CN109462615A - Be delayed communication means and system - Google Patents
Be delayed communication means and system Download PDFInfo
- Publication number
- CN109462615A CN109462615A CN201811639289.6A CN201811639289A CN109462615A CN 109462615 A CN109462615 A CN 109462615A CN 201811639289 A CN201811639289 A CN 201811639289A CN 109462615 A CN109462615 A CN 109462615A
- Authority
- CN
- China
- Prior art keywords
- information
- time
- capsulae vacuus
- capsule
- dimensional orientation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
- Computer And Data Communications (AREA)
Abstract
The present invention provides a kind of delay communication means and systems, wherein method is the following steps are included: the information that typing is sent in advance;It is sent to information setting, reception, reading, the time for showing and disappearing, while to information setting transmission, reception, reading, display and the dimensional orientation to disappear;The information for being provided with the pre- transmission of time and dimensional orientation is sent according to the time and dimensional orientation of setting;After receiving under conditions of recipient meets time and dimensional orientation and reading information, the transmitting of entire delay communication is completed.The present invention is using mobile Internet and mobile phone sensor technology to information setting transmission, receiving, reading, display and the time to disappear, simultaneously to information setting transmission, receiving, reading, display and the dimensional orientation (i.e. geographical location) to disappear, to assign information time and space (geographical location) attribute, communicated with this to realize to be delayed.
Description
Technical field
The present invention relates to field of communication technology, in particular to a kind of delay communication means and system.
Background technique
Communication is the mode of civilization Transmission, and even more civilized evolution carrier does not communicate, culture can not exchange, trade can not
It carries out.The importance communicated in human lives' production is self-evident.
So far, the mankind have grasped two kinds of communication modes: one is instant messaging, IM (Instant Message), such as
Letter, telegram, the phone of early stage evolves E-mail, ICQ (QQ) and based on mobile interchange in present Internet era
The instant messaging (such as wechat, Whatsapp, Line, Telegram) of net.Another kind is broadcast communication, BM (Broadcast
Message), such as the residence of a high official report of early stage, pool report, local authorities' bulletin, the newspaper of modern society, wired and wireless broadcast, TV, internet
Epoch, portal website of appearance, and the microblogging based on mobile Internet, Twitter etc., and branch out picture and share, is short-sighted
The diversified forms such as APP are enjoyed and be broadcast live to frequency division.
Investigate above two existing communication mode, it has been found that: the same instant messaging information that user receives, in Hangzhoupro
State is seen and is seen in Beijing, is the same, referring now to seeing, tomorrow, and the same.Likewise, same broadcast communication information
(such as: micro-blog information), user sees in Hangzhou and sees in Beijing, is the same, referring now to seeing, tomorrow, and the same.Also
It is that the information saying current instant messaging and broadcast communication and being transmitted will not be because of time, sky without time, the attribute in space
Between variation and it is different.
But the life of the mankind, production, business activity, social activities, scientific research etc. all with time, the close phase in space
It closes, all with the attribute of time and space.That is, at present applied to non-internet and internet, mobile Internet i.e.
Shi Tongxin, broadcast communication because do not have time and space attribute, thus cannot with the life of the mankind, production, commercially pass through
Battalion, social activities match well, with Intelligent life, the development of intelligently production, intelligent scientific research, intelligent society management, immediately
Communication, the limitation of broadcast communication are more obvious.
Summary of the invention
The present invention provides a kind of delay communication means and system, solves the problems, such as existing above-mentioned.
To solve the above problems, the embodiment of the present invention provides a kind of delay communication means, comprising the following steps:
The information that typing is sent in advance;
To information setting send, receive, read, display and disappear time, while to information setting send, receive,
It reads, the dimensional orientation of display and disappearance;
The information for being provided with the pre- transmission of time and dimensional orientation is sent according to the time and dimensional orientation of setting;
After receiving under conditions of recipient meets time and dimensional orientation and reading information, entire delay communication is completed
Transmitting.
As an implementation, further comprising the steps of:
Information, time and attitude information that typing is sent in advance are packaged to capsulae vacuus when establishing;
It is sent by Encryption Transmission Protocol clock synchronization capsulae vacuus.
As an implementation, the information that typing is sent in advance, time and attitude information are packaged
Capsulae vacuus when establishing, specifically includes the following steps:
After setting time and dimensional orientation, recessed code and convex code are generated;
Information will be sent in advance and convex code combines and generates data Layer;
Recessed code is combined to generate parameter layer time and dimensional orientation setting information;
Whether the recessed code of detection parameters layer and the convex code of data Layer match;
If matching is correct, sealed, the foundation of capsulae vacuus when completion.
As an implementation, described to combine recessed code to generate parameter layer time and dimensional orientation setting information, also wrap
Include following steps:
The unique digital signature of sampling registration user generates data signature;
Sampling characterization capsule count mark random number and characterization capsule generate time sequencing natural count, and according to
Machine number and natural count generate capsule count, wherein random number is made of the multidigit code for fixing digit, and random number is arranged
First is that identification marking as capsule count, natural count refer to system to it is all when capsulae vacuus the time generated by request
The natural number of sequence;
Sampling system clock links national time service center imparting generation timestamp, meanwhile, timestamp combination system is compiled
Code generates capsule head;
By time and dimensional orientation setting information, recessed code, capsule count, timestamp, capsule head and asymmetric encryption letter
Breath, which combines, generates parameter layer.
As an implementation, described to be sent by Encryption Transmission Protocol clock synchronization capsulae vacuus, it specifically includes following
Step:
Concave-convex code check is carried out to the when capsulae vacuus established and sealed;
If verification does not pass through, capsulae vacuus when re-establishing, if verification passes through, judge that APP ID, APP Secret are
It is no to exist simultaneously;
If APP ID, APP Secret are not existed simultaneously, sends request and generates APP ID, APP Secret, and cache,
If APP ID, APP Secret are existed simultaneously, clock synchronization capsulae vacuus carries out asymmetric encryption;
Data signature verification is carried out by MD5 one-way Hash algorithm;
If data signature verification does not pass through, rejudge whether APP ID, APP Secret exist simultaneously, if data label
Name verification passes through, then clock synchronization capsulae vacuus carries out global encryption;
Judge whether APP Secret is expired;
If APP Secret is expired, sends request and generate APP ID, APP Secret, if APP Secret is not out of date,
Capsulae vacuus sends request when then initiating;
Capsulae vacuus when being sent by Encryption Transmission Protocol.
As an implementation, capsulae vacuus when establishing is further comprising the steps of:
After setting time and dimensional orientation, preview simultaneously checks the information content and setting condition.
The present invention also provides a kind of delay communication systems, comprising:
Typing unit, the information sent in advance for typing;
Condition setting unit, the time for sending, receiving, reading, show and disappear to information setting, while to letter
Breath setting transmission, reception, reading, display and the dimensional orientation to disappear;
Sending module, time and space of the information according to setting of the pre- transmission for time and dimensional orientation will to be provided with
Orientation is sent;
Receiving module is completed after receiving under conditions of recipient meets time and dimensional orientation and reading information
The transmitting of entire delay communication.
As an implementation, further includes:
When capsulae vacuus establish module, the information, time and attitude information for sending typing in advance are packaged
Capsulae vacuus when establishing;
Encrypted transmission unit, for being sent by Encryption Transmission Protocol clock synchronization capsulae vacuus.
As an implementation, capsulae vacuus establishes module when described further include:
Password is to unit, for generating recessed code and convex code after setting time and dimensional orientation;
Data acquisition unit, for generating capsule count, data signature, timestamp, capsule size and capsule head;
Combining unit combines for that will send information and convex code in advance and generates data Layer;By time and dimensional orientation setting letter
Breath, recessed code, capsule count, data signature, capsule size, timestamp, capsule head and asymmetric encryption information, which combine, generates ginseng
Several layers;
Capsule encryption unit, for being encrypted to capsule;
Whether matching unit matches for the recessed code of detection parameters layer and the convex code of data Layer;
Unit is sealed, if correct for matching, is sealed, the foundation of capsulae vacuus when completion.
As an implementation, the sending module includes:
Password is to verification unit, for carrying out concave-convex code check to the when capsulae vacuus established and sealed, if verification does not pass through,
Capsulae vacuus when then re-establishing;
Judging unit judges whether APP ID, APP Secret exist simultaneously if passing through for verifying, if it does not exist,
It then sends request and generates APP ID, APP Secret, and cache;
Private key encryption unit, if existing simultaneously for APP ID, APP Secret, clock synchronization capsulae vacuus carries out asymmetric add
It is close;
Signature check unit, for carrying out data signature verification by MD5 one-way Hash algorithm;
Full key encryption unit carries out global encryption for clock synchronization capsulae vacuus;
Expired judging unit, for judging whether APP Secret expired, if expired, send request generate APP ID,
APP Secret, if not out of date, capsulae vacuus sends request when initiating;
Encrypted transmission unit, capsulae vacuus when for being sent by Encryption Transmission Protocol.
The beneficial effect of the present invention compared with the prior art is: using mobile Internet and mobile phone sensor technology to letter
Breath setting send, receive, read, display and disappear time, while to information setting send, receive, read, display and
The dimensional orientation (i.e. geographical location) of disappearance is prolonged to assign information time and space (geographical location) attribute with this to realize
Shi Tongxin;By when capsulae vacuus can avoid transmit exposed information in the communications, realize encapsulating for information, time, sky can be assigned
Between attribute function so that delay communication conveniently realized, and make transmission information preferably encrypt, save and pass
It is defeated;Meanwhile when capsulae vacuus be divided into parameter layer, data Layer, wherein parameter layer is equivalent to the block of block chain technology in the application, can
To realize distributed storage, point-to-point transmission etc..Data Layer includes user data, i.e. information content itself.Parameter layer and data
For layer with unique corresponding password to combination, parameter layer is recessed code, data Layer is convex code, is ensured between the two with unique corresponding relation
Capsule is that unique information is whole, it is ensured that the when capsulae vacuus sealed has and can not add, can not delete, can not cover, can not repair
The characteristics of changing, can not destroying.
Detailed description of the invention
Fig. 1 is the flow chart of delay communication means of the invention;
Fig. 2 is the flow chart of capsulae vacuus when establishing of the invention;
Fig. 3 encrypts for when capsulae vacuus of the invention and the flow chart of transmission flow;
Fig. 4 is the module connection figure of delay communication system of the invention;
Fig. 5 is that the when capsulae vacuus of present invention delay communication system establishes the module connection figure of module;
Fig. 6 is the module connection figure of the sending module of present invention delay communication system.
1, attached drawing mark: capsulae vacuus establishes module when;11, typing unit;12, condition setting unit;13, password is to list
Member;14, combining unit;15, data acquisition unit;16, capsule encryption unit;17, matching unit;18, unit is sealed;2, it sends
Module;21, password is to verification unit;22, judging unit;23, private key encryption unit;24, signature check unit;25, full key adds
Close unit;26, expired judging unit;27, encrypted transmission unit;3, receiving module.
Specific embodiment
Below in conjunction with attached drawing, the technical characteristic and advantage above-mentioned and other to the present invention are clearly and completely described,
Obviously, described embodiment is only section Example of the invention, rather than whole embodiments.
As shown in Figure 1, a kind of delay communication means, comprising the following steps:
S101: the information that typing is sent in advance, the information sent in advance can be text, picture, video, audio, 3D information, electricity
The different types such as son signature, electronic document and link;
S102: sending to information setting, receive, reading, the time for showing and disappearing, while being sent to information setting,
It receives, read, the dimensional orientation of display and disappearance;
S200: the information that will be provided with the pre- transmission of time and dimensional orientation is carried out according to the time of setting and dimensional orientation
It sends;
S300: after receiving under conditions of recipient meets time and dimensional orientation and reading information, entire delay is completed
The transmitting of communication.
It sends, receive, read, show and disappears to information setting using mobile Internet and mobile phone sensor technology
Time, while to the dimensional orientation (i.e. geographical location) that information setting sends, receives, reads, shows and disappear, to assign
Information time and space (geographical location) attribute communicate (Time-Lapse Message, abbreviation TM) with this to realize to be delayed.Prolong
The central principle of Shi Tongxin is: sending information to some preset space-time crosspoint, makes the information person of being received of setting
Accurately know, information receiver can be a people, group, owner or machine, artificial intelligence terminal, and delay is logical
The information transmitted in letter has time and space attribute.
In order to develop letter using the method being packaged to information to information imparting time and space attribute, the present invention
Encapsulation tool is ceased, " when capsulae vacuus " (English name: Spatio-temporal Capsule, abbreviation STC) is named as.When hungry area
Capsule is the invention of means of communication of being delayed, and avoids transmitting exposed information in the communications, realizes encapsulating for information, can assign
The function of Shi Wen, space attribute so that delay communication is able to facilitate realization, and make the information of transmission preferably encrypt, save, pass
It is defeated.
When capsulae vacuus include parameter layer and data Layer, parameter layer includes: (1) capsule head: coding, time including the capsule
Stamp;(2) transmit details: sending time and dimensional orientation, the receiving time of recipient and dimensional orientation including sender and
Other conditions (time and dimensional orientation) in relation to display, reading and disappearance;(3) digital signature: the i.e. digital signature of sender;
(4) capsule count device: sender's capsule count and all capsule counts of system;(5) capsule size: the i.e. byte of the complete capsule
Number;(6) asymmetric encryption information;(7) recessed code.Data Layer includes: that (1) sends information in advance: i.e. sender wants the information transmitted,
Including different types of information such as text, picture, video, audio, 3D information, electronic signature, electronic document and links;(2)
Convex code.
Meanwhile when capsulae vacuus be divided into parameter layer, data Layer, wherein parameter layer is equivalent to the area of block chain technology in the application
Distributed storage, point-to-point transmission etc. may be implemented in block.Data Layer includes user data, i.e. information content itself.Parameter layer and
Data Layer is with unique corresponding password to (parameter layer is recessed code, data Layer is convex code) is combined, and recessed code is with convex code as tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China
It corresponds to each other, is that parameter layer and data Layer are uniquely corresponded to by Encryption Algorithm.Assign the recessed code of parameter layer and the data of parameter layer
Content coupling, when capsulae vacuus foundation finish, after sealing, recessed code one side Protection parameters layer is not destroyed, be not modified, add,
It covers, delete, destroy, can only read and replicate, it is on the other hand, recessed when above-mentioned accident occurs when external force breakthrough system encryption
Code is at once disturbed, is recognized by the system and invades for danger, and causes parameter layer that can not be adapted to data Layer, protects data Layer information
It is not broken into and damages;Assign data Layer convex code couple with the data content of data Layer, when capsulae vacuus foundation finish, sealing
Afterwards, on the one hand convex code protects data Layer not to be destroyed, is not modified, adds, covers, deletes, destroys, on the other hand, when outer
Power breaks through system encryption, and when above-mentioned accident occurs, convex code is at once disturbed, is recognized by the system and invades for danger, and leads to data
Layer can not be adapted to parameter layer, and Protection parameters layer information is not broken into and damages;When the parameter layer containing recessed code is copied as
When the block of block chain carries out distributed storage, if any tracing or reading when needing of data Layer information, matched by concave-convex code,
Block (parameter layer replicated) the correspondence system storage of distributed storage (refers to and is stored in system database, cloud, client
Deng) data Layer, to read data Layer content, to realize the small parameter layer distributed storage of data volume, the big number of data volume
It is concentrated according to layer or client stores.
As shown in Fig. 2, when capsulae vacuus establishment process specifically includes the following steps:
S101: the information that typing is sent in advance, the information sent in advance can be text, picture, video, audio, 3D information, electricity
The different types such as son signature, electronic document and link;
S102: sending to information setting, receive, reading, the time for showing and disappearing, while being sent to information setting,
It receives, read, the dimensional orientation of display and disappearance;
S103: after setting time and dimensional orientation, recessed code and convex code are generated;
S104: will send information in advance and convex code combines and generates data Layer;
S105: the unique digital signature of sampling registration user generates data signature;
S106: the random number and characterization capsule of sampling characterization capsule count mark generate the natural count of time sequencing, and
Capsule count is generated according to random number and natural count, wherein random number is made of the multidigit code for fixing digit, and setting is random
The number first purpose are identification markings as capsule count, natural count refer to system to it is all when capsulae vacuus generated by request
Time-sequencing natural number;
S107: sampling system clock links national time service center imparting generation timestamp, meanwhile, it is by timestamp combination
Unified editing code generates capsule head;
S108: recessed code, capsule count, data signature, timestamp, capsule head and asymmetric encryption information are combined and generated
Parameter layer;
S109: whether the recessed code of detection parameters layer and the convex code of data Layer match, and the process is primarily to ensure " product
It is qualified ";
S110: if matching is correct, being sealed, the foundation of capsulae vacuus when completion, when reading entire in establishment process
Capsule size is added in parameter layer for the data volume of capsulae vacuus, i.e. capsule size.
It is further comprising the steps of when above-mentioned establish in addition to capsulae vacuus step:
After setting time and dimensional orientation, preview simultaneously checks the information content and setting condition.
During step S200, using Encryption Transmission Protocol, as shown in figure 3, detailed process the following steps are included:
S201: concave-convex code check is carried out to the when capsulae vacuus established and sealed, capsulae vacuus prepares when which ensures
Transmission, especially parameter layer by the block as block chain in use, if concave-convex code check does not pass through, hungry area when re-establishing
Capsule;
S202: if concave-convex code check passes through, judge whether APP ID, APP Secret exist simultaneously;
S203: if APP ID, APP Secret are not existed simultaneously, sending request and generate APP ID, APP Secret, and
Caching;
S204: if APP ID, APP Secret are existed simultaneously, clock synchronization capsulae vacuus carries out asymmetric encryption;
S205: carrying out data signature verification by MD5 one-way Hash algorithm, if data signature verification does not pass through, again
Judge whether APP ID, APP Secret exist simultaneously;
S206: if data signature verification passes through, clock synchronization capsulae vacuus carries out global encryption;
S207: judging whether APP Secret is expired, if APP Secret is expired, sends request and generates APP ID, APP
Secret;
S208: if APP Secret is not out of date, capsulae vacuus sends request when initiating;
S209: capsulae vacuus when being sent by Encryption Transmission Protocol, in this example, can using following three kinds it is common plus
Close transport protocol: 1, Signal protocol Encryption Transmission Protocol, this is a kind of communication encryption agreement end to end,
What facebook messenger and whatsapp were used is exactly this transport protocol;2,SSL(Secure Sockets
Layer) agreement and TLS (Transport Layer Security) are mainly used for adding the data that http protocol transmits
Close, TLS is the upgrade version of SSL;3, WTLS wireless transport layer security (Wireless Transport Layer
Security Protocol, WTLS), it is the base growth in above-mentioned tls protocol (1.0), and main improve is according to nothing
The requirement such as thread environment, long range, low bandwidth increases the support of datagram, the optimization of Handshake Protocol and dynamic key refreshing etc.
New feature;
S210: when receiving end receives after capsulae vacuus, concave-convex code check is carried out to it;
S211: if verification passes through, sending it to recipient, meanwhile, successful information will be sent and inform sender;
S212: capsulae vacuus when opening recipient meets time and dimensional orientation under conditions of, read when capsulae vacuus
Information, meanwhile, the information of capsulae vacuus when having opened is informed into sender.
The anti-decryption capabilities of capsulae vacuus, pass through multiple, the multiple encryption algorithms side of combining when in above process, to improve
Formula improves cryptographic capabilities.Specifically, have four encryptions: the encryption for timestamp in parameter layer (is calculated using such as 128 AES
Method encryption), the concave-convex code encryption for parameter layer and data Layer, the asymmetric encryption for digital signature (using such as MD5 it is mono-
To hashing algorithm encrypt) and for when capsulae vacuus transmit asymmetric encryption.Wherein, capsule encryption is for passing according to agreement
Encipherment protection when defeated, it is ensured that when capsulae vacuus transmission error of transmission will not occur, and capsulae vacuus does not ride misfortune by non-agreement when ensuring.
As shown in figure 4, a kind of delay communication system, including when capsulae vacuus establish module, sending module and receiving module,
When capsulae vacuus establish module for information, time and attitude information that typing is sent in advance to be packaged to hungry area when establishing
Capsule;Sending module is used to set information (the when capsulae vacuus after the encapsulating) basis for being provided with the pre- transmission of time and dimensional orientation
The time and dimensional orientation set are sent;Receiving module under conditions of recipient meets time and dimensional orientation for receiving
And after reading information, the transmitting of entire delay communication is completed.
As shown in figure 5, when capsulae vacuus establish module include typing unit, condition setting unit, password to unit, in conjunction with list
Member, data acquisition unit, capsule encryption unit, matching unit and sealing unit, typing unit are used for the letter that typing is sent in advance
Breath;Condition setting unit was used for information setting transmission, reception, reading, display and the time to disappear, while giving information setting
It sends, receive, reading, the dimensional orientation of display and disappearance;Password is used for after setting time and dimensional orientation unit, raw
At recessed code and convex code;Combining unit combines for that will send information and convex code in advance and generates data Layer;Time and dimensional orientation are set
Confidence breath, recessed code, capsule count, data signature, capsule size, timestamp, capsule head and asymmetric encryption information combine life
At parameter layer;Data acquisition unit is for generating capsule count, data signature, timestamp, capsule size and capsule head;Capsule
Encryption unit is used to encrypt capsule parameter;Matching unit for detection parameters layer recessed code and data Layer convex code whether
Match;If sealing unit is correct for matching, sealed, the foundation of capsulae vacuus when completion.
The space-time capsule structure of foundation includes parameter layer and data Layer, and parameter layer includes: (1) capsule head: including the capsule
Coding, timestamp;(2) details: sending time and dimensional orientation, the receiving time of recipient and sky including sender are transmitted
Between orientation and it is other in relation to display, read and disappear condition (time and dimensional orientation);(3) digital signature: i.e. sender
Digital signature;(4) capsule count device: sender's capsule count and all capsule counts of system;(5) capsule size: i.e. this is complete
The byte number of whole capsule;(6) asymmetric encryption information;(7) recessed code.Data Layer includes: that (1) sends information in advance: i.e. sender thinks
The inhomogeneities such as the information to be transmitted, including text, picture, video, audio, 3D information, electronic signature, electronic document and link
The information of type;(2) convex code.
As shown in fig. 6, sending module includes password to verification unit, judging unit, private key encryption unit, signature check list
First, full key encryption unit, expired judging unit and encrypted transmission unit, password are used for establishing and seal verification unit
When capsulae vacuus carry out concave-convex code check, if verification does not pass through, capsulae vacuus when re-establishing;If judging unit is logical for verifying
It crosses, then judges whether APP ID, APP Secret exist simultaneously, if it does not exist, then send request and generate APP ID, APP
Secret, and cache;Private key encryption unit is for if it exists, then clock synchronization capsulae vacuus to carry out asymmetric encryption;Signature check unit
For carrying out data signature verification by MD5 one-way Hash algorithm;Full key encryption unit carries out global add for clock synchronization capsulae vacuus
It is close;Expired judging unit is for judging whether APP Secret is expired, if expired, send request and generates APP ID, APP
Secret, if not out of date, capsulae vacuus sends request when initiating;Encrypted transmission unit by Encryption Transmission Protocol for when being sent
Capsulae vacuus.
The present invention sent to information setting using mobile Internet and mobile phone sensor technology, received, read, display and
The time of disappearance, while being arranged to information and send, receive, reading, the dimensional orientation (i.e. geographical location) of display and disappearance, from
And information time and space (geographical location) attribute are assigned, it is communicated with this to realize to be delayed.
By when capsulae vacuus can avoid transmit exposed information in the communications, realize encapsulating for information, time, sky can be assigned
Between attribute function so that delay communication conveniently realized, and make transmission information preferably encrypt, save and pass
It is defeated.
Meanwhile when capsulae vacuus be divided into parameter layer, data Layer, wherein parameter layer is equivalent to the area of block chain technology in the application
Distributed storage, point-to-point transmission etc. may be implemented in block.Data Layer includes user data, i.e. information content itself.Parameter layer and
Data Layer is with unique corresponding password to combination, and parameter layer is recessed code, data Layer is convex code, between the two with unique corresponding relation
Ensure that capsule is that unique information is whole, it is ensured that the when capsulae vacuus sealed has and can not add, can not delete, can not cover, no
The characteristics of can modifying, can not destroying.
Particular embodiments described above has carried out further the purpose of the present invention, technical scheme and beneficial effects
It is described in detail, it should be understood that the above is only a specific embodiment of the present invention, the protection being not intended to limit the present invention
Range.It particularly points out, to those skilled in the art, all within the spirits and principles of the present invention, that is done any repairs
Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.
Claims (10)
1. a kind of delay communication means, which comprises the following steps:
The information that typing is sent in advance;
Transmission is set to information, is received, the time of reading, display and disappearance, while being arranged to information and sending, reception, reading,
Display and the dimensional orientation to disappear;
The information for being provided with the pre- transmission of time and dimensional orientation is sent according to the time and dimensional orientation of setting;
After receiving under conditions of recipient meets time and dimensional orientation and reading information, the biography of entire delay communication is completed
It passs.
2. delay communication means according to claim 1, which is characterized in that further comprising the steps of:
Information, time and attitude information that typing is sent in advance are packaged to capsulae vacuus when establishing;
It is sent by Encryption Transmission Protocol clock synchronization capsulae vacuus.
3. delay communication means according to claim 2, which is characterized in that the information for sending typing in advance, time
And attitude information is packaged capsulae vacuus when establishing, specifically includes the following steps:
After setting time and dimensional orientation, recessed code and convex code are generated;
Information will be sent in advance and convex code combines and generates data Layer;
Recessed code is combined to generate parameter layer time and dimensional orientation setting information;
Whether the recessed code of detection parameters layer and the convex code of data Layer match;
If matching is correct, sealed, the foundation of capsulae vacuus when completion.
4. delay communication means according to claim 3, which is characterized in that described by time and dimensional orientation setting information
Parameter layer is generated in conjunction with recessed code, further comprising the steps of:
The unique digital signature of sampling registration user generates data signature;
The random number and characterization capsule of sampling characterization capsule count mark generate the natural count of time sequencing, and according to random number
Capsule count is generated with natural count, wherein random number is made of the multidigit code for fixing digit, and the random number first purpose is arranged
The identification marking as capsule count, natural count refer to system to it is all when capsulae vacuus the time-sequencing generated by request
Natural number;
Sampling system clock links national time service center imparting generation timestamp, meanwhile, timestamp combination system coding is raw
At capsule head;
By time and dimensional orientation setting information, recessed code, capsule count, timestamp, capsule head and asymmetric encryption information knot
Symphysis is at parameter layer.
5. delay communication means according to claim 2, which is characterized in that described to pass through Encryption Transmission Protocol clock synchronization hungry area
Capsule is sent, specifically includes the following steps:
Concave-convex code check is carried out to the when capsulae vacuus established and sealed;
If verification does not pass through, capsulae vacuus when re-establishing, if verification passes through, judge APPID, APP Secret whether simultaneously
In the presence of;
If APPID, APP Secret are not existed simultaneously, sends request and generate APP ID, APP Secret, and cache, if
APPID, APP Secret are existed simultaneously, then clock synchronization capsulae vacuus carries out asymmetric encryption;
Data signature verification is carried out by MD5 one-way Hash algorithm;
If data signature verification does not pass through, rejudge whether APPID, APP Secret exist simultaneously, if data signature school
It tests and passes through, then clock synchronization capsulae vacuus carries out global encryption;
Judge whether APP Secret is expired;
If APP Secret is expired, sends request generation APPID, APP Secret and initiated if APP Secret is not out of date
When capsulae vacuus send request;
Capsulae vacuus when being sent by Encryption Transmission Protocol.
6. delay communication means according to claim 3, which is characterized in that capsulae vacuus when establishing further includes following step
It is rapid:
After setting time and dimensional orientation, preview simultaneously checks the information content and setting condition.
7. a kind of delay communication system characterized by comprising
Typing unit, the information sent in advance for typing;
Condition setting unit, the time for sending, receiving, reading, show and disappear to information setting, while being set to information
Set the dimensional orientation of transmission, reception, reading, display and disappearance;
Sending module, time and dimensional orientation of the information according to setting of the pre- transmission for time and dimensional orientation will to be provided with
It is sent;
Receiving module is completed entire after receiving under conditions of recipient meets time and dimensional orientation and reading information
Be delayed the transmitting communicated.
8. delay communication system according to claim 7, which is characterized in that further include:
When capsulae vacuus establish module, the information, time and attitude information for sending typing in advance are packaged foundation
When capsulae vacuus;
Encrypted transmission unit, for being sent by Encryption Transmission Protocol clock synchronization capsulae vacuus.
9. delay communication system according to claim 8, which is characterized in that capsulae vacuus establishes module when described further include:
Password is to unit, for generating recessed code and convex code after setting time and dimensional orientation;
Data acquisition unit, for generating capsule count, data signature, timestamp, capsule size and capsule head;
Combining unit combines for that will send information and convex code in advance and generates data Layer;By time and dimensional orientation setting information, recessed
Code, capsule count, data signature, capsule size, timestamp, capsule head and asymmetric encryption information, which combine, generates parameter layer;
Capsule encryption unit, for being encrypted to capsule;
Whether matching unit matches for the recessed code of detection parameters layer and the convex code of data Layer;
Unit is sealed, if correct for matching, is sealed, the foundation of capsulae vacuus when completion.
10. delay communication system according to claim 8, which is characterized in that the sending module includes:
Password weighs verification unit for carrying out concave-convex code check to the when capsulae vacuus established and sealed if verification does not pass through
Newly-built capsulae vacuus immediately;
Judging unit judges whether APPID, APP Secret exist simultaneously, if it does not exist, then sends out if passing through for verifying
It send request to generate APPID, APP Secret, and caches;
Private key encryption unit, if existing simultaneously for APPID, APP Secret, clock synchronization capsulae vacuus carries out asymmetric encryption;
Signature check unit, for carrying out data signature verification by MD5 one-way Hash algorithm;
Full key encryption unit carries out global encryption for clock synchronization capsulae vacuus;
Expired judging unit, if expired, send request and generates APPID, APP for judging whether APP Secret is expired
Secret, if not out of date, capsulae vacuus sends request when initiating;
Encrypted transmission unit, capsulae vacuus when for being sent by Encryption Transmission Protocol.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811639289.6A CN109462615B (en) | 2018-12-29 | 2018-12-29 | Time-delay communication method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811639289.6A CN109462615B (en) | 2018-12-29 | 2018-12-29 | Time-delay communication method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109462615A true CN109462615A (en) | 2019-03-12 |
CN109462615B CN109462615B (en) | 2021-09-21 |
Family
ID=65615796
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811639289.6A Active CN109462615B (en) | 2018-12-29 | 2018-12-29 | Time-delay communication method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109462615B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1373955A (en) * | 1999-10-08 | 2002-10-09 | 诺基亚公司 | Location sensitive multimedia messaging (MMS) |
CN1943193A (en) * | 2004-02-13 | 2007-04-04 | 索尼爱立信移动通讯股份有限公司 | Method and device for message delivery |
US20180189753A1 (en) * | 2017-01-05 | 2018-07-05 | Beskatta, LLC | Infrastructure for obligation management and validation |
-
2018
- 2018-12-29 CN CN201811639289.6A patent/CN109462615B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1373955A (en) * | 1999-10-08 | 2002-10-09 | 诺基亚公司 | Location sensitive multimedia messaging (MMS) |
CN1943193A (en) * | 2004-02-13 | 2007-04-04 | 索尼爱立信移动通讯股份有限公司 | Method and device for message delivery |
US20180189753A1 (en) * | 2017-01-05 | 2018-07-05 | Beskatta, LLC | Infrastructure for obligation management and validation |
Also Published As
Publication number | Publication date |
---|---|
CN109462615B (en) | 2021-09-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10771966B2 (en) | Encryption method, decryption method, and related apparatus | |
CN101662765B (en) | Encryption system and method of short message of mobile telephone | |
CN103684794A (en) | Communication data encryption and decryption method based on DES (Data Encryption Standard), RSA and SHA-1 (Secure Hash Algorithm) encryption algorithms | |
CN101247605A (en) | Short information enciphering and endorsement method, mobile terminal and short information ciphering system | |
CN101466079A (en) | Method, system and WAPI terminal for transmitting e-mail | |
CN110138795B (en) | Multi-step mixed encryption and decryption method in communication process | |
TW201417546A (en) | Instant messaging method and system | |
CN103026657A (en) | Method and apparatus for providing a key certificate in a tamperproof manner | |
CN103731270A (en) | Communication data encryption and decryption method based on BBS, RSA and SHA-1 encryption algorithm | |
CN104202736A (en) | Mobile terminal short message end-to-end encryption method oriented to Android system | |
CN107579903B (en) | Picture message secure transmission method and system based on mobile device | |
CN102006303A (en) | Method and terminal for increasing data transmission safety by using multi-encryption method | |
CN106533656A (en) | Key multilayer mixed encryption/decryption method based on WSN | |
CN109194701B (en) | Data processing method and device | |
CN106209373B (en) | Key generation system, data stamped signature and encryption system and method | |
CN102752314A (en) | Multimedia internet of thing secure communication method based on information hiding technology | |
CN104009842A (en) | Communication data encryption and decryption method based on DES encryption algorithm, RSA encryption algorithm and fragile digital watermarking | |
CN106453246A (en) | Equipment identity information distribution method, device and system | |
CN101924710A (en) | Management system and method for enterprise email box | |
CN108848413B (en) | System, method and device for preventing video from replay attack and storage medium | |
CN109600374A (en) | Secure user data sending method and its system based on block chain | |
CN101795315A (en) | System and method for encrypting short messages by using mobile phone terminal | |
CN114499857B (en) | Method for realizing data correctness and consistency in encryption and decryption of large data quanta | |
CN104602208B (en) | A kind of SMS encryption communication means based on mobile network | |
CN105847001A (en) | Device, system and method for digital microwave communication based on quantum encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |