CN111368321B - Communication anti-monitoring method and device - Google Patents

Communication anti-monitoring method and device Download PDF

Info

Publication number
CN111368321B
CN111368321B CN202010157574.5A CN202010157574A CN111368321B CN 111368321 B CN111368321 B CN 111368321B CN 202010157574 A CN202010157574 A CN 202010157574A CN 111368321 B CN111368321 B CN 111368321B
Authority
CN
China
Prior art keywords
information
short
target
address
short address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010157574.5A
Other languages
Chinese (zh)
Other versions
CN111368321A (en
Inventor
刁嘉文
王忠儒
崔翔
余伟强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Digapis Technology Co ltd
Original Assignee
Beijing Digapis Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Digapis Technology Co ltd filed Critical Beijing Digapis Technology Co ltd
Priority to CN202010157574.5A priority Critical patent/CN111368321B/en
Publication of CN111368321A publication Critical patent/CN111368321A/en
Application granted granted Critical
Publication of CN111368321B publication Critical patent/CN111368321B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a communication anti-monitoring method and a device, which are used for encrypting acquired target transmission information to obtain encrypted information; coding the encrypted information to obtain coded information; splitting the coded information to obtain a plurality of segments of sub information; and performing short address conversion on each section of the sub information, splicing each short address obtained by conversion to obtain a spliced short address, performing iterative compression conversion on the spliced short address to finally obtain a target short address, and enabling the target short address to represent the target transmission information for transmission. In the invention, the target transmission information to be transmitted is hidden in the short address, so that the information transmission has penetrability, concealment and safety, thereby realizing the purposes of effectively encrypting the transmission information and effectively preventing the information from being monitored.

Description

Communication anti-monitoring method and device
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method and an apparatus for preventing communications from being monitored.
Background
With the development of internet technology, the security of information has become the focus of general attention. Along with the leakage of more and more network information of users, people pay more and more attention to whether information transmitted on the internet is safe or not, whether a third party can obtain privacy content transmitted by the third party or not, and namely whether the privacy content required to be transmitted by the users is effectively kept secret or not. But the user's information, either in traffic or content, is easily monitored.
Therefore, how to effectively prevent the interception of the information transmission content of the user network has become a research focus in the current field.
Disclosure of Invention
In view of the above problems, the present invention provides a method and an apparatus for preventing communication interception, which achieve the purpose of effectively encrypting transmission information and effectively preventing information from being intercepted.
In order to achieve the purpose, the invention provides the following technical scheme:
a method for communication anti-interception, the method comprising:
encrypting the acquired target transmission information to obtain encrypted information;
encoding the encrypted information to obtain encoded information;
splitting the coded information to obtain a plurality of segments of sub information;
and performing short address conversion on each section of the sub information, splicing each short address obtained by conversion to obtain a spliced short address, performing iterative compression conversion on the spliced short address to obtain a target short address, and enabling the target short address to represent the target transmission information for transmission.
Optionally, the method further comprises:
responding to the transmission of the target short address to a destination end, and analyzing the target short address to obtain a plurality of short addresses;
acquiring sub-information according to each short address;
splicing the sub information to obtain spliced information;
decoding the spliced information to obtain decoded information;
and decrypting the decoded information to obtain the target transmission information.
Optionally, the encoding the encrypted information to obtain encoded information includes:
extracting the encrypted information to obtain target information;
and coding the target information to obtain coded information.
Optionally, the splitting the encoded information to obtain a plurality of pieces of sub information includes:
and splitting the coded information in equal length to obtain a plurality of segments of sub information.
Optionally, the performing short address translation on each piece of the sub information includes:
and converting each section of the sub information into a target format to obtain a short address, wherein the target format comprises a flag bit, a ciphertext group and an address suffix.
Optionally, the splicing each short address obtained by conversion to obtain a spliced short address includes:
splicing each converted short address to obtain a first group of short addresses, wherein the first group of short addresses at least comprises two short addresses;
splicing the first group of short addresses, and merging and compressing according to preset address input capacity to obtain a second group of short addresses;
if the number of the second group of short addresses is one and only one, determining the second group of short addresses as spliced short addresses;
otherwise, the second group of short addresses are spliced, and merged and compressed according to the preset address input capacity until only one spliced short address exists.
A communication anti-eavesdropping device, the device comprising:
the encryption unit is used for encrypting the acquired target transmission information to obtain encrypted information;
the encoding unit is used for encoding the encrypted information to obtain encoded information;
the splitting unit is used for splitting the coded information to obtain a plurality of segments of sub information;
and the conversion unit is used for converting the short address of each section of the sub information, splicing each short address obtained by conversion to obtain a spliced short address, and performing iterative compression conversion on the spliced short address to obtain a target short address, so that the target transmission information is represented by the target short address for transmission.
Optionally, the apparatus further comprises:
the analysis unit is used for responding to the transmission of the target short address to a destination end and analyzing the target short address to obtain a plurality of short addresses;
the acquisition unit is used for acquiring the sub information according to each short address;
the splicing unit is used for splicing the sub information to obtain spliced information;
the decoding unit is used for decoding the spliced information to obtain decoded information;
and the decryption unit is used for decrypting the decoded information to obtain the target transmission information.
Optionally, the encoding unit includes:
the extraction subunit is used for extracting the encrypted information to obtain target information;
and the coding subunit is used for coding the target information to obtain coded information.
Optionally, the splitting unit is specifically configured to:
and splitting the coded information in equal length to obtain a plurality of segments of sub information.
Optionally, the conversion unit includes:
the format conversion subunit is used for converting each segment of the sub information into a target format to obtain a short address, wherein the target format comprises a flag bit, a ciphertext group and an address suffix;
the splicing unit is used for splicing each short address obtained by conversion to obtain a first group of short addresses, and the first group of short addresses at least comprises two short addresses; splicing the first group of short addresses, and merging and compressing according to preset address input capacity to obtain a second group of short addresses; if the number of the second group of short addresses is one and only one, determining the second group of short addresses as spliced short addresses; otherwise, the second group of short addresses are spliced, and merged and compressed according to the preset address input capacity until only one spliced short address exists.
Compared with the prior art, the invention provides a communication anti-monitoring method and device, which are used for encrypting the acquired target transmission information to obtain encrypted information; coding the encrypted information to obtain coded information; splitting the coded information to obtain a plurality of segments of sub information; and performing short address conversion on each section of the sub information, splicing each short address obtained by conversion to obtain a spliced short address, performing iterative compression conversion on the spliced short address to obtain a target short address, and enabling the target short address to represent the target transmission information for transmission. In the invention, the target transmission information to be transmitted is hidden in the short address, so that the information transmission has penetrability, concealment and safety, thereby realizing the purposes of effectively encrypting the transmission information and effectively preventing the information from being monitored.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a schematic flow chart of a communication monitoring prevention method according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of an information processing method according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a communication monitoring apparatus according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first" and "second," and the like in the description and claims of the present invention and the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "comprising" and "having," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not set forth for a listed step or element but may include steps or elements not listed.
In order to clearly understand the technical solution of the present invention, the following describes the technique in the solution of the present invention.
The address reduction technology comprises the following steps: also called short address, short web address, web address shortening, etc., refer to a technology and service on the internet. The service can provide a very short web site to replace the original possibly longer web site, shortening the long web site. When the user accesses the shortened website, the user can redirect to the original website.
Encryption technology: carrying out encryption operation by adopting a mainstream symmetric or asymmetric encryption algorithm;
and a decryption part: and decrypting the decoded ciphertext to obtain the original information. In the embodiment of the invention, the key negotiation problem does not need to be considered, namely, the two parties are assumed to complete the key negotiation process and have communicable keys.
Because the short address conversion does not support Chinese characters and part of special symbol contents, the information is coded and decoded to enhance the general applicability of the method, so that the method is suitable for most information.
And an encoding part: and encoding the input secret information needing protection by using Base64/Base32/Base 16.
A decoding part: and decoding the spliced content B to obtain a ciphertext.
Splitting information: splitting the encoded information B into several equal-length parts, for example: if the ciphertext length is n and the length of each part is m, the ciphertext is divided into n/m parts (n is an integral multiple of m).
Splicing part: and carrying out suffix removal or flag bit splicing on each part of information.
In an embodiment of the present invention, a communication monitoring prevention method is provided, and referring to fig. 1, the method may include the following steps:
s101, encrypting the acquired target transmission information to obtain encrypted information.
The target transmission information refers to information to be transmitted through the network, and may be information selected by the user to be transmitted. The encryption of the target transmission information may be performed by using a symmetric or asymmetric encryption algorithm, for example, AES, RSA, SM2, SM4, etc. to obtain the encrypted information, i.e., the ciphertext.
S102, the encrypted information is coded to obtain coded information.
All encrypted information may be encoded, or part of encrypted information may be encoded to reduce the amount of computation, where the part of information may be secret information that needs to be protected, such as privacy information of a user. That is, the encrypted information needs to be extracted to obtain the target information, and then the target information is encoded to obtain the encoded information. The extraction criteria of the target information can be default extraction of information with specific fields or extraction conditions customized by a user.
When the encrypted information is encoded, the encoding operation can be carried out on the input secret information needing to be protected by using Base64/Base32/Base 16.
S103, splitting the coded information to obtain a plurality of segments of sub information.
After the encoded information is obtained, the information can be transmitted via a short address. The encoded information needs to be split, the information can be split into equal-length parts or any product length, but the minimum length needs to meet the generation length of the short address. It should be noted that the input of the short address is in a range theoretically, so that the length can be controlled better, and the unequal length splitting algorithm is more complex.
For example, the encoded information B may be split into n/m parts by splitting the information B into equal-length parts, where the initial length is n and the length of each part is m.
S104, short address conversion is carried out on each section of the sub information, each short address obtained through conversion is spliced to obtain a spliced short address, iterative address reduction conversion is carried out on the spliced short address to obtain a target short address, and the target short address is used for representing the target transmission information to be transmitted.
When each segment of sub information is converted into a short address, the short address has a corresponding target format, and the target format can comprise a flag bit, a ciphertext group and an address suffix. For example, aOver-addressing service, will "[ flag bit][ ciphertext group]Com "to obtain the address. Wherein, the flag bit is 0 to represent the original information, and the flag bit is 1 to represent the need of iterative recovery. Each part B after splitting 1 ,B 2 …B n/m As address content 0B 1 .com,0B 2 .com…0B n/m Com, into a corresponding short address dwz. cn/(D1, D2 … Dn/m). In general, D x Is much shorter than B x Length of (d). Thus, the information length can be effectively shortened, and a layer of security measures are added. Subsequently, D is 1 、D 2 …D n/m Spliced together to give 1D 1 1D 2 …1D n/m Then, the short addresses are divided into the sizes which can be converted, and the short address conversion operation is continued. Repeating the above operations until the final ciphertext D which can be compressed only by one address compression operation is obtained f
In the embodiment of the invention, the target short address is used for replacing the target transmission information for transmission. Therefore, when the target short address is transmitted to the destination, the target short address needs to be analyzed to obtain a plurality of short addresses; acquiring sub-information according to each short address; splicing the sub information to obtain spliced information; decoding the spliced information to obtain decoded information; and decrypting the decoded information to obtain the target transmission information.
For example, refer to fig. 2, which shows a schematic flow chart of information processing provided by an embodiment of the present invention. The plaintext represents target transmission information, wherein the process of converting the plaintext into the addresses is as follows: and inputting information to be transmitted, and calling the encryption part to obtain a ciphertext C. And inputting the C into a coding part for coding to obtain a coding result B. And B is input into the information splitting part for splitting, each segment is converted into the length of the short address after splitting, and the splitting result is input into the short address conversion module and converted into the short address. Then calling an information splicing part, splicing the short address with the suffix removed as much as possible to a different place, continuing short address conversion, and finally converting into a short address, such as dwz.
It should be noted that short address stitching is an iterative stitching process, for example, each short address obtained by conversion is stitched to obtain a first group of short addresses, where the first group of short addresses includes at least two short addresses; splicing the first group of short addresses, and merging and compressing according to preset address input capacity to obtain a second group of short addresses; if the number of the second group of short addresses is one and only one, determining the second group of short addresses as spliced short addresses; otherwise, the second group of short addresses are spliced, and merged and compressed according to the preset address input capacity until only one spliced short address exists. Wherein the preset index input capacity represents the maximum index input capacity. After splitting the encoded information, several sub-information segments are obtained, and each word of information can be subjected to short address conversion to obtain a short address, such as D in fig. 2 1 、D 2 、D 3 、D 4 ,…,D n/m . Due to the influence of the range of the short address length, the obtained short addresses need to be spliced continuously, that is, the short addresses are spliced and added with the short addresses of the flag bit generation information, as shown in D in fig. 2 1 、D 2 、D 3 、,…D x If not, the concatenation is continued until only one and only one final short address is obtained, as shown in D of FIG. 2 f
And converting the addresses into plain texts: parsing the final short address (e.g., dwz. cn/final), calling each part to parse layer by layer through the resolution of the address reduction service, and finally parsing to 0B 1 .com,0B 2 .com…0B n/m Com. And calling the information splicing part to splice the information to obtain an encoding result B, and calling the decoding part to decode to obtain a ciphertext C. And then, the encryption and decryption part is called to decrypt the ciphertext to obtain the transmitted original information, namely the plaintext.
The invention realizes the safe transmission of information by using an address reduction mode and solves the problem of transmitting a large amount of information in a short time. The penetrability, the security, the disguise and the high efficiency of the communication are enhanced. At the same time, even if no encryption processing software is installed, the information is converted into long and short information by using an address reduction mode, and the two parties can still protect the information according to the specified address reduction mode.
Referring to fig. 3, in an embodiment of the present invention, there is further provided a communication monitoring apparatus, including:
the encryption unit 10 is configured to encrypt the obtained target transmission information to obtain encrypted information;
an encoding unit 20, configured to encode the encrypted information to obtain encoded information;
a splitting unit 30, configured to split the encoded information to obtain a plurality of pieces of sub information;
and the conversion unit 40 is configured to perform short address conversion on each segment of the sub information, splice each converted short address to obtain a spliced short address, perform iterative compression conversion on the spliced short address to obtain a target short address, and enable the target short address to represent the target transmission information for transmission.
On the basis of the above embodiment, the apparatus further includes:
the analysis unit is used for responding to the transmission of the target short address to a destination end and analyzing the target short address to obtain a plurality of short addresses;
the acquisition unit is used for acquiring the sub information according to each short address;
the splicing unit is used for splicing the sub information to obtain spliced information;
the decoding unit is used for decoding the spliced information to obtain decoded information;
and the decryption unit is used for decrypting the decoded information to obtain the target transmission information.
On the basis of the above embodiment, the encoding unit includes:
the extraction subunit is used for extracting the encrypted information to obtain target information;
and the coding subunit is used for coding the target information to obtain coded information.
On the basis of the foregoing embodiment, the splitting unit is specifically configured to:
and splitting the coded information in equal length to obtain a plurality of segments of sub information.
On the basis of the above embodiment, the conversion unit includes:
the format conversion subunit is used for converting each segment of the sub information into a target format to obtain a short address, wherein the target format comprises a flag bit, a ciphertext group and an address suffix;
the splicing unit is used for splicing each short address obtained by conversion to obtain a first group of short addresses, and the first group of short addresses at least comprises two short addresses; splicing the first group of short addresses, and merging and compressing according to preset address input capacity to obtain a second group of short addresses; if the number of the second group of short addresses is one and only one, determining the second group of short addresses as spliced short addresses; otherwise, the second group of short addresses are spliced, and merged and compressed according to the preset address input capacity until only one spliced short address exists.
The invention provides a communication anti-monitoring device.A ciphering unit ciphers acquired target transmission information to obtain ciphered information; the coding unit codes the encrypted information to obtain coded information; the splitting unit splits the coded information to obtain a plurality of segments of sub information; and the conversion unit performs short address conversion on each section of the sub information, splices each short address obtained by conversion to obtain a spliced short address, performs iterative compression conversion on the spliced short address to obtain a target short address, and enables the target short address to represent the target transmission information for transmission. In the invention, the target transmission information to be transmitted is hidden in the short address, so that the information transmission has penetrability, concealment and safety, thereby realizing the purposes of effectively encrypting the transmission information and effectively preventing the information from being monitored.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (6)

1. A communication anti-monitoring method is characterized by comprising the following steps:
encrypting the acquired target transmission information to obtain encrypted information;
encoding the encrypted information to obtain encoded information;
splitting the coded information to obtain a plurality of segments of sub information;
performing short address conversion on each segment of the sub information, splicing each short address obtained by conversion to obtain a spliced short address, performing iterative compression conversion on the spliced short address to obtain a target short address, and enabling the target short address to represent the target transmission information for transmission;
splitting the encoded information to obtain a plurality of segments of sub-information, including:
splitting the coded information in equal length to obtain a plurality of segments of sub information;
the short address conversion of each segment of the sub information comprises:
converting each segment of the sub information into a target format to obtain a short address, wherein the target format comprises a flag bit, a ciphertext group and an address suffix;
the splicing of each short address obtained by conversion to obtain a spliced short address comprises the following steps:
splicing each converted short address to obtain a first group of short addresses, wherein the first group of short addresses at least comprises two short addresses;
splicing the first group of short addresses, and merging and compressing according to preset address input capacity to obtain a second group of short addresses;
if the number of the second group of short addresses is one and only one, determining the second group of short addresses as spliced short addresses;
otherwise, the second group of short addresses are spliced, and merged and compressed according to the preset address input capacity until only one spliced short address exists.
2. The method of claim 1, further comprising:
responding to the transmission of the target short address to a destination end, and analyzing the target short address to obtain a plurality of short addresses;
acquiring sub-information according to each short address;
splicing the sub information to obtain spliced information;
decoding the spliced information to obtain decoded information;
and decrypting the decoded information to obtain the target transmission information.
3. The method of claim 1, wherein encoding the encrypted information to obtain encoded information comprises:
extracting the encrypted information to obtain target information;
and coding the target information to obtain coded information.
4. A communication anti-eavesdropping apparatus, the apparatus comprising:
the encryption unit is used for encrypting the acquired target transmission information to obtain encrypted information;
the encoding unit is used for encoding the encrypted information to obtain encoded information;
the splitting unit is used for splitting the coded information to obtain a plurality of segments of sub information;
the conversion unit is used for performing short address conversion on each segment of the sub information, splicing each short address obtained through conversion to obtain a spliced short address, and performing iterative compression conversion on the spliced short address to obtain a target short address, so that the target transmission information is represented by the target short address for transmission;
the splitting unit is specifically configured to:
splitting the coded information in equal length to obtain a plurality of segments of sub information;
the conversion unit specifically includes:
the format conversion subunit is used for converting each segment of the sub information into a target format to obtain a short address, wherein the target format comprises a flag bit, a ciphertext group and an address suffix;
the splicing unit is used for splicing each short address obtained by conversion to obtain a first group of short addresses, and the first group of short addresses at least comprises two short addresses; splicing the first group of short addresses, and merging and compressing according to preset address input capacity to obtain a second group of short addresses; if the number of the second group of short addresses is one and only one, determining the second group of short addresses as spliced short addresses; otherwise, the second group of short addresses are spliced, and merged and compressed according to the preset address input capacity until only one spliced short address exists.
5. The apparatus of claim 4, further comprising:
the analysis unit is used for responding to the transmission of the target short address to a destination end and analyzing the target short address to obtain a plurality of short addresses;
the acquisition unit is used for acquiring the sub information according to each short address;
the splicing unit is used for splicing the sub information to obtain spliced information;
the decoding unit is used for decoding the spliced information to obtain decoded information;
and the decryption unit is used for decrypting the decoded information to obtain the target transmission information.
6. The apparatus of claim 4, wherein the encoding unit comprises:
the extraction subunit is used for extracting the encrypted information to obtain target information;
and the coding subunit is used for coding the target information to obtain coded information.
CN202010157574.5A 2020-03-09 2020-03-09 Communication anti-monitoring method and device Active CN111368321B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010157574.5A CN111368321B (en) 2020-03-09 2020-03-09 Communication anti-monitoring method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010157574.5A CN111368321B (en) 2020-03-09 2020-03-09 Communication anti-monitoring method and device

Publications (2)

Publication Number Publication Date
CN111368321A CN111368321A (en) 2020-07-03
CN111368321B true CN111368321B (en) 2022-08-02

Family

ID=71208627

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010157574.5A Active CN111368321B (en) 2020-03-09 2020-03-09 Communication anti-monitoring method and device

Country Status (1)

Country Link
CN (1) CN111368321B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102811123A (en) * 2011-05-30 2012-12-05 三星Sds株式会社 Identity-based encryption method and apparatus
US8499099B1 (en) * 2011-03-29 2013-07-30 Google Inc. Converting data into addresses
US8560843B1 (en) * 2010-09-24 2013-10-15 Symantec Corporation Encrypted universal resource identifier (URI) based messaging
CN104765773A (en) * 2015-03-17 2015-07-08 中国科学技术大学苏州研究院 Multi-account network news commentary time based covert communication method
CN107172030A (en) * 2017-05-09 2017-09-15 国家计算机网络与信息安全管理中心 A kind of high concealed and anti-communication means traced to the source

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8560843B1 (en) * 2010-09-24 2013-10-15 Symantec Corporation Encrypted universal resource identifier (URI) based messaging
US8499099B1 (en) * 2011-03-29 2013-07-30 Google Inc. Converting data into addresses
CN102811123A (en) * 2011-05-30 2012-12-05 三星Sds株式会社 Identity-based encryption method and apparatus
CN104765773A (en) * 2015-03-17 2015-07-08 中国科学技术大学苏州研究院 Multi-account network news commentary time based covert communication method
CN107172030A (en) * 2017-05-09 2017-09-15 国家计算机网络与信息安全管理中心 A kind of high concealed and anti-communication means traced to the source

Also Published As

Publication number Publication date
CN111368321A (en) 2020-07-03

Similar Documents

Publication Publication Date Title
CN113364760A (en) Data encryption processing method and device, computer equipment and storage medium
CN106506487A (en) A kind of information Encrypt and Decrypt method and device
CN107786331B (en) Data processing method, device, system and computer readable storage medium
CN110061967B (en) Service data providing method, device, equipment and computer readable storage medium
CN104580086A (en) Information transmission method, client side, server and system
WO2007071140A1 (en) A method for transmitting data securely
CN104378198A (en) Voice encryption method based on block cipher system
CN107294964B (en) Information transmission method
CN112511514A (en) HTTP encrypted transmission method and device, computer equipment and storage medium
CN102684877A (en) Method and device for carrying out user information processing
CN102073977A (en) Methods and equipment for generating and authenticating digital signatures and digital signature system
CN107800716B (en) Data processing method and device
CN102811426A (en) Method and system for cryptographically sending and receiving messages of mobile device
CN114257562B (en) Instant messaging method, device, electronic equipment and computer readable storage medium
CN105279447A (en) Method and device for data encryption, and method and device for data decryption
CN114567427A (en) Block chain concealed data segmented transmission method
CN104113410A (en) Method and device for data encryption transmission based on multi-table encryption method
KR101584127B1 (en) System and method for deniable encryption
JP4703805B2 (en) ENCRYPTION DEVICE, ENCRYPTION METHOD, DECRYPTION DEVICE, DECRYPTION METHOD, AND COMMUNICATION SYSTEM
CN112804058A (en) Conference data encryption and decryption method and device, storage medium and electronic equipment
CN111368321B (en) Communication anti-monitoring method and device
CN108234466A (en) Information encryption communication method, device, computing device and storage medium
CN104506530A (en) Network data processing method and device and data transmission method and device
CN108337233B (en) Method for encrypting content information, electronic equipment and storage medium
CN115632765A (en) Encryption method, decryption device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant