CN109792451A - Communication channel encryption, decryption and method for building up and device, memory and terminal - Google Patents

Communication channel encryption, decryption and method for building up and device, memory and terminal Download PDF

Info

Publication number
CN109792451A
CN109792451A CN201880002398.9A CN201880002398A CN109792451A CN 109792451 A CN109792451 A CN 109792451A CN 201880002398 A CN201880002398 A CN 201880002398A CN 109792451 A CN109792451 A CN 109792451A
Authority
CN
China
Prior art keywords
ciphertext
communication channel
address
port
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201880002398.9A
Other languages
Chinese (zh)
Other versions
CN109792451B (en
Inventor
袁振南
孟天晖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
District Chain Tong Network Co Ltd
Original Assignee
District Chain Tong Network Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by District Chain Tong Network Co Ltd filed Critical District Chain Tong Network Co Ltd
Publication of CN109792451A publication Critical patent/CN109792451A/en
Application granted granted Critical
Publication of CN109792451B publication Critical patent/CN109792451B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application provides encryption, decryption and the method for building up and device, memory and terminal of a kind of communication channel, and the communication channel encryption method is comprising steps of obtain the address and port of communication channel;By the public key encryption of the address of the communication channel and port asymmetric arithmetic, the first ciphertext is generated;First ciphertext is mapped by code book, obtains the second ciphertext;Second ciphertext is mixed with selected text segment, generates message text.The application can reduce the probability that communication channel is disturbed or cuts off, suitable for establishing communication channel between two users or open more people's communication systems.

Description

Communication channel encryption, decryption and method for building up and device, memory and terminal
Technical field
This application involves field of computer technology, specifically, this application involves a kind of encryption of communication channel, decrypting and building Cube method and device, memory and terminal.
Background technique
This part intends to provides background or context for the embodiment stated in claims.Description herein not because It is included in this section and just recognizes it is the prior art.
In the communication scenes of reality, between user and user, between user and server and server and server Between communication channel, may all be cut off by malicious parties, be interrupted so as to cause the communication between user.Such as it is shown in FIG. 1 E-mail system, if the communication channel between user 101 and first server 102 is cut off or second user 104 and second The communication channel between communication channel or first server 102 and second server 103 between server 103 is cut off, all Will lead to can not receiving and dispatching mail between user 101 and user 104.
Summary of the invention
The application proposes a kind of encryption method, decryption method, method for building up and device, memory and terminal, to solve The communication channel between user is easy cut-off problem in the prior art.
The communication channel encryption method that the application proposes, comprising steps of
Obtain the address and port of the communication channel of communication channel;
By the public key encryption of the address of the communication channel and port asymmetric arithmetic, the first ciphertext is generated;
First ciphertext is mapped by code book, obtains the second ciphertext;
Second ciphertext is mixed with selected text segment, generates message text.
The application also proposes a kind of communication channel decryption method, comprising steps of
Message text is obtained, the message text is mixed to get by the second ciphertext and selected text segment;
According to the selected text segment, second ciphertext is searched from the message text;
Second ciphertext is carried out reflection by code book to penetrate, obtains the first ciphertext;
First ciphertext is decrypted using the private key of asymmetric arithmetic, obtains the address and port of communication channel.
Further, second ciphertext is the wrong word in the message text;
It is described by second ciphertext by code book carry out reflection penetrate, obtain the first ciphertext, comprising:
Preset code book is obtained, the code book is the mapping relations of wrong word and character;
According to the mapping relations, the wrong word of the second ciphertext is converted into character, using character as the first ciphertext.
The application also proposes a kind of communication channel method for building up, comprising steps of
The address and port of sender's acquisition communication channel;By the address of the communication channel and port asymmetric arithmetic Public key encryption, generate the first ciphertext;First ciphertext is mapped by code book, obtains the second ciphertext;It will be described Second ciphertext is mixed with selected text segment, generates message text;
Recipient obtains the message text;According to the selected text segment, institute is searched from the message text State the second ciphertext;Second ciphertext is carried out reflection by code book to penetrate, obtains first ciphertext;By first ciphertext It is decrypted using the private key of asymmetric arithmetic, obtains the address and port of communication channel;Access the address of the communication channel Device node corresponding with port, establishes communication channel.
The application also proposes a kind of communication channel encryption device, comprising:
Address acquisition module, for obtaining the address and port of communication channel;
Public-key encryption module, for giving birth to the public key encryption of the address of the communication channel and port asymmetric arithmetic At the first ciphertext;
Mapping encrypting module obtains the second ciphertext for mapping first ciphertext by code book;
Hybrid Encryption module generates message text for mixing second ciphertext with selected text segment.
The application also proposes a kind of communication channel decryption device, comprising:
Data obtaining module, for obtaining message text, message text is carried out by the second ciphertext and selected text segment It is mixed to get;
Ciphertext searching module, for searching described second from the message text according to the selected text segment Ciphertext;
Password deciphering module is penetrated for second ciphertext to be carried out reflection by code book, obtains the first ciphertext;
First ciphertext is decrypted using the private key of asymmetric arithmetic, obtains communication channel by private key deciphering module Address and port.
The application also proposes a kind of computer-readable memory, is stored thereon with computer program, and the program is by processor Communication channel encryption method described in aforementioned any one is realized when execution;Alternatively, before being realized when the program is executed by processor State communication channel decryption method described in any one;Or the program realizes that the communication channel is built when being executed by processor Cube method.
The application also proposes that a kind of terminal, the terminal include:
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processing Device realizes communication channel encryption method described in aforementioned any one;Alternatively, before realizing one or more of processors State communication channel decryption method described in any one;Alternatively, one or more of processors is made to realize the communication Path Setup method.
The application has the advantages that
1, the application is mapped by public key encryption, code book and carries out the cipher mode layer by layer such as mixing with text segment, is solved When this terminal of having determined sends the address and port of the communication channel to other terminals or user, it is easy the communication channel of divulging a secret Address and port so as to cause communication channel be easy by attack or cutting the problem of;Moreover, generated by asymmetric arithmetic Public key is encrypted, even if the message text is leaked to third party, if third party does not have the private key, can not also be passed through Reverse or conventional decryption method obtains the address of the communication channel and the information of port, further reduced communication channel and is done The probability disturbed and cut off is applicable not only to establish communication channel between two users, is also suitable for communicating system in open more people Communication channel is established in system.
2, the application can send the message text by the Email for being not easy to be stopped by most of network, improve The address of the communication channel and the probability of success of port are sent between user, suitable for Network status is bad or attacked Network system;Moreover, can also be by encrypted second ciphertext hiding in selected text segment, to avoid by mail mistake Filter system intercepts, and further improves and sends the address of the communication channel and the probability of success of port.
The additional aspect of the application and advantage will be set forth in part in the description, these will become from the following description It obtains obviously, or recognized by the practice of the application.
Detailed description of the invention
The application is above-mentioned and/or additional aspect and advantage will become from the following description of the accompanying drawings of embodiments Obviously and it is readily appreciated that, in which:
Fig. 1 is the structural schematic diagram of real e-mail system embodiment
Fig. 2 is the flow diagram of herein described communication channel encryption method first embodiment;
Fig. 3 is the flow diagram of herein described communication channel decryption method first embodiment;
Fig. 4 is the flow diagram of the embodiment of herein described communication channel method for building up;
Fig. 5 is the structural schematic diagram of herein described communication system embodiment;
Fig. 6 is the structural schematic diagram of herein described terminal embodiment.
Specific embodiment
Embodiments herein is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached The embodiment of figure description is exemplary, and is only used for explaining the application, and cannot be construed to the limitation to the application.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, " one It is a ", " described " and "the" may also comprise plural form, " first " used herein, " second " are only used for distinguishing same technology special Sign, is not limited the sequence of the technical characteristic and quantity etc..It is to be further understood that in the description of the present application The wording " comprising " used refers to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that depositing Or add other one or more features, integer, step, operation, element, component and/or their group.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art Language and scientific term), there is meaning identical with the general understanding of those of ordinary skill in the application fields.Should also Understand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior art The consistent meaning of meaning, and unless idealization or meaning too formal otherwise will not be used by specific definitions as here To explain.
Those skilled in the art of the present technique are appreciated that " terminal " used herein above, " terminal device " both include wireless communication The equipment of number receiver, only has the equipment of the wireless signal receiver of non-emissive ability, and including receiving and emitting hardware Equipment, have on bidirectional communication link, can execute two-way communication reception and emit hardware equipment.This equipment It may include: honeycomb or other communication equipments, shown with single line display or multi-line display or without multi-line The honeycomb of device or other communication equipments;PCS (Personal Communications Service, PCS Personal Communications System), can With combine voice, data processing, fax and/or communication ability;PDA (Personal Digital Assistant, it is personal Digital assistants), it may include radio frequency receiver, pager, the Internet/intranet access, web browser, notepad, day It goes through and/or GPS (Global Positioning System, global positioning system) receiver;Conventional laptop and/or palm Type computer or other equipment, have and/or the conventional laptop including radio frequency receiver and/or palmtop computer or its His equipment." terminal " used herein above, " terminal device " can be it is portable, can transport, be mounted on the vehicles (aviation, Sea-freight and/or land) in, or be suitable for and/or be configured in local runtime, and/or with distribution form, operate in the earth And/or any other position operation in space." terminal " used herein above, " terminal device " can also be communication terminal, on Network termination, music/video playback terminal, such as can be PDA, MID (Mobile Internet Device, mobile Internet Equipment) and/or mobile phone with music/video playing function, it is also possible to the equipment such as smart television, set-top box.
The application proposes a kind of encryption method, decryption method, method for building up and device, memory and terminal, for improving The anti-cut cutting capacity and raising confidentiality of communication channel.
Communication channel encryption method first embodiment as shown in Figure 2, includes the following steps:
Step S10: the address and port of communication channel are obtained;
Step S20: by the public key encryption of the address of the communication channel and port asymmetric arithmetic, it is close to generate first Text;
Step S30: first ciphertext is mapped by code book, obtains the second ciphertext;
Step S40: second ciphertext is mixed with selected text segment, generates message text.
Wherein, each step is specific as follows:
Step S10: the address and port of communication channel are obtained.
The address of the communication channel includes the server ip address or other equipment for communication nodes for communication. The address and port of the communication channel can be according to specific requirements for sending and receiving data, to realize two different users Or the data exchange between multiple users.
Step S20: by the public key encryption of the address of the communication channel and port asymmetric arithmetic, it is close to generate first Text.
Sender can be used rivest, shamir, adelman and obtain a pair of of private key and public key.The public key be used for communication data into Row encryption, the private key can be used for encrypting communication data, the data received can also be decrypted;In some cases Under, the private key can also be used as the digital signature voucher etc. in communication.To guarantee that it is described logical that the recipient of only communication can decrypt Data are interrogated, the public key for being used to encrypt can be stored in sender in advance, will used by the present invention before sender and recipient's communication It is stored in recipient in the private key of decryption, so that sender is encrypted using the public key, and encrypted communication data is only It can be decrypted by the private key of recipient, to guarantee the privacy of communication data.When first ciphertext is uploaded in network When defeated, if being intercepted and captured by other rogue programs, when interception side is without corresponding private key, then the content of intercepting and capturing can not be learnt, therefore this step Suddenly the address of the communication channel and port are encrypted by the public key in asymmetric arithmetic, it is ensured that the communication channel Address and port crypticity, improve the safety during subsequent communications.
The related asymmetric arithmetic such as ECC algorithm or RSA Algorithm can be used in the asymmetric arithmetic.ECC algorithm is based on ellipse Circular curve algorithm mainly utilizes the rational point on elliptic curve to constitute the calculating of Elliptic discrete logarithm in Abel module.RSA Encryption Algorithm is based on factorization algorithm, and 1977 by Peter Lonard Lee Vista (Ron Rivest), A Di Shamir What (Adi Shamir) and Leonard A Deman (Leonard Adleman) three people proposed, therefore use their three people's surnames first Title of the combination RSA of letter as the algorithm.RSA Algorithm is mainly decomposed using big factor of an integer.It can be according to asymmetric calculation The complexity for the public key that method obtains, the difficulty for generating signature with verifying signature, and generate signature in use and signed with verifying Name frequency come determine public key use generating algorithm.
For example, in a specific embodiment, first terminal can be used for the server ip address and port letter of communication Cease mip(such as 100.100.100.1:1234) uses public key dPIt is encrypted to the first ciphertext ms=fe(mip, dP), as the first ciphertext msIt is cut It obtains, since intercepting and capturing side lacks the private key d for decryptionA, then can not know the server ip address and port information for communication mip
Therefore the application also proposes another embodiment: the address by the communication channel and port asymmetric arithmetic Public key encryption, generate the first ciphertext before, further includes:
The private key d for decryption is generated according to random number or random number polynomialA
According to the private key dAGenerate the public key d for encryptionP, the public key dPGenerating algorithm include based on several points big Resolving Algorithm, or it is based on elliptic curve.
The present embodiment can be used based on factorization algorithm or based on elliptic curve, generate a pair of of public key dPWith private key dA;Wherein private key dAIt can be according to generating random number, public key dPIt can be based on the private key dAIt generates.Based on the factorization algorithm Or the private key d is generated based on elliptic curveAWith public key dPProcess can be found in the associated description of rivest, shamir, adelman, Details are not described herein.
In some embodiments, the public key dPThe password (Lattice-based) based on lattice also can be used, be based on Hash Password (Hash-based), based on coding (error correcting code) password (Code-based), be based on multivariate public key cryptography (Multivariate Public Key Cryptography), it is generated based on Falcon Encryption Algorithm scheduling algorithm.For example, when adopting When with Falcon Encryption Algorithm, the private key dAIt can be generated according to random number polynomial, then by the private key dAIt is encrypted using Falcon Algorithm generates the public key dP, to obtain the higher private key d of security levelAWith public key dP.Falcon Encryption Algorithm is 2017 11 The moon submits to National Institute of Standards and Technology (National Institute of Standards and on the 30th Technology, abbreviation NIST) rear quantum cryptology algorithm, its main feature is that generate the public key face quantum computer When, the safety for ensuring encryption data can be continued.Falcon Encryption Algorithm is the NTRU encryption system based on lattice digital signature scheme Algorithm frame is found in construction in a systematic way, after obtaining short polynomial f, g, F and G, can establish binary system or ternary Falcon structure tree, with It obtains and the private key dACorresponding public key dP, specific calculation can be found in be committed to NIST it is described after quantum cryptology Algorithm and other related descriptions about Falcon Encryption Algorithm.
Obtain the public key dPWith the private key dALater, the public key dPIt is stored in sender, the private key dAIt is held in Recipient;As the public key dPBe not sender generate when, sender can by publishing, public key catalogue listing, public key pipe The modes such as reason mechanism, data transmission obtain the public key dP, to be encrypted for the address to the communication channel with port. Certainly, sender can also obtain the public key d by modes such as EmailsP
Step S30: first ciphertext is mapped by code book, obtains the second ciphertext.
The code book be can be the conversion rule of another group of character string by one group of specific character string corresponding conversion, such as English alphabet is converted into corresponding Arabic numerals.The code book can be to only use primary disposal password sheet, can also Non-disposable code book.The code book can arrange with other communicating terminals in advance, so that other terminals would know that code book In mapping relations, convenient for decryption.It is logical to can further improve foundation by continuing to encrypt first ciphertext for this step Interrogate the safety in channel.
In another embodiment, the code book can be the mapping relations of wrong word and character;Implement based on described first Example, another embodiment can specifically: and it is described to map first ciphertext by code book, obtain the second ciphertext, comprising:
Preset code book is obtained, the code book is the mapping relations of wrong word and character;
According to the mapping relations, the character of the first ciphertext is converted into wrong word, using wrong word as the second ciphertext.
The code book can derive from other terminals, can also be generated as the terminal where sender.The wrong word and word The mapping relations of symbol can be mapped to the relationship of other kinds of characters for different characters, such as alphabetical A is mapped as alphabetical P, Letter b is mapped as letter C.When there is wrong word in certain section of article, the wrong word can be chosen and in a predefined order Combination, can be obtained second ciphertext;If second ciphertext is restored according to the mapping relations, can be obtained not There is the article of wrong word.The present embodiment is by mapping correct first ciphertext, with the second ciphertext after being mapped, into One step improves the safety of ciphertext.
Step S40: second ciphertext is mixed with selected text segment, generates message text.
The addresses of all encrypted communication channels of the second ciphertext obtained in the step S30 and port Information does not meet the messy code of correct language rule generally, to avoid this section of messy code from being identified as junk information, or is blocked by system It cuts or filters, or be identified as specific information, second ciphertext can be mixed in the article for meeting correct language rule and be sent out It send, to avoid arousing attention, can further improve the safety of system and the second ciphertext can be prevented and sent out because of intercepting or filtering Send failure.The text segment can be intercepted from English encyclopaedia class text, or be cut from the literature carrier such as english article, novel It takes, so that the cipher-text information sent will not be integrally intercepted in transmission process, or monitoring system is caused to pay attention to.
On the one hand the present embodiment passes through public key encryption, code book mapping and is mixed with text segment, solve this end When holding the address and port that send the communication channel to other terminals or user, the address for the communication channel that is easy to divulge a secret with The problem of port is easy so as to cause communication channel by attack or cutting;Moreover, the present embodiment is also generated by asymmetric arithmetic Public key encrypted, recipient can be decrypted by private key corresponding with the public key, further improve the peace of encryption Quan Xing is particularly suitable for open more people's communication systems;On the other hand, recipient corresponding with the present embodiment receives the letter After ceasing text, the address and port of the communication channel can be obtained by corresponding decryption method, convenient for logical with the communication The address in road and the sender of port establish communication channel, can effectively avoid communication channel and convert among multiple servers, protect The safety for establishing communication channel is hindered, the scene that may be maliciously stopped suitable for network, between communication server No limiting communication provides reliable method.
It is described by the address of the communication channel and port asymmetric arithmetic in another embodiment of the application Public key encryption generates the first ciphertext, comprising:
Obtain random information;
It is raw by the public key encryption of the address of the communication channel, the port and the random information asymmetric arithmetic At the first ciphertext.
The present embodiment not only adds the address and port of the communication channel when being encrypted using the public key It is close, also before encryption, it is mixed into the random information in the address and port of Xiang Suoshu communication channel, further improves encryption Safety.The random information generated can be generated by this terminal as sender, can also be generated by other equipment, and Each send is built consensus between hair and recipient.
It is described to mix second ciphertext with selected text segment in the another embodiment of the application, it is raw After message text, further includes:
By Email, the message text is sent to recipient.
Most of network can not generally block the transmitting-receiving of Email completely, therefore the present embodiment is sent out by the Email The message text is sent, the message text is can avoid and loses in transmission process, improve the success rate for establishing communication channel.
Corresponding to the communication channel encryption method of sender, the application also proposes the communication channel solution of recipient a kind of Decryption method, as shown in figure 3, comprising steps of
Step S60: obtaining message text, and the message text mix with selected text segment by the second ciphertext It arrives;
Step S70: according to the selected text segment, second ciphertext is searched from the message text;
Step S80: second ciphertext is subjected to reflection by code book and is penetrated, the first ciphertext is obtained;
Step S90: first ciphertext is decrypted using the private key of asymmetric arithmetic, obtains the address of communication channel With port.
In the step S60, when the recipient of information receives the message text, not only include in the message text Encrypted second ciphertext further includes the selected text segment so that second ciphertext it is whole in transmission process not It can be intercepted, or monitoring system will not be caused to pay attention to;The selected literature segment also plays the role of encryption, so that the letter When breath text is compromised, also other users will not be made to directly obtain the second ciphertext, increase the difficulty of other user's decryption.
In the step S70, if the recipient of information knows the selected literature segment of insertion, or know to mix institute It, can be according to selected the literature segment or the rule, from described when stating the rule of the second ciphertext and selected text segment Second ciphertext is found out in message text.Such as: second ciphertext is mixed with one section of literary works, works as reception When precognition mixed content in side's is the literary works, the literary works can be rejected, to filter out second ciphertext;Or The hiding rule predicted using recipient, the corresponding character of second ciphertext is hidden in the literary works, so as to connect Debit is combined into second ciphertext according to the literary works lookup received.
In step S80, if that first ciphertext is converted to second in ciphering process, using code book is close by sender Text, recipient can be penetrated by reflection, and second ciphertext is converted to corresponding first ciphertext.Sender can pass through with recipient It makes an appointment or mode that data are synchronous keeps the synchronization of code book, so that the mapping relations of both sides' code book are consistent.
When the information that sender uses public key to encrypt needs is encrypted to obtain first ciphertext, this step S90 can be decrypted first ciphertext by corresponding private key, with the information before being encrypted.The private key and public key It can be generated in the recipient of communication, then the public key can be sent in advance to the hair of communication by modes such as data transmission, mails The side of sending, so that the sender of communication is encrypted using the public key.
The present embodiment first searches second ciphertext, and penetrates to obtain described the by reflection for second ciphertext of lookup Finally first ciphertext is decrypted by the private key for one ciphertext, with the address of the communication channel before being encrypted And port, the present embodiment have ensured the address of the communication channel and the concealment of port by decryption layer by layer, reduce described The address and port of communication channel cause the probability attacked or intercepted because divulging a secret;Moreover, recipient need to be by described non-right The private key of algorithm is claimed to be decrypted, even if the message text is leaked to third party, if third party does not have the private key, also The information of the address and port of the communication channel can not be obtained by reverse or conventional decryption method, therefore further reduced logical Interrogate the probability that channel is disturbed and cuts off.Embodiments herein is applicable not only to establish communication channel between two users, also It is applicable to the scene of multi-party communication.
In another specific embodiment of the application, second ciphertext is the wrong word in the message text;
It is described by second ciphertext by code book carry out reflection penetrate, obtain the first ciphertext, comprising:
Preset code book is obtained, the code book is the mapping relations of wrong word and character;
According to the mapping relations, the wrong word of the second ciphertext is converted into character, using character as the first ciphertext.
The decryption step of the present embodiment is directed to using the wrong word in the message text as the encryption side of the second ciphertext Formula.For example, when encryption, using one section of literary works as the message text, according to specific rule, by the literary works Middle subalphbet replaces with corresponding wrong word, or increases extra character among division statement, and being formed has redundant character Words and phrases, the extra character can be used as wrong word.When recipient receives the message text, the literature can be searched Wrong word in works, and according to default rule, the wrong word group is combined into second ciphertext;Further according to described default Code book, the wrong word is penetrated by reflection and is converted to corresponding character, which is first ciphertext.This implementation Example is suitable for using wrong word as the cipher mode of second ciphertext, and encryption method is simple, lower to terminal resource consumption, fits It is wide with range;It is intercepted moreover, the message text for being mixed with wrong word is not easy to be filtered by system, improves the message text Transmission success rate.
It is described to solve first ciphertext using the private key of asymmetric arithmetic in another embodiment of the application It is close, obtain the address and port of communication channel, comprising:
First ciphertext is decrypted using the private key of asymmetric arithmetic, the plaintext after being decrypted;
The random information in the plaintext is removed, the address and port of the communication channel are obtained.
When needing also to be mixed with the random information for interference in the information that encrypts, the present embodiment can be according to knowing in advance Random information or be mixed with the rule of random information, the plaintext after decryption is handled, to obtain the communication channel Address and port.The present embodiment by the random information, further improve the communication channel address and port it is hidden Covering property enhances cipher round results.
For the decryption speed of raising recipient, and the influence for avoiding network environment bad to output transmission, this Shen Please also propose another embodiment: the acquisition message text, comprising:
By Email, the message text that sender sends is received.
The Email that most of network can not block completely, the present embodiment send the letter by way of Email Text is ceased, can be improved and send successful probability;Moreover, message text is used based on factorization algorithm or ellipse in the present embodiment The public key of curved line arithmetic is encrypted, and the safety of the message text is improved, even if other users get the information When text, due to not having private key, also it is difficult to crack the institute for obtaining and encrypting in the message text by modes such as Brute force State the address and port of communication channel.Information sender and the code book of recipient can also be synchronized with public key by mail, Or keep synchronous in such a way that other data are transmitted.
It is described to solve first ciphertext using the private key of asymmetric arithmetic in another embodiment of the application It is close, after obtaining the address and port of communication channel, further includes:
The address device node corresponding with port for accessing the communication channel, establishes communication channel.
The device node can be the node address in the server address or block catenary system where sender.At this In embodiment, address and port of the recipient by the access communication channel, the device node foundation that can be established with sender Connection, to complete the establishment process of sender and recipient's communication channel.
Based on the above various embodiments, the application also proposes a kind of embodiment of communication channel method for building up, the embodiment packet Include following steps:
The address and port of sender's acquisition communication channel;By the address of the communication channel and port asymmetric arithmetic Private key encryption, generate the first ciphertext;First ciphertext is mapped by code book, obtains the second ciphertext;It will be described Second ciphertext is mixed with selected text segment, generates message text;
Recipient obtains the message text;According to the selected text segment, institute is searched from the message text State the second ciphertext;Second ciphertext is carried out reflection by code book to penetrate, obtains first ciphertext;By first ciphertext It is decrypted using the private key of asymmetric arithmetic, obtains the address and port of communication channel;Access the address of the communication channel Device node corresponding with port, establishes communication channel.
There is the communication channel established through this embodiment good resistance to cut performance, can be in the network rings for having attack to stop It is flexibly free to establish without limited communication connection under border;And the communication connection established is not easy to be monitored by other users, can protect Hold the confidentiality of Content of Communication.
The application also proposes the embodiment of communication channel method for building up as shown in Figure 4 comprising following steps:
Step S11: sender and recipient establish code book b through consultations, the code book bsIt is arrived for English wrong word The mapping of English character;
Step S12: sender determines the server ip address and port m of this terminal calledip, and by the server ip Location and port mip(such as 100.100.100.1:1234) adds random information mr
Step S21: with the public key dABy the server ip address, port mipWith random information mrIt is close to be encrypted to first Literary ms=fe(mip+mr, dA);
Step S31: code book b is usedsBy the first ciphertext msIt is converted into corresponding wrong word, to obtain described second Ciphertext;
Step S41: by second ciphertext hiding in an english article, the message text is generated;Will pass through When Email sends the message text, second ciphertext is avoided to be blocked by the mail filtering system of email provider It cuts;The english article can intercept segment from English encyclopaedia or english article at random;
Step S51: the message text with wrong word is emailed to recipient;
Step S61: after recipient receives the Email, the english article with wrong word is got, i.e., The message text;
Step S71: searching wrong word from the english article, and the wrong word group is combined into second ciphertext;
Step S81: the code book b is usedsSecond ciphertext is converted into the first ciphertext ms
Step S91: recipient uses private key dPBy the first ciphertext msIt is decrypted into plaintext mp, mp=fd(ms, dA), from institute State literary m clearlypIn obtain with sender communicate server ip address and port mip
Step S92: recipient connects the server of sender by the server ip address with port, and it is logical to establish communication Road.
The present embodiment can establish communication system as shown in Figure 5, and user 1001 can be by the IP address of server 1002 and end Mouth mipUser 1004 is sent to by mail after encryption, user 1004 obtains IP address and the port of server 1002 after decrypting mipInformation, and pass through the IP address and port m of access server 1002ipEstablish the communication channel between user 1001.Pass through The communication system that the application establishes has higher anti-interference ability, avoids the information forwarding between multiple servers, also subtracts The cut-off possibility of the communication channel established is lacked;Moreover, communication process is not easy to be monitored by third party, secrecy with higher Property.
The present embodiment can be in such a way that most of network stops the Email that can not be blocked completely, will be encrypted logical Inquiry server IP address and port are sent to recipient, improve the success rate that the message text is sent;Moreover, by described Two ciphertexts are mixed in the english article, reduce the probability that second ciphertext is intercepted by mail filtering system, further It improves the message text and sends successful probability.The present embodiment also passes through the public key of rivest, shamir, adelman and makes an appointment Code book, the server ip address and port are hidden in the e-mail, ensure that the hidden of the message text of transmission Property transmission.The method for building up of the communication channel of the present embodiment is applicable not only to establish connection between two sides, is also applicable to multi-party Under the scene of communication;And it flexibly can freely realize and be connected without limiting communication under the network environment for thering is attack to stop.
Based on the communication channel encryption method, the application also proposes a kind of communication channel encryption device, and the communication is logical Road encryption device includes:
Address acquisition module, for obtaining the address and port of communication channel;
Public-key encryption module, for giving birth to the public key encryption of the address of the communication channel and port asymmetric arithmetic At the first ciphertext;
Mapping encrypting module obtains the second ciphertext for mapping first ciphertext by code book;
Hybrid Encryption module generates message text for mixing second ciphertext with selected text segment.
Based on the communication channel decryption method, the application also proposes a kind of embodiment of communication channel decryption device, institute Stating communication channel decryption device includes:
Data obtaining module, for obtaining message text, message text is carried out by the second ciphertext and selected text segment It is mixed to get;
Ciphertext searching module, for searching described second from the message text according to the selected text segment Ciphertext;
Password deciphering module is penetrated for second ciphertext to be carried out reflection by code book, obtains the first ciphertext;
First ciphertext is decrypted using the private key of asymmetric arithmetic, obtains communication channel by private key deciphering module Address and port.
The communication channel encryption device embodiment has same as the communication channel encryption method corresponding embodiment Beneficial effect, the communication channel decryption Installation practice have same as the communication channel decryption method corresponding embodiment Beneficial effect, details are not described herein.
A kind of computer-readable memory of the application, is stored thereon with computer program, when which is executed by processor Realize communication channel encryption method described in aforementioned any one;Alternatively, the program realized when being executed by processor it is aforementioned any Communication channel decryption method described in one;Or the program realizes the communication channel foundation side when being executed by processor Method.Wherein, the memory includes but is not limited to any kind of disk (including floppy disk, hard disk, CD, CD-ROM and magneto-optic Disk), ROM (Read-Only Memory, read-only memory), RAM (Random Access Memory, immediately memory), EPROM (Erasable Programmable Read-Only Memory, Erarable Programmable Read only Memory), EEPROM (Electrically Erasable Programmable Read-Only Memory, Electrically Erasable Programmable Read-Only Memory), Flash memory, magnetic card or light card.It is, memory includes being deposited by equipment (for example, computer) in the form that can be read Any medium of storage or transmission information.It can be read-only memory, disk or CD etc..
The application also proposes that a kind of terminal, the terminal include:
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processing Device realizes communication channel encryption method described in aforementioned any one;Alternatively, before realizing one or more of processors State communication channel decryption method described in any one;Alternatively, one or more of processors is made to realize the communication Path Setup method.
As shown in fig. 6, for ease of description, illustrating only part relevant to the embodiment of the present application, particular technique details It does not disclose, please refers to the embodiment of the present application method part.The terminal can be include mobile phone, tablet computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point of Sales, point-of-sale terminal), vehicle mounted electric Any terminal device such as brain, server, taking the terminal as an example:
Fig. 6 shows the block diagram of the part-structure of mobile phone relevant to terminal provided by the embodiments of the present application.With reference to figure 6, mobile phone includes: radio frequency (Radio Frequency, RF) circuit 1510, memory 1520, input unit 1530, display unit 1540, sensor 1550, voicefrequency circuit 1560, Wireless Fidelity (wireless fidelity, Wi-Fi) module 1570, processor The components such as 1580 and power supply 1590.It will be understood by those skilled in the art that handset structure shown in Fig. 6 is not constituted pair The restriction of mobile phone may include perhaps combining certain components or different component cloth than illustrating more or fewer components It sets.
It is specifically introduced below with reference to each component parts of the Fig. 6 to mobile phone:
RF circuit 1510 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station After downlink information receives, handled to processor 1580;In addition, the data for designing uplink are sent to base station.In general, RF circuit 1510 include but is not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition, RF circuit 1510 can also be logical with network and other equipment by wireless communication Letter.Any communication standard or agreement, including but not limited to global system for mobile communications (Global can be used in above-mentioned wireless communication System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE), Email, short message service (Short Messaging Service, SMS) etc..
Memory 1520 can be used for storing software program and module, and processor 1580 is stored in memory by operation 1520 software program and module, thereby executing the various function application and data processing of mobile phone.Memory 1520 can be led It to include storing program area and storage data area, wherein storing program area can be needed for storage program area, at least one function Application program (such as encryption or decryption etc.) etc.;Storage data area, which can be stored, uses created data (ratio according to mobile phone Such as code book or public key) etc..In addition, memory 1520 may include high-speed random access memory, it can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Input unit 1530 can be used for receiving the number or character information of input, and generate with the user setting of mobile phone with And the related key signals input of function control.Specifically, input unit 1530 may include touch panel 1531 and other inputs Equipment 1532.Touch panel 1531, also referred to as touch screen collect touch operation (such as the user of user on it or nearby Use the behaviour of any suitable object or attachment such as finger, stylus on touch panel 1531 or near touch panel 1531 Make), and corresponding attachment device is driven according to preset formula.Optionally, touch panel 1531 may include touch detection Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it It is converted into contact coordinate, then gives processor 1580, and order that processor 1580 is sent can be received and executed.In addition, Touch panel 1531 can be realized using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch surface Plate 1531, input unit 1530 can also include other input equipments 1532.Specifically, other input equipments 1532 may include But in being not limited to physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. It is one or more.
Display unit 1540 can be used for showing information input by user or be supplied to user information and mobile phone it is each Kind menu.Display unit 1540 may include display panel 1541, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) To configure display panel 1541.Further, touch panel 1531 can cover display panel 1541, when touch panel 1531 detects After arriving touch operation on it or nearby, processor 1580 is sent to determine the type of touch event, is followed by subsequent processing device 1580 provide corresponding visual output according to the type of touch event on display panel 1541.Although in Fig. 6, touch panel 1531 and display panel 1541 are the input and input function for realizing mobile phone as two independent components, but in certain realities Apply in example, can be integrated by touch panel 1531 and display panel 1541 and that realizes mobile phone output and input function.
Mobile phone may also include at least one sensor 1550, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light Light and shade adjust the brightness of display panel 1541, proximity sensor can close display panel when mobile phone is moved in one's ear 1541 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (generally three axis) and add The size of speed can detect that size and the direction of gravity when static, can be used to identify application (such as the horizontal/vertical screen of mobile phone posture Switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Also as mobile phone The other sensors such as configurable gyroscope, barometer, hygrometer, thermometer, infrared sensor, details are not described herein.
Voicefrequency circuit 1560, loudspeaker 1561, microphone 1562 can provide the audio interface between user and mobile phone.Audio Electric signal after the audio data received conversion can be transferred to loudspeaker 1561, be converted by loudspeaker 1561 by circuit 1560 For the output of vocal print signal;On the other hand, the vocal print signal of collection is converted to electric signal by microphone 1562, by voicefrequency circuit 1560 Audio data is converted to after reception, then by after the processing of audio data output processor 1580, through RF circuit 1510 to be sent to ratio Such as another mobile phone, or audio data is exported to memory 1520 to be further processed.
Wi-Fi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics by Wi-Fi module 1570 Mail, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 6 is shown Wi-Fi module 1570, but it is understood that, and it is not belonging to must be configured into for mobile phone, it can according to need completely Do not change in the range of the essence of invention and omits.
Processor 1580 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, By running or execute the software program and/or module that are stored in memory 1520, and calls and be stored in memory 1520 Interior data execute the various functions and processing data of mobile phone, to carry out integral monitoring to mobile phone.Optionally, processor 1580 may include one or more processing units;Preferably, processor 1580 can integrate application processor and modulation /demodulation processing Device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is mainly located Reason wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 1580.
Mobile phone further includes the power supply 1590 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply Management system and processor 1580 are logically contiguous, to realize management charging, electric discharge and power consumption pipe by power-supply management system The functions such as reason.
Although being not shown, mobile phone can also include camera, bluetooth module etc., and details are not described herein.
It should be understood that can be integrated in a processing module in each functional unit in each embodiment of the application, It can be physically existed alone, can also be integrated in two or more units in a module with each unit.It is above-mentioned integrated Module both can take the form of hardware realization, can also be realized in the form of software function module.
The above is only some embodiments of the application, it is noted that for the ordinary skill people of the art For member, under the premise of not departing from the application principle, several improvements and modifications can also be made, these improvements and modifications are also answered It is considered as the protection scope of the application.

Claims (15)

1. a kind of communication channel encryption method, which is characterized in that comprising steps of
Obtain the address and port of communication channel;
By the public key encryption of the address of the communication channel and port asymmetric arithmetic, the first ciphertext is generated;
First ciphertext is mapped by code book, obtains the second ciphertext;
Second ciphertext is mixed with selected text segment, generates message text.
2. communication channel encryption method according to claim 1, which is characterized in that it is described by first ciphertext by close Code book is mapped, and the second ciphertext is obtained, comprising:
Preset code book is obtained, the code book is the mapping relations of wrong word and character;
According to the mapping relations, the character of the first ciphertext is converted into wrong word, using wrong word as the second ciphertext.
3. communication channel encryption method according to claim 1, which is characterized in that the address by the communication channel With the public key encryption of port asymmetric arithmetic, the first ciphertext is generated, comprising:
Obtain random information;
By the public key encryption of the address of the communication channel, the port and the random information asymmetric arithmetic, the is generated One ciphertext.
4. communication channel encryption method according to claim 1, which is characterized in that the address by the communication channel With the public key encryption of port asymmetric arithmetic, generate the first ciphertext before, further includes:
The private key for decryption is generated according to random number or random number polynomial;
Generate the public key for encryption according to the private key, the generating algorithm of the public key include be based on factorization algorithm, or Based on elliptic curve.
5. communication channel encryption method according to claim 1, which is characterized in that described by second ciphertext and selected Text segment mixed, generate message text after, further includes:
By Email, the message text is sent to recipient.
6. a kind of communication channel decryption method, which is characterized in that comprising steps of
Message text is obtained, the message text is mixed to get by the second ciphertext and selected text segment;
According to the selected text segment, second ciphertext is searched from the message text;
Second ciphertext is carried out reflection by code book to penetrate, obtains the first ciphertext;
First ciphertext is decrypted using the private key of asymmetric arithmetic, obtains the address and port of communication channel.
7. communication channel decryption method according to claim 6, which is characterized in that second ciphertext be the information just Wrong word in text;
It is described by second ciphertext by code book carry out reflection penetrate, obtain the first ciphertext, comprising:
Preset code book is obtained, the code book is the mapping relations of wrong word and character;
According to the mapping relations, the wrong word of the second ciphertext is converted into character, using character as the first ciphertext.
8. communication channel decryption method according to claim 7, which is characterized in that it is described by first ciphertext using non- The private key of symmetry algorithm is decrypted, and obtains the address and port of communication channel, comprising:
First ciphertext is decrypted using the private key of asymmetric arithmetic, the plaintext after being decrypted;
The random information in the plaintext is removed, the address and port of the communication channel are obtained.
9. communication channel decryption method according to claim 6, which is characterized in that the acquisition message text, comprising:
By Email, the message text that sender sends is received.
10. communication channel decryption method according to claim 6, which is characterized in that described to use first ciphertext The private key of asymmetric arithmetic is decrypted, after obtaining the address and port of communication channel, further includes:
The address device node corresponding with port for accessing the communication channel, establishes communication channel.
11. a kind of communication channel method for building up, which is characterized in that comprising steps of
The address and port of sender's acquisition communication channel;By the public affairs of the address of the communication channel and port asymmetric arithmetic Key encryption, generates the first ciphertext;First ciphertext is mapped by code book, obtains the second ciphertext;By described second Ciphertext is mixed with selected text segment, generates message text;
Recipient obtains the message text;According to the selected text segment, described is searched from the message text Two ciphertexts;Second ciphertext is carried out reflection by code book to penetrate, obtains first ciphertext;First ciphertext is used The private key of asymmetric arithmetic is decrypted, and obtains the address and port of communication channel;Access the address and end of the communication channel The corresponding device node of mouth, establishes communication channel.
12. a kind of communication channel encryption device characterized by comprising
Address acquisition module, for obtaining the address and port of communication channel;
Public-key encryption module, for by the public key encryption of the address of the communication channel and port asymmetric arithmetic, generating the One ciphertext;
Mapping encrypting module obtains the second ciphertext for mapping first ciphertext by code book;
Hybrid Encryption module generates message text for mixing second ciphertext with selected text segment.
13. a kind of communication channel decrypts device characterized by comprising
Data obtaining module, for obtaining message text, message text is mixed by the second ciphertext with selected text segment It obtains;
Ciphertext searching module, for searching second ciphertext from the message text according to the selected text segment;
Password deciphering module is penetrated for second ciphertext to be carried out reflection by code book, obtains the first ciphertext;
First ciphertext is decrypted using the private key of asymmetric arithmetic, obtains the ground of communication channel by private key deciphering module Location and port.
14. a kind of computer-readable memory, is stored thereon with computer program, which is characterized in that the program is held by processor The communication channel encryption method as described in claim 1 to 5 any one is realized when row;Alternatively, the program is executed by processor Communication channel decryption method of the Shi Shixian as described in claim 6 to 10 any one;Or the program is when being executed by processor Realize communication channel method for building up as claimed in claim 11.
15. a kind of terminal, which is characterized in that the terminal includes:
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processors are real The now communication channel encryption method as described in claim 1 to 5 any one;Alternatively, making one or more of processors Realize the communication channel decryption method as described in claim 6 to 10 any one;Alternatively, making one or more of processing Device realizes communication channel method for building up as claimed in claim 11.
CN201880002398.9A 2018-08-22 2018-08-22 Communication channel encryption, decryption and establishment method and device, memory and terminal Active CN109792451B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/101825 WO2020037577A1 (en) 2018-08-22 2018-08-22 Communication channel encrypting, decrypting, and establishing methods and apparatuses, memory, and terminal

Publications (2)

Publication Number Publication Date
CN109792451A true CN109792451A (en) 2019-05-21
CN109792451B CN109792451B (en) 2022-11-18

Family

ID=66499482

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201880002398.9A Active CN109792451B (en) 2018-08-22 2018-08-22 Communication channel encryption, decryption and establishment method and device, memory and terminal

Country Status (2)

Country Link
CN (1) CN109792451B (en)
WO (1) WO2020037577A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111781890A (en) * 2020-07-14 2020-10-16 厦门海为科技有限公司 Multi-equipment engineering communication method and system in configuration engineering
CN111797417A (en) * 2020-07-06 2020-10-20 上海明略人工智能(集团)有限公司 File uploading method and device, storage medium and electronic device
CN112202868A (en) * 2020-09-27 2021-01-08 上海交通大学 Method for realizing block chain consensus protocol based on wireless air calculation
CN113808303A (en) * 2021-08-24 2021-12-17 珠海市安科电子有限公司 Composite encryption method, door lock system and storage medium

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116436697B (en) * 2023-06-07 2023-09-12 北京华云安信息技术有限公司 Data transmission encryption and decryption method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1949750A (en) * 2006-11-24 2007-04-18 杭州华为三康技术有限公司 Method and apparatus for transmitting, receiving and processing text of generative tree protocol
CN101471772A (en) * 2007-12-27 2009-07-01 华为技术有限公司 Communication method, device and system
WO2011161494A1 (en) * 2010-06-22 2011-12-29 Sandisk Il Ltd. Storage device, host device, and method for communicating a password between first and second storage devices using a double-encryption scheme
CN104301283A (en) * 2013-07-15 2015-01-21 镇江金钛软件有限公司 Method for client to log into server
CN104396182A (en) * 2012-04-16 2015-03-04 迈德安全基金会 Method of encrypting data

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102624749B (en) * 2012-04-13 2014-06-04 宁波市北仑海伯精密机械制造有限公司 Load balancing method and system for safety communication

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1949750A (en) * 2006-11-24 2007-04-18 杭州华为三康技术有限公司 Method and apparatus for transmitting, receiving and processing text of generative tree protocol
CN101471772A (en) * 2007-12-27 2009-07-01 华为技术有限公司 Communication method, device and system
WO2011161494A1 (en) * 2010-06-22 2011-12-29 Sandisk Il Ltd. Storage device, host device, and method for communicating a password between first and second storage devices using a double-encryption scheme
CN104396182A (en) * 2012-04-16 2015-03-04 迈德安全基金会 Method of encrypting data
CN104301283A (en) * 2013-07-15 2015-01-21 镇江金钛软件有限公司 Method for client to log into server

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111797417A (en) * 2020-07-06 2020-10-20 上海明略人工智能(集团)有限公司 File uploading method and device, storage medium and electronic device
CN111781890A (en) * 2020-07-14 2020-10-16 厦门海为科技有限公司 Multi-equipment engineering communication method and system in configuration engineering
CN112202868A (en) * 2020-09-27 2021-01-08 上海交通大学 Method for realizing block chain consensus protocol based on wireless air calculation
CN113808303A (en) * 2021-08-24 2021-12-17 珠海市安科电子有限公司 Composite encryption method, door lock system and storage medium

Also Published As

Publication number Publication date
CN109792451B (en) 2022-11-18
WO2020037577A1 (en) 2020-02-27

Similar Documents

Publication Publication Date Title
CN109792451A (en) Communication channel encryption, decryption and method for building up and device, memory and terminal
US9998434B2 (en) Secure dynamic communication network and protocol
US9659189B2 (en) Systems and methods of safeguarding user information while interacting with online service providers
CN104683301B (en) Password storage method and device
CN106790009B (en) Information processing method and device and mobile terminal
CN112087362B (en) Message forwarding method and device between clients and terminal
US9240978B2 (en) Communication system having message encryption
US7945248B2 (en) Mobile communications device employing multiple data storage locations for electronic messages
CN106685948A (en) Data processing method, terminal, communication device and data processing system
US9166794B2 (en) Securing private key access for cross-component message processing
CN104980436B (en) A kind of encryption transmission system, method, terminal and intermediate server
US8819407B2 (en) Personal messaging security
US9479928B2 (en) Cross-component message encryption
CN114629649B (en) Data processing method and device based on cloud computing and storage medium
US20140280656A1 (en) Method employing at least one central processing unit (cpu)
Wirtz et al. Encrypting data to pervasive contexts
CN109076317A (en) Verify the method and server of message legitimacy
US8538022B2 (en) System and method of cross-component message processing
CN110769306B (en) Subtitle decryption method and device, client and storage medium
CN106657122A (en) Data processing method and device as well as terminal device
CN114553506A (en) Mail encryption method, system, equipment and storage medium based on cloud service
Karimov et al. DEVELOPMENT OF SECURE MODELS AND ALGORITHMS OF MESSENGERS WHEN EXCHANGING SERVICE MESSAGES
Armoogum et al. A Secure Messaging and File Transfer Application
CA2537028C (en) Mobile communications device employing multiple data storage locations for electronic messages
CA2705004C (en) System and method of cross-component message processing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant