CN112367323B - Text end-to-end encryption and decryption system and method of intelligent terminal - Google Patents

Text end-to-end encryption and decryption system and method of intelligent terminal Download PDF

Info

Publication number
CN112367323B
CN112367323B CN202011249003.0A CN202011249003A CN112367323B CN 112367323 B CN112367323 B CN 112367323B CN 202011249003 A CN202011249003 A CN 202011249003A CN 112367323 B CN112367323 B CN 112367323B
Authority
CN
China
Prior art keywords
decryption
text
encryption
input
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011249003.0A
Other languages
Chinese (zh)
Other versions
CN112367323A (en
Inventor
高原英
王文庆
邓楠轶
董夏昕
介银娟
刘超飞
毕玉冰
朱博迪
崔逸群
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Thermal Power Research Institute Co Ltd
Original Assignee
Xian Thermal Power Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Thermal Power Research Institute Co Ltd filed Critical Xian Thermal Power Research Institute Co Ltd
Priority to CN202011249003.0A priority Critical patent/CN112367323B/en
Publication of CN112367323A publication Critical patent/CN112367323A/en
Application granted granted Critical
Publication of CN112367323B publication Critical patent/CN112367323B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • User Interface Of Digital Computer (AREA)
  • Input From Keyboards Or The Like (AREA)

Abstract

The invention discloses a text end-to-end encryption and decryption system and method of an intelligent terminal, wherein the system comprises an input monitoring module, a decryption module and an encryption module, and the text encryption and decryption system interacts with a screen, a keyboard/input method and a text selector in the intelligent terminal through the input monitoring module; the input monitoring module captures the input of the keyboard/input method, transmits the captured plaintext data to the encryption module for text encryption, receives the encrypted text data returned by the encryption module, and replaces the plaintext input by the keyboard/input method with the encrypted text; the input monitoring module receives ciphertext text data of the text selector as input, transmits the ciphertext text data to the decryption module, receives a decryption result returned by the decryption module, and displays the decryption result on a screen of the intelligent terminal device; the system and the method of the invention are independent of specific communication application, and can be used by users in any communication application.

Description

Text end-to-end encryption and decryption system and method of intelligent terminal
Technical Field
The invention relates to the technical field of intelligent terminals, in particular to a text end-to-end encryption and decryption system and method of an intelligent terminal.
Background
As smart terminals such as smart phones and tablet computers are increasingly used in daily life, the lives of the smart terminals and people are already secret and inseparable. Among them, various instant messaging applications are most widely used and most frequently used, and text information is the most commonly used communication mode for people. However, in the use process of instant messaging application, the private information of the user, especially chat information, has the risk of being stolen or collected. The built-in end-to-end encryption of the communication application can not guarantee that the application can not collect user privacy to the user technically, and the user is required to switch between different applications by using an encryption and decryption scheme independent of the communication application.
Disclosure of Invention
In order to overcome the problems in the prior art, the invention aims to provide a system and a method for encrypting and decrypting text information end to end, which are convenient and easy to use in an intelligent terminal, are independent of specific communication application, and can be used by users under any communication application.
In order to achieve the above purpose, the invention adopts the following technical scheme:
the text end-to-end encryption and decryption system of the intelligent terminal comprises an input monitoring module 111, a decryption module 112 and an encryption module 113, wherein the text encryption and decryption system 11 interacts with a screen 101, a keyboard/input method 102 and a text selector 103 in the intelligent terminal 10 through the input monitoring module 111;
the input monitoring module 111 captures the input of the keyboard/input method 102, transmits the captured plaintext data to the encryption module 113 for text encryption, and receives the encrypted text data returned by the encryption module 113, and replaces the plaintext input by the keyboard/input method 102 with the encrypted text; the input monitoring module 111 receives the ciphertext text data of the text selector 103 as input, transmits the ciphertext text data to the decryption module 112, receives a decryption result returned by the decryption module 112, and displays the decryption result on the screen 101 of the intelligent terminal device;
the decryption module 112 stores public keys of other encryption and decryption systems input by the user, receives encrypted text information input into the monitoring module 111, decrypts the encrypted text information by using the public keys of other encryption and decryption systems stored in the decryption module 112 to obtain a plaintext set, scores the plaintext set, and returns a decryption result to the input monitoring module 111;
the encryption module 113 is used for generating and storing a private key/public key pair of the system, providing the public key of the system to a user, and transmitting the public key to an encryption and decryption system in other terminals by the user; the encryption module 113 receives the plaintext data captured by the input monitoring module 111, encrypts the received plaintext data using a local private key stored in the encryption module 113, and returns the encrypted result to the input monitoring module 111.
The encryption and decryption method of the text end-to-end encryption and decryption system of the intelligent terminal comprises the following steps:
step 1: before encrypting and decrypting the text, two intelligent terminals for communication need to perform preparation work:
1) Two intelligent terminals respectively use the encryption module 113 to generate private key/public key pairs of respective encryption and decryption systems;
2) The users of the two intelligent terminals respectively transmit the public keys of the terminals to the users of the other terminals through trusted channels;
3) The users of the two terminals respectively input the public keys of the opposite terminals into the decryption module 112 of the terminal;
step 2: the text end-to-end encryption process of the intelligent terminal comprises the following steps:
1) When the keyboard/input method 102 is awakened while text encryption is turned on, the input monitoring module 111 captures user input and transmits the input plaintext data to the encryption module 113;
2) The encryption module 113 encrypts the received plaintext by using the stored private key, and returns the encryption result to the input monitoring module 111;
3) The input monitoring module 111 uses the ciphertext text to replace the plaintext input by the keyboard/input method 102, and at this time, the plaintext in the input box seen by the user is replaced by the ciphertext text for display;
4) The user can directly send the ciphertext text information;
step 3: the text end-to-end decryption process of the intelligent terminal is specifically as follows:
1) After receiving ciphertext text information sent by other encryption and decryption systems, a user uses the text selector 103 to select to decrypt the ciphertext text information;
2) The decryption module 112 uses public keys of other encryption and decryption systems stored therein, and each public key in the set decrypts the ciphertext text information to obtain a plaintext text set;
3) The decryption module 112 scores each plaintext in the plaintext set by using a common character set of the current system language, and examines whether the result is successful in decryption;
4) Judging whether the score of the plaintext exceeds a set value or not;
5) If yes, the decryption is considered to be successful, and the plaintext information with the highest score is the correct result, and is directly displayed on the screen 101 for the user to check;
6) Otherwise, the system decryption module is considered to not store the public key capable of decrypting the ciphertext text, the decryption fails, and the user is prompted to the decryption failure on the screen 101;
7) When decryption fails or is unnecessary after decryption is successful, inquiring whether a user needs to designate a public key to decrypt the ciphertext text;
8) When the user selects to decrypt using the specified public key, plaintext information decrypted by the specified public key is displayed on the screen 101.
Compared with the prior art, the invention has the following advantages:
compared with the built-in end-to-end encryption and decryption method of the communication application, the method is independent of the communication application, and the risk of collecting communication information by the communication application is eliminated.
Compared with an independent encryption and decryption system, the method is convenient to use, and can be embedded into any communication application for implementation in the use process, so that a user does not need to switch back and forth between the encryption and decryption system and the communication application.
Drawings
Fig. 1 is a block diagram of a text end-to-end encryption and decryption system of an intelligent terminal.
Fig. 2 is a flowchart of exchanging public keys in the encryption and decryption method of the intelligent terminal in the embodiment.
Fig. 3 is a flowchart of encrypting and transmitting information by the information transmitting end in the encryption and decryption method of the intelligent terminal in the embodiment.
Fig. 4 is a flowchart of information decryption at the information receiving end in the encryption and decryption method of the intelligent terminal in the embodiment.
Detailed Description
The invention is further illustrated by the following examples in conjunction with the accompanying drawings.
As shown in fig. 1, in the text end-to-end encryption and decryption system of the intelligent terminal of the present invention, the text encryption and decryption system 11 includes an input monitoring module 111, a decryption module 112 and an encryption module 113, and the text encryption and decryption system 11 interacts with a screen 101, a keyboard/input method 102 and a text selector 103 in the intelligent terminal 10 through the input monitoring module 111.
The screen 101 is a hardware device commonly used for intelligent terminal equipment, and is used for displaying terminal information and data processing results to a user.
The keyboard/input method 102 is an intelligent terminal input component, and may be a soft keyboard or an input method, or may be a hardware keyboard.
The text selector 103 is a software component of the intelligent terminal for selecting text segments and popup options to operate on the text.
The input monitoring module 111 captures the input of the keyboard/input method 102, transmits the captured plaintext data to the encryption module 113 for text encryption, and receives the encrypted text data returned by the encryption module 113, and replaces the plaintext input by the keyboard/input method 102 with the encrypted text; the input monitoring module 111 receives the ciphertext text data of the text selector 103 as input, transmits the ciphertext text data to the decryption module 112, receives a decryption result returned by the decryption module 112, and displays the decryption result on the screen 101 of the intelligent terminal device.
The decryption module 112 stores public keys of other encryption and decryption systems input by the user, receives encrypted text information input to the monitoring module 111, decrypts the encrypted text information with the public keys of other encryption and decryption systems stored in the decryption module 112 to obtain a plaintext set, scores the plaintext set, and returns the decryption result to the input monitoring module 111.
The encryption module 113 is used for generating and storing a private key/public key pair of the system, and providing the public key of the system to the user so that the user can transmit the private key/public key pair to the encryption and decryption system in other terminals; the encryption module 113 receives the plaintext data captured by the input monitoring module 111, encrypts the received plaintext data using a local private key stored in the encryption module 113, and returns the encrypted result to the input monitoring module 111.
Fig. 2 shows the preparation work required by two intelligent terminals for communication before text encryption and decryption.
Step 1: the two intelligent terminals respectively use the encryption module 113 to generate private key/public key pairs of respective encryption and decryption systems.
Step 2: and the users of the two intelligent terminals respectively transmit the public keys of the intelligent terminals to the users of the other terminals through the trusted channels.
Step 3: the users of the two terminals respectively input the public keys of the opposite terminals into the decryption module 112 of the terminal.
Fig. 3 is a flowchart of a text end-to-end encryption method of an intelligent terminal according to an embodiment, which mainly includes the following steps:
in step 301, when the keyboard/input method 102 is awakened while text encryption is turned on, the input monitoring module 111 captures user input and transmits the input plaintext data to the encryption module 113.
In step 302, the encryption module 113 encrypts the received plaintext using the stored private key, and returns the encrypted result to the input monitoring module 111.
In step 303, the input monitoring module 111 uses the ciphertext text to replace the plaintext text input by the keyboard/input method 102, and the plaintext text in the input box seen by the user is replaced by the ciphertext text for display.
Step 304, the user may directly send the ciphertext text information.
Fig. 4 is a flowchart of an end-to-end decryption method for a text of an intelligent terminal, which mainly includes the following steps:
step 401, after receiving ciphertext text information sent by other encryption and decryption systems, the user uses the text selector 103 to select to decrypt the ciphertext text information.
Step 402, the decryption module 112 uses public keys of other encryption and decryption systems stored therein, and each public key in the set decrypts the ciphertext text information to obtain a plaintext text set.
In step 403, the decryption module 112 uses the common character set C of the current system language L to score each plaintext in the plaintext set, and examines whether it is a result of successful decryption.
Step 404, judging whether the score of the plaintext exceeds a set value S.
Step 405, if yes, the decryption is considered to be successful, and the plaintext information with the highest score is the correct result, and is directly displayed on the screen 101 for the user to view.
Step 406, if not, the system decrypting module is considered to not store the public key capable of decrypting the ciphertext text, the decrypting fails, and the user is prompted to the decrypting failure on the screen 101.
Step 407, inquiring whether the user wants to specify a public key to decrypt the ciphertext text when decryption fails or is unnecessary after decryption is successful.
Step 408, when the user selects to decrypt using the specified public key, displaying the plaintext information decrypted by the specified public key on the screen 101.

Claims (1)

1. A text end-to-end encryption and decryption system of an intelligent terminal is characterized in that: the text encryption and decryption system (11) interacts with a screen (101), a keyboard/input method (102) and a text selector (103) in the intelligent terminal (10) through the input monitoring module (111);
the input monitoring module (111) captures the input of the keyboard/input method (102), transmits the captured plaintext data to the encryption module (113) for text encryption, receives the encrypted text data returned by the encryption module (113), and replaces the plaintext input by the keyboard/input method (102) with the encrypted text; the input monitoring module (111) receives ciphertext text data of the text selector (103) as input, transmits the ciphertext text data to the decryption module (112), receives a decryption result returned by the decryption module (112), and displays the decryption result on the screen (101) of the intelligent terminal device;
the decryption module (112) stores public keys of other encryption and decryption systems input by a user, receives encrypted text information input into the monitoring module (111), decrypts the encrypted text information by using the public keys of the other encryption and decryption systems stored in the decryption module (112) to obtain a plaintext set, scores the plaintext set, and transmits a decryption result back to the input monitoring module (111);
the encryption module (113) is used for generating and storing a private key public key pair of the system, providing the public key of the system for a user, and transmitting the public key to an encryption and decryption system in other terminals by the user; the encryption module (113) receives the plaintext data captured by the input monitoring module (111), encrypts the received plaintext data by using a local private key stored in the encryption module (113), and transmits the encryption result back to the input monitoring module (111);
the encryption and decryption method of the text end-to-end encryption and decryption system of the intelligent terminal comprises the following steps:
step 1: before encrypting and decrypting the text, two intelligent terminals for communication need to perform preparation work:
1) Two intelligent terminals respectively use the encryption module (113) to generate private key public key pairs of respective encryption and decryption systems;
2) The users of the two intelligent terminals respectively transmit the public keys of the terminals to the users of the other terminals through trusted channels;
3) The users of the two terminals respectively input the public keys of the opposite terminals into a decryption module (112) of the terminal;
step 2: the text end-to-end encryption process of the intelligent terminal comprises the following steps:
1) when text encryption is turned on, when the keyboard/input method (102) is awakened, the input monitoring module (111) captures user input and transmits the input plaintext data to the encryption module (113);
2) The encryption module (113) encrypts the received plaintext by using the stored private key and transmits the encryption result back to the input monitoring module (111);
3) The input monitoring module (111) uses the ciphertext text to replace the plaintext text input by the keyboard/input method (102), and the plaintext text in the input box seen by the user is replaced by the ciphertext text for display;
4) The user can directly send the ciphertext text information;
step 3: the text end-to-end decryption process of the intelligent terminal is specifically as follows:
1) After receiving ciphertext text information sent by other encryption and decryption systems, a user uses a text selector (103) to select to decrypt the ciphertext text information;
2) The decryption module (112) uses public keys of other encryption and decryption systems stored in the decryption module to respectively decrypt the ciphertext text information by using each public key in the set to obtain a plaintext text set;
3) The decryption module (112) uses the common character set of the current system language to score each plaintext in the plaintext set and examines whether the plaintext is a successful decryption result or not;
4) Judging whether the score of the plaintext exceeds a set value or not;
5) If yes, the decryption is considered to be successful, and the plaintext information with the highest score is the correct result, and is directly displayed on a screen (101) for the user to check;
6) Otherwise, the system decryption module is considered to not store a public key capable of decrypting the ciphertext text, the decryption fails, and a user is prompted that the decryption fails on a screen (101);
7) When decryption fails or the decryption is successful, inquiring whether a user wants to designate a public key to decrypt the ciphertext text;
8) When the user selects to decrypt using the specified public key, plaintext information decrypted by the specified public key is displayed on a screen (101).
CN202011249003.0A 2020-11-10 2020-11-10 Text end-to-end encryption and decryption system and method of intelligent terminal Active CN112367323B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011249003.0A CN112367323B (en) 2020-11-10 2020-11-10 Text end-to-end encryption and decryption system and method of intelligent terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011249003.0A CN112367323B (en) 2020-11-10 2020-11-10 Text end-to-end encryption and decryption system and method of intelligent terminal

Publications (2)

Publication Number Publication Date
CN112367323A CN112367323A (en) 2021-02-12
CN112367323B true CN112367323B (en) 2023-04-25

Family

ID=74508632

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011249003.0A Active CN112367323B (en) 2020-11-10 2020-11-10 Text end-to-end encryption and decryption system and method of intelligent terminal

Country Status (1)

Country Link
CN (1) CN112367323B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113709024B (en) * 2021-07-20 2022-11-01 荣耀终端有限公司 Data transmission method, medium and electronic device thereof

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017080356A1 (en) * 2015-11-09 2017-05-18 国民技术股份有限公司 Secure input method, device and system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015093898A1 (en) * 2013-12-20 2015-06-25 삼성전자주식회사 Method and apparatus for transmitting and receiving encrypted message between terminals
KR102195900B1 (en) * 2013-12-20 2020-12-29 삼성전자주식회사 Method and apparatus for sending and receiving of encrypted message between devices
CN104270517B (en) * 2014-09-23 2019-06-14 中兴通讯股份有限公司 Information ciphering method and mobile terminal
CN105516157B (en) * 2015-12-16 2019-05-17 上海交通大学 Network information security input system and method based on independent encryption
CN111212068B (en) * 2019-12-31 2022-02-08 北京升鑫网络科技有限公司 Method for encrypting and decrypting characters by input method

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017080356A1 (en) * 2015-11-09 2017-05-18 国民技术股份有限公司 Secure input method, device and system

Also Published As

Publication number Publication date
CN112367323A (en) 2021-02-12

Similar Documents

Publication Publication Date Title
CN1098581C (en) Use of an encryption server for encrypting messages
CN101789865B (en) Dedicated server used for encryption and encryption method
CN102419805B (en) Terminal equipment and method for encrypting user information
CN107682141A (en) Data ciphering method and system for data transfer
EP3211560A1 (en) Fingerprint decryption method and device
CN106487659B (en) Information encryption method, information encryption device and terminal
CN104270516B (en) Decryption method and mobile terminal
CN108200093B (en) Encryption and decryption method and encryption and decryption device for transmission file
CN104660589A (en) Method and system for controlling encryption of information and analyzing information as well as terminal
CN104092550A (en) Password protection method, system and device
CN101626567A (en) Short message sending and receiving method, short message sending and receiving device and mobile terminal
CN107579903B (en) Picture message secure transmission method and system based on mobile device
JPH0934356A (en) High-bandwidth cryptographic system with low-bandwidth cryptographic module
CN105208028A (en) Data transmission method and related device and equipment
CN108390755B (en) Safety input method of SIM (subscriber identity Module) film-pasting card based on built-in safety chip
CN112367323B (en) Text end-to-end encryption and decryption system and method of intelligent terminal
CN114257562B (en) Instant messaging method, device, electronic equipment and computer readable storage medium
CN101841785B (en) Method for sending encrypted message by cellphone and system thereof
CN103067897A (en) Asymmetrical mobile phone short message encryption method
CN111818466B (en) Information sending and receiving method and device, electronic equipment and readable storage medium
CN115776413B (en) Iris encryption-based data transmission method and system
CN106850219B (en) Data processing method and terminal
CN109104361B (en) Instant messaging method, instant messaging device, electronic equipment and storage medium
CN102118311A (en) Data transmission method
CN115277192B (en) Information encryption method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant