CN109462615A - Be delayed communication means and system - Google Patents

Be delayed communication means and system Download PDF

Info

Publication number
CN109462615A
CN109462615A CN201811639289.6A CN201811639289A CN109462615A CN 109462615 A CN109462615 A CN 109462615A CN 201811639289 A CN201811639289 A CN 201811639289A CN 109462615 A CN109462615 A CN 109462615A
Authority
CN
China
Prior art keywords
information
time
capsulae vacuus
capsule
dimensional orientation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811639289.6A
Other languages
Chinese (zh)
Other versions
CN109462615B (en
Inventor
曹勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Space-Time Capsule Network Technology Co Ltd
Original Assignee
Hangzhou Space-Time Capsule Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Space-Time Capsule Network Technology Co Ltd filed Critical Hangzhou Space-Time Capsule Network Technology Co Ltd
Priority to CN201811639289.6A priority Critical patent/CN109462615B/en
Publication of CN109462615A publication Critical patent/CN109462615A/en
Application granted granted Critical
Publication of CN109462615B publication Critical patent/CN109462615B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Abstract

The present invention provides a kind of delay communication means and systems, wherein method is the following steps are included: the information that typing is sent in advance;It is sent to information setting, reception, reading, the time for showing and disappearing, while to information setting transmission, reception, reading, display and the dimensional orientation to disappear;The information for being provided with the pre- transmission of time and dimensional orientation is sent according to the time and dimensional orientation of setting;After receiving under conditions of recipient meets time and dimensional orientation and reading information, the transmitting of entire delay communication is completed.The present invention is using mobile Internet and mobile phone sensor technology to information setting transmission, receiving, reading, display and the time to disappear, simultaneously to information setting transmission, receiving, reading, display and the dimensional orientation (i.e. geographical location) to disappear, to assign information time and space (geographical location) attribute, communicated with this to realize to be delayed.

Description

Be delayed communication means and system
Technical field
The present invention relates to field of communication technology, in particular to a kind of delay communication means and system.
Background technique
Communication is the mode of civilization Transmission, and even more civilized evolution carrier does not communicate, culture can not exchange, trade can not It carries out.The importance communicated in human lives' production is self-evident.
So far, the mankind have grasped two kinds of communication modes: one is instant messaging, IM (Instant Message), such as Letter, telegram, the phone of early stage evolves E-mail, ICQ (QQ) and based on mobile interchange in present Internet era The instant messaging (such as wechat, Whatsapp, Line, Telegram) of net.Another kind is broadcast communication, BM (Broadcast Message), such as the residence of a high official report of early stage, pool report, local authorities' bulletin, the newspaper of modern society, wired and wireless broadcast, TV, internet Epoch, portal website of appearance, and the microblogging based on mobile Internet, Twitter etc., and branch out picture and share, is short-sighted The diversified forms such as APP are enjoyed and be broadcast live to frequency division.
Investigate above two existing communication mode, it has been found that: the same instant messaging information that user receives, in Hangzhoupro State is seen and is seen in Beijing, is the same, referring now to seeing, tomorrow, and the same.Likewise, same broadcast communication information (such as: micro-blog information), user sees in Hangzhou and sees in Beijing, is the same, referring now to seeing, tomorrow, and the same.Also It is that the information saying current instant messaging and broadcast communication and being transmitted will not be because of time, sky without time, the attribute in space Between variation and it is different.
But the life of the mankind, production, business activity, social activities, scientific research etc. all with time, the close phase in space It closes, all with the attribute of time and space.That is, at present applied to non-internet and internet, mobile Internet i.e. Shi Tongxin, broadcast communication because do not have time and space attribute, thus cannot with the life of the mankind, production, commercially pass through Battalion, social activities match well, with Intelligent life, the development of intelligently production, intelligent scientific research, intelligent society management, immediately Communication, the limitation of broadcast communication are more obvious.
Summary of the invention
The present invention provides a kind of delay communication means and system, solves the problems, such as existing above-mentioned.
To solve the above problems, the embodiment of the present invention provides a kind of delay communication means, comprising the following steps:
The information that typing is sent in advance;
To information setting send, receive, read, display and disappear time, while to information setting send, receive, It reads, the dimensional orientation of display and disappearance;
The information for being provided with the pre- transmission of time and dimensional orientation is sent according to the time and dimensional orientation of setting;
After receiving under conditions of recipient meets time and dimensional orientation and reading information, entire delay communication is completed Transmitting.
As an implementation, further comprising the steps of:
Information, time and attitude information that typing is sent in advance are packaged to capsulae vacuus when establishing;
It is sent by Encryption Transmission Protocol clock synchronization capsulae vacuus.
As an implementation, the information that typing is sent in advance, time and attitude information are packaged Capsulae vacuus when establishing, specifically includes the following steps:
After setting time and dimensional orientation, recessed code and convex code are generated;
Information will be sent in advance and convex code combines and generates data Layer;
Recessed code is combined to generate parameter layer time and dimensional orientation setting information;
Whether the recessed code of detection parameters layer and the convex code of data Layer match;
If matching is correct, sealed, the foundation of capsulae vacuus when completion.
As an implementation, described to combine recessed code to generate parameter layer time and dimensional orientation setting information, also wrap Include following steps:
The unique digital signature of sampling registration user generates data signature;
Sampling characterization capsule count mark random number and characterization capsule generate time sequencing natural count, and according to Machine number and natural count generate capsule count, wherein random number is made of the multidigit code for fixing digit, and random number is arranged First is that identification marking as capsule count, natural count refer to system to it is all when capsulae vacuus the time generated by request The natural number of sequence;
Sampling system clock links national time service center imparting generation timestamp, meanwhile, timestamp combination system is compiled Code generates capsule head;
By time and dimensional orientation setting information, recessed code, capsule count, timestamp, capsule head and asymmetric encryption letter Breath, which combines, generates parameter layer.
As an implementation, described to be sent by Encryption Transmission Protocol clock synchronization capsulae vacuus, it specifically includes following Step:
Concave-convex code check is carried out to the when capsulae vacuus established and sealed;
If verification does not pass through, capsulae vacuus when re-establishing, if verification passes through, judge that APP ID, APP Secret are It is no to exist simultaneously;
If APP ID, APP Secret are not existed simultaneously, sends request and generates APP ID, APP Secret, and cache, If APP ID, APP Secret are existed simultaneously, clock synchronization capsulae vacuus carries out asymmetric encryption;
Data signature verification is carried out by MD5 one-way Hash algorithm;
If data signature verification does not pass through, rejudge whether APP ID, APP Secret exist simultaneously, if data label Name verification passes through, then clock synchronization capsulae vacuus carries out global encryption;
Judge whether APP Secret is expired;
If APP Secret is expired, sends request and generate APP ID, APP Secret, if APP Secret is not out of date, Capsulae vacuus sends request when then initiating;
Capsulae vacuus when being sent by Encryption Transmission Protocol.
As an implementation, capsulae vacuus when establishing is further comprising the steps of:
After setting time and dimensional orientation, preview simultaneously checks the information content and setting condition.
The present invention also provides a kind of delay communication systems, comprising:
Typing unit, the information sent in advance for typing;
Condition setting unit, the time for sending, receiving, reading, show and disappear to information setting, while to letter Breath setting transmission, reception, reading, display and the dimensional orientation to disappear;
Sending module, time and space of the information according to setting of the pre- transmission for time and dimensional orientation will to be provided with Orientation is sent;
Receiving module is completed after receiving under conditions of recipient meets time and dimensional orientation and reading information The transmitting of entire delay communication.
As an implementation, further includes:
When capsulae vacuus establish module, the information, time and attitude information for sending typing in advance are packaged Capsulae vacuus when establishing;
Encrypted transmission unit, for being sent by Encryption Transmission Protocol clock synchronization capsulae vacuus.
As an implementation, capsulae vacuus establishes module when described further include:
Password is to unit, for generating recessed code and convex code after setting time and dimensional orientation;
Data acquisition unit, for generating capsule count, data signature, timestamp, capsule size and capsule head;
Combining unit combines for that will send information and convex code in advance and generates data Layer;By time and dimensional orientation setting letter Breath, recessed code, capsule count, data signature, capsule size, timestamp, capsule head and asymmetric encryption information, which combine, generates ginseng Several layers;
Capsule encryption unit, for being encrypted to capsule;
Whether matching unit matches for the recessed code of detection parameters layer and the convex code of data Layer;
Unit is sealed, if correct for matching, is sealed, the foundation of capsulae vacuus when completion.
As an implementation, the sending module includes:
Password is to verification unit, for carrying out concave-convex code check to the when capsulae vacuus established and sealed, if verification does not pass through, Capsulae vacuus when then re-establishing;
Judging unit judges whether APP ID, APP Secret exist simultaneously if passing through for verifying, if it does not exist, It then sends request and generates APP ID, APP Secret, and cache;
Private key encryption unit, if existing simultaneously for APP ID, APP Secret, clock synchronization capsulae vacuus carries out asymmetric add It is close;
Signature check unit, for carrying out data signature verification by MD5 one-way Hash algorithm;
Full key encryption unit carries out global encryption for clock synchronization capsulae vacuus;
Expired judging unit, for judging whether APP Secret expired, if expired, send request generate APP ID, APP Secret, if not out of date, capsulae vacuus sends request when initiating;
Encrypted transmission unit, capsulae vacuus when for being sent by Encryption Transmission Protocol.
The beneficial effect of the present invention compared with the prior art is: using mobile Internet and mobile phone sensor technology to letter Breath setting send, receive, read, display and disappear time, while to information setting send, receive, read, display and The dimensional orientation (i.e. geographical location) of disappearance is prolonged to assign information time and space (geographical location) attribute with this to realize Shi Tongxin;By when capsulae vacuus can avoid transmit exposed information in the communications, realize encapsulating for information, time, sky can be assigned Between attribute function so that delay communication conveniently realized, and make transmission information preferably encrypt, save and pass It is defeated;Meanwhile when capsulae vacuus be divided into parameter layer, data Layer, wherein parameter layer is equivalent to the block of block chain technology in the application, can To realize distributed storage, point-to-point transmission etc..Data Layer includes user data, i.e. information content itself.Parameter layer and data For layer with unique corresponding password to combination, parameter layer is recessed code, data Layer is convex code, is ensured between the two with unique corresponding relation Capsule is that unique information is whole, it is ensured that the when capsulae vacuus sealed has and can not add, can not delete, can not cover, can not repair The characteristics of changing, can not destroying.
Detailed description of the invention
Fig. 1 is the flow chart of delay communication means of the invention;
Fig. 2 is the flow chart of capsulae vacuus when establishing of the invention;
Fig. 3 encrypts for when capsulae vacuus of the invention and the flow chart of transmission flow;
Fig. 4 is the module connection figure of delay communication system of the invention;
Fig. 5 is that the when capsulae vacuus of present invention delay communication system establishes the module connection figure of module;
Fig. 6 is the module connection figure of the sending module of present invention delay communication system.
1, attached drawing mark: capsulae vacuus establishes module when;11, typing unit;12, condition setting unit;13, password is to list Member;14, combining unit;15, data acquisition unit;16, capsule encryption unit;17, matching unit;18, unit is sealed;2, it sends Module;21, password is to verification unit;22, judging unit;23, private key encryption unit;24, signature check unit;25, full key adds Close unit;26, expired judging unit;27, encrypted transmission unit;3, receiving module.
Specific embodiment
Below in conjunction with attached drawing, the technical characteristic and advantage above-mentioned and other to the present invention are clearly and completely described, Obviously, described embodiment is only section Example of the invention, rather than whole embodiments.
As shown in Figure 1, a kind of delay communication means, comprising the following steps:
S101: the information that typing is sent in advance, the information sent in advance can be text, picture, video, audio, 3D information, electricity The different types such as son signature, electronic document and link;
S102: sending to information setting, receive, reading, the time for showing and disappearing, while being sent to information setting, It receives, read, the dimensional orientation of display and disappearance;
S200: the information that will be provided with the pre- transmission of time and dimensional orientation is carried out according to the time of setting and dimensional orientation It sends;
S300: after receiving under conditions of recipient meets time and dimensional orientation and reading information, entire delay is completed The transmitting of communication.
It sends, receive, read, show and disappears to information setting using mobile Internet and mobile phone sensor technology Time, while to the dimensional orientation (i.e. geographical location) that information setting sends, receives, reads, shows and disappear, to assign Information time and space (geographical location) attribute communicate (Time-Lapse Message, abbreviation TM) with this to realize to be delayed.Prolong The central principle of Shi Tongxin is: sending information to some preset space-time crosspoint, makes the information person of being received of setting Accurately know, information receiver can be a people, group, owner or machine, artificial intelligence terminal, and delay is logical The information transmitted in letter has time and space attribute.
In order to develop letter using the method being packaged to information to information imparting time and space attribute, the present invention Encapsulation tool is ceased, " when capsulae vacuus " (English name: Spatio-temporal Capsule, abbreviation STC) is named as.When hungry area Capsule is the invention of means of communication of being delayed, and avoids transmitting exposed information in the communications, realizes encapsulating for information, can assign The function of Shi Wen, space attribute so that delay communication is able to facilitate realization, and make the information of transmission preferably encrypt, save, pass It is defeated.
When capsulae vacuus include parameter layer and data Layer, parameter layer includes: (1) capsule head: coding, time including the capsule Stamp;(2) transmit details: sending time and dimensional orientation, the receiving time of recipient and dimensional orientation including sender and Other conditions (time and dimensional orientation) in relation to display, reading and disappearance;(3) digital signature: the i.e. digital signature of sender; (4) capsule count device: sender's capsule count and all capsule counts of system;(5) capsule size: the i.e. byte of the complete capsule Number;(6) asymmetric encryption information;(7) recessed code.Data Layer includes: that (1) sends information in advance: i.e. sender wants the information transmitted, Including different types of information such as text, picture, video, audio, 3D information, electronic signature, electronic document and links;(2) Convex code.
Meanwhile when capsulae vacuus be divided into parameter layer, data Layer, wherein parameter layer is equivalent to the area of block chain technology in the application Distributed storage, point-to-point transmission etc. may be implemented in block.Data Layer includes user data, i.e. information content itself.Parameter layer and Data Layer is with unique corresponding password to (parameter layer is recessed code, data Layer is convex code) is combined, and recessed code is with convex code as tiger-shaped tally issued to generals as imperial authorization for loop movement in ancient China It corresponds to each other, is that parameter layer and data Layer are uniquely corresponded to by Encryption Algorithm.Assign the recessed code of parameter layer and the data of parameter layer Content coupling, when capsulae vacuus foundation finish, after sealing, recessed code one side Protection parameters layer is not destroyed, be not modified, add, It covers, delete, destroy, can only read and replicate, it is on the other hand, recessed when above-mentioned accident occurs when external force breakthrough system encryption Code is at once disturbed, is recognized by the system and invades for danger, and causes parameter layer that can not be adapted to data Layer, protects data Layer information It is not broken into and damages;Assign data Layer convex code couple with the data content of data Layer, when capsulae vacuus foundation finish, sealing Afterwards, on the one hand convex code protects data Layer not to be destroyed, is not modified, adds, covers, deletes, destroys, on the other hand, when outer Power breaks through system encryption, and when above-mentioned accident occurs, convex code is at once disturbed, is recognized by the system and invades for danger, and leads to data Layer can not be adapted to parameter layer, and Protection parameters layer information is not broken into and damages;When the parameter layer containing recessed code is copied as When the block of block chain carries out distributed storage, if any tracing or reading when needing of data Layer information, matched by concave-convex code, Block (parameter layer replicated) the correspondence system storage of distributed storage (refers to and is stored in system database, cloud, client Deng) data Layer, to read data Layer content, to realize the small parameter layer distributed storage of data volume, the big number of data volume It is concentrated according to layer or client stores.
As shown in Fig. 2, when capsulae vacuus establishment process specifically includes the following steps:
S101: the information that typing is sent in advance, the information sent in advance can be text, picture, video, audio, 3D information, electricity The different types such as son signature, electronic document and link;
S102: sending to information setting, receive, reading, the time for showing and disappearing, while being sent to information setting, It receives, read, the dimensional orientation of display and disappearance;
S103: after setting time and dimensional orientation, recessed code and convex code are generated;
S104: will send information in advance and convex code combines and generates data Layer;
S105: the unique digital signature of sampling registration user generates data signature;
S106: the random number and characterization capsule of sampling characterization capsule count mark generate the natural count of time sequencing, and Capsule count is generated according to random number and natural count, wherein random number is made of the multidigit code for fixing digit, and setting is random The number first purpose are identification markings as capsule count, natural count refer to system to it is all when capsulae vacuus generated by request Time-sequencing natural number;
S107: sampling system clock links national time service center imparting generation timestamp, meanwhile, it is by timestamp combination Unified editing code generates capsule head;
S108: recessed code, capsule count, data signature, timestamp, capsule head and asymmetric encryption information are combined and generated Parameter layer;
S109: whether the recessed code of detection parameters layer and the convex code of data Layer match, and the process is primarily to ensure " product It is qualified ";
S110: if matching is correct, being sealed, the foundation of capsulae vacuus when completion, when reading entire in establishment process Capsule size is added in parameter layer for the data volume of capsulae vacuus, i.e. capsule size.
It is further comprising the steps of when above-mentioned establish in addition to capsulae vacuus step:
After setting time and dimensional orientation, preview simultaneously checks the information content and setting condition.
During step S200, using Encryption Transmission Protocol, as shown in figure 3, detailed process the following steps are included:
S201: concave-convex code check is carried out to the when capsulae vacuus established and sealed, capsulae vacuus prepares when which ensures Transmission, especially parameter layer by the block as block chain in use, if concave-convex code check does not pass through, hungry area when re-establishing Capsule;
S202: if concave-convex code check passes through, judge whether APP ID, APP Secret exist simultaneously;
S203: if APP ID, APP Secret are not existed simultaneously, sending request and generate APP ID, APP Secret, and Caching;
S204: if APP ID, APP Secret are existed simultaneously, clock synchronization capsulae vacuus carries out asymmetric encryption;
S205: carrying out data signature verification by MD5 one-way Hash algorithm, if data signature verification does not pass through, again Judge whether APP ID, APP Secret exist simultaneously;
S206: if data signature verification passes through, clock synchronization capsulae vacuus carries out global encryption;
S207: judging whether APP Secret is expired, if APP Secret is expired, sends request and generates APP ID, APP Secret;
S208: if APP Secret is not out of date, capsulae vacuus sends request when initiating;
S209: capsulae vacuus when being sent by Encryption Transmission Protocol, in this example, can using following three kinds it is common plus Close transport protocol: 1, Signal protocol Encryption Transmission Protocol, this is a kind of communication encryption agreement end to end, What facebook messenger and whatsapp were used is exactly this transport protocol;2,SSL(Secure Sockets Layer) agreement and TLS (Transport Layer Security) are mainly used for adding the data that http protocol transmits Close, TLS is the upgrade version of SSL;3, WTLS wireless transport layer security (Wireless Transport Layer Security Protocol, WTLS), it is the base growth in above-mentioned tls protocol (1.0), and main improve is according to nothing The requirement such as thread environment, long range, low bandwidth increases the support of datagram, the optimization of Handshake Protocol and dynamic key refreshing etc. New feature;
S210: when receiving end receives after capsulae vacuus, concave-convex code check is carried out to it;
S211: if verification passes through, sending it to recipient, meanwhile, successful information will be sent and inform sender;
S212: capsulae vacuus when opening recipient meets time and dimensional orientation under conditions of, read when capsulae vacuus Information, meanwhile, the information of capsulae vacuus when having opened is informed into sender.
The anti-decryption capabilities of capsulae vacuus, pass through multiple, the multiple encryption algorithms side of combining when in above process, to improve Formula improves cryptographic capabilities.Specifically, have four encryptions: the encryption for timestamp in parameter layer (is calculated using such as 128 AES Method encryption), the concave-convex code encryption for parameter layer and data Layer, the asymmetric encryption for digital signature (using such as MD5 it is mono- To hashing algorithm encrypt) and for when capsulae vacuus transmit asymmetric encryption.Wherein, capsule encryption is for passing according to agreement Encipherment protection when defeated, it is ensured that when capsulae vacuus transmission error of transmission will not occur, and capsulae vacuus does not ride misfortune by non-agreement when ensuring.
As shown in figure 4, a kind of delay communication system, including when capsulae vacuus establish module, sending module and receiving module, When capsulae vacuus establish module for information, time and attitude information that typing is sent in advance to be packaged to hungry area when establishing Capsule;Sending module is used to set information (the when capsulae vacuus after the encapsulating) basis for being provided with the pre- transmission of time and dimensional orientation The time and dimensional orientation set are sent;Receiving module under conditions of recipient meets time and dimensional orientation for receiving And after reading information, the transmitting of entire delay communication is completed.
As shown in figure 5, when capsulae vacuus establish module include typing unit, condition setting unit, password to unit, in conjunction with list Member, data acquisition unit, capsule encryption unit, matching unit and sealing unit, typing unit are used for the letter that typing is sent in advance Breath;Condition setting unit was used for information setting transmission, reception, reading, display and the time to disappear, while giving information setting It sends, receive, reading, the dimensional orientation of display and disappearance;Password is used for after setting time and dimensional orientation unit, raw At recessed code and convex code;Combining unit combines for that will send information and convex code in advance and generates data Layer;Time and dimensional orientation are set Confidence breath, recessed code, capsule count, data signature, capsule size, timestamp, capsule head and asymmetric encryption information combine life At parameter layer;Data acquisition unit is for generating capsule count, data signature, timestamp, capsule size and capsule head;Capsule Encryption unit is used to encrypt capsule parameter;Matching unit for detection parameters layer recessed code and data Layer convex code whether Match;If sealing unit is correct for matching, sealed, the foundation of capsulae vacuus when completion.
The space-time capsule structure of foundation includes parameter layer and data Layer, and parameter layer includes: (1) capsule head: including the capsule Coding, timestamp;(2) details: sending time and dimensional orientation, the receiving time of recipient and sky including sender are transmitted Between orientation and it is other in relation to display, read and disappear condition (time and dimensional orientation);(3) digital signature: i.e. sender Digital signature;(4) capsule count device: sender's capsule count and all capsule counts of system;(5) capsule size: i.e. this is complete The byte number of whole capsule;(6) asymmetric encryption information;(7) recessed code.Data Layer includes: that (1) sends information in advance: i.e. sender thinks The inhomogeneities such as the information to be transmitted, including text, picture, video, audio, 3D information, electronic signature, electronic document and link The information of type;(2) convex code.
As shown in fig. 6, sending module includes password to verification unit, judging unit, private key encryption unit, signature check list First, full key encryption unit, expired judging unit and encrypted transmission unit, password are used for establishing and seal verification unit When capsulae vacuus carry out concave-convex code check, if verification does not pass through, capsulae vacuus when re-establishing;If judging unit is logical for verifying It crosses, then judges whether APP ID, APP Secret exist simultaneously, if it does not exist, then send request and generate APP ID, APP Secret, and cache;Private key encryption unit is for if it exists, then clock synchronization capsulae vacuus to carry out asymmetric encryption;Signature check unit For carrying out data signature verification by MD5 one-way Hash algorithm;Full key encryption unit carries out global add for clock synchronization capsulae vacuus It is close;Expired judging unit is for judging whether APP Secret is expired, if expired, send request and generates APP ID, APP Secret, if not out of date, capsulae vacuus sends request when initiating;Encrypted transmission unit by Encryption Transmission Protocol for when being sent Capsulae vacuus.
The present invention sent to information setting using mobile Internet and mobile phone sensor technology, received, read, display and The time of disappearance, while being arranged to information and send, receive, reading, the dimensional orientation (i.e. geographical location) of display and disappearance, from And information time and space (geographical location) attribute are assigned, it is communicated with this to realize to be delayed.
By when capsulae vacuus can avoid transmit exposed information in the communications, realize encapsulating for information, time, sky can be assigned Between attribute function so that delay communication conveniently realized, and make transmission information preferably encrypt, save and pass It is defeated.
Meanwhile when capsulae vacuus be divided into parameter layer, data Layer, wherein parameter layer is equivalent to the area of block chain technology in the application Distributed storage, point-to-point transmission etc. may be implemented in block.Data Layer includes user data, i.e. information content itself.Parameter layer and Data Layer is with unique corresponding password to combination, and parameter layer is recessed code, data Layer is convex code, between the two with unique corresponding relation Ensure that capsule is that unique information is whole, it is ensured that the when capsulae vacuus sealed has and can not add, can not delete, can not cover, no The characteristics of can modifying, can not destroying.
Particular embodiments described above has carried out further the purpose of the present invention, technical scheme and beneficial effects It is described in detail, it should be understood that the above is only a specific embodiment of the present invention, the protection being not intended to limit the present invention Range.It particularly points out, to those skilled in the art, all within the spirits and principles of the present invention, that is done any repairs Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.

Claims (10)

1. a kind of delay communication means, which comprises the following steps:
The information that typing is sent in advance;
Transmission is set to information, is received, the time of reading, display and disappearance, while being arranged to information and sending, reception, reading, Display and the dimensional orientation to disappear;
The information for being provided with the pre- transmission of time and dimensional orientation is sent according to the time and dimensional orientation of setting;
After receiving under conditions of recipient meets time and dimensional orientation and reading information, the biography of entire delay communication is completed It passs.
2. delay communication means according to claim 1, which is characterized in that further comprising the steps of:
Information, time and attitude information that typing is sent in advance are packaged to capsulae vacuus when establishing;
It is sent by Encryption Transmission Protocol clock synchronization capsulae vacuus.
3. delay communication means according to claim 2, which is characterized in that the information for sending typing in advance, time And attitude information is packaged capsulae vacuus when establishing, specifically includes the following steps:
After setting time and dimensional orientation, recessed code and convex code are generated;
Information will be sent in advance and convex code combines and generates data Layer;
Recessed code is combined to generate parameter layer time and dimensional orientation setting information;
Whether the recessed code of detection parameters layer and the convex code of data Layer match;
If matching is correct, sealed, the foundation of capsulae vacuus when completion.
4. delay communication means according to claim 3, which is characterized in that described by time and dimensional orientation setting information Parameter layer is generated in conjunction with recessed code, further comprising the steps of:
The unique digital signature of sampling registration user generates data signature;
The random number and characterization capsule of sampling characterization capsule count mark generate the natural count of time sequencing, and according to random number Capsule count is generated with natural count, wherein random number is made of the multidigit code for fixing digit, and the random number first purpose is arranged The identification marking as capsule count, natural count refer to system to it is all when capsulae vacuus the time-sequencing generated by request Natural number;
Sampling system clock links national time service center imparting generation timestamp, meanwhile, timestamp combination system coding is raw At capsule head;
By time and dimensional orientation setting information, recessed code, capsule count, timestamp, capsule head and asymmetric encryption information knot Symphysis is at parameter layer.
5. delay communication means according to claim 2, which is characterized in that described to pass through Encryption Transmission Protocol clock synchronization hungry area Capsule is sent, specifically includes the following steps:
Concave-convex code check is carried out to the when capsulae vacuus established and sealed;
If verification does not pass through, capsulae vacuus when re-establishing, if verification passes through, judge APPID, APP Secret whether simultaneously In the presence of;
If APPID, APP Secret are not existed simultaneously, sends request and generate APP ID, APP Secret, and cache, if APPID, APP Secret are existed simultaneously, then clock synchronization capsulae vacuus carries out asymmetric encryption;
Data signature verification is carried out by MD5 one-way Hash algorithm;
If data signature verification does not pass through, rejudge whether APPID, APP Secret exist simultaneously, if data signature school It tests and passes through, then clock synchronization capsulae vacuus carries out global encryption;
Judge whether APP Secret is expired;
If APP Secret is expired, sends request generation APPID, APP Secret and initiated if APP Secret is not out of date When capsulae vacuus send request;
Capsulae vacuus when being sent by Encryption Transmission Protocol.
6. delay communication means according to claim 3, which is characterized in that capsulae vacuus when establishing further includes following step It is rapid:
After setting time and dimensional orientation, preview simultaneously checks the information content and setting condition.
7. a kind of delay communication system characterized by comprising
Typing unit, the information sent in advance for typing;
Condition setting unit, the time for sending, receiving, reading, show and disappear to information setting, while being set to information Set the dimensional orientation of transmission, reception, reading, display and disappearance;
Sending module, time and dimensional orientation of the information according to setting of the pre- transmission for time and dimensional orientation will to be provided with It is sent;
Receiving module is completed entire after receiving under conditions of recipient meets time and dimensional orientation and reading information Be delayed the transmitting communicated.
8. delay communication system according to claim 7, which is characterized in that further include:
When capsulae vacuus establish module, the information, time and attitude information for sending typing in advance are packaged foundation When capsulae vacuus;
Encrypted transmission unit, for being sent by Encryption Transmission Protocol clock synchronization capsulae vacuus.
9. delay communication system according to claim 8, which is characterized in that capsulae vacuus establishes module when described further include:
Password is to unit, for generating recessed code and convex code after setting time and dimensional orientation;
Data acquisition unit, for generating capsule count, data signature, timestamp, capsule size and capsule head;
Combining unit combines for that will send information and convex code in advance and generates data Layer;By time and dimensional orientation setting information, recessed Code, capsule count, data signature, capsule size, timestamp, capsule head and asymmetric encryption information, which combine, generates parameter layer;
Capsule encryption unit, for being encrypted to capsule;
Whether matching unit matches for the recessed code of detection parameters layer and the convex code of data Layer;
Unit is sealed, if correct for matching, is sealed, the foundation of capsulae vacuus when completion.
10. delay communication system according to claim 8, which is characterized in that the sending module includes:
Password weighs verification unit for carrying out concave-convex code check to the when capsulae vacuus established and sealed if verification does not pass through Newly-built capsulae vacuus immediately;
Judging unit judges whether APPID, APP Secret exist simultaneously, if it does not exist, then sends out if passing through for verifying It send request to generate APPID, APP Secret, and caches;
Private key encryption unit, if existing simultaneously for APPID, APP Secret, clock synchronization capsulae vacuus carries out asymmetric encryption;
Signature check unit, for carrying out data signature verification by MD5 one-way Hash algorithm;
Full key encryption unit carries out global encryption for clock synchronization capsulae vacuus;
Expired judging unit, if expired, send request and generates APPID, APP for judging whether APP Secret is expired Secret, if not out of date, capsulae vacuus sends request when initiating;
Encrypted transmission unit, capsulae vacuus when for being sent by Encryption Transmission Protocol.
CN201811639289.6A 2018-12-29 2018-12-29 Time-delay communication method and system Active CN109462615B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811639289.6A CN109462615B (en) 2018-12-29 2018-12-29 Time-delay communication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811639289.6A CN109462615B (en) 2018-12-29 2018-12-29 Time-delay communication method and system

Publications (2)

Publication Number Publication Date
CN109462615A true CN109462615A (en) 2019-03-12
CN109462615B CN109462615B (en) 2021-09-21

Family

ID=65615796

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811639289.6A Active CN109462615B (en) 2018-12-29 2018-12-29 Time-delay communication method and system

Country Status (1)

Country Link
CN (1) CN109462615B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1373955A (en) * 1999-10-08 2002-10-09 诺基亚公司 Location sensitive multimedia messaging (MMS)
CN1943193A (en) * 2004-02-13 2007-04-04 索尼爱立信移动通讯股份有限公司 Method and device for message delivery
US20180189753A1 (en) * 2017-01-05 2018-07-05 Beskatta, LLC Infrastructure for obligation management and validation

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1373955A (en) * 1999-10-08 2002-10-09 诺基亚公司 Location sensitive multimedia messaging (MMS)
CN1943193A (en) * 2004-02-13 2007-04-04 索尼爱立信移动通讯股份有限公司 Method and device for message delivery
US20180189753A1 (en) * 2017-01-05 2018-07-05 Beskatta, LLC Infrastructure for obligation management and validation

Also Published As

Publication number Publication date
CN109462615B (en) 2021-09-21

Similar Documents

Publication Publication Date Title
US10771966B2 (en) Encryption method, decryption method, and related apparatus
CN101662765B (en) Encryption system and method of short message of mobile telephone
US20220198049A1 (en) Blockchain-Based Secure Email System
CN103684794A (en) Communication data encryption and decryption method based on DES (Data Encryption Standard), RSA and SHA-1 (Secure Hash Algorithm) encryption algorithms
CN101247605A (en) Short information enciphering and endorsement method, mobile terminal and short information ciphering system
CN101466079A (en) Method, system and WAPI terminal for transmitting e-mail
CN106533656B (en) A kind of key multilayer mixing method for encryption/decryption based on WSN
CN101720071A (en) Short message two-stage encryption transmission and secure storage method based on safety SIM card
TW201417546A (en) Instant messaging method and system
CN110138795B (en) Multi-step mixed encryption and decryption method in communication process
CN103026657A (en) Method and apparatus for providing a key certificate in a tamperproof manner
CN103731270A (en) Communication data encryption and decryption method based on BBS, RSA and SHA-1 encryption algorithm
CN104202736A (en) Mobile terminal short message end-to-end encryption method oriented to Android system
CN107579903B (en) Picture message secure transmission method and system based on mobile device
CN109194701B (en) Data processing method and device
CN104009842A (en) Communication data encryption and decryption method based on DES encryption algorithm, RSA encryption algorithm and fragile digital watermarking
CN104243149A (en) Encrypting and decrypting method, device and server
CN101924710A (en) Management system and method for enterprise email box
CN108848413B (en) System, method and device for preventing video from replay attack and storage medium
CN109600374A (en) Secure user data sending method and its system based on block chain
CN104602208B (en) A kind of SMS encryption communication means based on mobile network
CN103297230A (en) Information encryption and decryption method, device and system
CN105847001A (en) Device, system and method for digital microwave communication based on quantum encryption
CN103067897A (en) Asymmetrical mobile phone short message encryption method
CN109462615A (en) Be delayed communication means and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant