CN113141609A - Encrypted communication method and terminal - Google Patents

Encrypted communication method and terminal Download PDF

Info

Publication number
CN113141609A
CN113141609A CN202110289618.4A CN202110289618A CN113141609A CN 113141609 A CN113141609 A CN 113141609A CN 202110289618 A CN202110289618 A CN 202110289618A CN 113141609 A CN113141609 A CN 113141609A
Authority
CN
China
Prior art keywords
terminal
secret key
communication
key
feedback information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110289618.4A
Other languages
Chinese (zh)
Other versions
CN113141609B (en
Inventor
李胡送
张祖辉
关学进
欧志芳
何勇
陈哲
黄双飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Gaoge Communication Technology Co ltd
Original Assignee
Shenzhen Gaoge Communication Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Gaoge Communication Technology Co ltd filed Critical Shenzhen Gaoge Communication Technology Co ltd
Priority to CN202110289618.4A priority Critical patent/CN113141609B/en
Publication of CN113141609A publication Critical patent/CN113141609A/en
Application granted granted Critical
Publication of CN113141609B publication Critical patent/CN113141609B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup

Abstract

The application discloses an encryption communication method and a terminal, wherein the method comprises the following steps: the method comprises the steps that a first terminal establishes communication connection with a second terminal based on a fifth generation mobile communication technology and sends a secret key request to the second terminal, wherein the second terminal sends feedback information corresponding to the secret key request to the first terminal after receiving the secret key request; receiving the feedback information, and acquiring a secret key according to the feedback information; the communication data are encrypted according to the secret key, and the encrypted communication data are sent to the second terminal, so that the technical problem that the secret key is leaked when the server is attacked when the secret key is generated by the server is solved, and the safety of communication between the first terminal and the second terminal is improved.

Description

Encrypted communication method and terminal
Technical Field
The present application relates to the field of communications technologies, and in particular, to an encryption communication method and a terminal.
Background
In the prior art, when different terminals communicate, the secret key needs to be maintained at the server end when the different terminals communicate, which not only increases the cost of maintaining the server, but also causes the secret key to be leaked when the server is attacked, thereby affecting the security of encrypted communication.
Disclosure of Invention
The embodiment of the application provides an encryption communication method and a terminal, and aims to solve the problem that the security of encryption communication is influenced when a server side maintains a secret key.
To achieve the above object, an aspect of the present application provides an encrypted communication method, including:
the method comprises the steps that a first terminal establishes communication connection with a second terminal based on a fifth generation mobile communication technology and sends a secret key request to the second terminal, wherein the second terminal sends feedback information corresponding to the secret key request to the first terminal after receiving the secret key request;
receiving the feedback information, and acquiring a secret key according to the feedback information;
and encrypting communication data according to the secret key, and sending the encrypted communication data to the second terminal.
Optionally, the step of establishing, by the first terminal, a communication connection with a second terminal based on a fifth-generation mobile communication technology, and sending a key request to the second terminal includes:
the first terminal sends broadcast information of a connection address of the second terminal, wherein the second terminal sends response information after receiving the broadcast information;
establishing connection with the second terminal according to the response information;
sending the key request to the second terminal based on the connection.
Optionally, before the step of sending the key request to the second terminal based on the connection, the method includes:
receiving operation information of a user, and determining whether to carry out encryption communication according to the operation information;
upon determining to conduct the encrypted communication, a step of sending a key request to the second terminal based on the connection is performed.
Optionally, after the step of encrypting the communication data according to the key and sending the encrypted communication data to the second terminal, the method further includes:
when a request instruction for modifying the secret key is received, modification information is sent to the second terminal, and after the second terminal receives the modification request, the secret key is modified and the modified secret key is sent to the first terminal;
and the first terminal encrypts communication data based on the modified secret key.
Optionally, before the step of receiving the feedback information and obtaining the key according to the feedback information, the method includes:
when the feedback information is not received, executing a step of sending a key request to the second terminal;
calculating the times of sending the key request;
and when the times are greater than the preset times, performing plaintext communication, wherein the plaintext communication is to encrypt the communication data.
Optionally, after the step of encrypting the communication data according to the key and sending the encrypted communication data to the second terminal, the method further includes:
and after the communication data is sent, sending an instruction for deleting the secret key to the second terminal.
In addition, to achieve the above object, another aspect of the present application further provides an encryption communication method applied to a second terminal, the encryption communication method including the steps of:
the second terminal establishes communication connection with the first terminal based on a fifth generation mobile communication technology and receives a secret key request sent by the first terminal;
generating corresponding feedback information according to the secret key request, wherein the feedback information comprises the secret key;
and sending the feedback information to the first terminal.
Optionally, the step of generating corresponding feedback information according to the key request includes:
randomly generating a secret key according to the secret key request;
and packaging the secret key to generate corresponding feedback information.
Optionally, after the step of sending the feedback information to the first terminal, the method further includes:
and performing encryption operation on the communication data sent to the first terminal according to the secret key in the feedback information, and performing decryption operation on the communication data received from the first terminal.
In addition, in order to achieve the above object, another aspect of the present application further provides a terminal storing an encrypted communication program, which when executed by a processor, implements the steps of the encrypted communication method as described in any one of the above.
In this embodiment, the first terminal establishes a connection with the second terminal based on a fifth generation mobile communication technology, and sends a key request to the second terminal after receiving an instruction that encrypted communication needs to be performed with the second terminal, so that the second terminal generates feedback information including a key according to the key request and sends the feedback information to the first terminal when receiving the key request of the first terminal. When the second terminal acquires the request instruction of the first terminal, the second terminal directly generates feedback information corresponding to the request instruction, wherein the feedback information comprises the secret key and is sent to the first terminal, and a server for generating the secret key is not required to generate and forward the secret key, so that the problem of secret key leakage caused by the fact that the server for generating the secret key is attacked is avoided, and the security of encrypted transmission between the first terminal and the second terminal is improved.
Drawings
Fig. 1 is a schematic terminal structure diagram of a hardware operating environment according to an embodiment of the present application;
FIG. 2 is a flowchart illustrating an embodiment of an encryption communication method according to the present application;
FIG. 3 is a schematic flow chart diagram illustrating a method for encrypted communication according to another embodiment of the present application;
fig. 4 is a flowchart illustrating another embodiment of the encrypted communication method of the present application.
The implementation, functional features and advantages of the objectives of the present application will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The main solution of the embodiment of the application is as follows: the method comprises the steps that a first terminal establishes communication connection with a second terminal based on a fifth generation mobile communication technology and sends a secret key request to the second terminal, wherein the second terminal sends feedback information corresponding to the secret key request to the first terminal after receiving the secret key request; receiving the feedback information, and acquiring a secret key according to the feedback information; and encrypting communication data according to the secret key, and sending the encrypted communication data to the second terminal.
When different terminals communicate, the secret key needs to be maintained at the server end when the different terminals communicate, so that the cost for maintaining the server is increased, and the secret key is leaked when the server is attacked, so that the security of encrypted communication is influenced.
As shown in fig. 1, fig. 1 is a schematic terminal structure diagram of a hardware operating environment according to an embodiment of the present application.
As shown in fig. 1, the terminal may include: a processor 1001, such as a CPU, a network interface 1004, a user interface 1003, a memory 1005, a communication bus 1002. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 1005 may alternatively be a storage device separate from the processor 1001.
Optionally, the terminal may further include a camera, a Radio Frequency (RF) circuit, a sensor, a remote controller, an audio circuit, a WiFi module, a detector, and the like. Of course, the terminal may also be configured with other sensors such as a gyroscope, a barometer, a hygrometer and a temperature sensor, which are not described herein again.
Those skilled in the art will appreciate that the terminal structure shown in fig. 1 does not constitute a limitation of the terminal device and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 1, a memory 1005, which is a kind of a second terminal, may include therein an operating system, a network communication module, a user interface module, and an encrypted communication program.
In the terminal shown in fig. 1, the network interface 1004 is mainly used for connecting to a backend server and performing data communication with the backend server; the user interface 1003 is mainly used for connecting a client (user side) and performing data communication with the client; and the processor 1001 may be configured to call the encrypted communication program stored in the memory 1005 and perform the following operations:
the method comprises the steps that a first terminal establishes communication connection with a second terminal based on a fifth generation mobile communication technology and sends a secret key request to the second terminal, wherein the second terminal sends feedback information corresponding to the secret key request to the first terminal after receiving the secret key request;
receiving the feedback information, and acquiring a secret key according to the feedback information;
and encrypting communication data according to the secret key, and sending the encrypted communication data to the second terminal.
Referring to fig. 2, fig. 2 is a flowchart illustrating an embodiment of an encryption communication method according to the present application.
While the embodiments of the present application provide an embodiment of an encrypted communication method, it should be noted that, although a logical order is shown in the flow chart, in some cases, the steps shown or described may be performed in an order different from that shown or described herein.
The encryption communication method comprises the following steps:
step S10, the first terminal establishes a communication connection with the second terminal based on a fifth-generation mobile communication technology, and sends a key request to the second terminal, where the second terminal sends feedback information corresponding to the key request to the first terminal after receiving the key request;
the first terminal is a key requester, specifically a vehicle, a mobile terminal, an infrastructure capable of communication, etc., and the second terminal is a key sender, specifically a vehicle, a mobile terminal, an infrastructure capable of communication, etc. In the present embodiment, the first terminal is exemplified by the vehicle a, and the second terminal is exemplified by the vehicle B.
In the present embodiment, the vehicle a and the vehicle B establish a communication connection based on a fifth-generation mobile communication technology. It can be understood that, in the prior art, a key generation server needs to be constructed after the different terminals establish connections, that is, when determining that communication data between the vehicle a and the vehicle B needs to be encrypted, the process is that the vehicle a sends a key request to the server, the server generates a key according to the key request, and sends the generated key to the vehicle a and the vehicle B, so that the vehicle a and the vehicle B encrypt the communication data according to the key acquired from the server.
It can be understood that, in the present application, the first terminal and the second terminal are installed with an application program for encryption and decryption, when a user uses the first terminal to perform data communication, the application program for communication of the first terminal is started, whether the user starts encrypted communication is determined, and if the user selects to perform encrypted communication, a key request is generated by the application program.
The key request is request information for acquiring a key sent by the first terminal. The format of the key request may be a http (hypertext Transfer protocol) request, a ftp (file Transfer protocol) request, or a format conforming to other feasible text Transfer formats, and the present invention is not limited thereto. More specifically, the key request may be embodied as a message, which may consist of a request line, a message header and a message body, for example, for a key request in http format. After the second terminal receives the key request, the second terminal knows that the first terminal requests to obtain the key according to the message body in the key request, generates corresponding feedback information containing the key, and sends the feedback information to the first terminal.
Similarly, the format of the feedback information generated by the second terminal may be a http (hypertext Transfer protocol) request, a ftp (file Transfer protocol) request, or a format conforming to other feasible text Transfer formats, and the present invention is not limited thereto. The feedback information comprises a response line, a response head and a response body, wherein the first terminal obtains the secret key in the response body after receiving the feedback information of the second terminal.
Step S20, receiving the feedback information, and obtaining a key according to the feedback information;
and after receiving the feedback information, the second terminal sends the feedback information to the application program. The application gets the key from the responder.
Before the step of receiving the feedback information and obtaining the key according to the feedback information, the method includes:
a step S01 of, when the feedback information is not received, executing a step of sending a key request to the second terminal;
step S02, calculating the number of times of sending the key request;
and step 03, when the number of times is greater than the preset number of times, performing plaintext communication, wherein the plaintext communication is to encrypt the communication data.
In this embodiment, after the first terminal sends the key request to the second terminal, the timer is started to start timing, and when the counted time is greater than the preset time (20s), the sending of the key request instruction to the second terminal is executed again, the number of times of sending the key request instruction to the second terminal is counted, and when the counted time is greater than the preset number of times (3 times), it is determined that plaintext communication is performed with the second terminal. The preset time and the preset times can be changed according to the requirement of the user on the communication quality. In this embodiment, when the number of times that the first terminal sends the key request to the second terminal is greater than the preset number of times, the plaintext communication between the first terminal and the second terminal is controlled, that is, the encryption operation is not performed on the communication data between the first terminal and the second terminal, so that the problem that the first terminal frequently sends the key request to the second terminal when the second terminal cannot perform encrypted communication is avoided, and the communication quality is reduced.
Step S30, encrypting the communication data according to the secret key, and sending the encrypted communication data to the second terminal.
The communication data is data generated by the first terminal and the second terminal in the communication process and comprises data transmitted by a file or communication data generated during communication. In the present application, a description is given of call data generated when a first terminal and a second terminal make a call by using communication data as an example.
Specifically, the present embodiment can be exemplified as follows. When detecting that the user initiates a call with the vehicle B by operating an application installed in the vehicle A, and when determining that the user selects to establish encrypted communication with the vehicle B, sending a request for obtaining the secret key to the vehicle B. After the vehicle B receives the key request, prompt information of 'the vehicle B requests for encrypted communication' is displayed on a terminal interface, and when confirmation information that a user selects 'enter encrypted communication' is received, an application program in the vehicle B is controlled to generate a key for encrypted communication with the vehicle B, and the key is packaged to generate feedback information and is sent to the vehicle A. After the vehicle a receives the key, the call data to be sent to the vehicle B is encrypted by the key, and the call data acquired in the vehicle B is decrypted.
After the step of encrypting the communication data according to the key and sending the encrypted communication data to the second terminal, the method further includes:
step S40, after the communication data is sent, sending an instruction to delete the key to the second terminal.
After the first terminal and the second terminal complete communication, the first terminal sends an instruction for deleting the secret key, and meanwhile, an application program in the first terminal also executes operation for deleting the secret key used in the transmission process, so that the secret key is prevented from being leaked.
With the rapid development of artificial intelligence technology, the realization of intelligent and automated driving of vehicles has become the key point of the development of the automobile industry, and V2X (vehicle to electric) technology is the basis for realizing automatic driving of vehicles. Especially, the service data interaction between the terminals can improve the driving safety, reduce the congestion and the vehicle energy consumption, improve the traffic efficiency and the like. In the prior art, the key for encrypted communication is generally obtained by the key generation server, but when the server is attacked, the security of communication data between terminals is definitely affected. In this embodiment, the first terminal establishes a connection with the second terminal based on a fifth generation mobile communication technology, and sends a key request to the second terminal after receiving an instruction that encrypted communication needs to be performed with the second terminal, so that the second terminal generates feedback information including a key according to the key request and sends the feedback information to the first terminal when receiving the key request of the first terminal. When the second terminal acquires the request instruction of the first terminal, the second terminal directly generates feedback information corresponding to the request instruction, wherein the feedback information comprises the secret key and is sent to the first terminal, and a server for generating the secret key is not required to generate and forward the secret key, so that the problem of secret key leakage caused by the fact that the server for generating the secret key is attacked is avoided, and the security of encrypted transmission between the first terminal and the second terminal is improved.
The steps that the first terminal establishes communication connection with a second terminal based on a fifth generation mobile communication technology and sends a secret key request to the second terminal include:
step S11, the first terminal sends broadcast information of the connection address of the second terminal, where the second terminal sends response information after receiving the broadcast information;
step S12, establishing connection with the second terminal according to the response information;
step S13, sending the key request to the second terminal based on the connection.
The connection address is an address for establishing connection with the second terminal. In this embodiment, the first terminal may send and obtain a connection address of the second terminal, and if the first terminal and the second terminal are in the same local area network, the second terminal directly establishes a connection with the first terminal; and if the first terminal and the second terminal are in different networks, the base station performs rebroadcasting. And after the second terminal receives the rebroadcast broadcast information, sending response information so that the first terminal establishes connection with the second terminal according to the response information and sends a key request to the second terminal after establishing the connection.
Before the step of sending the key request to the second terminal based on the connection, the method includes:
step S01, receiving the operation information of the user, and determining whether to carry out encrypted communication according to the operation information;
step S02, when it is determined that the encrypted communication is performed, performs a step of transmitting a key request to the second terminal based on the connection.
In this embodiment, after the first terminal and the second terminal establish a connection, the first terminal receives operation information of the user to determine whether the user selects to enter encrypted communication, and when the user selects to perform encrypted communication with the second terminal by installing an application program in the first terminal, the first terminal sends a key request for obtaining a key to the second terminal, so that the second terminal generates the key by the application program installed in the second terminal after receiving the key request. In this embodiment, after the specific information selected by the user is obtained, the second terminal sends the key request for obtaining the key, so that the key server for generating the key is not required to generate the key, and the security of the key is improved.
Further, referring to fig. 3, a further embodiment of the encryption communication method of the present application is provided.
The second embodiment of the encrypted communication method differs from the first embodiment of the encrypted communication method in that, after the step of encrypting the communication data according to the key and transmitting the encrypted communication data to the second terminal, the method further includes:
step S40, when receiving a request instruction for modifying the key, sending modification information to the second terminal, where the second terminal modifies the key after receiving the modification request, and sends the modified key to the first terminal;
in step S50, the first terminal encrypts the communication data based on the modified key.
It can be understood that, when encrypted transmission is performed between the first terminal and the second terminal, if all encrypted data are encrypted by using the uniform key, there is a risk of information leakage to all communication data in the communication process between the first terminal and the second terminal undoubtedly when the key is stolen. For this purpose, in the request, after the second terminal receives the key request of the first terminal, the second terminal adds the use time of the key to the feedback information sent by the second terminal according to the communication protocol. When the time for the first terminal to encrypt and decrypt by using the key is longer than the preset time, the key request for obtaining the key is sent to the second terminal again so as to change the key for encrypting communication between the first terminal and the second terminal, and the security of communication between the first terminal and the second terminal is enhanced.
Further, referring to fig. 4, another embodiment of the encrypted communication method of the present application is provided.
In this embodiment, the communication encryption method is applied to the second terminal, and includes:
step S100, the second terminal establishes communication connection with the first terminal based on a fifth generation mobile communication technology and receives a secret key request sent by the first terminal;
step S200, generating corresponding feedback information according to the secret key request, wherein the feedback information comprises the secret key;
step S300, sending the feedback information to the first terminal.
The second terminal establishes connection with the second terminal based on the fifth generation mobile communication technology, and receives a key request sent by the second terminal. Further, an application for realizing communication data transmission with the second terminal is installed, and a key is generated based on the received key request, and it is understood that the key generation method may generate a key based on a key generation algorithm in the application, and generate feedback information from the generated key and other information (the use time of the key, the address information of the first terminal, and the like) and transmit the feedback information to the first terminal. When the first terminal receives the secret key, the communication data is encrypted or decrypted according to the secret key, so that when the encrypted communication is carried out between the first terminal and the second terminal, the secret key can be directly generated at the second terminal without reconstructing a server for generating the secret key, and the security of the encrypted communication between the first terminal and the second terminal is improved.
The step of generating corresponding feedback information according to the key request includes:
step S210, randomly generating a secret key according to the secret key request;
step S220, packing the secret key to generate corresponding feedback information.
After receiving the request instruction of the first terminal, the second terminal randomly generates a key through an application program installed in the first terminal, packages information such as the randomly generated key and the survival time of the key to generate feedback information, and sends the feedback information to the first terminal. The mode of randomly generating the secret key is used, and the security of encrypted communication between the first terminal and the second terminal is improved.
After the step of sending the feedback information to the first terminal, the method further includes:
step S400, performing an encryption operation on the communication data sent to the first terminal according to the key in the feedback information, and performing a decryption operation on the communication data received from the first terminal.
In this embodiment, when receiving the key of the second terminal, the first terminal sends the confirmation information to the second terminal based on the received key, so that the second terminal confirms that the first terminal has received the key. After confirming the key received by the first terminal, when the second terminal sends the communication data to the first terminal, the encryption operation is executed on the communication data sent to the first terminal by using the key. At the same time, the received communication data from the first terminal is decrypted using the key. The second terminal encrypts the communication data sent to the first terminal, so that the communication safety between the first terminal and the second terminal is improved.
In addition, in order to achieve the above object, another aspect of the present application further provides a terminal storing an encrypted communication program, which when executed by a processor, implements the steps of the encrypted communication method as described in any one of the above.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It should be noted that in the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The application can be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.
While alternative embodiments of the present application have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following appended claims be interpreted as including alternative embodiments and all such alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (10)

1. An encryption communication method applied to a first terminal, the encryption communication method comprising the steps of:
the method comprises the steps that a first terminal establishes communication connection with a second terminal based on a fifth generation mobile communication technology and sends a secret key request to the second terminal, wherein the second terminal sends feedback information corresponding to the secret key request to the first terminal after receiving the secret key request;
receiving the feedback information, and acquiring a secret key according to the feedback information;
and encrypting communication data according to the secret key, and sending the encrypted communication data to the second terminal.
2. The encrypted communication method according to claim 1, wherein the step of the first terminal establishing a communication connection with the second terminal based on a fifth-generation mobile communication technology and sending a key request to the second terminal comprises:
the first terminal sends broadcast information of a connection address of the second terminal, wherein the second terminal sends response information after receiving the broadcast information;
establishing connection with the second terminal according to the response information;
sending the key request to the second terminal based on the connection.
3. The encrypted communication method according to claim 2, wherein the step of sending the key request to the second terminal based on the connection is preceded by:
receiving operation information of a user, and determining whether to carry out encryption communication according to the operation information;
upon determining to conduct the encrypted communication, a step of sending a key request to the second terminal based on the connection is performed.
4. The encrypted communication method according to claim 1, wherein after the step of encrypting the communication data based on the key and transmitting the encrypted communication data to the second terminal, the method further comprises:
when a request instruction for modifying the secret key is received, a modification request for modifying the secret key is sent to the second terminal, and after the second terminal receives the modification request, the secret key is modified and the modified secret key is sent to the first terminal;
and the first terminal encrypts communication data based on the modified secret key.
5. The encrypted communication method according to claim 1, wherein the step of receiving the feedback information and obtaining a key based on the feedback information is preceded by:
when the feedback information is not received, executing a step of sending a key request to the second terminal;
calculating the times of sending the key request;
and when the times are greater than the preset times, performing plaintext communication, wherein the plaintext communication is to encrypt the communication data.
6. The encrypted communication method according to claim 1, wherein after the step of encrypting the communication data based on the key and transmitting the encrypted communication data to the second terminal, the method further comprises:
and after the communication data is sent, sending an instruction for deleting the secret key to the second terminal.
7. An encryption communication method applied to a second terminal, the encryption communication method comprising the steps of:
the second terminal establishes communication connection with the first terminal based on a fifth generation mobile communication technology and receives a secret key request sent by the first terminal;
generating corresponding feedback information according to the secret key request, wherein the feedback information comprises the secret key;
and sending the feedback information to the first terminal.
8. The encrypted communication method according to claim 7, wherein the step of generating the corresponding feedback information according to the key request includes:
randomly generating a secret key according to the secret key request;
and packaging the secret key to generate corresponding feedback information.
9. The encrypted communication method according to claim 7, wherein after the step of transmitting the feedback information to the first terminal, further comprising:
and performing encryption operation on communication data sent to the first terminal according to the secret key in the feedback information, and performing decryption operation on the communication data received by the first terminal.
10. A terminal, characterized in that the terminal stores an encrypted communication program that realizes the steps of the encrypted communication method according to any one of claims 1 to 9 when executed by a processor.
CN202110289618.4A 2021-03-17 2021-03-17 Encryption communication method and terminal Active CN113141609B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110289618.4A CN113141609B (en) 2021-03-17 2021-03-17 Encryption communication method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110289618.4A CN113141609B (en) 2021-03-17 2021-03-17 Encryption communication method and terminal

Publications (2)

Publication Number Publication Date
CN113141609A true CN113141609A (en) 2021-07-20
CN113141609B CN113141609B (en) 2023-02-07

Family

ID=76811339

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110289618.4A Active CN113141609B (en) 2021-03-17 2021-03-17 Encryption communication method and terminal

Country Status (1)

Country Link
CN (1) CN113141609B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3410758A4 (en) * 2016-01-29 2018-12-05 Tencent Technology (Shenzhen) Company Limited Wireless network connecting method and apparatus, and storage medium
CN109218263A (en) * 2017-07-04 2019-01-15 阿里巴巴集团控股有限公司 A kind of control method and device
CN109862040A (en) * 2019-03-27 2019-06-07 北京经纬恒润科技有限公司 A kind of safety certifying method and Verification System
CN112491840A (en) * 2020-11-17 2021-03-12 平安养老保险股份有限公司 Information modification method and device, computer equipment and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3410758A4 (en) * 2016-01-29 2018-12-05 Tencent Technology (Shenzhen) Company Limited Wireless network connecting method and apparatus, and storage medium
CN109218263A (en) * 2017-07-04 2019-01-15 阿里巴巴集团控股有限公司 A kind of control method and device
CN109862040A (en) * 2019-03-27 2019-06-07 北京经纬恒润科技有限公司 A kind of safety certifying method and Verification System
CN112491840A (en) * 2020-11-17 2021-03-12 平安养老保险股份有限公司 Information modification method and device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN113141609B (en) 2023-02-07

Similar Documents

Publication Publication Date Title
EP3962130B1 (en) Method, apparatus, and system for supporting multiple imsis
KR101491392B1 (en) Indirect device communication
CN110162009B (en) Fault diagnosis method, information determination method, corresponding device and equipment
CN108762791A (en) Firmware upgrade method and device
CN109067739B (en) Communication data encryption method and device
CN105471874A (en) Data transmission method and device
CN113794734A (en) Vehicle-mounted CAN bus encryption communication method, control device and readable storage medium
CN112019541A (en) Data transmission method and device, computer equipment and storage medium
CN103605551A (en) Plugin updating method, system and relevant equipment based on IOS program
CN107211265B (en) Method and device for secure interaction between terminals
CN111030827A (en) Information interaction method and device, electronic equipment and storage medium
CN110505619B (en) Data transmission method in eSIM remote configuration
JP2023506661A (en) Certificate application method and device
CN113613227B (en) Data transmission method and device of Bluetooth equipment, storage medium and electronic device
EP3041188B1 (en) Method, device and system for controlling presentation of application
CN107682335B (en) Data transmission method, server and computer readable storage medium
CN114039727A (en) Data transmission method and device, intelligent terminal and gateway equipment
CN108933758B (en) Sharable cloud storage encryption and decryption method, device and system
CN111787514B (en) Method and device for acquiring equipment control data, storage medium and electronic device
CN113141609B (en) Encryption communication method and terminal
CN113194139A (en) Vehicle remote control method, device and system, electronic equipment and storage medium
CN115296807B (en) Key generation method, device and equipment for preventing industrial control network viruses
CN105635059A (en) WLAN access authentication method, related equipment, and system
CN113455032B (en) Communication method, communication device, and computer-readable medium
CN110830243B (en) Symmetric key distribution method, device, vehicle and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant