharing over cloud based network | |
JP5000658B2 (en) | Processing of protective electronic communication | |
TW595195B (en) | Network lock method and related apparatus by ciphered network lock and inerasable deciphering key | |
US20100169425A1 (en) | Electronic Mail Delivery System And Electronic Mail Delivery Program | |
US20170099269A1 (en) | Secure transmission system with upgraded encryption strength | |
CN101083524A (en) | Method and system for encrypting and deciphering E-mail | |
KR101625785B1 (en) | Method and device for information security management of mobile terminal, and mobile terminal | |
CN112615824B (en) | Anti-leakage one-time pad communication method and device | |
CN202872828U (en) | A circulation control system of files | |
KR20220039779A (en) | Enhanced security encryption and decryption system | |
CN102271332B (en) | End message time slot scrambling and device | |
CN108833083A (en) | One kind being based on time and space communications content transmission method | |
CN112333153A (en) | Method for sending safety management and alarm mail of login code and related equipment | |
WO2007055558A1 (en) | Integrated security mobile engines for mobile devices and resident data security | |
CN105897730A (en) | User name and password information encryption and verification method | |
US20170201376A1 (en) | Method for generating a digital signature | |
CN107665311A (en) | Authentication Client, encryption data access method and system | |
AU2020102234A4 (en) | A method to automatically encrypt attached documents on an email and email it to intended recipient. Encryption password is passed to the recipient separately, using different method. | |
WO2007037671A2 (en) | Integrated security mobile engines and novel mobile message for secure and trusted mobile messaging system | |
JP4140617B2 (en) | Authentication system using authentication recording medium and method of creating authentication recording medium | |
GB2540138A (en) | Method of exchanging digital content |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181116 |
|
RJ01 | Rejection of invention patent application after publication |