CN109274690A - Group's data ciphering method - Google Patents

Group's data ciphering method Download PDF

Info

Publication number
CN109274690A
CN109274690A CN201811326155.9A CN201811326155A CN109274690A CN 109274690 A CN109274690 A CN 109274690A CN 201811326155 A CN201811326155 A CN 201811326155A CN 109274690 A CN109274690 A CN 109274690A
Authority
CN
China
Prior art keywords
key
encryption
group
user
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811326155.9A
Other languages
Chinese (zh)
Inventor
韩炯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Blue Letter Mobile (beijing) Technology Co Ltd
Original Assignee
Blue Letter Mobile (beijing) Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Blue Letter Mobile (beijing) Technology Co Ltd filed Critical Blue Letter Mobile (beijing) Technology Co Ltd
Priority to CN201811326155.9A priority Critical patent/CN109274690A/en
Publication of CN109274690A publication Critical patent/CN109274690A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates

Abstract

The disclosure provides a population data ciphering method, comprising: multiple telecommunication customer ends generate group chat group by communication server, and group chat group has group identification;Multiple telecommunication customer ends receive the group identification from communication server;And Key Management server receives the group identification authorization relationship from communication server, group identification authorization relationship is the authorization relationship of the user account of each telecommunication customer end and the group identification in multiple telecommunication customer ends.

Description

Group's data ciphering method
Technical field
The disclosure belongs to field of communication technology more particularly to a population data ciphering method.
Background technique
In various communication systems, how to realize the protection of interactive information between user, guarantee Content of Communication safety and Secrecy needs emphasis to consider.Especially in mobile communication system, data are transmitted by communication server, communication garment There is the security risk obtain, check, revealing user's chat data in business device end.
In the prior art, multiple users can carry out data interaction by way of group chat group, chatting in these group chats group Day data equally faces issue noted above.
Summary of the invention
The disclosure is designed to provide a kind of new group's data ciphering method, come solve to mention in background above technology Technical problem.The disclosure is achieved through the following technical solutions.
Group's data ciphering method, comprising:
Multiple telecommunication customer ends generate group chat group by communication server, and group chat group has group identification;
Multiple telecommunication customer ends receive the group identification from communication server;And
Key Management server receives the group identification authorization relationship from communication server, and group identification authorization relationship is multiple The authorization relationship of the user account of each telecommunication customer end and group identification in telecommunication customer end.
According at least one embodiment of the disclosure, telecommunication customer end includes data module and encryption/decryption module, data Module receives and/or sends data, the data encryption that encryption/decryption module sends data module, encryption and decryption via communication server Module is to the received data deciphering of data module.
According at least one embodiment of the disclosure, the user key of each telecommunication customer end is by Key Management server It generates.
According at least one embodiment of the disclosure, the user key of each telecommunication customer end is by each telecommunication customer end Encryption/decryption module generate.
According at least one embodiment of the disclosure, Key Management server is that the data from telecommunication customer end generate Encryption key, and using the user key of the telecommunication customer end to encryption keys.
According at least one embodiment of the disclosure, Key Management server generates encryption key indices, and records and add The authorization relationship of close cipher key index and group identification.
According at least one embodiment of the disclosure, Key Management server includes user authentication module, user key Management module, encryption key management module and cryptographic service module;
User authentication module uses the user information of each telecommunication customer end, carries out user's checking to each telecommunication customer end It is bound with user account;
User key management module is managed the user key of each telecommunication customer end;
Encryption key management module creation encryption key;
Cryptographic service module encrypts encryption key using user key.
According at least one embodiment of the disclosure, user key includes public key and private key, and cryptographic service module uses Public key encrypts encryption key.
According at least one embodiment of the disclosure, the cryptographic service module of Key Management server generates encryption key Index, and the authorization relationship of recording of encrypted cipher key index and group identification.
According at least one embodiment of the disclosure, encryption/decryption module includes user authentication submodule, user key pipe Manage submodule, data encryption submodule and data deciphering submodule;
User authentication submodule completes user identity authentication using user account;
User key manages submodule and saves user key;
Data encryption submodule is decrypted encryption key using user key, then with encryption key to the number to be sent According to being encrypted;
Data deciphering submodule is decrypted encryption key using user key, then with encryption key to the number received According to being decrypted.
According at least one embodiment of the disclosure, user key includes public key and private key, and data encryption submodule makes It is decrypted with private key pair encryption key, then the data to be sent is encrypted with encryption key;Data deciphering submodule makes It is decrypted with private key pair encryption key, then the data received is decrypted with encryption key.
According at least one embodiment of the disclosure, group identification is group's account.
According at least one embodiment of the disclosure, communication server is instant communication server, and telecommunication customer end is Instant communication client.
Detailed description of the invention
Attached drawing shows the illustrative embodiments of the disclosure, and it is bright together for explaining the principles of this disclosure, Which includes these attached drawings to provide further understanding of the disclosure, and attached drawing is included in the description and constitutes this Part of specification.
Fig. 1 is the overall knot for the data encryption system that group's data ciphering method of the disclosure at least one embodiment uses Structure.
Fig. 2 is the specific knot for the data encryption system that group's data ciphering method of the disclosure at least one embodiment uses Structure.
Specific embodiment
The disclosure is described in further detail with embodiment with reference to the accompanying drawing.It is understood that this place The specific embodiment of description is only used for explaining related content, rather than the restriction to the disclosure.It also should be noted that being Convenient for description, part relevant to the disclosure is illustrated only in attached drawing.
It should be noted that in the absence of conflict, the feature in embodiment and embodiment in the disclosure can To be combined with each other.The disclosure is described in detail below with reference to the accompanying drawings and in conjunction with embodiment.
The data encryption system that group's data ciphering method that Fig. 1 shows the disclosure at least one embodiment uses it is total Body structure, Fig. 2 shows the tools for the data encryption system that group's data ciphering method of the disclosure at least one embodiment uses Body structure.
Group's data ciphering method, comprising:
Multiple telecommunication customer ends generate group chat group by communication server, and group chat group has group identification;
Multiple telecommunication customer ends receive the group identification from communication server;And
Key Management server receives the group identification authorization relationship from communication server, and group identification authorization relationship is multiple The authorization relationship of the user account of each telecommunication customer end and group identification in telecommunication customer end.
Wherein, group identification can be group account.Communication server is instant communication server, and telecommunication customer end is Instant Messenger Interrogate client.Telecommunication customer end may be mounted on such as mobile phone, personal computer, such as APP, and certain telecommunication customer end can also To be present on such as mobile phone, personal computer in the form of a web page.Data above-mentioned can be word message, sound text Part, picture file, video file etc..Communication server above-mentioned can be can be realized data communication in the prior art Communication server.Fig. 1 shows two telecommunication customer ends (i.e. two users) for participating in group chat.
In at least one embodiment of the disclosure, telecommunication customer end includes data module and encryption/decryption module, data mould Block receives and/or sends data, the data encryption that encryption/decryption module sends data module, encryption and decryption mould via communication server Block is to the received data deciphering of data module.
Each telecommunication customer end is unable to get the clear data of other telecommunication customer ends.
In at least one embodiment of the disclosure, the user key of each telecommunication customer end is given birth to by Key Management server At.
In at least one embodiment of the disclosure, the user key of each telecommunication customer end is by each telecommunication customer end Encryption/decryption module generates.
In at least one embodiment of the disclosure, Key Management server is that the data generation from telecommunication customer end adds Key, and using the user key of the telecommunication customer end to encryption keys.
In at least one embodiment of the disclosure, Key Management server generates encryption key indices, and recording of encrypted The authorization relationship of cipher key index and group identification.
In at least one embodiment of the disclosure, Key Management server includes user authentication module, user key pipe Manage module, encryption key management module and cryptographic service module;
User authentication module uses the user information of each telecommunication customer end, carries out user's checking to each telecommunication customer end It is bound with user account;
User key management module is managed the user key of each telecommunication customer end;
Encryption key management module creation encryption key;
Cryptographic service module encrypts encryption key using user key.
Wherein, user key includes public key and private key.Encryption key is preferably random key, passes through the user key factor And/or folk prescription or multi-party public key generate.The user key factor is based on user's unique identification and is generated by Key Management server, user Unique identification is generated by telecommunication customer end.
In at least one embodiment of the disclosure, the user key of each telecommunication customer end is given birth to by Key Management server At, user key management module generates the user key of each telecommunication customer end, to the user key of each telecommunication customer end into Row management, is sent to each telecommunication customer end for corresponding user key.
In at least one embodiment of the disclosure, the user key of each telecommunication customer end is by each telecommunication customer end End-to-end encryption/decryption module generates, and the user key management module of Key Management server is received from each telecommunication customer end User key is managed the user key of each telecommunication customer end.
In at least one embodiment of the disclosure, cryptographic service module encrypts encryption key using public key.
In at least one embodiment of the disclosure, the cryptographic service module of Key Management server generates encryption key rope Draw, and the authorization relationship of recording of encrypted cipher key index and group identification.
In at least one embodiment of the disclosure, encryption/decryption module includes user authentication submodule, user key management Submodule, data encryption submodule and data deciphering submodule;
User authentication submodule completes user identity authentication using user account;
User key manages submodule and saves user key;
Data encryption submodule is decrypted encryption key using user key, then with encryption key to the number to be sent According to being encrypted;
Data deciphering submodule is decrypted encryption key using user key, then with encryption key to the number received According to being decrypted.
In at least one embodiment of the disclosure, the user key of each telecommunication customer end is given birth to by Key Management server Receive the user key from Key Management server at the user key management submodule of, each telecommunication customer end, and to Family key is saved.
In at least one embodiment of the disclosure, the user key of each telecommunication customer end is by each telecommunication customer end End-to-end encryption/decryption module generates, and user key is generated by the user key management submodule of end-to-end encryption/decryption module, and will User key is sent to Key Management server.
In at least one embodiment of the disclosure, the user key of telecommunication customer end is added by the end-to-end of telecommunication customer end The user key management submodule of deciphering module generates, and user key includes public key and private key, and the end-to-end of telecommunication customer end adds The user key management submodule of deciphering module saves public key and private key, and public key is sent to cipher key management services The user key management module of device, Key Management server receives the public key from telecommunication customer end, to the public affairs of telecommunication customer end Key is managed (for example including saving).
In at least one embodiment of the disclosure, data encryption submodule is decrypted using private key pair encryption key, The data to be sent are encrypted with encryption key again;Data deciphering submodule is decrypted using private key pair encryption key, The data received are decrypted with encryption key again.
In at least one embodiment of the disclosure, the first user using the first telecommunication customer end create group chat group, first Telecommunication customer end sends creation group chat group request to communication server, and communication server is generated based on the request has group's account (group's account can be the unique identification of group chat group to group chat group;Group chat group can also include group's information, such as group's title), communication garment Group chat group with group's account is returned to the first telecommunication customer end by business device, and the first telecommunication customer end saves group chat group.
Other group members of communication server into group chat group such as the second telecommunication customer end (by second user use) hair It send and builds group's notice, the second telecommunication customer end preservation group chat group (or whether prompt is added using the second user of the second telecommunication customer end Enter and/or save group chat group), communication server sends group's account authorization relationship (i.e. each communication visitor to Key Management server The user account at family end and the corresponding relationship of group's account), Key Management server saves this group of account authorization relationships, as group chat group When interior group members change, which is sent to Key Management server, Key Management server pair by communication server Group's account authorization relationship is updated.
First user sends data in group (such as text information, picture, table by the first telecommunication customer end in group chat group Feelings, file etc.), the encryption/decryption module of the first telecommunication customer end i.e. the first encryption/decryption module is passed into the use of the first telecommunication customer end Family account, group's account and data content, the first encryption/decryption module, which is generated to Key Management server request based on group's account, to be added Key, Key Management server generates encryption key and encryption key indices, recording of encrypted cipher key index are awarded with group's account Power relationship.Key Management server using the first telecommunication customer end user account public key to encryption key generated above into Row encryption, is sent to the first encryption/decryption module for encrypted encryption key and encryption key indices, the first encryption/decryption module makes Be decrypted with the private key pair encryption key of the user account of the first telecommunication customer end, reuse encryption key to data content into Row encryption, is packaged into encrypted data volume.It include encryption key indices in encrypted data volume.
Encrypted data volume is transferred to the number of data module i.e. first of the first telecommunication customer end by the first encryption/decryption module According to module, the first data module issues encrypted data volume in group.
Second data module of the second telecommunication customer end receives the encrypted data volume in group, the second data module The encrypted data volume is sent to encryption/decryption module i.e. the second encryption/decryption module of second telecommunication customer end, second Encryption/decryption module sends the user account and encryption key rope of group's account, the second telecommunication customer end to Key Management server Draw, request inquires encryption key based on encryption key indices.
Key Management server is based on the group's account received, the user account and encryption key of the second telecommunication customer end Index checks group's account authorization relationship, and group's account authorization relationship is correct, then using the public affairs of the user account of the second telecommunication customer end Key encrypts encryption key, and encrypted encryption key is sent to the second encryption/decryption module.
Second encryption/decryption module is decrypted using the private key pair encryption key of the user account of the second telecommunication customer end, the Two encryption/decryption modules are decrypted data volume using the encryption key after decryption, and the data volume after decryption, that is, clear data is passed It is defeated by the user account of the second telecommunication customer end.
It will be understood by those of skill in the art that above embodiment is used for the purpose of clearly demonstrating the disclosure, and simultaneously Non- be defined to the scope of the present disclosure.For those skilled in the art, may be used also on the basis of disclosed above To make other variations or modification, and these variations or modification are still in the scope of the present disclosure.

Claims (10)

1. a population data ciphering method characterized by comprising
Multiple telecommunication customer ends generate group chat group by communication server, and the group chat group has group identification;
The multiple telecommunication customer end receives the group identification from communication server;And
Key Management server receives the group identification authorization relationship from communication server, and the group identification authorization relationship is described The authorization relationship of the user account of each telecommunication customer end and the group identification in multiple telecommunication customer ends.
2. according to claim 1 group of data ciphering methods, which is characterized in that the telecommunication customer end includes data module And encryption/decryption module, the data module receive and/or send data, the encryption/decryption module pair via the communication server The data encryption that the data module is sent, the encryption/decryption module is to the received data deciphering of the data module.
3. according to claim 1 or 2 group of data ciphering methods, which is characterized in that the user of each telecommunication customer end is close Key is generated by the Key Management server.
4. according to claim 2 group of data ciphering methods, which is characterized in that the user key of each telecommunication customer end by The encryption/decryption module of each telecommunication customer end generates.
5. according to claim 3 or 4 group of data ciphering methods, which is characterized in that the Key Management server is next Encryption key is generated from the data of telecommunication customer end, and using the user key of the telecommunication customer end to encryption keys.
6. according to claim 5 group of data ciphering methods, which is characterized in that the Key Management server generates encryption Cipher key index, and the authorization relationship of recording of encrypted cipher key index and group identification.
7. according to claim 5 or 6 group of data ciphering methods, which is characterized in that the Key Management server includes User authentication module, user key management module, encryption key management module and cryptographic service module;
The user authentication module uses the user information of each telecommunication customer end, carries out user's checking to each telecommunication customer end It is bound with user account;
The user key management module is managed the user key of each telecommunication customer end;
The encryption key management module creation encryption key;
The cryptographic service module encrypts the encryption key using the user key.
8. according to claim 7 group of data ciphering methods, which is characterized in that the user key includes public key and private Key, the cryptographic service module encrypt the encryption key using the public key.
9. according to claim 7 group of data ciphering methods, which is characterized in that the encryption of the Key Management server takes Module of being engaged in generates encryption key indices, and the authorization relationship of recording of encrypted cipher key index and group identification.
10. according to claim 3 or 4 group of data ciphering methods, which is characterized in that the encryption/decryption module includes user Authentication sub module, user key management submodule, data encryption submodule and data deciphering submodule;
The user authentication submodule completes user identity authentication using user account;
The user key management submodule saves user key;
The data encryption submodule is decrypted encryption key using user key, then with encryption key to the number to be sent According to being encrypted;
The data deciphering submodule is decrypted encryption key using user key, then with encryption key to the number received According to being decrypted.
CN201811326155.9A 2018-11-08 2018-11-08 Group's data ciphering method Pending CN109274690A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811326155.9A CN109274690A (en) 2018-11-08 2018-11-08 Group's data ciphering method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811326155.9A CN109274690A (en) 2018-11-08 2018-11-08 Group's data ciphering method

Publications (1)

Publication Number Publication Date
CN109274690A true CN109274690A (en) 2019-01-25

Family

ID=65192613

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811326155.9A Pending CN109274690A (en) 2018-11-08 2018-11-08 Group's data ciphering method

Country Status (1)

Country Link
CN (1) CN109274690A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109981663A (en) * 2019-03-31 2019-07-05 杭州复杂美科技有限公司 A kind of privacy group chat method, equipment and storage medium
CN112804133A (en) * 2020-12-25 2021-05-14 江苏通付盾区块链科技有限公司 Encrypted group chat method and system based on block chain technology

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101479984A (en) * 2006-04-25 2009-07-08 斯蒂芬·L.·博伦 Dynamic distributed key system and method for identity management, authentication servers, data security and preventing man-in-the-middle attacks
CN104717232A (en) * 2015-04-09 2015-06-17 武汉理工大学 Cryptosystem facing to group
CN106603504A (en) * 2016-11-23 2017-04-26 深圳市金立通信设备有限公司 VoIP (Voice over Internet Protocol) encrypting and monitoring methods and VoIP encrypting and monitoring devices
CN106935242A (en) * 2015-12-30 2017-07-07 北京明朝万达科技股份有限公司 A kind of voice communication encryption system and method
WO2017133485A1 (en) * 2016-02-02 2017-08-10 阿里巴巴集团控股有限公司 Method of establishing communication between apparatuses, device, and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101479984A (en) * 2006-04-25 2009-07-08 斯蒂芬·L.·博伦 Dynamic distributed key system and method for identity management, authentication servers, data security and preventing man-in-the-middle attacks
CN104717232A (en) * 2015-04-09 2015-06-17 武汉理工大学 Cryptosystem facing to group
CN106935242A (en) * 2015-12-30 2017-07-07 北京明朝万达科技股份有限公司 A kind of voice communication encryption system and method
WO2017133485A1 (en) * 2016-02-02 2017-08-10 阿里巴巴集团控股有限公司 Method of establishing communication between apparatuses, device, and system
CN106603504A (en) * 2016-11-23 2017-04-26 深圳市金立通信设备有限公司 VoIP (Voice over Internet Protocol) encrypting and monitoring methods and VoIP encrypting and monitoring devices

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109981663A (en) * 2019-03-31 2019-07-05 杭州复杂美科技有限公司 A kind of privacy group chat method, equipment and storage medium
CN112804133A (en) * 2020-12-25 2021-05-14 江苏通付盾区块链科技有限公司 Encrypted group chat method and system based on block chain technology

Similar Documents

Publication Publication Date Title
CN110474893A (en) A kind of isomery is across the close state data safety sharing method of trust domain and system
CN101677269B (en) Method and system for transmitting keys
CN103401949B (en) A kind of system and method shared for the personal data safety of mobile phone
CN101340443A (en) Session key negotiating method, system and server in communication network
CN109543434B (en) Block chain information encryption method, decryption method, storage method and device
CN107483505A (en) The method and system that a kind of privacy of user in Video chat is protected
CN107094156A (en) A kind of safety communicating method and system based on P2P patterns
CN107666395A (en) One population file management method, user terminal, group chat system
CN106656490A (en) Quantum whiteboard data storage method
CN102404337A (en) Data encryption method and device
CN109525388A (en) A kind of combined ciphering method and system of cipher key separation
CN103997405B (en) A kind of key generation method and device
CN109274690A (en) Group's data ciphering method
CN106211146B (en) Adding method, information communicating method and call method and system are recorded in safety communication
CN111368271A (en) Method and system for realizing password management based on multiple encryption
KR102191111B1 (en) System and method of providing anonymity message service using block chain
CN106059767A (en) Terminal private data protection system and method based on Internet
CN111698203A (en) Cloud data encryption method
CN109726583A (en) Cloud data base encryption server system
CN110266483A (en) Based on unsymmetrical key pond to and the quantum communications service station cryptographic key negotiation method of QKD, system, equipment
JP2014527786A (en) Communication system for authentication by fingerprint information and use thereof
KR101760376B1 (en) Terminal and method for providing secure messenger service
CN103986640A (en) Instant messaging method and system capable of guaranteeing safety of user communication content
CN215186781U (en) Quantum computing resistant mobile communication system based on quantum secret communication network
CN111539032B (en) Electronic signature application system resistant to quantum computing disruption and implementation method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190125

RJ01 Rejection of invention patent application after publication