CN110166426A - Information sends terminal, receives terminal and its secret communication method, storage medium - Google Patents

Information sends terminal, receives terminal and its secret communication method, storage medium Download PDF

Info

Publication number
CN110166426A
CN110166426A CN201910290277.5A CN201910290277A CN110166426A CN 110166426 A CN110166426 A CN 110166426A CN 201910290277 A CN201910290277 A CN 201910290277A CN 110166426 A CN110166426 A CN 110166426A
Authority
CN
China
Prior art keywords
information
key
terminal
sent
check value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910290277.5A
Other languages
Chinese (zh)
Inventor
胡进飞
王增斌
韩军海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Matchball Information Technology Co Ltd
Original Assignee
Beijing Matchball Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Matchball Information Technology Co Ltd filed Critical Beijing Matchball Information Technology Co Ltd
Priority to CN201910290277.5A priority Critical patent/CN110166426A/en
Publication of CN110166426A publication Critical patent/CN110166426A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of secret communication method, comprising: information send terminal according to the rule that is consulted under one side's line of information receiving terminal, acquire key template from network public information;The information sends terminal and generates key and the first check value using the key template;The information receiving terminal generates key and the second check value using the key template, and the information sends terminal to the information receiving end and sends the first check value with the consistency of check key;The information sends terminal and the key is used to encrypt data to be sent to obtain ciphertext;The information sends terminal to the information receiving terminal and sends the ciphertext.It, to prevent encryption information and key to be acquired simultaneously, improves the safety of transmission information by way of only transfer check value and ciphertext.

Description

Information sends terminal, receives terminal and its secret communication method, storage medium
Technical field
The present invention relates to mobile message applied technical fields more particularly to a kind of information to send terminal, information receiving terminal And its secret communication method, storage medium.
Background technique
Secret communication is to take the content to be transmitted special measure, so that the true content of hidden information, makes illegal Intercept person cannot understand Content of Communication, for covert communications content, usually before transmission, content first be carried out various forms of turns It changes, forms encryption information, carry out corresponding inverse transformation in receiving end to restore information.The information password protection that conventional method uses Measure will fail for the decoding of supercomputer.Therefore the safety for how improving transmission information, which becomes, to be badly in need of solving at present The problem of.
Summary of the invention
Terminal, information receiving terminal and its secrecy is sent the invention mainly solves the technical problem of providing a kind of information to lead to Letter method, storage medium improve the safety of transmission information to prevent encryption information and key to be acquired simultaneously.
In order to solve the above technical problems, one technical scheme adopted by the invention is that: a kind of secret communication method is provided, is wrapped It includes:
Information send terminal according to the rule that is consulted under one side's line of information receiving terminal, adopted from network public information Collect key template;
The information sends terminal and generates key using the key template;
The information sends terminal and the key is used to encrypt data to be sent to obtain ciphertext;
The information sends terminal to the information receiving terminal and sends the ciphertext.
In order to solve the above technical problems, another technical solution used in the present invention is: a kind of information transmission terminal is provided, It includes memory and processor interconnected that the information, which sends terminal, wherein
The memory is used to store the program instruction for realizing secret communication method described above;
The processor is used to execute the described program instruction of the memory storage.
In order to solve the above technical problems, another technical solution that the present invention uses is: a kind of storage medium is provided, In, the storage medium is stored with program data, and described program data can be performed secret communication method described above.
In order to solve the above technical problems, another technical solution used in the present invention is: a kind of secret communication method is provided, Include:
Information receiving terminal sends the rule consulted under one side's line of terminal according to information, adopts from network public information Collect key template;
The information receiving terminal generates key using the key template;
The information receiving terminal receives the ciphertext that terminal is sent from the information;
The information receiving terminal uses the key to decrypt the ciphertext to read received message.
In order to solve the above technical problems, another technical solution that the application uses is: a kind of information receiving terminal is provided, The information receiving terminal includes memory and processor interconnected, wherein
The memory is used to store the program instruction for realizing secret communication method described above;
The processor is used to execute the described program instruction of the memory storage.In order to solve the above technical problems, this Another technical solution that invention uses is: providing a kind of storage medium, wherein the storage medium is stored with program data, Described program data can be performed secret communication method described above.
The beneficial effects of the present invention are: being different from the prior art, secret communication method proposed by the present invention is to pass through information It sends terminal and acquires key template from network public information according to the rule consulted under one side's line of information receiving terminal, and Key is generated using the key template, then uses key encryption data to be sent to obtain ciphertext, it finally will be described close Text is sent to the information receiving terminal.As a result, to prevent encryption information and key by simultaneously by way of only transmitting ciphertext It obtains, improves the safety of transmission information.
Detailed description of the invention
Fig. 1 is the flow diagram for the first embodiment that information of the present invention sends terminal security communication means;
Fig. 2 is the flow diagram for the second embodiment that information of the present invention sends terminal security communication means;
Fig. 3 is the flow diagram for the 3rd embodiment that information of the present invention sends terminal security communication means;
Fig. 4 is the flow diagram of the first embodiment of information receiving terminal secret communication method of the present invention;
Fig. 5 is the flow diagram of the second embodiment of information receiving terminal secret communication method of the present invention;
Fig. 6 is the flow diagram of the 3rd embodiment of information receiving terminal secret communication method of the present invention;
Fig. 7 is the structural representation that information of the present invention sends terminal and the transmission of information receiving terminal secret communication method signal Figure;
Fig. 8 is that information of the present invention sends terminal/information receiving terminal structural schematic diagram;
Fig. 9 is the structural schematic diagram of storage medium embodiment of the present invention.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation description, it is clear that described embodiment is only a part of the embodiment of the application, instead of all the embodiments.It is based on Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall in the protection scope of this application.
Term " first ", " second ", " third " in the application are used for description purposes only, and should not be understood as instruction or dark Show relative importance or implicitly indicates the quantity of indicated technical characteristic." first ", " second ", " are defined as a result, Three " feature can explicitly or implicitly include at least one of the features.In the description of the present application, the meaning of " plurality " is extremely It is two few, such as two, three etc., unless otherwise specifically defined.The directional instruction of institute is (all in the embodiment of the present application Such as up, down, left, right, before and after ...) it is only used for explaining in the phase under a certain particular pose (as shown in the picture) between each component To positional relationship, motion conditions etc., if the particular pose changes, directionality instruction also correspondingly changes therewith Become.In addition, term " includes " and " having " and their any deformations, it is intended that cover and non-exclusive include.Such as comprising The process, method, system, product or equipment of a series of steps or units are not limited to listed step or unit, and It is optionally further comprising the step of not listing or unit, or optionally further comprising for these process, methods, product or equipment Intrinsic other step or units.
Referenced herein " embodiment " is it is meant that a particular feature, structure, or characteristic described can wrap in conjunction with the embodiments It is contained at least one embodiment of the application.Each position in the description occur the phrase might not each mean it is identical Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and Implicitly understand, embodiment described herein can be combined with other embodiments.
The present invention will be described in detail with reference to the accompanying drawings and examples.
Fig. 1 and Fig. 4 is please referred to, is the flow diagram of the first embodiment of secret communication method of the present invention, side described in Fig. 1 Method sends terminal by information and executes.Include:
Step S101: information send terminal according to the rule that is consulted under one side's line of information receiving terminal, from net Key template is acquired in network public information.
The information is sent negotiates under terminal and the information receiving terminal line, from network public information one section of acquisition or Multistage information is as key template, and network public information is well-known information disclosed in network, such as video, picture, text The one kind such as chapter, music or any combination.
Step S102: the information sends terminal and generates key using the key template.
It includes key generating device, video, picture, text of the key generating device by acquisition in terminal that the information, which is sent, Chapter, music etc. are a kind of or any combination generates key.
Step S103: the information sends terminal and the key is used to encrypt data to be sent to obtain ciphertext.
Pass through specifically, the information sends terminal according to the key template (one kind such as video, picture, article, music Or any combination) the obtained key pair message (i.e. ciphertext) that needs the message sent to be encrypted, and then encrypted.
Step S104: the information sends terminal to the information receiving terminal and sends the ciphertext.
The information sends terminal after being encrypted to obtain ciphertext to the message to be sent by the ciphertext It is sent to the information receiving terminal.
Method described in Fig. 4 is executed by the information receiving terminal, comprising:
Step S301: information receiving terminal sends the rule consulted under one side's line of terminal according to the information, from net Key template is acquired in network public information.
The information is sent negotiates under terminal and the information receiving terminal line, from network public information one section of acquisition or Multistage information is as key template, and network public information is well-known information disclosed in network, such as video, picture, text The one kind such as chapter, music or any combination.It should be noted that the information receiving terminal and the information send terminal acquisition Key template its type, size must be identical.
Step S302: the information receiving terminal generates key using the key template.
It include key generating device, video, picture, text of the key generating device by acquisition in the information receiving terminal Chapter, music etc. are a kind of or any combination generates key, it should be noted that since the information receiving terminal and the information are sent out Making arrangements for his funeral key template its type of end acquisition, size must be identical, thus the key that generates of the information receiving terminal with it is described It is identical that information sends the key that terminal generates.
Step S303: the information receiving terminal receives the ciphertext that terminal is sent from the information.
The information sends after terminal message to be sent according to the key pair is encrypted and obtains ciphertext, by institute It states ciphertext and is sent to the information receiving terminal.
Step S304: the information receiving terminal uses the key to decrypt the ciphertext to read received message.
The information receiving terminal after receiving the information and sending the ciphertext that terminal is sent, generated by itself with The information sends ciphertext described in the identical key pair of terminal and is decrypted, to read received message.
In the present embodiment, the information sends terminal and only sends ciphertext to the information receiving terminal, without sending out Key is sent, therefore is difficult to be cracked the ciphertext sent is trapped message transmitted later.
Fig. 2 and Fig. 5 is referred to, is the flow diagram of the second embodiment of secret communication method of the present invention, side described in Fig. 2 Method sends terminal by information and executes.Compared to Fig. 1, the method is before step S103 further include:
Step S201: information sends terminal and generates the first check value according to the key.
The information utilizes the key template to generate key after sending terminal acquisition key template, further according to described close Key generates the first check value.Wherein first check value is MD5 (Message-Digest Algorithm 5, information-abstract Algorithm), it is a kind of non-reversible algorithm, each file (video, picture, article etc.) has the MD5 value of displacement, if to certain One file content is modified, and MD5 value can also change, therefore first check value is that the key template is unique MD5 value.
Step S202: the information sends terminal and first check value is sent to the information receiving terminal.
In order to which the secret communication can be normally carried out, therefore, to assure that the information sends terminal and the information receives eventually The key at end is identical, therefore the information sends terminal and the first check value generated according to the key is sent to the information Terminal is received, so that first check value is compared by the information receiving terminal with the second check value that itself is generated.
Step S203: information sends terminal and receives the comparison result from the information receiving terminal, and in comparison result Under unanimous circumstances, step S103 is executed, does not otherwise execute step S103.
The information receiving terminal receives the first check value and verifies the second of first check value and itself generation Value is compared, compare complete after to the information send terminal feedback compare as a result, the information send terminal according to than Relatively result judges whether secret communication is normally carried out, and even comparison result shows first check value and second check value It is consistent then show that both sides' key is identical, then step S103 is carried out, if comparison result shows first check value and described second Check value is inconsistent, shows that both sides' key is not identical, then without step S103.
Fig. 5 the method is executed by information receiving terminal, and compared to Fig. 4, the method is before step S303 further include:
Step S401: information receiving terminal generates the second check value according to the key.
Key is generated using the key template after the information receiving terminal acquisition key template, further according to described close Key generates the second check value.Wherein second check value is MD5 (Message-Digest Algorithm 5, information-abstract Algorithm), it is a kind of non-reversible algorithm, each file (video, picture, article etc.) has unique MD5 value, if to certain One file content is modified, and MD5 value can also change, therefore second check value is that the key template is unique MD5 value.
Step S402: the information receiving terminal receives the first check value that terminal is sent from the information, will be described Second check value that first check value is generated with itself is compared, and is sent terminal transmission to the information and compared knot Fruit.
The information receiving terminal receives the first check value and verifies the second of first check value and itself generation Value is compared, and is sent terminal feedback to the information after comparing completion and is compared as a result, so that the information sends terminal and sentences Whether disconnected both sides' key is identical, it is ensured that secret communication is normally carried out.
In the present embodiment, verify the information send terminal and the information receiving terminal key it is whether identical be logical It crosses information and sends terminal and the first check value is sent to the information receiving terminal, the information receiving terminal is by the first check code It is compared with the second check code itself generated, and comparison result is fed back into the information and sends terminal.In other implementations In example, the whether identical mode of key for verifying the information transmission terminal and the information receiving terminal can also be, described Second check value is sent to the information and sends terminal by information receiving terminal, and the information sends terminal and verifies described second Value is compared with the first check value that itself is generated, when comparison result is consistent, described in the transmission of Xiang Suoshu information receiving terminal Ciphertext.It in another embodiment, can also be that the information sends terminal and the first check code is sent to information receiving terminal, The second check code is sent to the information and sends terminal by the information receiving terminal simultaneously, and both sides are compared simultaneously.
In the present embodiment, in order to guarantee that secret communication is normally carried out, while in order to guarantee that key is not trapped, pass through ratio Compared with the MD5 value of both sides' key come confirmation message send terminal and information receiving terminal key it is whether identical, due to MD5 be can not Inverse operation is unable to get key being trapped, and further improves the safety of information transmission.
Fig. 3 and Fig. 6 is referred to, is the flow diagram of the 3rd embodiment of secret communication method of the present invention, side described in Fig. 3 Method sends terminal by information and executes.Compared to second embodiment, the method further includes following sub-step in step S102:
Step S1021: the information sends terminal and generates first key using the key template, and connects according to information It receives the rule consulted under one side's line of terminal and intercepts the first key, to form the institute with the message identical length to be sent State key.
The information sends terminal after obtaining first key according to key template, and the first key is cut It takes, obtains the key identical with the message-length to be sent to encrypt to the message to be sent.It needs to illustrate , in the present embodiment, the length of the key before the interception need to be greater than the length that the band sends message, such as described pending Sending message is 5K, then key before the interception need to be greater than 5K, such as 7K, according to negotiate under one side's line of information receiving terminal The mode of good rule interception and the key of the message identical length to be sent is that both sides hold consultation, interception 5k length Key, such as from the 1-5K or 2-6K or 3-7K in interception 7K key, as long as guaranteeing that key length is identical as message length to be sent ?.
In step S201 further include following sub-step in the present embodiment compared to second embodiment:
Step S2011: first check value is generated according to the key of the message identical length to be sent.
In order to ensure both sides interception key length and content it is identical, after intercepting key, by with it is described to be sent The key of message identical length generates the first check value.According to after interception key generate the first check value after continue into Row step S202.
Fig. 6 the method is executed by information receiving terminal.Compared to second embodiment, the method is gone back in step S302 Including following sub-step:
Step S3021: the information receiving terminal generates the second key using the key template, and sends out according to information It makes arrangements for his funeral and the rule consulted under side's line is held to intercept second key, to form the institute with the message identical length to be sent State key.
This step mode is identical as above-mentioned steps S1021 mode, and details are not described herein.
In step S401 further include following sub-step in the present embodiment compared to second embodiment:
Step S4011: second check value is generated according to the key of the message identical length to be sent.
In order to ensure the key length and content of both sides' interception are identical, after intercepting second key, by with institute The key for stating message identical length to be sent generates the second check value.The second check value is being generated according to the key after interception After continue step S402.
In the present embodiment, the key generated according to the key template is intercepted, with obtain with it is described to be sent The key of message identical length further makes basis so that the key and message to be sent after interception do not have any statistical relationship The ciphertext that key pair message to be sent after the interception is encrypted can not crack.
It should be noted that in this application, it is close to generate that file of every transmission can acquire a key template Key can also just encrypt different multiple files with same key, can also be when sending a file packet, to the file Multiple subfiles in packet use identical or different key.Depending on its concrete mode is accustomed to by user, specifically without limitation.
Fig. 7 is referred to, signal between terminal and information receiving terminal is sent for information of the present invention and transmits schematic diagram.
The information, which is sent, negotiates to acquire identical key template under terminal 71 and 72 line of information receiving terminal, under line Negotiation mode is mailbox or communication software etc., and both sides carry out assisting under line again by each self-generating key of identical key template Quotient, the first key generated according to the rule interception of negotiation according to the key template and the second key, with obtain with it is described to The key of message identical length is sent, the information sends terminal 71 and generates the first check value by the key after interception, The information receiving terminal 72 generates the second check value by the key after interception, and the information sends terminal 71 will be described First check value is sent to the information receiving terminal 72, and the information receiving terminal 72 is by first check value and itself gives birth to At the second check value be compared, and comparison result is sent to the information and sends terminal 71, the information sends terminal 71 analysis comparison results illustrate double when the comparison result shows first check value and second check value is identical Key after side's interception is identical, and the information sends the message to be sent according to the key pair after interception of terminal 71 and encrypted Ciphertext is generated, and the ciphertext is sent to the information receiving terminal 72, after the information receiving terminal 72 is according to interception Ciphertext described in key pair is decrypted to read received message.The present invention by way of only transfer check value and ciphertext to prevent Only encryption information and key are acquired simultaneously, and improve the safety of transmission information.
Referring to Fig. 8, being the structural schematic diagram that information of the present invention sends terminal or information receiving terminal.The information is sent Terminal or information receiving terminal include processor 51 and the memory connect with processor lotus root 52.
The memory 52 is stored with the program instruction of the secret communication for realizing any of the above-described.
The processor 51 is used to execute the described program instruction of the storage of memory 52.
Wherein, processor 51 can also be known as CPU (Central Processing Unit, central processing unit).Processing Device 51 may be a kind of IC chip, the processing capacity with signal.Processor 51 can also be general processor, number Signal processor (DSP), specific integrated circuit (ASIC), ready-made programmable gate array (FPGA) or other programmable logic devices Part, discrete gate or transistor logic, discrete hardware components.General processor can be microprocessor or the processor It is also possible to any conventional processor etc..
Memory 52 can be memory bar, TF card etc., can store all information in terminal, the original number including input It is all saved in memory according to, computer program, intermediate operation result and final operation result.The position that it is specified according to controller It sets deposit and takes out information.There is memory, terminal just has memory function, just can guarantee normal work.Memory in terminal Main memory (memory) and additional storage (external memory) can be divided by purposes memory, also have and be divided into external memory and inside is deposited The classification method of reservoir.External memory is usually magnetic medium or CD etc., energy long-term preservation information.Memory refers to the storage unit on mainboard Part is used to store the data and program being currently executing, but is only used for temporarily storing program and data, closes power supply or disconnected Electricity, data can lose.
The information sends terminal or information receiving terminal further includes other devices, sends out with information in the prior art Make arrangements for his funeral other devices in end or information receiving terminal and function it is identical, details are not described herein.
It is the structural schematic diagram of storage medium embodiment of the present invention refering to Fig. 9.The storage medium of the application is stored with can Realize the above-mentioned methodical program data 61 of institute, wherein the program data 61 can be stored in above-mentioned in the form of software products In storage medium, including some instructions are used so that a computer equipment (can be personal computer, server or net Network equipment etc.) or processor (processor) execute each embodiment the method for the application all or part of the steps.And Storage device above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory The various media that can store program code such as device (RAM, Random Access Memory), magnetic or disk, either The terminal devices such as computer, server, mobile phone, plate.
Mode the above is only the implementation of the present invention is not intended to limit the scope of the invention, all to utilize this Equivalent structure or equivalent flow shift made by description of the invention and accompanying drawing content, it is relevant to be applied directly or indirectly in other Technical field is included within the scope of the present invention.

Claims (10)

1. a kind of secret communication method characterized by comprising
Information send terminal according to the rule that is consulted under one side's line of information receiving terminal, acquired from network public information close Key template;
The information sends terminal and generates key using the key template;
The information sends terminal and the key is used to encrypt data to be sent to obtain ciphertext;
The information sends terminal to the information receiving terminal and sends the ciphertext.
2. secret communication method according to claim 1, which is characterized in that
The information sends terminal and use key encryption data to be sent to include: before obtaining ciphertext
Information sends terminal and generates the first check value according to the key;
The information sends terminal and first check value is sent to the information receiving terminal, so that the information receives eventually First check value is compared by end with the second check value that itself is generated, and is returned to comparison result to information and sent eventually End;
The information sends terminal and receives the comparison result, the result shows that first check value and the second of itself generation Under check value unanimous circumstances, executes the information transmission terminal and the key is used to encrypt data to be sent to obtain ciphertext Otherwise step does not execute the information transmission terminal and the key is used to encrypt the step of data to be sent are to obtain ciphertext.
3. secret communication method according to claim 2, which is characterized in that the information sends terminal and utilizes the key Template generation key includes:
The information sends terminal and generates first key using the key template, and according to under one side's line of information receiving terminal The rule consulted intercepts the first key, to form the key with the message identical length to be sent;
The information sends terminal according to the key the first check value of generation
First check value is generated according to the key of the message identical length to be sent.
4. a kind of secret communication method characterized by comprising
Information receiving terminal sends the rule consulted under one side's line of terminal according to information, acquires from network public information close Key template;
The information receiving terminal generates key using the key template;
The information receiving terminal receives the ciphertext that terminal is sent from the information;
The information receiving terminal uses the key to decrypt the ciphertext to read received message.
5. secret communication method according to claim 4, which is characterized in that
The information receiving terminal is received includes before the ciphertext that the information sends terminal;
Information receiving terminal generates the second check value according to the key;
The information receiving terminal receives the first check value that terminal is sent from the information, by first check value and certainly Second check value that body generates is compared, and is sent terminal to the information and sent comparison result.
6. secret communication method according to claim 5, which is characterized in that
The information receiving terminal generates key using the key template
The information receiving terminal generates the second key using the key template, and sends under one side's line of terminal according to information The rule consulted intercepts second key, to form the key with the message identical length to be sent;
The information receiving terminal generates the second check value according to the key
Second check value is generated according to the key of the message identical length to be sent.
7. a kind of information sends terminal, which is characterized in that including memory interconnected and processor, wherein
The memory is used to store the program instruction for realizing secret communication method described above;
The processor is used to execute the described program instruction of the memory storage.
8. a kind of information receiving terminal, which is characterized in that including memory interconnected and processor, wherein
The memory is used to store the program instruction for realizing secret communication method described above;
The processor is used to execute the described program instruction of the memory storage.
9. a kind of storage medium, which is characterized in that be stored with program data, described program data can be performed to realize as weighed Benefit requires secret communication method described in 1-3 any one.
10. a kind of storage medium, which is characterized in that be stored with program data, described program data can be performed to realize such as Secret communication method described in claim 4-6 any one.
CN201910290277.5A 2019-04-11 2019-04-11 Information sends terminal, receives terminal and its secret communication method, storage medium Pending CN110166426A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910290277.5A CN110166426A (en) 2019-04-11 2019-04-11 Information sends terminal, receives terminal and its secret communication method, storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910290277.5A CN110166426A (en) 2019-04-11 2019-04-11 Information sends terminal, receives terminal and its secret communication method, storage medium

Publications (1)

Publication Number Publication Date
CN110166426A true CN110166426A (en) 2019-08-23

Family

ID=67639253

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910290277.5A Pending CN110166426A (en) 2019-04-11 2019-04-11 Information sends terminal, receives terminal and its secret communication method, storage medium

Country Status (1)

Country Link
CN (1) CN110166426A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021082813A1 (en) * 2019-11-01 2021-05-06 华为技术有限公司 Secure communication method and device
CN112787803A (en) * 2019-11-01 2021-05-11 华为技术有限公司 Method and equipment for secure communication
CN113347147A (en) * 2021-04-15 2021-09-03 中安云科科技发展(山东)有限公司 Two-point secret key safety synchronization method, system and equipment
CN115277050A (en) * 2022-06-01 2022-11-01 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) Data sending method, data receiving method and network equipment
CN116132134A (en) * 2022-12-30 2023-05-16 北京海泰方圆科技股份有限公司 Data transmission method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103997405A (en) * 2014-05-28 2014-08-20 大唐移动通信设备有限公司 Secret key generation method and device
CN104506483A (en) * 2014-10-21 2015-04-08 中兴通讯股份有限公司 Method for encrypting and decrypting information and managing secret key as well as terminal and network server
CN104767610A (en) * 2015-04-23 2015-07-08 数据堂(北京)科技股份有限公司 Data encryption method and system
CN107172030A (en) * 2017-05-09 2017-09-15 国家计算机网络与信息安全管理中心 A kind of high concealed and anti-communication means traced to the source
CN109150526A (en) * 2018-11-02 2019-01-04 美的集团股份有限公司 Cryptographic key negotiation method, equipment, terminal, storage medium and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103997405A (en) * 2014-05-28 2014-08-20 大唐移动通信设备有限公司 Secret key generation method and device
CN104506483A (en) * 2014-10-21 2015-04-08 中兴通讯股份有限公司 Method for encrypting and decrypting information and managing secret key as well as terminal and network server
CN104767610A (en) * 2015-04-23 2015-07-08 数据堂(北京)科技股份有限公司 Data encryption method and system
CN107172030A (en) * 2017-05-09 2017-09-15 国家计算机网络与信息安全管理中心 A kind of high concealed and anti-communication means traced to the source
CN109150526A (en) * 2018-11-02 2019-01-04 美的集团股份有限公司 Cryptographic key negotiation method, equipment, terminal, storage medium and system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021082813A1 (en) * 2019-11-01 2021-05-06 华为技术有限公司 Secure communication method and device
CN112787803A (en) * 2019-11-01 2021-05-11 华为技术有限公司 Method and equipment for secure communication
CN113347147A (en) * 2021-04-15 2021-09-03 中安云科科技发展(山东)有限公司 Two-point secret key safety synchronization method, system and equipment
CN115277050A (en) * 2022-06-01 2022-11-01 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) Data sending method, data receiving method and network equipment
CN115277050B (en) * 2022-06-01 2023-11-17 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) Data transmission method, data receiving method and network equipment
CN116132134A (en) * 2022-12-30 2023-05-16 北京海泰方圆科技股份有限公司 Data transmission method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN110166426A (en) Information sends terminal, receives terminal and its secret communication method, storage medium
JP4216475B2 (en) Cryptographic indexed key update method and device having leakage resistance
CN110061845A (en) Block chain data ciphering method, device, computer equipment and storage medium
CN109728906B (en) Anti-quantum-computation asymmetric encryption method and system based on asymmetric key pool
US9641340B2 (en) Certificateless multi-proxy signature method and apparatus
CN110417750A (en) File based on block chain technology is read and method, terminal device and the storage medium of storage
US20110047377A1 (en) Secure digital communications via biometric key generation
EP2218029B1 (en) Mobile smartcard based authentication
Silva et al. Towards a cooperative security system for mobile-health applications
CN111294203B (en) Information transmission method
CN108347404A (en) A kind of identity identifying method and device
CN103208151A (en) Method and system for processing operation requests
EP2141627A1 (en) Securely using a display to exchange information
CN107395589A (en) Finger print information acquisition methods and terminal
AU2020336124A1 (en) Decentralized techniques for verification of data in transport layer security and other contexts
CN110445840A (en) A method of file storage and reading based on block chain technology
US20020018570A1 (en) System and method for secure comparison of a common secret of communicating devices
Agarwala et al. DICE: A dual integrity convergent encryption protocol for client side secure data deduplication
EP3785399B1 (en) Method for generating on-board a cryptographic key using a physically unclonable function
CN110493005B (en) Anti-quantum computing public key pool updating method and system based on alliance chain
CN109302425A (en) Identity identifying method and terminal device
CN109302442A (en) A kind of data storage method of proof and relevant device
CN108959908A (en) A kind of method, computer equipment and storage medium that the mobile platform with access SDK is authenticated
CN110519045B (en) Anti-quantum computing alliance chain transaction method and system based on group asymmetric key pool
CN103746798B (en) A kind of data access control method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190823

RJ01 Rejection of invention patent application after publication