CN112367323B - Text end-to-end encryption and decryption system and method of intelligent terminal - Google Patents
Text end-to-end encryption and decryption system and method of intelligent terminal Download PDFInfo
- Publication number
- CN112367323B CN112367323B CN202011249003.0A CN202011249003A CN112367323B CN 112367323 B CN112367323 B CN 112367323B CN 202011249003 A CN202011249003 A CN 202011249003A CN 112367323 B CN112367323 B CN 112367323B
- Authority
- CN
- China
- Prior art keywords
- text
- decryption
- encryption
- module
- input
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 40
- 238000012544 monitoring process Methods 0.000 claims abstract description 37
- 238000004891 communication Methods 0.000 abstract description 13
- 238000010586 diagram Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- User Interface Of Digital Computer (AREA)
- Input From Keyboards Or The Like (AREA)
Abstract
Description
技术领域technical field
本发明涉及智能终端技术领域,特别是涉及智能终端的文本端到端加解密系统与方法。The invention relates to the technical field of intelligent terminals, in particular to an end-to-end text encryption and decryption system and method for intelligent terminals.
背景技术Background technique
随着智能手机与平板电脑等智能终端在日常生活中被越来越广泛的使用,智能终端与人们的生活已密不可分。其中使用最广泛也最频繁的是各种即时通讯应用,文本信息是人们最常使用的交流方式。但在即时通讯应用的使用过程中,用户的隐私信息尤其是聊天信息有被窃取或被收集的风险。通讯应用内置的端到端加密从技术上无法向用户保证本应用不会收集用户隐私,使用独立于通讯应用的加解密方案要求用户在不同应用之间切换。As smart terminals such as smart phones and tablet computers are more and more widely used in daily life, smart terminals are inseparable from people's lives. Among them, the most widely and frequently used are various instant messaging applications, and text messages are the most commonly used communication methods. However, during the use of instant messaging applications, the user's private information, especially chat information, may be stolen or collected. The built-in end-to-end encryption of the communication application cannot technically guarantee the user that the application will not collect user privacy, and the use of an encryption and decryption scheme independent of the communication application requires the user to switch between different applications.
发明内容Contents of the invention
为了克服上述现有技术存在的问题,本发明的目的在于提供了一种智能终端中方便易用的对文本信息进行端到端加解密的系统与方法,不依赖于特定通讯应用,用户可以在任意通讯应用下使用。In order to overcome the above-mentioned problems in the prior art, the object of the present invention is to provide a convenient and easy-to-use system and method for end-to-end encryption and decryption of text information in an intelligent terminal, which does not depend on specific communication applications, and users can It can be used under any communication application.
为了达到上述目的,本发明采用如下技术方案:In order to achieve the above object, the present invention adopts following technical scheme:
一种智能终端的文本端到端加解密系统,包括输入监控模块111、解密模块112和加密模块113,文本加解密系统11通过输入监控模块111与智能终端10中的屏幕101、键盘/输入法102、文本选择器103进行交互;An end-to-end text encryption and decryption system for an intelligent terminal, including an
所述输入监控模块111捕获键盘/输入法102的输入,将捕获到的明文文本数据传输到加密模块113中做文本加密,并接收加密模块113回传的加密文本数据,用加密文本替换键盘/输入法102输入的明文文本;输入监控模块111接收文本选择器103的密文文本数据作为输入,将密文文本数据传输给解密模块112,接收解密模块112回传的解密结果,并将解密结果显示在智能终端设备的屏幕101上;The
所述解密模块112存储用户输入的其它加解密系统的公钥,接收输入监控模块111的加密文本信息,并用存储在解密模块112中的其它加解密系统的公钥对加密文本信息进行解密得到明文文本集,并对明文文本集进行评分,将解密结果回传至输入监控模块111;The
所述加密模块113用来生成本系统的私钥/公钥对并存储,将本系统公钥提供给用户,使用户将其传递给其它终端中的加解密系统;加密模块113接收输入监控模块111捕获的明文文本数据,并使用存储在加密模块113中的本地私钥加密接收到的明文文本数据,将加密结果回传至输入监控模块111中。The
所述的智能终端的文本端到端加解密系统的加解密方法,包括如下步骤:The encryption and decryption method of the text end-to-end encryption and decryption system of the intelligent terminal comprises the following steps:
步骤1:进行文本加解密前,进行通讯的两个智能终端需要进行的准备工作:Step 1: Before text encryption and decryption, the two smart terminals that communicate need to prepare:
1)两个智能终端分别使用加密模块113生成各自加解密系统的私钥/公钥对;1) Two smart terminals respectively use the
2)两个智能终端的用户分别将本终端的公钥经可信渠道传递给对方终端用户;2) The users of the two smart terminals respectively transmit the public key of the terminal to the terminal user of the other party through a trusted channel;
3)两个终端的用户分别将对端的公钥输入本终端的解密模块112中;3) The users of the two terminals respectively input the public key of the opposite end into the
步骤2:智能终端的文本端到端加密过程,具体如下:Step 2: The text end-to-end encryption process of the smart terminal, as follows:
1)开启文本加密时,当键盘/输入法102被唤醒时,输入监控模块111捕获用户输入并将输入的明文文本数据传输至加密模块113;1) When text encryption is enabled, when the keyboard/
2)加密模块113使用存储的私钥对接收到的明文文本进行加密,将加密结果回传至输入监控模块111;2) The
3)输入监控模块111使用密文文本替换键盘/输入法102输入的明文文本,此时用户所见输入框内明文文本已被替换为密文文本进行显示;3) The
4)用户可直接将密文文本信息进行发送;4) The user can directly send the cipher text information;
步骤3:智能终端的文本端到端解密过程,具体如下:Step 3: The end-to-end decryption process of the text of the smart terminal, as follows:
1)在收到其它加解密系统发送的密文文本信息后,用户使用文本选择器103选择对密文文本信息进行解密;1) After receiving the ciphertext information sent by other encryption and decryption systems, the user uses the
2)解密模块112使用存储在其中的其它加解密系统的公钥,集中每一个公钥分别对密文文本信息进行解密,得到明文文本集;2) The
3)解密模块112使用当前系统语言的常用字符集对明文文本集中的每个明文文本进行评分,考察其是否为解密成功的结果;3) The
4)判断是否有明文文本的得分超过设定值;4) Judging whether the score of plain text exceeds the set value;
5)若有,则认为解密成功,得分最高的明文文本信息为正确的结果,将其直接显示在屏幕101上供用户查看;5) If there is, it is considered that the decryption is successful, and the plain text information with the highest score is the correct result, which is directly displayed on the
6)否则,则认为本系统解密模块中并没有存储可以解密该条密文文本的公钥,解密失败,在屏幕101上提示用户解密失败;6) Otherwise, it is considered that the public key that can decrypt the ciphertext text is not stored in the decryption module of this system, and the decryption fails, and the user is prompted to fail to decrypt on the
7)当解密失败,或解密成功后非必要的,询问用户是否要指定公钥对该密文文本进行解密;7) When the decryption fails, or it is not necessary after the decryption is successful, ask the user whether to specify the public key to decrypt the ciphertext;
8)当用户选择使用指定公钥进行解密,在屏幕101上显示指定公钥解密的明文文本信息。8) When the user chooses to use the specified public key for decryption, the plain text information decrypted by the specified public key is displayed on the
和现有技术相比较,本发明具备如下优点:Compared with the prior art, the present invention has the following advantages:
与通讯应用内置的端到端加解密方法相比,本发明独立于通讯应用,消除了被通讯应用收集通讯信息的风险。Compared with the built-in end-to-end encryption and decryption method of the communication application, the present invention is independent of the communication application and eliminates the risk of the communication information being collected by the communication application.
与独立的加解密系统相比,本发明使用方便,可以嵌入任何通讯应用的使用过程中实施,使用户不必在加解密系统与通讯应用之间来回切换。Compared with an independent encryption and decryption system, the present invention is easy to use and can be embedded in any communication application for implementation, so that users do not have to switch back and forth between the encryption and decryption system and the communication application.
附图说明Description of drawings
图1为一种智能终端的文本端到端加解密系统的结构图。FIG. 1 is a structural diagram of an end-to-end text encryption and decryption system for an intelligent terminal.
图2为实施例中智能终端加解密方法中交换公钥的流程图。Fig. 2 is a flow chart of exchanging public keys in the encryption and decryption method of the smart terminal in the embodiment.
图3为实施例中智能终端加解密方法中信息发送端加密并发送信息的流程图。Fig. 3 is a flow chart of the information sending end encrypting and sending information in the smart terminal encryption and decryption method in the embodiment.
图4为实施例中智能终端加解密方法中信息接收端解密信息的流程图。Fig. 4 is a flow chart of decrypting information at the information receiving end in the encryption and decryption method of the smart terminal in the embodiment.
具体实施方式Detailed ways
以下结合附图及实施例对本发明作进一步的阐释。The present invention will be further explained below in conjunction with the accompanying drawings and embodiments.
如图1所示,本发明一种智能终端的文本端到端加解密系统,该文本加解密系统11包含输入监控模块111、解密模块112和加密模块113,文本加解密系统11通过输入监控模块111与智能终端10中的屏幕101、键盘/输入法102、文本选择器103进行交互。As shown in FIG. 1 , the present invention is an end-to-end text encryption and decryption system for smart terminals. The text encryption and
屏幕101是智能终端设备常见的硬件设备,用于向用户显示终端信息与数据处理结果。The
键盘/输入法102是智能终端输入组件,可以是软键盘或输入法,也可以是硬件键盘。The keyboard/
文本选择器103是智能终端的软件组件,用于选择文本段并弹出选项对文本进行操作。The
输入监控模块111捕获键盘/输入法102的输入,将捕获到的明文文本数据传输到加密模块113中做文本加密,并接收加密模块113回传的加密文本数据,用加密文本替换键盘/输入法102输入的明文文本;输入监控模块111接收文本选择器103的密文文本数据作为输入,将密文文本数据传输给解密模块112,接收解密模块112回传的解密结果,并将解密结果显示在智能终端设备的屏幕101上。The
解密模块112存储用户输入的其它加解密系统的公钥,接收输入监控模块111的加密文本信息,并用存储在解密模块112中的其它加解密系统的公钥对加密文本信息进行解密得到明文文本集,并对明文文本集进行评分,将解密结果回传至输入监控模块111。The
加密模块113用来生成本系统的私钥/公钥对并存储,将本系统公钥提供给用户,使用户可以将其传递给其它终端中的加解密系统;加密模块113接收输入监控模块111捕获的明文文本数据,并使用存储在加密模块113中的本地私钥加密接收到的明文文本数据,将加密结果回传至输入监控模块111中。The
图2所示为进行文本加解密前,进行通讯的两个智能终端需要进行的准备工作。Figure 2 shows the preparatory work required for two intelligent terminals to communicate before text encryption and decryption.
步骤1:两个智能终端分别使用加密模块113生成各自加解密系统的私钥/公钥对。Step 1: The two smart terminals respectively use the
步骤2:两个智能终端的用户分别将本终端的公钥经可信渠道传递给对方终端用户。Step 2: The users of the two smart terminals respectively transmit the public key of the terminal to the terminal user of the other party through a trusted channel.
步骤3:两个终端的用户分别将对端的公钥输入本终端的解密模块112中。Step 3: The users of the two terminals respectively input the public key of the opposite terminal into the
图3为实施例提供的智能终端的文本端到端加密方法流程图,主要包括以下步骤:Fig. 3 is the flow chart of the text end-to-end encryption method of the smart terminal provided by the embodiment, which mainly includes the following steps:
步骤301、开启文本加密时,当键盘/输入法102被唤醒时,输入监控模块111捕获用户输入并将输入的明文文本数据传输至加密模块113。Step 301 , when text encryption is enabled, when the keyboard/
步骤302、加密模块113使用存储的私钥对接收到的明文文本进行加密,将加密结果回传至输入监控模块111。Step 302 , the
步骤303、输入监控模块111使用密文文本替换键盘/输入法102输入的明文文本,此时用户所见输入框内明文文本已被替换为密文文本进行显示。Step 303 , the
步骤304、用户可直接将密文文本信息进行发送。Step 304, the user can directly send the ciphertext information.
图4为实施例提供的智能终端文本端到端解密方法流程图,主要包括以下步骤:Fig. 4 is the flow chart of the end-to-end decryption method of the smart terminal text provided by the embodiment, mainly including the following steps:
步骤401、在收到其它加解密系统发送的密文文本信息后,用户使用文本选择器103选择对密文文本信息进行解密。Step 401 , after receiving the ciphertext information sent by other encryption and decryption systems, the user uses the
步骤402、解密模块112使用存储在其中的其它加解密系统的公钥,集中每一个公钥分别对密文文本信息进行解密,得到明文文本集。Step 402 , the
步骤403、解密模块112使用当前系统语言L的常用字符集C对明文文本集中的每个明文文本进行评分,考察其是否为解密成功的结果。Step 403 , the
步骤404、判断是否有明文文本的得分超过设定值S。Step 404, judging whether the score of any plain text exceeds the set value S.
步骤405、若有,则认为解密成功,得分最高的明文文本信息为正确的结果,将其直接显示在屏幕101上供用户查看。Step 405 , if yes, it is considered that the decryption is successful, and the plaintext information with the highest score is the correct result, which is directly displayed on the
步骤406、否则,则认为本系统解密模块中并没有存储可以解密该条密文文本的公钥,解密失败,在屏幕101上提示用户解密失败。Step 406, otherwise, it is considered that the decryption module of the system does not store a public key capable of decrypting the ciphertext, and the decryption fails, and the user is prompted on the
步骤407、当解密失败,或解密成功后非必要的,询问用户是否要指定公钥对该密文文本进行解密。Step 407: When the decryption fails, or it is not necessary after the decryption is successful, ask the user whether to specify the public key to decrypt the ciphertext.
步骤408、当用户选择使用指定公钥进行解密,在屏幕101上显示指定公钥解密的明文文本信息。Step 408 , when the user chooses to use the specified public key for decryption, the plaintext information decrypted by the specified public key is displayed on the
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011249003.0A CN112367323B (en) | 2020-11-10 | 2020-11-10 | Text end-to-end encryption and decryption system and method of intelligent terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011249003.0A CN112367323B (en) | 2020-11-10 | 2020-11-10 | Text end-to-end encryption and decryption system and method of intelligent terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112367323A CN112367323A (en) | 2021-02-12 |
CN112367323B true CN112367323B (en) | 2023-04-25 |
Family
ID=74508632
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011249003.0A Active CN112367323B (en) | 2020-11-10 | 2020-11-10 | Text end-to-end encryption and decryption system and method of intelligent terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112367323B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113709024B (en) * | 2021-07-20 | 2022-11-01 | 荣耀终端有限公司 | Data transmission method, medium and electronic device thereof |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017080356A1 (en) * | 2015-11-09 | 2017-05-18 | 国民技术股份有限公司 | Secure input method, device and system |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015093898A1 (en) * | 2013-12-20 | 2015-06-25 | 삼성전자주식회사 | Method and apparatus for transmitting and receiving encrypted message between terminals |
KR102195900B1 (en) * | 2013-12-20 | 2020-12-29 | 삼성전자주식회사 | Method and apparatus for sending and receiving of encrypted message between devices |
CN104270517B (en) * | 2014-09-23 | 2019-06-14 | 中兴通讯股份有限公司 | Information ciphering method and mobile terminal |
CN105516157B (en) * | 2015-12-16 | 2019-05-17 | 上海交通大学 | Network information security input system and method based on independent encryption |
CN111212068B (en) * | 2019-12-31 | 2022-02-08 | 北京升鑫网络科技有限公司 | Method for encrypting and decrypting characters by input method |
-
2020
- 2020-11-10 CN CN202011249003.0A patent/CN112367323B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017080356A1 (en) * | 2015-11-09 | 2017-05-18 | 国民技术股份有限公司 | Secure input method, device and system |
Also Published As
Publication number | Publication date |
---|---|
CN112367323A (en) | 2021-02-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5475757A (en) | Secure data transmission method | |
CN102419805B (en) | Terminal equipment and method for encrypting user information | |
CN104270516B (en) | Decryption method and mobile terminal | |
CN107682141A (en) | Data ciphering method and system for data transfer | |
TWI536790B (en) | Communication method using fingerprint information authentication | |
CN106487659B (en) | Information encryption method, information encryption device and terminal | |
CN109543434B (en) | Block chain information encryption method, decryption method, storage method and device | |
CN104660589A (en) | Method and system for controlling encryption of information and analyzing information as well as terminal | |
CN108090370A (en) | Instant messaging encryption method and system based on index | |
CN111914291A (en) | Message processing method, device, equipment and storage medium | |
CN110771190A (en) | Controlling access to data | |
CN107579903B (en) | Picture message secure transmission method and system based on mobile device | |
WO2018018726A1 (en) | Group file management method, user terminal, and group chat system | |
CN105959279A (en) | Computer information transmission system and method based on encryption processing | |
CN108390755B (en) | Safety input method of SIM (subscriber identity Module) film-pasting card based on built-in safety chip | |
CN105592431B (en) | SMS encryption system based on iOS system mobile terminal | |
CN101841785B (en) | Method for sending encrypted message by cellphone and system thereof | |
CN102098307A (en) | Password type instant message (IM) encryption method and system in self-service bank | |
CN111245771A (en) | Instant message encryption and decryption method, device, equipment and storage medium | |
CN112367323B (en) | Text end-to-end encryption and decryption system and method of intelligent terminal | |
CN108134799A (en) | Novel encipher-decipher method and its device | |
CN109104361B (en) | Instant messaging method, instant messaging device, electronic equipment and storage medium | |
CN115277192B (en) | Information encryption method and device and electronic equipment | |
CN115776413A (en) | Data transmission method and system based on iris encryption | |
CN111212068B (en) | Method for encrypting and decrypting characters by input method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |