CN109792451A - Communication channel encryption, decryption and method for building up and device, memory and terminal - Google Patents
Communication channel encryption, decryption and method for building up and device, memory and terminal Download PDFInfo
- Publication number
- CN109792451A CN109792451A CN201880002398.9A CN201880002398A CN109792451A CN 109792451 A CN109792451 A CN 109792451A CN 201880002398 A CN201880002398 A CN 201880002398A CN 109792451 A CN109792451 A CN 109792451A
- Authority
- CN
- China
- Prior art keywords
- ciphertext
- communication channel
- address
- port
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000006854 communication Effects 0.000 title claims abstract description 206
- 238000004891 communication Methods 0.000 title claims abstract description 204
- 238000000034 method Methods 0.000 title claims abstract description 71
- 238000004422 calculation algorithm Methods 0.000 claims description 28
- 238000013507 mapping Methods 0.000 claims description 24
- 238000012545 processing Methods 0.000 claims description 12
- 238000003860 storage Methods 0.000 claims description 6
- 238000004590 computer program Methods 0.000 claims description 3
- 230000005540 biological transmission Effects 0.000 description 11
- 230000006870 function Effects 0.000 description 9
- 238000010586 diagram Methods 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 6
- 230000008901 benefit Effects 0.000 description 3
- 238000006243 chemical reaction Methods 0.000 description 3
- 238000005520 cutting process Methods 0.000 description 3
- 238000001914 filtration Methods 0.000 description 3
- 238000012544 monitoring process Methods 0.000 description 3
- 230000001360 synchronised effect Effects 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 238000012905 input function Methods 0.000 description 2
- 230000000670 limiting effect Effects 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000007774 longterm Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000032696 parturition Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000002829 reductive effect Effects 0.000 description 2
- 230000002441 reversible effect Effects 0.000 description 2
- 230000001755 vocal effect Effects 0.000 description 2
- PEDCQBHIVMGVHV-UHFFFAOYSA-N Glycerine Chemical compound OCC(O)CO PEDCQBHIVMGVHV-UHFFFAOYSA-N 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000007175 bidirectional communication Effects 0.000 description 1
- 229910002056 binary alloy Inorganic materials 0.000 description 1
- 210000004556 brain Anatomy 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000005314 correlation function Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 239000004744 fabric Substances 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000010897 surface acoustic wave method Methods 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Telephonic Communication Services (AREA)
Abstract
The application provides encryption, decryption and the method for building up and device, memory and terminal of a kind of communication channel, and the communication channel encryption method is comprising steps of obtain the address and port of communication channel;By the public key encryption of the address of the communication channel and port asymmetric arithmetic, the first ciphertext is generated;First ciphertext is mapped by code book, obtains the second ciphertext;Second ciphertext is mixed with selected text segment, generates message text.The application can reduce the probability that communication channel is disturbed or cuts off, suitable for establishing communication channel between two users or open more people's communication systems.
Description
Technical field
This application involves field of computer technology, specifically, this application involves a kind of encryption of communication channel, decrypting and building
Cube method and device, memory and terminal.
Background technique
This part intends to provides background or context for the embodiment stated in claims.Description herein not because
It is included in this section and just recognizes it is the prior art.
In the communication scenes of reality, between user and user, between user and server and server and server
Between communication channel, may all be cut off by malicious parties, be interrupted so as to cause the communication between user.Such as it is shown in FIG. 1
E-mail system, if the communication channel between user 101 and first server 102 is cut off or second user 104 and second
The communication channel between communication channel or first server 102 and second server 103 between server 103 is cut off, all
Will lead to can not receiving and dispatching mail between user 101 and user 104.
Summary of the invention
The application proposes a kind of encryption method, decryption method, method for building up and device, memory and terminal, to solve
The communication channel between user is easy cut-off problem in the prior art.
The communication channel encryption method that the application proposes, comprising steps of
Obtain the address and port of the communication channel of communication channel;
By the public key encryption of the address of the communication channel and port asymmetric arithmetic, the first ciphertext is generated;
First ciphertext is mapped by code book, obtains the second ciphertext;
Second ciphertext is mixed with selected text segment, generates message text.
The application also proposes a kind of communication channel decryption method, comprising steps of
Message text is obtained, the message text is mixed to get by the second ciphertext and selected text segment;
According to the selected text segment, second ciphertext is searched from the message text;
Second ciphertext is carried out reflection by code book to penetrate, obtains the first ciphertext;
First ciphertext is decrypted using the private key of asymmetric arithmetic, obtains the address and port of communication channel.
Further, second ciphertext is the wrong word in the message text;
It is described by second ciphertext by code book carry out reflection penetrate, obtain the first ciphertext, comprising:
Preset code book is obtained, the code book is the mapping relations of wrong word and character;
According to the mapping relations, the wrong word of the second ciphertext is converted into character, using character as the first ciphertext.
The application also proposes a kind of communication channel method for building up, comprising steps of
The address and port of sender's acquisition communication channel;By the address of the communication channel and port asymmetric arithmetic
Public key encryption, generate the first ciphertext;First ciphertext is mapped by code book, obtains the second ciphertext;It will be described
Second ciphertext is mixed with selected text segment, generates message text;
Recipient obtains the message text;According to the selected text segment, institute is searched from the message text
State the second ciphertext;Second ciphertext is carried out reflection by code book to penetrate, obtains first ciphertext;By first ciphertext
It is decrypted using the private key of asymmetric arithmetic, obtains the address and port of communication channel;Access the address of the communication channel
Device node corresponding with port, establishes communication channel.
The application also proposes a kind of communication channel encryption device, comprising:
Address acquisition module, for obtaining the address and port of communication channel;
Public-key encryption module, for giving birth to the public key encryption of the address of the communication channel and port asymmetric arithmetic
At the first ciphertext;
Mapping encrypting module obtains the second ciphertext for mapping first ciphertext by code book;
Hybrid Encryption module generates message text for mixing second ciphertext with selected text segment.
The application also proposes a kind of communication channel decryption device, comprising:
Data obtaining module, for obtaining message text, message text is carried out by the second ciphertext and selected text segment
It is mixed to get;
Ciphertext searching module, for searching described second from the message text according to the selected text segment
Ciphertext;
Password deciphering module is penetrated for second ciphertext to be carried out reflection by code book, obtains the first ciphertext;
First ciphertext is decrypted using the private key of asymmetric arithmetic, obtains communication channel by private key deciphering module
Address and port.
The application also proposes a kind of computer-readable memory, is stored thereon with computer program, and the program is by processor
Communication channel encryption method described in aforementioned any one is realized when execution;Alternatively, before being realized when the program is executed by processor
State communication channel decryption method described in any one;Or the program realizes that the communication channel is built when being executed by processor
Cube method.
The application also proposes that a kind of terminal, the terminal include:
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processing
Device realizes communication channel encryption method described in aforementioned any one;Alternatively, before realizing one or more of processors
State communication channel decryption method described in any one;Alternatively, one or more of processors is made to realize the communication
Path Setup method.
The application has the advantages that
1, the application is mapped by public key encryption, code book and carries out the cipher mode layer by layer such as mixing with text segment, is solved
When this terminal of having determined sends the address and port of the communication channel to other terminals or user, it is easy the communication channel of divulging a secret
Address and port so as to cause communication channel be easy by attack or cutting the problem of;Moreover, generated by asymmetric arithmetic
Public key is encrypted, even if the message text is leaked to third party, if third party does not have the private key, can not also be passed through
Reverse or conventional decryption method obtains the address of the communication channel and the information of port, further reduced communication channel and is done
The probability disturbed and cut off is applicable not only to establish communication channel between two users, is also suitable for communicating system in open more people
Communication channel is established in system.
2, the application can send the message text by the Email for being not easy to be stopped by most of network, improve
The address of the communication channel and the probability of success of port are sent between user, suitable for Network status is bad or attacked
Network system;Moreover, can also be by encrypted second ciphertext hiding in selected text segment, to avoid by mail mistake
Filter system intercepts, and further improves and sends the address of the communication channel and the probability of success of port.
The additional aspect of the application and advantage will be set forth in part in the description, these will become from the following description
It obtains obviously, or recognized by the practice of the application.
Detailed description of the invention
The application is above-mentioned and/or additional aspect and advantage will become from the following description of the accompanying drawings of embodiments
Obviously and it is readily appreciated that, in which:
Fig. 1 is the structural schematic diagram of real e-mail system embodiment
Fig. 2 is the flow diagram of herein described communication channel encryption method first embodiment;
Fig. 3 is the flow diagram of herein described communication channel decryption method first embodiment;
Fig. 4 is the flow diagram of the embodiment of herein described communication channel method for building up;
Fig. 5 is the structural schematic diagram of herein described communication system embodiment;
Fig. 6 is the structural schematic diagram of herein described terminal embodiment.
Specific embodiment
Embodiments herein is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end
Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached
The embodiment of figure description is exemplary, and is only used for explaining the application, and cannot be construed to the limitation to the application.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, " one
It is a ", " described " and "the" may also comprise plural form, " first " used herein, " second " are only used for distinguishing same technology special
Sign, is not limited the sequence of the technical characteristic and quantity etc..It is to be further understood that in the description of the present application
The wording " comprising " used refers to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that depositing
Or add other one or more features, integer, step, operation, element, component and/or their group.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art
Language and scientific term), there is meaning identical with the general understanding of those of ordinary skill in the application fields.Should also
Understand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior art
The consistent meaning of meaning, and unless idealization or meaning too formal otherwise will not be used by specific definitions as here
To explain.
Those skilled in the art of the present technique are appreciated that " terminal " used herein above, " terminal device " both include wireless communication
The equipment of number receiver, only has the equipment of the wireless signal receiver of non-emissive ability, and including receiving and emitting hardware
Equipment, have on bidirectional communication link, can execute two-way communication reception and emit hardware equipment.This equipment
It may include: honeycomb or other communication equipments, shown with single line display or multi-line display or without multi-line
The honeycomb of device or other communication equipments;PCS (Personal Communications Service, PCS Personal Communications System), can
With combine voice, data processing, fax and/or communication ability;PDA (Personal Digital Assistant, it is personal
Digital assistants), it may include radio frequency receiver, pager, the Internet/intranet access, web browser, notepad, day
It goes through and/or GPS (Global Positioning System, global positioning system) receiver;Conventional laptop and/or palm
Type computer or other equipment, have and/or the conventional laptop including radio frequency receiver and/or palmtop computer or its
His equipment." terminal " used herein above, " terminal device " can be it is portable, can transport, be mounted on the vehicles (aviation,
Sea-freight and/or land) in, or be suitable for and/or be configured in local runtime, and/or with distribution form, operate in the earth
And/or any other position operation in space." terminal " used herein above, " terminal device " can also be communication terminal, on
Network termination, music/video playback terminal, such as can be PDA, MID (Mobile Internet Device, mobile Internet
Equipment) and/or mobile phone with music/video playing function, it is also possible to the equipment such as smart television, set-top box.
The application proposes a kind of encryption method, decryption method, method for building up and device, memory and terminal, for improving
The anti-cut cutting capacity and raising confidentiality of communication channel.
Communication channel encryption method first embodiment as shown in Figure 2, includes the following steps:
Step S10: the address and port of communication channel are obtained;
Step S20: by the public key encryption of the address of the communication channel and port asymmetric arithmetic, it is close to generate first
Text;
Step S30: first ciphertext is mapped by code book, obtains the second ciphertext;
Step S40: second ciphertext is mixed with selected text segment, generates message text.
Wherein, each step is specific as follows:
Step S10: the address and port of communication channel are obtained.
The address of the communication channel includes the server ip address or other equipment for communication nodes for communication.
The address and port of the communication channel can be according to specific requirements for sending and receiving data, to realize two different users
Or the data exchange between multiple users.
Step S20: by the public key encryption of the address of the communication channel and port asymmetric arithmetic, it is close to generate first
Text.
Sender can be used rivest, shamir, adelman and obtain a pair of of private key and public key.The public key be used for communication data into
Row encryption, the private key can be used for encrypting communication data, the data received can also be decrypted;In some cases
Under, the private key can also be used as the digital signature voucher etc. in communication.To guarantee that it is described logical that the recipient of only communication can decrypt
Data are interrogated, the public key for being used to encrypt can be stored in sender in advance, will used by the present invention before sender and recipient's communication
It is stored in recipient in the private key of decryption, so that sender is encrypted using the public key, and encrypted communication data is only
It can be decrypted by the private key of recipient, to guarantee the privacy of communication data.When first ciphertext is uploaded in network
When defeated, if being intercepted and captured by other rogue programs, when interception side is without corresponding private key, then the content of intercepting and capturing can not be learnt, therefore this step
Suddenly the address of the communication channel and port are encrypted by the public key in asymmetric arithmetic, it is ensured that the communication channel
Address and port crypticity, improve the safety during subsequent communications.
The related asymmetric arithmetic such as ECC algorithm or RSA Algorithm can be used in the asymmetric arithmetic.ECC algorithm is based on ellipse
Circular curve algorithm mainly utilizes the rational point on elliptic curve to constitute the calculating of Elliptic discrete logarithm in Abel module.RSA
Encryption Algorithm is based on factorization algorithm, and 1977 by Peter Lonard Lee Vista (Ron Rivest), A Di Shamir
What (Adi Shamir) and Leonard A Deman (Leonard Adleman) three people proposed, therefore use their three people's surnames first
Title of the combination RSA of letter as the algorithm.RSA Algorithm is mainly decomposed using big factor of an integer.It can be according to asymmetric calculation
The complexity for the public key that method obtains, the difficulty for generating signature with verifying signature, and generate signature in use and signed with verifying
Name frequency come determine public key use generating algorithm.
For example, in a specific embodiment, first terminal can be used for the server ip address and port letter of communication
Cease mip(such as 100.100.100.1:1234) uses public key dPIt is encrypted to the first ciphertext ms=fe(mip, dP), as the first ciphertext msIt is cut
It obtains, since intercepting and capturing side lacks the private key d for decryptionA, then can not know the server ip address and port information for communication
mip。
Therefore the application also proposes another embodiment: the address by the communication channel and port asymmetric arithmetic
Public key encryption, generate the first ciphertext before, further includes:
The private key d for decryption is generated according to random number or random number polynomialA;
According to the private key dAGenerate the public key d for encryptionP, the public key dPGenerating algorithm include based on several points big
Resolving Algorithm, or it is based on elliptic curve.
The present embodiment can be used based on factorization algorithm or based on elliptic curve, generate a pair of of public key dPWith private key
dA;Wherein private key dAIt can be according to generating random number, public key dPIt can be based on the private key dAIt generates.Based on the factorization algorithm
Or the private key d is generated based on elliptic curveAWith public key dPProcess can be found in the associated description of rivest, shamir, adelman,
Details are not described herein.
In some embodiments, the public key dPThe password (Lattice-based) based on lattice also can be used, be based on Hash
Password (Hash-based), based on coding (error correcting code) password (Code-based), be based on multivariate public key cryptography
(Multivariate Public Key Cryptography), it is generated based on Falcon Encryption Algorithm scheduling algorithm.For example, when adopting
When with Falcon Encryption Algorithm, the private key dAIt can be generated according to random number polynomial, then by the private key dAIt is encrypted using Falcon
Algorithm generates the public key dP, to obtain the higher private key d of security levelAWith public key dP.Falcon Encryption Algorithm is 2017 11
The moon submits to National Institute of Standards and Technology (National Institute of Standards and on the 30th
Technology, abbreviation NIST) rear quantum cryptology algorithm, its main feature is that generate the public key face quantum computer
When, the safety for ensuring encryption data can be continued.Falcon Encryption Algorithm is the NTRU encryption system based on lattice digital signature scheme
Algorithm frame is found in construction in a systematic way, after obtaining short polynomial f, g, F and G, can establish binary system or ternary Falcon structure tree, with
It obtains and the private key dACorresponding public key dP, specific calculation can be found in be committed to NIST it is described after quantum cryptology
Algorithm and other related descriptions about Falcon Encryption Algorithm.
Obtain the public key dPWith the private key dALater, the public key dPIt is stored in sender, the private key dAIt is held in
Recipient;As the public key dPBe not sender generate when, sender can by publishing, public key catalogue listing, public key pipe
The modes such as reason mechanism, data transmission obtain the public key dP, to be encrypted for the address to the communication channel with port.
Certainly, sender can also obtain the public key d by modes such as EmailsP。
Step S30: first ciphertext is mapped by code book, obtains the second ciphertext.
The code book be can be the conversion rule of another group of character string by one group of specific character string corresponding conversion, such as
English alphabet is converted into corresponding Arabic numerals.The code book can be to only use primary disposal password sheet, can also
Non-disposable code book.The code book can arrange with other communicating terminals in advance, so that other terminals would know that code book
In mapping relations, convenient for decryption.It is logical to can further improve foundation by continuing to encrypt first ciphertext for this step
Interrogate the safety in channel.
In another embodiment, the code book can be the mapping relations of wrong word and character;Implement based on described first
Example, another embodiment can specifically: and it is described to map first ciphertext by code book, obtain the second ciphertext, comprising:
Preset code book is obtained, the code book is the mapping relations of wrong word and character;
According to the mapping relations, the character of the first ciphertext is converted into wrong word, using wrong word as the second ciphertext.
The code book can derive from other terminals, can also be generated as the terminal where sender.The wrong word and word
The mapping relations of symbol can be mapped to the relationship of other kinds of characters for different characters, such as alphabetical A is mapped as alphabetical P,
Letter b is mapped as letter C.When there is wrong word in certain section of article, the wrong word can be chosen and in a predefined order
Combination, can be obtained second ciphertext;If second ciphertext is restored according to the mapping relations, can be obtained not
There is the article of wrong word.The present embodiment is by mapping correct first ciphertext, with the second ciphertext after being mapped, into
One step improves the safety of ciphertext.
Step S40: second ciphertext is mixed with selected text segment, generates message text.
The addresses of all encrypted communication channels of the second ciphertext obtained in the step S30 and port
Information does not meet the messy code of correct language rule generally, to avoid this section of messy code from being identified as junk information, or is blocked by system
It cuts or filters, or be identified as specific information, second ciphertext can be mixed in the article for meeting correct language rule and be sent out
It send, to avoid arousing attention, can further improve the safety of system and the second ciphertext can be prevented and sent out because of intercepting or filtering
Send failure.The text segment can be intercepted from English encyclopaedia class text, or be cut from the literature carrier such as english article, novel
It takes, so that the cipher-text information sent will not be integrally intercepted in transmission process, or monitoring system is caused to pay attention to.
On the one hand the present embodiment passes through public key encryption, code book mapping and is mixed with text segment, solve this end
When holding the address and port that send the communication channel to other terminals or user, the address for the communication channel that is easy to divulge a secret with
The problem of port is easy so as to cause communication channel by attack or cutting;Moreover, the present embodiment is also generated by asymmetric arithmetic
Public key encrypted, recipient can be decrypted by private key corresponding with the public key, further improve the peace of encryption
Quan Xing is particularly suitable for open more people's communication systems;On the other hand, recipient corresponding with the present embodiment receives the letter
After ceasing text, the address and port of the communication channel can be obtained by corresponding decryption method, convenient for logical with the communication
The address in road and the sender of port establish communication channel, can effectively avoid communication channel and convert among multiple servers, protect
The safety for establishing communication channel is hindered, the scene that may be maliciously stopped suitable for network, between communication server
No limiting communication provides reliable method.
It is described by the address of the communication channel and port asymmetric arithmetic in another embodiment of the application
Public key encryption generates the first ciphertext, comprising:
Obtain random information;
It is raw by the public key encryption of the address of the communication channel, the port and the random information asymmetric arithmetic
At the first ciphertext.
The present embodiment not only adds the address and port of the communication channel when being encrypted using the public key
It is close, also before encryption, it is mixed into the random information in the address and port of Xiang Suoshu communication channel, further improves encryption
Safety.The random information generated can be generated by this terminal as sender, can also be generated by other equipment, and
Each send is built consensus between hair and recipient.
It is described to mix second ciphertext with selected text segment in the another embodiment of the application, it is raw
After message text, further includes:
By Email, the message text is sent to recipient.
Most of network can not generally block the transmitting-receiving of Email completely, therefore the present embodiment is sent out by the Email
The message text is sent, the message text is can avoid and loses in transmission process, improve the success rate for establishing communication channel.
Corresponding to the communication channel encryption method of sender, the application also proposes the communication channel solution of recipient a kind of
Decryption method, as shown in figure 3, comprising steps of
Step S60: obtaining message text, and the message text mix with selected text segment by the second ciphertext
It arrives;
Step S70: according to the selected text segment, second ciphertext is searched from the message text;
Step S80: second ciphertext is subjected to reflection by code book and is penetrated, the first ciphertext is obtained;
Step S90: first ciphertext is decrypted using the private key of asymmetric arithmetic, obtains the address of communication channel
With port.
In the step S60, when the recipient of information receives the message text, not only include in the message text
Encrypted second ciphertext further includes the selected text segment so that second ciphertext it is whole in transmission process not
It can be intercepted, or monitoring system will not be caused to pay attention to;The selected literature segment also plays the role of encryption, so that the letter
When breath text is compromised, also other users will not be made to directly obtain the second ciphertext, increase the difficulty of other user's decryption.
In the step S70, if the recipient of information knows the selected literature segment of insertion, or know to mix institute
It, can be according to selected the literature segment or the rule, from described when stating the rule of the second ciphertext and selected text segment
Second ciphertext is found out in message text.Such as: second ciphertext is mixed with one section of literary works, works as reception
When precognition mixed content in side's is the literary works, the literary works can be rejected, to filter out second ciphertext;Or
The hiding rule predicted using recipient, the corresponding character of second ciphertext is hidden in the literary works, so as to connect
Debit is combined into second ciphertext according to the literary works lookup received.
In step S80, if that first ciphertext is converted to second in ciphering process, using code book is close by sender
Text, recipient can be penetrated by reflection, and second ciphertext is converted to corresponding first ciphertext.Sender can pass through with recipient
It makes an appointment or mode that data are synchronous keeps the synchronization of code book, so that the mapping relations of both sides' code book are consistent.
When the information that sender uses public key to encrypt needs is encrypted to obtain first ciphertext, this step
S90 can be decrypted first ciphertext by corresponding private key, with the information before being encrypted.The private key and public key
It can be generated in the recipient of communication, then the public key can be sent in advance to the hair of communication by modes such as data transmission, mails
The side of sending, so that the sender of communication is encrypted using the public key.
The present embodiment first searches second ciphertext, and penetrates to obtain described the by reflection for second ciphertext of lookup
Finally first ciphertext is decrypted by the private key for one ciphertext, with the address of the communication channel before being encrypted
And port, the present embodiment have ensured the address of the communication channel and the concealment of port by decryption layer by layer, reduce described
The address and port of communication channel cause the probability attacked or intercepted because divulging a secret;Moreover, recipient need to be by described non-right
The private key of algorithm is claimed to be decrypted, even if the message text is leaked to third party, if third party does not have the private key, also
The information of the address and port of the communication channel can not be obtained by reverse or conventional decryption method, therefore further reduced logical
Interrogate the probability that channel is disturbed and cuts off.Embodiments herein is applicable not only to establish communication channel between two users, also
It is applicable to the scene of multi-party communication.
In another specific embodiment of the application, second ciphertext is the wrong word in the message text;
It is described by second ciphertext by code book carry out reflection penetrate, obtain the first ciphertext, comprising:
Preset code book is obtained, the code book is the mapping relations of wrong word and character;
According to the mapping relations, the wrong word of the second ciphertext is converted into character, using character as the first ciphertext.
The decryption step of the present embodiment is directed to using the wrong word in the message text as the encryption side of the second ciphertext
Formula.For example, when encryption, using one section of literary works as the message text, according to specific rule, by the literary works
Middle subalphbet replaces with corresponding wrong word, or increases extra character among division statement, and being formed has redundant character
Words and phrases, the extra character can be used as wrong word.When recipient receives the message text, the literature can be searched
Wrong word in works, and according to default rule, the wrong word group is combined into second ciphertext;Further according to described default
Code book, the wrong word is penetrated by reflection and is converted to corresponding character, which is first ciphertext.This implementation
Example is suitable for using wrong word as the cipher mode of second ciphertext, and encryption method is simple, lower to terminal resource consumption, fits
It is wide with range;It is intercepted moreover, the message text for being mixed with wrong word is not easy to be filtered by system, improves the message text
Transmission success rate.
It is described to solve first ciphertext using the private key of asymmetric arithmetic in another embodiment of the application
It is close, obtain the address and port of communication channel, comprising:
First ciphertext is decrypted using the private key of asymmetric arithmetic, the plaintext after being decrypted;
The random information in the plaintext is removed, the address and port of the communication channel are obtained.
When needing also to be mixed with the random information for interference in the information that encrypts, the present embodiment can be according to knowing in advance
Random information or be mixed with the rule of random information, the plaintext after decryption is handled, to obtain the communication channel
Address and port.The present embodiment by the random information, further improve the communication channel address and port it is hidden
Covering property enhances cipher round results.
For the decryption speed of raising recipient, and the influence for avoiding network environment bad to output transmission, this Shen
Please also propose another embodiment: the acquisition message text, comprising:
By Email, the message text that sender sends is received.
The Email that most of network can not block completely, the present embodiment send the letter by way of Email
Text is ceased, can be improved and send successful probability;Moreover, message text is used based on factorization algorithm or ellipse in the present embodiment
The public key of curved line arithmetic is encrypted, and the safety of the message text is improved, even if other users get the information
When text, due to not having private key, also it is difficult to crack the institute for obtaining and encrypting in the message text by modes such as Brute force
State the address and port of communication channel.Information sender and the code book of recipient can also be synchronized with public key by mail,
Or keep synchronous in such a way that other data are transmitted.
It is described to solve first ciphertext using the private key of asymmetric arithmetic in another embodiment of the application
It is close, after obtaining the address and port of communication channel, further includes:
The address device node corresponding with port for accessing the communication channel, establishes communication channel.
The device node can be the node address in the server address or block catenary system where sender.At this
In embodiment, address and port of the recipient by the access communication channel, the device node foundation that can be established with sender
Connection, to complete the establishment process of sender and recipient's communication channel.
Based on the above various embodiments, the application also proposes a kind of embodiment of communication channel method for building up, the embodiment packet
Include following steps:
The address and port of sender's acquisition communication channel;By the address of the communication channel and port asymmetric arithmetic
Private key encryption, generate the first ciphertext;First ciphertext is mapped by code book, obtains the second ciphertext;It will be described
Second ciphertext is mixed with selected text segment, generates message text;
Recipient obtains the message text;According to the selected text segment, institute is searched from the message text
State the second ciphertext;Second ciphertext is carried out reflection by code book to penetrate, obtains first ciphertext;By first ciphertext
It is decrypted using the private key of asymmetric arithmetic, obtains the address and port of communication channel;Access the address of the communication channel
Device node corresponding with port, establishes communication channel.
There is the communication channel established through this embodiment good resistance to cut performance, can be in the network rings for having attack to stop
It is flexibly free to establish without limited communication connection under border;And the communication connection established is not easy to be monitored by other users, can protect
Hold the confidentiality of Content of Communication.
The application also proposes the embodiment of communication channel method for building up as shown in Figure 4 comprising following steps:
Step S11: sender and recipient establish code book b through consultations, the code book bsIt is arrived for English wrong word
The mapping of English character;
Step S12: sender determines the server ip address and port m of this terminal calledip, and by the server ip
Location and port mip(such as 100.100.100.1:1234) adds random information mr;
Step S21: with the public key dABy the server ip address, port mipWith random information mrIt is close to be encrypted to first
Literary ms=fe(mip+mr, dA);
Step S31: code book b is usedsBy the first ciphertext msIt is converted into corresponding wrong word, to obtain described second
Ciphertext;
Step S41: by second ciphertext hiding in an english article, the message text is generated;Will pass through
When Email sends the message text, second ciphertext is avoided to be blocked by the mail filtering system of email provider
It cuts;The english article can intercept segment from English encyclopaedia or english article at random;
Step S51: the message text with wrong word is emailed to recipient;
Step S61: after recipient receives the Email, the english article with wrong word is got, i.e.,
The message text;
Step S71: searching wrong word from the english article, and the wrong word group is combined into second ciphertext;
Step S81: the code book b is usedsSecond ciphertext is converted into the first ciphertext ms;
Step S91: recipient uses private key dPBy the first ciphertext msIt is decrypted into plaintext mp, mp=fd(ms, dA), from institute
State literary m clearlypIn obtain with sender communicate server ip address and port mip;
Step S92: recipient connects the server of sender by the server ip address with port, and it is logical to establish communication
Road.
The present embodiment can establish communication system as shown in Figure 5, and user 1001 can be by the IP address of server 1002 and end
Mouth mipUser 1004 is sent to by mail after encryption, user 1004 obtains IP address and the port of server 1002 after decrypting
mipInformation, and pass through the IP address and port m of access server 1002ipEstablish the communication channel between user 1001.Pass through
The communication system that the application establishes has higher anti-interference ability, avoids the information forwarding between multiple servers, also subtracts
The cut-off possibility of the communication channel established is lacked;Moreover, communication process is not easy to be monitored by third party, secrecy with higher
Property.
The present embodiment can be in such a way that most of network stops the Email that can not be blocked completely, will be encrypted logical
Inquiry server IP address and port are sent to recipient, improve the success rate that the message text is sent;Moreover, by described
Two ciphertexts are mixed in the english article, reduce the probability that second ciphertext is intercepted by mail filtering system, further
It improves the message text and sends successful probability.The present embodiment also passes through the public key of rivest, shamir, adelman and makes an appointment
Code book, the server ip address and port are hidden in the e-mail, ensure that the hidden of the message text of transmission
Property transmission.The method for building up of the communication channel of the present embodiment is applicable not only to establish connection between two sides, is also applicable to multi-party
Under the scene of communication;And it flexibly can freely realize and be connected without limiting communication under the network environment for thering is attack to stop.
Based on the communication channel encryption method, the application also proposes a kind of communication channel encryption device, and the communication is logical
Road encryption device includes:
Address acquisition module, for obtaining the address and port of communication channel;
Public-key encryption module, for giving birth to the public key encryption of the address of the communication channel and port asymmetric arithmetic
At the first ciphertext;
Mapping encrypting module obtains the second ciphertext for mapping first ciphertext by code book;
Hybrid Encryption module generates message text for mixing second ciphertext with selected text segment.
Based on the communication channel decryption method, the application also proposes a kind of embodiment of communication channel decryption device, institute
Stating communication channel decryption device includes:
Data obtaining module, for obtaining message text, message text is carried out by the second ciphertext and selected text segment
It is mixed to get;
Ciphertext searching module, for searching described second from the message text according to the selected text segment
Ciphertext;
Password deciphering module is penetrated for second ciphertext to be carried out reflection by code book, obtains the first ciphertext;
First ciphertext is decrypted using the private key of asymmetric arithmetic, obtains communication channel by private key deciphering module
Address and port.
The communication channel encryption device embodiment has same as the communication channel encryption method corresponding embodiment
Beneficial effect, the communication channel decryption Installation practice have same as the communication channel decryption method corresponding embodiment
Beneficial effect, details are not described herein.
A kind of computer-readable memory of the application, is stored thereon with computer program, when which is executed by processor
Realize communication channel encryption method described in aforementioned any one;Alternatively, the program realized when being executed by processor it is aforementioned any
Communication channel decryption method described in one;Or the program realizes the communication channel foundation side when being executed by processor
Method.Wherein, the memory includes but is not limited to any kind of disk (including floppy disk, hard disk, CD, CD-ROM and magneto-optic
Disk), ROM (Read-Only Memory, read-only memory), RAM (Random Access Memory, immediately memory),
EPROM (Erasable Programmable Read-Only Memory, Erarable Programmable Read only Memory), EEPROM
(Electrically Erasable Programmable Read-Only Memory, Electrically Erasable Programmable Read-Only Memory),
Flash memory, magnetic card or light card.It is, memory includes being deposited by equipment (for example, computer) in the form that can be read
Any medium of storage or transmission information.It can be read-only memory, disk or CD etc..
The application also proposes that a kind of terminal, the terminal include:
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processing
Device realizes communication channel encryption method described in aforementioned any one;Alternatively, before realizing one or more of processors
State communication channel decryption method described in any one;Alternatively, one or more of processors is made to realize the communication
Path Setup method.
As shown in fig. 6, for ease of description, illustrating only part relevant to the embodiment of the present application, particular technique details
It does not disclose, please refers to the embodiment of the present application method part.The terminal can be include mobile phone, tablet computer, PDA
(Personal Digital Assistant, personal digital assistant), POS (Point of Sales, point-of-sale terminal), vehicle mounted electric
Any terminal device such as brain, server, taking the terminal as an example:
Fig. 6 shows the block diagram of the part-structure of mobile phone relevant to terminal provided by the embodiments of the present application.With reference to figure
6, mobile phone includes: radio frequency (Radio Frequency, RF) circuit 1510, memory 1520, input unit 1530, display unit
1540, sensor 1550, voicefrequency circuit 1560, Wireless Fidelity (wireless fidelity, Wi-Fi) module 1570, processor
The components such as 1580 and power supply 1590.It will be understood by those skilled in the art that handset structure shown in Fig. 6 is not constituted pair
The restriction of mobile phone may include perhaps combining certain components or different component cloth than illustrating more or fewer components
It sets.
It is specifically introduced below with reference to each component parts of the Fig. 6 to mobile phone:
RF circuit 1510 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station
After downlink information receives, handled to processor 1580;In addition, the data for designing uplink are sent to base station.In general, RF circuit
1510 include but is not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise
Amplifier, LNA), duplexer etc..In addition, RF circuit 1510 can also be logical with network and other equipment by wireless communication
Letter.Any communication standard or agreement, including but not limited to global system for mobile communications (Global can be used in above-mentioned wireless communication
System of Mobile communication, GSM), general packet radio service (General Packet Radio
Service, GPRS), CDMA (Code Division Multiple Access, CDMA), wideband code division multiple access
(Wideband Code Division Multiple Access, WCDMA), long term evolution (Long Term Evolution,
LTE), Email, short message service (Short Messaging Service, SMS) etc..
Memory 1520 can be used for storing software program and module, and processor 1580 is stored in memory by operation
1520 software program and module, thereby executing the various function application and data processing of mobile phone.Memory 1520 can be led
It to include storing program area and storage data area, wherein storing program area can be needed for storage program area, at least one function
Application program (such as encryption or decryption etc.) etc.;Storage data area, which can be stored, uses created data (ratio according to mobile phone
Such as code book or public key) etc..In addition, memory 1520 may include high-speed random access memory, it can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Input unit 1530 can be used for receiving the number or character information of input, and generate with the user setting of mobile phone with
And the related key signals input of function control.Specifically, input unit 1530 may include touch panel 1531 and other inputs
Equipment 1532.Touch panel 1531, also referred to as touch screen collect touch operation (such as the user of user on it or nearby
Use the behaviour of any suitable object or attachment such as finger, stylus on touch panel 1531 or near touch panel 1531
Make), and corresponding attachment device is driven according to preset formula.Optionally, touch panel 1531 may include touch detection
Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band
The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it
It is converted into contact coordinate, then gives processor 1580, and order that processor 1580 is sent can be received and executed.In addition,
Touch panel 1531 can be realized using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch surface
Plate 1531, input unit 1530 can also include other input equipments 1532.Specifically, other input equipments 1532 may include
But in being not limited to physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc.
It is one or more.
Display unit 1540 can be used for showing information input by user or be supplied to user information and mobile phone it is each
Kind menu.Display unit 1540 may include display panel 1541, optionally, can use liquid crystal display (Liquid
Crystal Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED)
To configure display panel 1541.Further, touch panel 1531 can cover display panel 1541, when touch panel 1531 detects
After arriving touch operation on it or nearby, processor 1580 is sent to determine the type of touch event, is followed by subsequent processing device
1580 provide corresponding visual output according to the type of touch event on display panel 1541.Although in Fig. 6, touch panel
1531 and display panel 1541 are the input and input function for realizing mobile phone as two independent components, but in certain realities
Apply in example, can be integrated by touch panel 1531 and display panel 1541 and that realizes mobile phone output and input function.
Mobile phone may also include at least one sensor 1550, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light
Light and shade adjust the brightness of display panel 1541, proximity sensor can close display panel when mobile phone is moved in one's ear
1541 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (generally three axis) and add
The size of speed can detect that size and the direction of gravity when static, can be used to identify application (such as the horizontal/vertical screen of mobile phone posture
Switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Also as mobile phone
The other sensors such as configurable gyroscope, barometer, hygrometer, thermometer, infrared sensor, details are not described herein.
Voicefrequency circuit 1560, loudspeaker 1561, microphone 1562 can provide the audio interface between user and mobile phone.Audio
Electric signal after the audio data received conversion can be transferred to loudspeaker 1561, be converted by loudspeaker 1561 by circuit 1560
For the output of vocal print signal;On the other hand, the vocal print signal of collection is converted to electric signal by microphone 1562, by voicefrequency circuit 1560
Audio data is converted to after reception, then by after the processing of audio data output processor 1580, through RF circuit 1510 to be sent to ratio
Such as another mobile phone, or audio data is exported to memory 1520 to be further processed.
Wi-Fi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics by Wi-Fi module 1570
Mail, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 6 is shown
Wi-Fi module 1570, but it is understood that, and it is not belonging to must be configured into for mobile phone, it can according to need completely
Do not change in the range of the essence of invention and omits.
Processor 1580 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone,
By running or execute the software program and/or module that are stored in memory 1520, and calls and be stored in memory 1520
Interior data execute the various functions and processing data of mobile phone, to carry out integral monitoring to mobile phone.Optionally, processor
1580 may include one or more processing units;Preferably, processor 1580 can integrate application processor and modulation /demodulation processing
Device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is mainly located
Reason wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 1580.
Mobile phone further includes the power supply 1590 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply
Management system and processor 1580 are logically contiguous, to realize management charging, electric discharge and power consumption pipe by power-supply management system
The functions such as reason.
Although being not shown, mobile phone can also include camera, bluetooth module etc., and details are not described herein.
It should be understood that can be integrated in a processing module in each functional unit in each embodiment of the application,
It can be physically existed alone, can also be integrated in two or more units in a module with each unit.It is above-mentioned integrated
Module both can take the form of hardware realization, can also be realized in the form of software function module.
The above is only some embodiments of the application, it is noted that for the ordinary skill people of the art
For member, under the premise of not departing from the application principle, several improvements and modifications can also be made, these improvements and modifications are also answered
It is considered as the protection scope of the application.
Claims (15)
1. a kind of communication channel encryption method, which is characterized in that comprising steps of
Obtain the address and port of communication channel;
By the public key encryption of the address of the communication channel and port asymmetric arithmetic, the first ciphertext is generated;
First ciphertext is mapped by code book, obtains the second ciphertext;
Second ciphertext is mixed with selected text segment, generates message text.
2. communication channel encryption method according to claim 1, which is characterized in that it is described by first ciphertext by close
Code book is mapped, and the second ciphertext is obtained, comprising:
Preset code book is obtained, the code book is the mapping relations of wrong word and character;
According to the mapping relations, the character of the first ciphertext is converted into wrong word, using wrong word as the second ciphertext.
3. communication channel encryption method according to claim 1, which is characterized in that the address by the communication channel
With the public key encryption of port asymmetric arithmetic, the first ciphertext is generated, comprising:
Obtain random information;
By the public key encryption of the address of the communication channel, the port and the random information asymmetric arithmetic, the is generated
One ciphertext.
4. communication channel encryption method according to claim 1, which is characterized in that the address by the communication channel
With the public key encryption of port asymmetric arithmetic, generate the first ciphertext before, further includes:
The private key for decryption is generated according to random number or random number polynomial;
Generate the public key for encryption according to the private key, the generating algorithm of the public key include be based on factorization algorithm, or
Based on elliptic curve.
5. communication channel encryption method according to claim 1, which is characterized in that described by second ciphertext and selected
Text segment mixed, generate message text after, further includes:
By Email, the message text is sent to recipient.
6. a kind of communication channel decryption method, which is characterized in that comprising steps of
Message text is obtained, the message text is mixed to get by the second ciphertext and selected text segment;
According to the selected text segment, second ciphertext is searched from the message text;
Second ciphertext is carried out reflection by code book to penetrate, obtains the first ciphertext;
First ciphertext is decrypted using the private key of asymmetric arithmetic, obtains the address and port of communication channel.
7. communication channel decryption method according to claim 6, which is characterized in that second ciphertext be the information just
Wrong word in text;
It is described by second ciphertext by code book carry out reflection penetrate, obtain the first ciphertext, comprising:
Preset code book is obtained, the code book is the mapping relations of wrong word and character;
According to the mapping relations, the wrong word of the second ciphertext is converted into character, using character as the first ciphertext.
8. communication channel decryption method according to claim 7, which is characterized in that it is described by first ciphertext using non-
The private key of symmetry algorithm is decrypted, and obtains the address and port of communication channel, comprising:
First ciphertext is decrypted using the private key of asymmetric arithmetic, the plaintext after being decrypted;
The random information in the plaintext is removed, the address and port of the communication channel are obtained.
9. communication channel decryption method according to claim 6, which is characterized in that the acquisition message text, comprising:
By Email, the message text that sender sends is received.
10. communication channel decryption method according to claim 6, which is characterized in that described to use first ciphertext
The private key of asymmetric arithmetic is decrypted, after obtaining the address and port of communication channel, further includes:
The address device node corresponding with port for accessing the communication channel, establishes communication channel.
11. a kind of communication channel method for building up, which is characterized in that comprising steps of
The address and port of sender's acquisition communication channel;By the public affairs of the address of the communication channel and port asymmetric arithmetic
Key encryption, generates the first ciphertext;First ciphertext is mapped by code book, obtains the second ciphertext;By described second
Ciphertext is mixed with selected text segment, generates message text;
Recipient obtains the message text;According to the selected text segment, described is searched from the message text
Two ciphertexts;Second ciphertext is carried out reflection by code book to penetrate, obtains first ciphertext;First ciphertext is used
The private key of asymmetric arithmetic is decrypted, and obtains the address and port of communication channel;Access the address and end of the communication channel
The corresponding device node of mouth, establishes communication channel.
12. a kind of communication channel encryption device characterized by comprising
Address acquisition module, for obtaining the address and port of communication channel;
Public-key encryption module, for by the public key encryption of the address of the communication channel and port asymmetric arithmetic, generating the
One ciphertext;
Mapping encrypting module obtains the second ciphertext for mapping first ciphertext by code book;
Hybrid Encryption module generates message text for mixing second ciphertext with selected text segment.
13. a kind of communication channel decrypts device characterized by comprising
Data obtaining module, for obtaining message text, message text is mixed by the second ciphertext with selected text segment
It obtains;
Ciphertext searching module, for searching second ciphertext from the message text according to the selected text segment;
Password deciphering module is penetrated for second ciphertext to be carried out reflection by code book, obtains the first ciphertext;
First ciphertext is decrypted using the private key of asymmetric arithmetic, obtains the ground of communication channel by private key deciphering module
Location and port.
14. a kind of computer-readable memory, is stored thereon with computer program, which is characterized in that the program is held by processor
The communication channel encryption method as described in claim 1 to 5 any one is realized when row;Alternatively, the program is executed by processor
Communication channel decryption method of the Shi Shixian as described in claim 6 to 10 any one;Or the program is when being executed by processor
Realize communication channel method for building up as claimed in claim 11.
15. a kind of terminal, which is characterized in that the terminal includes:
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processors are real
The now communication channel encryption method as described in claim 1 to 5 any one;Alternatively, making one or more of processors
Realize the communication channel decryption method as described in claim 6 to 10 any one;Alternatively, making one or more of processing
Device realizes communication channel method for building up as claimed in claim 11.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2018/101825 WO2020037577A1 (en) | 2018-08-22 | 2018-08-22 | Communication channel encrypting, decrypting, and establishing methods and apparatuses, memory, and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109792451A true CN109792451A (en) | 2019-05-21 |
CN109792451B CN109792451B (en) | 2022-11-18 |
Family
ID=66499482
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201880002398.9A Active CN109792451B (en) | 2018-08-22 | 2018-08-22 | Communication channel encryption, decryption and establishment method and device, memory and terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109792451B (en) |
WO (1) | WO2020037577A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111781890A (en) * | 2020-07-14 | 2020-10-16 | 厦门海为科技有限公司 | Multi-equipment engineering communication method and system in configuration engineering |
CN111797417A (en) * | 2020-07-06 | 2020-10-20 | 上海明略人工智能(集团)有限公司 | File uploading method and device, storage medium and electronic device |
CN112202868A (en) * | 2020-09-27 | 2021-01-08 | 上海交通大学 | Method for realizing block chain consensus protocol based on wireless air calculation |
CN113808303A (en) * | 2021-08-24 | 2021-12-17 | 珠海市安科电子有限公司 | Composite encryption method, door lock system and storage medium |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116436697B (en) * | 2023-06-07 | 2023-09-12 | 北京华云安信息技术有限公司 | Data transmission encryption and decryption method and device, electronic equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1949750A (en) * | 2006-11-24 | 2007-04-18 | 杭州华为三康技术有限公司 | Method and apparatus for transmitting, receiving and processing text of generative tree protocol |
CN101471772A (en) * | 2007-12-27 | 2009-07-01 | 华为技术有限公司 | Communication method, device and system |
WO2011161494A1 (en) * | 2010-06-22 | 2011-12-29 | Sandisk Il Ltd. | Storage device, host device, and method for communicating a password between first and second storage devices using a double-encryption scheme |
CN104301283A (en) * | 2013-07-15 | 2015-01-21 | 镇江金钛软件有限公司 | Method for client to log into server |
CN104396182A (en) * | 2012-04-16 | 2015-03-04 | 迈德安全基金会 | Method of encrypting data |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102624749B (en) * | 2012-04-13 | 2014-06-04 | 宁波市北仑海伯精密机械制造有限公司 | Load balancing method and system for safety communication |
-
2018
- 2018-08-22 CN CN201880002398.9A patent/CN109792451B/en active Active
- 2018-08-22 WO PCT/CN2018/101825 patent/WO2020037577A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1949750A (en) * | 2006-11-24 | 2007-04-18 | 杭州华为三康技术有限公司 | Method and apparatus for transmitting, receiving and processing text of generative tree protocol |
CN101471772A (en) * | 2007-12-27 | 2009-07-01 | 华为技术有限公司 | Communication method, device and system |
WO2011161494A1 (en) * | 2010-06-22 | 2011-12-29 | Sandisk Il Ltd. | Storage device, host device, and method for communicating a password between first and second storage devices using a double-encryption scheme |
CN104396182A (en) * | 2012-04-16 | 2015-03-04 | 迈德安全基金会 | Method of encrypting data |
CN104301283A (en) * | 2013-07-15 | 2015-01-21 | 镇江金钛软件有限公司 | Method for client to log into server |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111797417A (en) * | 2020-07-06 | 2020-10-20 | 上海明略人工智能(集团)有限公司 | File uploading method and device, storage medium and electronic device |
CN111781890A (en) * | 2020-07-14 | 2020-10-16 | 厦门海为科技有限公司 | Multi-equipment engineering communication method and system in configuration engineering |
CN112202868A (en) * | 2020-09-27 | 2021-01-08 | 上海交通大学 | Method for realizing block chain consensus protocol based on wireless air calculation |
CN113808303A (en) * | 2021-08-24 | 2021-12-17 | 珠海市安科电子有限公司 | Composite encryption method, door lock system and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109792451B (en) | 2022-11-18 |
WO2020037577A1 (en) | 2020-02-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109792451A (en) | Communication channel encryption, decryption and method for building up and device, memory and terminal | |
US9998434B2 (en) | Secure dynamic communication network and protocol | |
US9659189B2 (en) | Systems and methods of safeguarding user information while interacting with online service providers | |
CN104683301B (en) | Password storage method and device | |
CN106790009B (en) | Information processing method and device and mobile terminal | |
CN112087362B (en) | Message forwarding method and device between clients and terminal | |
US9240978B2 (en) | Communication system having message encryption | |
US7945248B2 (en) | Mobile communications device employing multiple data storage locations for electronic messages | |
CN106685948A (en) | Data processing method, terminal, communication device and data processing system | |
US9166794B2 (en) | Securing private key access for cross-component message processing | |
CN104980436B (en) | A kind of encryption transmission system, method, terminal and intermediate server | |
US8819407B2 (en) | Personal messaging security | |
US9479928B2 (en) | Cross-component message encryption | |
CN114629649B (en) | Data processing method and device based on cloud computing and storage medium | |
US20140280656A1 (en) | Method employing at least one central processing unit (cpu) | |
Wirtz et al. | Encrypting data to pervasive contexts | |
CN109076317A (en) | Verify the method and server of message legitimacy | |
US8538022B2 (en) | System and method of cross-component message processing | |
CN110769306B (en) | Subtitle decryption method and device, client and storage medium | |
CN106657122A (en) | Data processing method and device as well as terminal device | |
CN114553506A (en) | Mail encryption method, system, equipment and storage medium based on cloud service | |
Karimov et al. | DEVELOPMENT OF SECURE MODELS AND ALGORITHMS OF MESSENGERS WHEN EXCHANGING SERVICE MESSAGES | |
Armoogum et al. | A Secure Messaging and File Transfer Application | |
CA2537028C (en) | Mobile communications device employing multiple data storage locations for electronic messages | |
CA2705004C (en) | System and method of cross-component message processing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |