CN113285870A - Method and system for protecting internet chat privacy - Google Patents

Method and system for protecting internet chat privacy Download PDF

Info

Publication number
CN113285870A
CN113285870A CN202110644540.3A CN202110644540A CN113285870A CN 113285870 A CN113285870 A CN 113285870A CN 202110644540 A CN202110644540 A CN 202110644540A CN 113285870 A CN113285870 A CN 113285870A
Authority
CN
China
Prior art keywords
chat
key
module
encrypted
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110644540.3A
Other languages
Chinese (zh)
Inventor
马铂翔
刘韬
范渊
吴永越
郑学新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu DBAPPSecurity Co Ltd
Original Assignee
Chengdu DBAPPSecurity Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu DBAPPSecurity Co Ltd filed Critical Chengdu DBAPPSecurity Co Ltd
Priority to CN202110644540.3A priority Critical patent/CN113285870A/en
Publication of CN113285870A publication Critical patent/CN113285870A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/52User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention provides a method and a system for protecting the privacy of internet chatting.A privacy protection system is embedded in the internet terminals of two parties, and comprises an input module, a reading module, a master control and statistical program, a key control program, a ciphertext output program and a plaintext output program; the method has the advantages that hardware does not need to be additionally arranged, the privacy protection system is not connected with the Internet to carry out data interaction, chat contents are encrypted and decrypted offline, the security is higher, and meanwhile, under the condition that the Internet terminal is lost, the encrypted chat contents cannot be subjected to substantial content acquisition without a secret key. The invention realizes quick, simple and safer Internet private chat through the arrangement.

Description

Method and system for protecting internet chat privacy
Technical Field
The invention belongs to the technical field of internet information technology transmission security, and particularly relates to a method and a system for protecting internet chat privacy.
Background
With the rapid development of internet technology, the chat service based on the internet has become a common social mode in people's life, and the chat data of users are stored on the host of each chat service provider and the mobile internet terminals of the users. The chat data of users is not only owned by users, but also held by internet chat service providers, and users cannot know whether the internet chat providers properly store the chat data. The scheme provides a solution for protecting chat privacy, and by recording and sending encrypted chat contents, any third party except a user can not obtain any meaningful chat information even if the third party obtains chat data.
Even if the network chat service provider promises not to reveal user privacy, users often cannot be relieved. In recent years, many chat service providers who promise not to reveal user privacy still have a user privacy disclosure event, especially some chat service providers use user chat records to push advertisements to users. The reason why privacy protection promised by the network chat service provider does not work well is many times because the network chat service provider promises to only not share user information to third parties, but the provider itself can still see and utilize the user's data.
The internet chat user needs a method for protecting the chat privacy really, and the privacy is not leaked or used by the internet chat service provider under the unknown condition. The method can ensure that the chat privacy of the user cannot be revealed or taken for use.
In the prior art, there are a chat record and content security method in patent application CN201711202861.8 and a method for protecting session privacy in patent application cn201910288880. x;
for a method for keeping chat records and contents secret in patent application CN201711202861.8, the following disadvantages are present:
(1) only protecting the chat records on the terminal of the user, and not protecting the chat records on the server and the chat object terminal;
(2) additional hardware support is required;
(3) more flows to the thought content, and the realization difficulty on the technical means is higher.
For patent application cn201910288880.x, a method for protecting session privacy has the following disadvantages:
(1) only the privacy of the picture can be protected;
(2) both users need to connect the Internet, and the software has the risk of uploading the user privacy to the server;
(3) the hidden private risks being seized by hardware methods.
Disclosure of Invention
The invention provides a method and a system for protecting the chat privacy of the internet aiming at the defects and the requirements in the prior art, and the privacy protection system is embedded in the internet terminals of both sides, does not need to additionally arrange hardware, is not connected with the internet for data interaction, and can encrypt and decrypt the chat content in an off-line manner, so that the security is higher, and meanwhile, under the condition that the internet terminal is lost, the encrypted chat content can not be substantially obtained without a secret key. The invention realizes quick, simple and safer Internet private chat through the arrangement.
The specific implementation content of the invention is as follows:
the invention provides a method for protecting the privacy of internet chatting, which embeds a privacy protection system on internet terminals of two or more chat parties, and then respectively performs the following operations on the sending chat content and the receiving chat content:
for sending chat content:
step 1: inputting chat content through an input module of a privacy protection system; the chat content comprises characters, videos and images;
step 2: sending the chat content input by the input module to a key control program through a master control and statistical program;
and step 3: in the key control program, the chat content is sent to an encryption module for encryption operation after a key is set by a key controller;
and 4, step 4: the encrypted chat content is output as encrypted chat content through a ciphertext output program and is sent to the chat software of the internet terminal of the chat receiver through the chat software on the internet terminal to be displayed;
for receiving chat content:
step S1: identifying and reading the encrypted chat content received on the chat software of the internet terminal of the chat receiver through a reading module of the privacy protection system;
step S2: sending the encrypted chat content identified by the reading module to a key control program through a master control and statistical program;
step S3: in the key control program, a chat receiver inputs a key for realizing the convention, and sends the encrypted chat content to a decryption module after the key is decrypted by a key controller;
step S4: decrypting the encrypted chat content after the key decryption into plaintext chat content in a decryption module; and displaying the plaintext chatting content on the chatting software of the internet terminal of the chatting receiver at the position corresponding to the encrypted chatting content through a plaintext output program.
In order to better implement the present invention, further, the encryption module and the decryption module perform encryption operation using a twofish online encryption algorithm.
In order to better implement the present invention, further, the operation of encrypting the text by the encryption module is: the text input by the chat sender is cut into 128-bit blocks by using the twofish online encryption algorithm, then the 128-bit blocks are encrypted by using a variable-length key, and then the encrypted text is encrypted by using a sub-key generated by a key controller.
In order to better implement the present invention, further, the operation of the encryption module encrypting the image is: and cutting the picture by taking the pixel as a unit, encrypting the picture by using a sub-key, and rearranging the cut pixel blocks of the encrypted picture by adopting a twofish online encryption algorithm.
In order to better implement the present invention, further, the operation of the encryption module to encrypt the video is: and cutting the video by taking the video frame as a unit, then encrypting by using the sub-key, and rearranging the cut video frame by adopting a twofish online encryption algorithm for the encrypted video.
In order to better implement the present invention, further, in the operation of encrypting the chat content by the encryption module, the encryption process is iterated 16 times by using a function, and in each iterative encryption process, the related replacement of the key is performed, and meanwhile, the related replacement of the key and the data is also performed.
To better implement the present invention, further, the generation operation of the subkey is: both parties or more than both parties of the chat appoint the key in advance, input the key controller that appoints the good key into; the agreed key is then converted by the key controller into a subkey of 4168 bits total.
A system for protecting the privacy of Internet chats is embedded into Internet terminals of two or more chat parties, and comprises an input module, a reading module, a master control and statistical program, a key control program, a cipher text output program and a plaintext output program;
the key control program comprises a key controller, an encryption module and a decryption module;
the reading module is connected with the master control and the statistical program and is used for reading the encrypted chat content sent by the chat sender through the chat software;
the input module is connected with the master control and the statistical program and is used for inputting the chat content which the chat sender wants to send;
the master control and the statistical program are respectively connected with the ciphertext output program, the plaintext output program and the key controller;
the key controller is respectively connected with the encryption module and the decryption module;
the encryption module is connected with the ciphertext output program;
the decryption module is connected with the plaintext output module.
Compared with the prior art, the invention has the following advantages and beneficial effects:
the invention realizes the automatic, convenient and quick chat privacy protection, and can effectively solve the problem of the chat privacy disclosure of the user; compared with the prior art, the automation and modularization hierarchy is higher, so that the labor time investment in production can be more reasonable; the invention is not connected with the network to operate, thus absolutely ensuring that the privacy of the user is only in the equipment of the user. Meanwhile, even if the internet terminal is lost, the disclosure of the chat content can not be caused.
Drawings
FIG. 1 is a schematic diagram of a privacy preserving system according to the present invention;
FIG. 2 is a schematic flow chart of the present invention;
FIG. 3 is a schematic illustration of an interface display according to the present invention;
FIG. 4 is an exemplary illustration of a gray scale of an image before encryption;
fig. 5 is an exemplary graph of the encrypted image of fig. 4.
Detailed Description
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it should be understood that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments, and therefore should not be considered as a limitation to the scope of protection. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
In the description of the present invention, it is to be noted that, unless otherwise explicitly specified or limited, the terms "disposed," "connected," and "connected" are to be construed broadly, and may be, for example, fixedly connected, detachably connected, or integrally connected; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
Example 1:
the embodiment provides a method for protecting the privacy of internet chatting, which embeds a privacy protection system on internet terminals of two or more chat parties, and then performs the following operations on sending chat content and receiving chat content respectively: as shown in fig. 1 and 2:
for sending chat content:
step 1: inputting chat content through an input module of a privacy protection system; the chat content comprises characters, videos and images;
step 2: sending the chat content input by the input module to a key control program through a master control and statistical program;
and step 3: in the key control program, the chat content is sent to an encryption module for encryption operation after a key is set by a key controller;
and 4, step 4: the encrypted chat content is output as encrypted chat content through a ciphertext output program and is sent to the chat software of the internet terminal of the chat receiver through the chat software on the internet terminal to be displayed;
for receiving chat content:
step S1: identifying and reading the encrypted chat content received on the chat software of the internet terminal of the chat receiver through a reading module of the privacy protection system;
step S2: sending the encrypted chat content identified by the reading module to a key control program through a master control and statistical program;
step S3: in the key control program, a chat receiver inputs a key for realizing the convention, and sends the encrypted chat content to a decryption module after the key is decrypted by a key controller;
step S4: decrypting the encrypted chat content after the key decryption into plaintext chat content in a decryption module; and displaying the plaintext chatting content on the chatting software of the internet terminal of the chatting receiver at the position corresponding to the encrypted chatting content through a plaintext output program.
Example 2:
in this embodiment, on the basis of the above embodiment 1, in order to better implement the present invention, as shown in fig. 4 and fig. 5, the encryption module and the decryption module perform an encryption operation by using a twofish online encryption algorithm.
The encryption module encrypts the characters by the following operations: the text input by the chat sender is cut into 128-bit blocks by using the twofish online encryption algorithm, then the 128-bit blocks are encrypted by using a variable-length key, and then the encrypted text is encrypted by using a sub-key generated by a key controller.
Example (c):
user a intends to send "hello" to user B.
User a completes typing through the ciphertext output program and then selects "hello".
Under UTF-8 coding, a Chinese character is 24 binary bits, the total number of the 'hello' is 48 bits, and the program automatically adds '\ 0' to the character until 128 bits are complemented.
"hello" bash64 is encoded as:
5L2g5aW9
after addition of '\ 0', the text to be encrypted at this time is:
5L2g5aW9XcDBFwwXBcMA==
after encryption:
Qn01GB4Js3fHShnYP7T67g==
the encryption module encrypts the image as follows: as shown in fig. 4, the picture in fig. 4 is cut in units of pixels, then encrypted by using a sub-key, and for the encrypted image, the cut pixel blocks are rearranged by using a twofish online encryption algorithm, so as to obtain the encrypted image shown in fig. 5. It should be noted that fig. 4 and 5 are color pictures, and there is a certain loss of information due to the conversion into black and white grey scale pictures, but the loss is only used as an illustration of the effect and does not affect the technical content of the scheme, and the applicant requests to retain the illustration of fig. 4 and 5 and states that the loss does not make the technical solution of the present application unclear or affect other essential contents.
The encryption module encrypts the video by the following operations: and cutting the video by taking the video frame as a unit, then encrypting by using the sub-key, and rearranging the cut video frame by adopting a twofish online encryption algorithm for the encrypted video.
Other parts of this embodiment are the same as those of embodiment 1, and thus are not described again.
Example 3:
in this embodiment, on the basis of any one of the foregoing embodiments 1-2, to better implement the present invention, further, in the operation of the encryption module to encrypt the chat content, the encryption process is iterated 16 times by using a function, and in each iterative encryption process, related replacement of the key is performed, and meanwhile, related replacement of the key and data is also performed.
Other parts of this embodiment are the same as any of embodiments 1-2 described above, and thus are not described again.
Example 4:
in this embodiment, on the basis of any one of the above embodiments 1 to 3, in order to better implement the present invention, further, the operation of generating the subkey is: both parties or more than both parties of the chat appoint the key in advance, input the key controller that appoints the good key into; the agreed key is then converted by the key controller into a subkey of 4168 bits total.
Other parts of this embodiment are the same as any of embodiments 1 to 3, and thus are not described again.
Example 5:
the embodiment also provides a system for protecting the privacy of internet chatting, which is embedded into internet terminals of two or more chat parties, and as shown in fig. 1, the system comprises an input module, a reading module, a master control and statistical program, a key control program, a ciphertext output program and a plaintext output program;
the key control program comprises a key controller, an encryption module and a decryption module;
the reading module is connected with the master control and the statistical program and is used for reading the encrypted chat content sent by the chat sender through the chat software;
the input module is connected with the master control and the statistical program and is used for inputting the chat content which the chat sender wants to send;
the master control and the statistical program are respectively connected with the ciphertext output program, the plaintext output program and the key controller;
the key controller is respectively connected with the encryption module and the decryption module;
the encryption module is connected with the ciphertext output program;
the decryption module is connected with the plaintext output module.
The working principle is as follows: the whole privacy protection system consists of a master control and statistic program, a ciphertext output program, a plaintext output program, a key control program and the like, and is not connected with or uses a network. The whole privacy protection system adopts a twofish symmetric encryption algorithm to realize encryption and decryption of chat information, and a secret key is customized by a user and is stored in a secret key control program. The main functions of the master control and statistical program are to uniformly configure and issue the simulation packet sending parameters of each packet sending program, ensure the correct encryption of the ciphertext output program, the successful decryption of the plaintext output program, and summarize the receiving and sending statistical data of the packet sending program. The key controller holds all the keys in the system, it has an encryption module and a decryption module, it controls only one key at a time to use encryption and decryption, there is no case of encryption using key a and decryption using key B. The cipher text output program obtains the plaintext chatting data through the master control and the statistical program, encrypts the chatting data through the key control program and outputs the cipher text to the chatting interface. The plaintext output program obtains the ciphertext chatting data through the master control program and the statistical program, decrypts the chatting data through the key control program, and outputs the plaintext to the chatting interface. It should be noted that the input module and the reading module are omitted from the structural display of fig. 1, but the specific connection relationship thereof is clear from the text description of the present application, and there is no unclear or ambiguous incomplete place.
Example 6:
on the basis of any one of the above embodiments 1 to 5, as shown in fig. 4, the privacy protecting system of the present application externally behaves like an input method, where a mobile phone is used as an internet terminal; the interface is provided with a keyboard, a text input box and a picture video loading box which are used as input modules, after the input modules input texts, the texts are sent to a key controller through a master control and statistical program to be encrypted by keys and then sent to an encryption module to be encrypted, and finally, the texts are sent through a chat software through a ciphertext output module. For sending the image and the video, the stored image or the stored video is read through a picture video loading frame of an input module, then the image or the video is sent to a key controller through a master control and statistical program to be encrypted by a key, then the image or the video is sent to an encryption module to be cut and encrypted, and finally the image or the video is sent through a chat software by a ciphertext output module.
And for the ciphertext received by the chat software, the content is read through the reading module, and then the ciphertext is decrypted through the key controller and the decryption module and then is output and displayed through the plaintext output module.
And displaying the sent encrypted chat content and the received plaintext chat content corresponding to the encrypted chat content at corresponding positions on the interface.
Other parts of this embodiment are the same as any of embodiments 1 to 5, and thus are not described again.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the present invention in any way, and all simple modifications and equivalent variations of the above embodiments according to the technical spirit of the present invention are included in the scope of the present invention.

Claims (8)

1. A method for protecting the privacy of Internet chats is characterized in that a privacy protection system is embedded in Internet terminals of two or more chat parties, and then the following operations are respectively carried out on the sending chat content and the receiving chat content:
for sending chat content:
step 1: inputting chat content through an input module of a privacy protection system; the chat content comprises characters, videos and images;
step 2: sending the chat content input by the input module to a key control program through a master control and statistical program;
and step 3: in the key control program, the chat content is sent to an encryption module for encryption operation after a key is set by a key controller;
and 4, step 4: the encrypted chat content is output as encrypted chat content through a ciphertext output program and is sent to the chat software of the internet terminal of the chat receiver through the chat software on the internet terminal to be displayed;
for receiving chat content:
step S1: identifying and reading the encrypted chat content received on the chat software of the internet terminal of the chat receiver through a reading module of the privacy protection system;
step S2: sending the encrypted chat content identified by the reading module to a key control program through a master control and statistical program;
step S3: in the key control program, a chat receiver inputs a key for realizing the convention, and sends the encrypted chat content to a decryption module after the key is decrypted by a key controller;
step S4: decrypting the encrypted chat content after the key decryption into plaintext chat content in a decryption module; and displaying the plaintext chatting content on the chatting software of the internet terminal of the chatting receiver at the position corresponding to the encrypted chatting content through a plaintext output program.
2. The method of claim 1, wherein the encryption module and the decryption module perform encryption operations using a twofish online encryption algorithm.
3. The method of claim 2, wherein the encryption module encrypts the text by: the text input by the chat sender is cut into 128-bit blocks by using the twofish online encryption algorithm, then the 128-bit blocks are encrypted by using a variable-length key, and then the encrypted text is encrypted by using a sub-key generated by a key controller.
4. The method of claim 2, wherein the encryption module encrypts the image by: and cutting the picture by taking the pixel as a unit, encrypting the picture by using a sub-key, and rearranging the cut pixel blocks of the encrypted picture by adopting a twofish online encryption algorithm.
5. The method of claim 2, wherein the encrypting module encrypts the video by: and cutting the video by taking the video frame as a unit, then encrypting by using the sub-key, and rearranging the cut video frame by adopting a twofish online encryption algorithm for the encrypted video.
6. The method for protecting privacy of internet chatting as claimed in claim 2, 3, 4 or 5, wherein in the operation of encrypting the chatting content by the encryption module, the encryption process is iterated 16 times by using the function, and in each iteration of the encryption process, the related replacement of the key is performed, and the related replacement of the key and the data is also performed.
7. A method for protecting privacy of Internet chatting as claimed in claim 2, 3, 4 or 5, wherein the generation of said subkey is operated as: both parties or more than both parties of the chat appoint the key in advance, input the key controller that appoints the good key into; the agreed key is then converted by the key controller into a subkey of 4168 bits total.
8. A system for protecting the privacy of Internet chats is embedded into the Internet terminals of two or more chat parties, and is characterized by comprising an input module, a reading module, a master control and statistical program, a key control program, a cipher text output program and a plaintext output program;
the key control program comprises a key controller, an encryption module and a decryption module;
the reading module is connected with the master control and the statistical program and is used for reading the encrypted chat content sent by the chat sender through the chat software;
the input module is connected with the master control and the statistical program and is used for inputting the chat content which the chat sender wants to send;
the master control and the statistical program are respectively connected with the ciphertext output program, the plaintext output program and the key controller;
the key controller is respectively connected with the encryption module and the decryption module;
the encryption module is connected with the ciphertext output program;
the decryption module is connected with the plaintext output module.
CN202110644540.3A 2021-06-09 2021-06-09 Method and system for protecting internet chat privacy Pending CN113285870A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110644540.3A CN113285870A (en) 2021-06-09 2021-06-09 Method and system for protecting internet chat privacy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110644540.3A CN113285870A (en) 2021-06-09 2021-06-09 Method and system for protecting internet chat privacy

Publications (1)

Publication Number Publication Date
CN113285870A true CN113285870A (en) 2021-08-20

Family

ID=77284023

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110644540.3A Pending CN113285870A (en) 2021-06-09 2021-06-09 Method and system for protecting internet chat privacy

Country Status (1)

Country Link
CN (1) CN113285870A (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102158338A (en) * 2011-05-25 2011-08-17 武汉大学 Differential fault analysis (DFA) method and system for Twofish encrypted chip
US20140123261A1 (en) * 2012-10-25 2014-05-01 Christopher Douglas Blair System and method for authentication of communications
CN103840946A (en) * 2014-03-25 2014-06-04 山东大学 Image classifying authentication method based on (t, n) threshold secret key sharing and phase retrieval algorithm
CN104301327A (en) * 2014-10-29 2015-01-21 东北大学 Privacy protection system and method used for P2P social network and based on broadcast encryption
CN104394530A (en) * 2014-12-09 2015-03-04 天津光电安辰信息技术有限公司 Wechat content encryption system based on smartphone and implementation method of wechat content encryption system
CN105208404A (en) * 2015-08-26 2015-12-30 北京新东方迅程网络科技有限公司 Video encryption and decryption method and device
CN105743906A (en) * 2016-03-21 2016-07-06 武汉优信众网科技有限公司 Picture file encryption and decryption method and system based on content-associated secret key
CN109587099A (en) * 2017-09-29 2019-04-05 武汉斗鱼网络科技有限公司 One kind carrying out guard method and device to privacy of user in Video chat
CN110113246A (en) * 2019-04-11 2019-08-09 上海掌门科技有限公司 A method of protection session privacy
CN110401849A (en) * 2019-03-01 2019-11-01 腾讯科技(深圳)有限公司 The cipher processing method and device of video data
CN111107298A (en) * 2019-12-04 2020-05-05 上海百脑经贸有限公司 Video conference encryption method

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102158338A (en) * 2011-05-25 2011-08-17 武汉大学 Differential fault analysis (DFA) method and system for Twofish encrypted chip
US20140123261A1 (en) * 2012-10-25 2014-05-01 Christopher Douglas Blair System and method for authentication of communications
CN103840946A (en) * 2014-03-25 2014-06-04 山东大学 Image classifying authentication method based on (t, n) threshold secret key sharing and phase retrieval algorithm
CN104301327A (en) * 2014-10-29 2015-01-21 东北大学 Privacy protection system and method used for P2P social network and based on broadcast encryption
CN104394530A (en) * 2014-12-09 2015-03-04 天津光电安辰信息技术有限公司 Wechat content encryption system based on smartphone and implementation method of wechat content encryption system
CN105208404A (en) * 2015-08-26 2015-12-30 北京新东方迅程网络科技有限公司 Video encryption and decryption method and device
CN105743906A (en) * 2016-03-21 2016-07-06 武汉优信众网科技有限公司 Picture file encryption and decryption method and system based on content-associated secret key
CN109587099A (en) * 2017-09-29 2019-04-05 武汉斗鱼网络科技有限公司 One kind carrying out guard method and device to privacy of user in Video chat
CN110401849A (en) * 2019-03-01 2019-11-01 腾讯科技(深圳)有限公司 The cipher processing method and device of video data
CN110113246A (en) * 2019-04-11 2019-08-09 上海掌门科技有限公司 A method of protection session privacy
CN111107298A (en) * 2019-12-04 2020-05-05 上海百脑经贸有限公司 Video conference encryption method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘?: "视频监控应用量子保密通信技术的研究探索", 《警察技术》 *

Similar Documents

Publication Publication Date Title
CN105376261B (en) Encryption method and system for instant messaging message
US7925009B2 (en) Hybrid data encryption
CN107579903B (en) Picture message secure transmission method and system based on mobile device
WO2016045464A1 (en) Decryption method and mobile terminal
CN105391676A (en) Instant communication message processing method, device and system
CN107181584B (en) Asymmetric completely homomorphic encryption and key replacement and ciphertext delivery method thereof
CN105208028A (en) Data transmission method and related device and equipment
CN111884802B (en) Media stream encryption transmission method, system, terminal and electronic equipment
Iqbal et al. SMS Encryption Using One-Time Pad Cipher
CN111049738B (en) E-mail data security protection method based on hybrid encryption
CN109067700A (en) A kind of cross-platform information input output protection system
CN103067897A (en) Asymmetrical mobile phone short message encryption method
JP2008035305A (en) Encryption method and data concealing method
CN102523563B (en) Multimedia messaging service (MMS) encrypting method based on identity-based cryptograph (IBC) technology
CN111625844A (en) Survey data security encryption method and device, electronic equipment and storage medium
CN103685239A (en) Real-time encryption and decryption system and real-time encryption and decryption method for mobile products
CN113285870A (en) Method and system for protecting internet chat privacy
CN108881300A (en) A kind of file encryption that supporting mobile phone terminal security cooperation and sharing method and system
CN104243291A (en) Instant messaging method and system thereof capable of guaranteeing safety of user communication content
CN104363584B (en) A kind of method, apparatus and terminal of short message Encrypt and Decrypt
Chen et al. An image encryption algorithm based on SM4 and Base64
CN110321722B (en) DNA sequence similarity safe calculation method and system
Manikandaprabhu et al. A Review of Encryption and Decryption of Text Using the AES Algorithm
Kavitha et al. Stagchain–a steganography based application working on a blockchain environment
Dodeja BaatCheet: Android chat application coupling End-to-End encryption and LSB substitution

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210820

RJ01 Rejection of invention patent application after publication