CN108833083A - One kind being based on time and space communications content transmission method - Google Patents

One kind being based on time and space communications content transmission method Download PDF

Info

Publication number
CN108833083A
CN108833083A CN201810675519.8A CN201810675519A CN108833083A CN 108833083 A CN108833083 A CN 108833083A CN 201810675519 A CN201810675519 A CN 201810675519A CN 108833083 A CN108833083 A CN 108833083A
Authority
CN
China
Prior art keywords
mail
casually
time
letter
read
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810675519.8A
Other languages
Chinese (zh)
Inventor
耿龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yangzhou Tian You Network Technology Co Ltd
Original Assignee
Yangzhou Tian You Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yangzhou Tian You Network Technology Co Ltd filed Critical Yangzhou Tian You Network Technology Co Ltd
Priority to CN201810675519.8A priority Critical patent/CN108833083A/en
Publication of CN108833083A publication Critical patent/CN108833083A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses one kind in field of information transmission to be based on time and space communications content transmission method, includes the following steps:Edit mail;Letter time conditions are read in setting;Letter steric requirements is read in setting;It reads and casually enables condition:Password is arranged to mail in sender, and is encrypted using the irreversible encryption mode of MD5, and addressee is received to after mail, it is necessary to input correct password, can open mail;Time, space, content and the password chain of rings encrypt;A chain of decryption time, space, content are casually enabled according to readding:When readding for addressee's input casually enables readding for the sender stored in comparison database casually enable, the reversible decryption for carrying out time, space, content is casually enabled after exact matching further according to readding before irreversible encryption, judge again addressee whether meet read the letter time, read the condition in letter space after show communications content, the present invention improves the safety of mail delivery process, confidentiality, can be used in information transmission.

Description

One kind being based on time and space communications content transmission method
Technical field
The present invention relates to a kind of mail encryption methods, in particular to a kind of to be based on time and space communications content transmission side Method.
Background technique
Information-technology age is arrived, and instant communicating system is increasingly various, powerful;But in instant messaging for user The safety and secret protection of the mail and chat content that are transmitted do not obtain enough attention, the user of most communication system Secret protection and communication security also all only rest on user account number level, for the safety of data in the transmission itself and reliably Property be not affected by attention always, once the account number of user is stolen, that is, face the personal secrets problem such as leakage of information;At this point, data pass Defeated safety and reliability becomes the important method of protection privacy of user;Binding time and space, and in data structure and Transportation level carries out rigorous Encryption Algorithm, is the important method for realizing this target.
Summary of the invention
The object of the present invention is to provide one kind to be based on time and space communications content transmission method, realizes that communications content is passing Holding in close confidence during defeated reaches the characteristic of data transmission, the anti-modification in storing process and strong impact resistant, final to realize Secret protection to user information safety.
The object of the present invention is achieved like this:One kind being based on time and space communications content transmission method, including following Step:
S1 edits mail:Sender according to the word content of self-demand editor's mail, can uploading pictures, background sound may be selected It is happy;
S2 reads letter time conditions:The time of mail opening is arranged in sender according to demand, and addressee is only at defined time point Mail can be just opened afterwards;
S3 reads letter steric requirements:The spatial position of mail opening is arranged in sender according to demand, and addressee must be in regulation space Position can just open mail;
S4, which is read, casually enables condition:Password is arranged to mail in sender, and is encrypted using the irreversible encryption mode of MD5, receives Part people is received to after mail, it is necessary to input correct password, can open mail;
S5 time, space, content and the password chain of rings encrypt:After sender has edited communications content and reading condition, according to outbox Readding for people's setting casually enables, and system will read letter time conditions and store according to casually order progress DES reversible encryption is read into database; System will read letter steric requirements and store according to casually order progress DES reversible encryption is read into database;System is by the content of mail Progress DES reversible encryption is casually enabled to store into database according to readding;It reads casually to enable and be additionally stored in server in itself;
S6 casually enables a chain of decryption time, space, content according to readding:When readding for addressee's input casually enables MD5 irreversible encryption The data of the sender stored in data comparison database afterwards read after casually enabling MD5 irreversible encryption, after exact matching again The reversible decryption for carrying out time, space, content is casually enabled according to readding before irreversible encryption, then is judged whether addressee meets and read The letter time shows communications content after readding the condition in letter space.
It is further limited as of the invention, S1 edits mail and is specially:
S11:Sender carries out the copy editor of communications content by input method, can be can choose in mail with uploading pictures The background music of mail keeps the expression-form of communications content more diversified.
It is further limited as of the invention, S2 reads letter time conditions and is specially:
S21:The time of mail is opened, when not reaching specified time node, addressee can not open mail and check content, with clothes It is engaged in subject to the device time, to guarantee that the time reference standard of sender and addressee are consistent.
It is further limited as of the invention, S3 reads letter steric requirements and is specially:
S31:The spatial position of addressee, addressee must carry out mail opening in the designated space place selected by mail, consult, System addressee's space address is compared with mail address by LBS technological means, space encrypt apart from design error Value can be set, and set error amount as 5-15M, if mail can be checked, letter otherwise can not be opened in regulation spatial dimension Part.
It is further limited as of the invention, S4, which is read, casually enables the condition be specially:
S41:Password encryption is arranged to mail in sender, and addressee is received to after mail, it is necessary to input correct password, ability Enough triggerings read letter time conditions, read letter steric requirements.
It is further limited as of the invention, S5 time, space, content and the password chain of rings are encrypted as:
S51:Password encryption, system carry out cryptographic calculation to the casually order of readding that sender is arranged using the Encryption Algorithm of MD5, should add Close algorithm belongs to irreversible encryption;
S52:Read letter time conditions encryption, system according to read casually enable using des encryption algorithm to read letter time conditions carry out can Reverse encryption carries out storage safeguard protection to letter time conditions are read;
S53:Read letter steric requirements encryption, system according to read casually enable using des encryption algorithm to read letter steric requirements carry out can Reverse encryption carries out storage safeguard protection to letter steric requirements is read;
S54:Content-encrypt, system uses des encryption algorithm to carry out reversible encryption to communications content according to casually order is read, to mail Content carries out storage safeguard protection.
It is further limited as of the invention, S6 is according to casually order chain of rings decryption time, space, content is read:
S61:Decryption relies on, and reads letter time conditions, reads the reversible decryption password of DES of letter steric requirements, communications content dependent on readding Casually enable;And readding for system storage casually enables as the irreversible data of MD5;So only readding for addressee's input casually enables MD5 The data of the sender stored in irreversible comparing database read after casually enabling MD5 irreversible encryption, exact matching The reversible decryption for carrying out time, space, content is casually enabled further according to readding before irreversible encryption afterwards;
S62:It after casually order is correctly read in addressee's input, then matches and reads letter time conditions, read letter steric requirements, can show letter Part content.
Compared with prior art, the beneficial effects of the present invention are for the maximum protection of user data privacy;Even if service Device, source code, the exposure of database whole will not reveal the communications content of user.
Detailed description of the invention
Fig. 1 is data encryption flow diagram in the present invention.
Fig. 2 is data deciphering flow diagram in the present invention.
Specific embodiment
The present invention will be further described combined with specific embodiments below.
By taking the whole process of mail transmitting as an example:Mail generates, mail encryption, mail delivery, mail decryption, and mail is looked into It reads.
Sender passes through the main contents of editor editor mail, including text, image and sound;It is answering With layer, sender can be by being arranged password, mail opening time, and mail is opened the elements such as space address and made by oneself to mail Justice encryption;In data Layer, system using password in plain text as the communications content that key edits sender by des encryption algorithm into Row cryptographic calculation carries out cryptographic calculation to the password that sender is arranged by MD5 irreversible encryption algorithm in plain text;Addressee receives After mail, it is necessary to which the time specified in sender and space input correct password, the original contents of mail just can be in by system In face of present addressee, the present invention has carried out effectively encryption to mail data and has calculated either in application layer or data Layer Method, so that entire data transmission be made to become safe and reliable.
One kind as shown in Figs. 1-2 is based on time and space communications content transmission method, includes the following steps:
S1 edits mail:Sender carries out the copy editor of communications content by input method, can be with uploading pictures in mail, can To select the background music of mail, keep the expression-form of communications content more diversified;
S2 reads letter time conditions:The time of mail opening is arranged in sender according to demand, when not reaching specified time node, Addressee can not open mail and check content, be subject to server time, to guarantee the time of sender and addressee referring to mark Standard is consistent;
S3 reads letter steric requirements:The spatial position of mail opening is arranged in sender according to demand, and addressee must be selected by the mail Designated space place carry out mail opening, consult, system is by LBS technological means, by addressee's space address and mail Location is compared, and being set apart from design error value for space encryption sets error amount as 5-15M, if in regulation space In range, mail can be checked, otherwise can not open mail;
S4, which is read, casually enables condition:Password is arranged to mail in sender, and is encrypted using the irreversible encryption mode of MD5, receives Part people is received to after mail, it is necessary to input correct password, can trigger and read letter time conditions, read letter steric requirements;
S5 time, space, content and the password chain of rings encrypt:After sender has edited communications content and reading condition, according to outbox Readding for people's setting casually enables, and system will read letter time conditions and store according to casually order progress DES reversible encryption is read into database; System will read letter steric requirements and store according to casually order progress DES reversible encryption is read into database;System is by the content of mail Progress DES reversible encryption is casually enabled to store into database according to readding;It reads casually to enable and be additionally stored in server in itself, specifically Including:
S51:Password encryption, system carry out cryptographic calculation to the casually order of readding that sender is arranged using the Encryption Algorithm of MD5, should add Close algorithm belongs to irreversible encryption;
S52:Read letter time conditions encryption, system according to read casually enable using des encryption algorithm to read letter time conditions carry out can Reverse encryption carries out storage safeguard protection to letter time conditions are read;
S53:Read letter steric requirements encryption, system according to read casually enable using des encryption algorithm to read letter steric requirements carry out can Reverse encryption carries out storage safeguard protection to letter steric requirements is read;
S54:Content-encrypt, system uses des encryption algorithm to carry out reversible encryption to communications content according to casually order is read, to mail Content carries out storage safeguard protection;
S6 casually enables a chain of decryption time, space, content according to readding:When readding for addressee's input casually enables MD5 irreversible encryption The data of the sender stored in data comparison database afterwards read after casually enabling MD5 irreversible encryption, after exact matching again The reversible decryption for carrying out time, space, content is casually enabled according to readding before irreversible encryption, then is judged whether addressee meets and read The letter time shows communications content after readding the condition in letter space;It specifically includes:
S61:Decryption relies on, and reads letter time conditions, reads the reversible decryption password of DES of letter steric requirements, communications content dependent on readding Casually enable;And readding for system storage casually enables as the irreversible data of MD5;So only readding for addressee's input casually enables MD5 The data of the sender stored in irreversible comparing database read after casually enabling MD5 irreversible encryption, exact matching The reversible decryption for carrying out time, space, content is casually enabled further according to readding before irreversible encryption afterwards;
S62:It after casually order is correctly read in addressee's input, then matches and reads letter time conditions, read letter steric requirements, can show letter Part content.
The present invention is not limited to the above embodiments, on the basis of technical solution disclosed by the invention, the skill of this field For art personnel according to disclosed technology contents, one can be made to some of which technical characteristic by not needing creative labor A little replacements and deformation, these replacements and deformation are within the scope of the invention.

Claims (7)

1. one kind is based on time and space communications content transmission method, which is characterized in that include the following steps:
S1 edits mail:Sender according to the word content of self-demand editor's mail, can uploading pictures, background sound may be selected It is happy;
S2 reads letter time conditions:The time of mail opening is arranged in sender according to demand, and addressee is only at defined time point Mail can be just opened afterwards;
S3 reads letter steric requirements:The spatial position of mail opening is arranged in sender according to demand, and addressee must be in regulation space Position can just open mail;
S4, which is read, casually enables condition:Password is arranged to mail in sender, and is encrypted using the irreversible encryption mode of MD5, receives Part people is received to after mail, it is necessary to input correct password, can open mail;
S5 time, space, content and the password chain of rings encrypt:After sender has edited communications content and reading condition, according to outbox Readding for people's setting casually enables, and system will read letter time conditions and store according to casually order progress DES reversible encryption is read into database; System will read letter steric requirements and store according to casually order progress DES reversible encryption is read into database;System is by the content of mail Progress DES reversible encryption is casually enabled to store into database according to readding;It reads casually to enable and be additionally stored in server in itself;
S6 casually enables a chain of decryption time, space, content according to readding:When readding for addressee's input casually enables MD5 irreversible encryption The data of the sender stored in data comparison database afterwards read after casually enabling MD5 irreversible encryption, after exact matching again The reversible decryption for carrying out time, space, content is casually enabled according to readding before irreversible encryption, then is judged whether addressee meets and read The letter time shows communications content after readding the condition in letter space.
2. according to claim 1 a kind of based on time and space communications content transmission method, which is characterized in that S1 is edited Mail is specially:
S11:Sender carries out the copy editor of communications content by input method, can be can choose in mail with uploading pictures The background music of mail keeps the expression-form of communications content more diversified.
3. according to claim 1 a kind of based on time and space communications content transmission method, which is characterized in that S2 reads letter Time conditions are specially:
S21:The time of mail is opened, when not reaching specified time node, addressee can not open mail and check content, with clothes It is engaged in subject to the device time, to guarantee that the time reference standard of sender and addressee are consistent.
4. according to claim 1 a kind of based on time and space communications content transmission method, which is characterized in that S3 reads letter Steric requirements is specially:
S31:The spatial position of addressee, addressee must carry out mail opening in the designated space place selected by mail, consult, System addressee's space address is compared with mail address by LBS technological means, space encrypt apart from design error Value can be set, and set error amount as 5-15M, if mail can be checked, letter otherwise can not be opened in regulation spatial dimension Part.
5. according to claim 1 a kind of based on time and space communications content transmission method, which is characterized in that S4 reads letter Password condition is specially:
S41:Password encryption is arranged to mail in sender, and addressee is received to after mail, it is necessary to input correct password, ability Enough triggerings read letter time conditions, read letter steric requirements.
6. according to claim 1 a kind of based on time and space communications content transmission method, which is characterized in that when S5 Between, space, content and the password chain of rings be encrypted as:
S51:Password encryption, system carry out cryptographic calculation to the casually order of readding that sender is arranged using the Encryption Algorithm of MD5, should add Close algorithm belongs to irreversible encryption;
S52:Read letter time conditions encryption, system according to read casually enable using des encryption algorithm to read letter time conditions carry out can Reverse encryption carries out storage safeguard protection to letter time conditions are read;
S53:Read letter steric requirements encryption, system according to read casually enable using des encryption algorithm to read letter steric requirements carry out can Reverse encryption carries out storage safeguard protection to letter steric requirements is read;
S54:Content-encrypt, system uses des encryption algorithm to carry out reversible encryption to communications content according to casually order is read, to mail Content carries out storage safeguard protection.
A kind of be based on time and space communications content transmission method 7. according to claim 1, which is characterized in that S6 according to Readding casually order chain of rings decryption time, space, content is:
S61:Decryption relies on, and reads letter time conditions, reads the reversible decryption password of DES of letter steric requirements, communications content dependent on readding Casually enable;And readding for system storage casually enables as the irreversible data of MD5;So only readding for addressee's input casually enables MD5 The data of the sender stored in irreversible comparing database read after casually enabling MD5 irreversible encryption, exact matching The reversible decryption for carrying out time, space, content is casually enabled further according to readding before irreversible encryption afterwards;
S62:It after casually order is correctly read in addressee's input, then matches and reads letter time conditions, read letter steric requirements, can show letter Part content.
CN201810675519.8A 2018-06-27 2018-06-27 One kind being based on time and space communications content transmission method Pending CN108833083A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810675519.8A CN108833083A (en) 2018-06-27 2018-06-27 One kind being based on time and space communications content transmission method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810675519.8A CN108833083A (en) 2018-06-27 2018-06-27 One kind being based on time and space communications content transmission method

Publications (1)

Publication Number Publication Date
CN108833083A true CN108833083A (en) 2018-11-16

Family

ID=64138899

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810675519.8A Pending CN108833083A (en) 2018-06-27 2018-06-27 One kind being based on time and space communications content transmission method

Country Status (1)

Country Link
CN (1) CN108833083A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110958173A (en) * 2019-11-29 2020-04-03 腾讯科技(深圳)有限公司 Mail sending method, device, equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105101120A (en) * 2014-05-19 2015-11-25 比亚迪股份有限公司 Short message transmitting method, short message receiving method and devices
CN106603388A (en) * 2016-12-21 2017-04-26 北京奇虎科技有限公司 Email sending method, email check method, email view control method and devices

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105101120A (en) * 2014-05-19 2015-11-25 比亚迪股份有限公司 Short message transmitting method, short message receiving method and devices
CN106603388A (en) * 2016-12-21 2017-04-26 北京奇虎科技有限公司 Email sending method, email check method, email view control method and devices

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110958173A (en) * 2019-11-29 2020-04-03 腾讯科技(深圳)有限公司 Mail sending method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
US20080019530A1 (en) Message archival assurance for encrypted communications
US9325675B2 (en) Secure delivery of files to authorized recipients
US11412385B2 (en) Methods for a secure mobile text message and object sharing application and system
US20090164506A1 (en) System and Method for Content-Based Email Authentication
US9015483B2 (en) Method and system for secured data storage and sharing over cloud based network
JP5000658B2 (en) Processing of protective electronic communication
TW595195B (en) Network lock method and related apparatus by ciphered network lock and inerasable deciphering key
US20100169425A1 (en) Electronic Mail Delivery System And Electronic Mail Delivery Program
US20170099269A1 (en) Secure transmission system with upgraded encryption strength
CN101083524A (en) Method and system for encrypting and deciphering E-mail
KR101625785B1 (en) Method and device for information security management of mobile terminal, and mobile terminal
CN112615824B (en) Anti-leakage one-time pad communication method and device
CN202872828U (en) A circulation control system of files
KR20220039779A (en) Enhanced security encryption and decryption system
CN102271332B (en) End message time slot scrambling and device
CN108833083A (en) One kind being based on time and space communications content transmission method
CN112333153A (en) Method for sending safety management and alarm mail of login code and related equipment
WO2007055558A1 (en) Integrated security mobile engines for mobile devices and resident data security
CN105897730A (en) User name and password information encryption and verification method
US20170201376A1 (en) Method for generating a digital signature
CN107665311A (en) Authentication Client, encryption data access method and system
AU2020102234A4 (en) A method to automatically encrypt attached documents on an email and email it to intended recipient. Encryption password is passed to the recipient separately, using different method.
WO2007037671A2 (en) Integrated security mobile engines and novel mobile message for secure and trusted mobile messaging system
JP4140617B2 (en) Authentication system using authentication recording medium and method of creating authentication recording medium
GB2540138A (en) Method of exchanging digital content

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181116

RJ01 Rejection of invention patent application after publication