CN115119200A - Information transfer method for 5G communication environment - Google Patents
Information transfer method for 5G communication environment Download PDFInfo
- Publication number
- CN115119200A CN115119200A CN202211036840.4A CN202211036840A CN115119200A CN 115119200 A CN115119200 A CN 115119200A CN 202211036840 A CN202211036840 A CN 202211036840A CN 115119200 A CN115119200 A CN 115119200A
- Authority
- CN
- China
- Prior art keywords
- information
- sequence
- network
- node
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses an information transmission method used for 5G communication environment, relating to the technical field of communication, by establishing a communication network consisting of a local area network and a mapping network, the information required to be transmitted by a user is subjected to data processing and encryption in the local area network, and then the encrypted information content is sent to the mapping network, so that the information content required to be transmitted cannot be obtained by others in the mapping network, meanwhile, when the information receiving end receives the encrypted information content in the mapping network, the information receiving node is used for transiting the client corresponding to the information receiving end and the mapping network, and the address received by the information receiving end is used for directly extracting the encrypted information content, after extraction, address information in the information receiving node is removed, and the encrypted ciphertext is decrypted in the information receiving end, so that the confidentiality of the information receiving process is improved.
Description
Technical Field
The invention relates to the technical field of communication, in particular to an information transmission method for a 5G communication environment.
Background
The computer network functions mainly include resource sharing, rapid data information transmission, reliability improvement, load balancing and distributed processing capacity provision, centralized management and comprehensive information service provision; the functions can be abstracted and summarized as follows: three parts of information flow transmission, information processing of network key nodes or node clusters and network performance optimization are realized;
in the process of transmitting information flow in a network node, information content is easy to be attacked or stolen, so that the information content is leaked, and how to increase the confidentiality of information in the transmission process is a problem to be solved.
Disclosure of Invention
The invention aims to provide an information transfer method for a 5G communication environment.
The purpose of the invention can be realized by the following technical scheme: an information delivery method for a 5G communication environment, comprising the steps of:
the method comprises the following steps: constructing a communication network for information transfer based on the 5G communication environment;
step two: obtaining an admission authentication of the communication network so that a user obtains a right to enter the communication network;
step three: processing the information to be transmitted by the user and storing the processed information;
step four: an information receiving node is established to enable an information receiving end to obtain information content from within a communication network.
Further, the process of constructing the communication network for information transfer includes:
utilizing a 5G communication environment to establish a local area network, setting n information storage nodes in the local area network, establishing a client associated with each information storage node according to each information storage node, randomly generating an identification sequence according to the association relationship between the information storage nodes and the client, and binding the identification sequence with the corresponding information storage nodes and the client;
and establishing a mapping network linked with the local area network, marking the established mapping network and the local area network, and obtaining a communication network for information transfer.
Furthermore, the mapping network comprises m information transfer nodes, each information transfer node is provided with a unique address, and m is greater than n.
Further, the process of obtaining an admission authentication of the communication network to enable the user to obtain an authority to enter the communication network comprises:
setting an information registration port and an information login port in a client;
inputting personal basic information through the information registration port, and auditing the input personal basic information;
after the verification is passed, generating a login account and a login password, and sending the generated login account and login password to the corresponding mobile phone terminal;
binding and associating an identification sequence related to a client with a login account;
the obtained login account and the login password are input into the information login port, so that the user can obtain the access authentication of the communication network, and after the user enters the communication network through the client for the first time, the permission of entering the communication network is obtained.
Further, the process of processing the information content that the user needs to deliver includes:
marking information required to be transmitted by a user as original information, converting the original information into a data stream, acquiring a sequence forming the data stream, and marking the sequence forming the data stream as an original sequence;
combining the identification sequence bound with the information storage node with the original sequence to obtain an information sequence to be transmitted;
and after the online encryption of the information sequence to be transmitted is completed, the encrypted information sequence to be transmitted is sent to a mapping network for storage.
Further, the process of encrypting the information sequence to be transmitted on line includes:
generating an initial key according to an identification sequence in an information sequence to be transmitted;
setting an initial vector C, and acquiring the byte number of the initial vector;
setting a temporary vector L with the same byte number as the initial vector, and sequentially filling the initial key into the temporary vector;
assigning the initial vector C according to the filled temporary vector L;
scrambling the initial vector to obtain a random sequence of the initial vector, and generating a key stream according to the obtained random sequence;
and storing the key stream, carrying out XOR operation on the key stream and the information sequence to be transmitted to obtain an encrypted ciphertext of the information sequence to be transmitted, sending the obtained encrypted ciphertext into the mapping network, and sending the key stream to the client.
Further, the process of sending the encrypted information sequence to be transmitted to the mapping network for storage includes:
acquiring the states of all information transfer nodes in a mapping network, wherein the states of the information transfer nodes comprise an occupied state and an idle state;
selecting any idle information transfer node, and uploading the encrypted ciphertext to the information transfer node for storage; and acquiring the address of the information transfer node, and returning the address of the information transfer node to the client.
Further, the process of step four includes:
establishing an information receiving node according to an identification sequence associated with a client corresponding to an information receiving end; sending the obtained key stream and the address to an information receiving end, endowing the received address to an information receiving node by the information receiving end, and linking the information receiving node with a corresponding information storage node in a mapping network;
importing the encrypted ciphertext in the information storage node into the information receiving node;
obtaining a plaintext by reading a key stream in an information receiving end and carrying out XOR operation on the key stream and an encrypted ciphertext; reading the identification sequence and the original sequence in the plain text, and sending feedback information to the client associated with the identification sequence according to the read identification sequence.
Compared with the prior art, the invention has the beneficial effects that: the communication network composed of the local area network and the mapping network is established, so that the information required to be transmitted by a user is processed and encrypted in the local area network, the encrypted information content is sent into the mapping network, the information content required to be transmitted cannot be obtained by other people in the mapping network, meanwhile, when the information receiving end receives the encrypted information content in the mapping network, the information receiving node is used for carrying out transition between the client corresponding to the information receiving end and the mapping network, the encrypted information content is directly extracted by using the address received by the information receiving end, after extraction, the address information in the information receiving node is cleared, the encrypted ciphertext is decrypted in the information receiving end, and the confidentiality of the information receiving process is improved.
Drawings
Fig. 1 is a schematic diagram of the present invention.
Detailed Description
As shown in fig. 1, an information delivery method for a 5G communication environment includes the steps of:
the method comprises the following steps: constructing a communication network for information transfer based on the 5G communication environment;
step two: obtaining an admission authentication of the communication network so that a user obtains a right to enter the communication network;
step three: processing the information to be transmitted by the user and storing the processed information;
step four: an information receiving node is established to enable an information receiving end to obtain information content from within a communication network.
It should be further noted that, in the implementation process, the construction process of the communication network for information transfer includes:
utilizing a 5G communication environment to establish a local area network, setting n information storage nodes in the local area network, establishing a client associated with each information storage node according to each information storage node, randomly generating an identification sequence according to the association relationship between the information storage nodes and the client, and binding the identification sequence with the corresponding information storage nodes and the client;
establishing a mapping network linked with a local area network, wherein the mapping network comprises m information transfer nodes, and each information transfer node is provided with a unique address; it is further noted that, in the specific implementation process, m and n are both integers, and m > n;
and marking the established mapping network and the local area network to obtain a communication network for information transfer.
It should be further noted that, in the implementation process, before information is transferred, it is necessary to obtain admission authentication of the communication network, so that a user obtains an authority to enter the communication network, and the process of obtaining the admission authentication of the communication network includes:
setting an information registration port and an information login port in a client;
inputting personal basic information through the information registration port, and auditing the input personal basic information; it should be further noted that, in the implementation process, the personal basic information includes name, gender, age and mobile phone number of real-name authentication;
after the verification is passed, generating a login account and a login password according to the mobile phone number in the input personal basic information, and sending the generated login account and login password to the corresponding mobile phone terminal;
binding and associating an identification sequence related to the client with the login account;
the obtained login account and the login password are input into the information login port, so that the user can obtain the access authentication of the communication network, and after the user enters the communication network through the client for the first time, the permission of entering the communication network is obtained.
It should be further noted that, in the specific implementation process, after obtaining the admission authentication of entering the communication network and the authority of entering the communication network, the information content to be transferred is uploaded into the information storage node associated with the client through the client, the information receiving end to be transferred is selected, and then the information content uploaded into the information storage node is processed, so that the information content is transferred to the information storage node
The process of processing the information content required to be delivered by the user comprises the following steps:
marking information required to be transmitted by a user as original information, converting the original information into a data stream, acquiring a sequence forming the data stream, and marking the sequence forming the data stream as an original sequence; it should be further noted that, in the specific implementation process, the characters forming the original sequence are encoded into binary codes;
combining the identification sequence bound with the information storage node with the original sequence to obtain a new sequence, and marking the new sequence as an information sequence to be transmitted;
and after the online encryption of the information sequence to be transmitted is completed, the encrypted information sequence to be transmitted is sent to a mapping network for storage.
It should be further noted that, in the implementation process, the process of encrypting the information sequence to be transmitted online includes:
generating an initial key according to an identification sequence in an information sequence to be transmitted;
setting an initial vector C, acquiring the byte number of the initial vector, and recording the byte number of the initial vector as n, wherein n =256 in the specific implementation process;
setting a temporary vector L, and sequentially filling the initial keys into the temporary vector; it should be further noted that, in the implementation process, the number of bytes of the temporary vector is the same as that of the initial vector, and when the initial key is sequentially filled into the temporary vector, if the number of character codes of the initial vector is smaller than that of the temporary vector, rotation is performed, for example:
the initial key is 12138, and is filled into the temporary vector, which becomes 1213812138 … …, and so on, until all bytes are filled;
assigning the initial vector C according to the filled temporary vector;
scrambling the initial vector to obtain a random sequence of the initial vector, and generating a key stream according to the obtained random sequence;
and storing the key stream, carrying out XOR operation on the key stream and the information sequence to be transmitted to obtain an encrypted ciphertext of the information sequence to be transmitted, sending the obtained encrypted ciphertext into the mapping network, and sending the key stream to the client.
It should be further explained that, in the specific implementation process, the process of sending the encrypted information sequence to be transmitted to the mapping network for storage includes:
acquiring the state of each information transfer node in a mapping network; it should be further noted that, in the implementation process, the states of the information transfer node include an occupied state and an idle state;
selecting any idle information transfer node, uploading the encrypted ciphertext to the information transfer node for storage, and changing the state of the information transfer node into an occupied state;
and acquiring the address of the information transfer node, and returning the address of the information transfer node to the client.
The communication network composed of the local area network and the mapping network is established, so that the information required to be transmitted by a user is subjected to data processing and encryption in the local area network, and the encrypted information content is sent to the mapping network, so that the information content required to be transmitted cannot be obtained by others in the mapping network.
The specific process of the fourth step comprises the following steps:
establishing an information receiving node according to an identification sequence associated with a client corresponding to an information receiving end; sending the obtained key stream and the address to an information receiving end, endowing the received address to an information receiving node by the information receiving end, and linking the information receiving node with a corresponding information storage node in a mapping network;
importing the encrypted ciphertext in the information storage node into the information receiving node, and then updating the state of the corresponding information storage node into an idle state;
it should be further noted that, in the specific implementation process, after the information receiving node imports the encrypted ciphertext, the address given in the information receiving node is cleared;
obtaining a plaintext by reading a key stream in an information receiving end and carrying out XOR operation on the key stream and an encrypted ciphertext;
reading the identification sequence and the original sequence in the plain text, and sending feedback information to the client associated with the identification sequence according to the read identification sequence, namely the information is successfully transmitted.
When the information receiving end receives the encrypted information content in the mapping network, the information receiving node is used for transiting the client corresponding to the information receiving end and the mapping network, the address received by the information receiving end is used for directly extracting the encrypted information content, after extraction, the address information in the information receiving node is removed, the encrypted ciphertext is decrypted in the information receiving end, and the confidentiality of the information receiving process is improved.
Although the present invention has been described in detail with reference to the preferred embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the spirit and scope of the present invention.
Claims (8)
1. An information transfer method for a 5G communication environment, comprising the steps of:
the method comprises the following steps: constructing a communication network for information transfer based on the 5G communication environment;
step two: obtaining an admission authentication of the communication network so that a user obtains a right to enter the communication network;
step three: processing the information to be transmitted by the user and storing the processed information;
step four: an information receiving node is established to enable an information receiving end to obtain information content from within a communication network.
2. The information delivery method for 5G communication environment according to claim 1, wherein the construction process of the communication network for information delivery comprises:
utilizing a 5G communication environment to establish a local area network, setting n information storage nodes in the local area network, establishing a client associated with each information storage node according to each information storage node, randomly generating an identification sequence according to the association relationship between the information storage nodes and the client, and binding the identification sequence with the corresponding information storage nodes and the client;
and establishing a mapping network linked with the local area network, marking the established mapping network and the local area network, and obtaining a communication network for information transfer.
3. The information delivery method for a 5G communication environment according to claim 2, wherein the mapping network comprises m information delivery nodes, each information delivery node is provided with a unique address, and m > n.
4. An information transfer method for 5G communication environment according to claim 3, wherein the process of obtaining admission authentication of the communication network to enable the user to obtain the right to enter the communication network comprises:
setting an information registration port and an information login port in a client;
inputting personal basic information through the information registration port, and auditing the input personal basic information;
after the verification is passed, generating a login account and a login password, and sending the generated login account and login password to the corresponding mobile phone terminal;
binding and associating an identification sequence related to the client with the login account;
the obtained login account and the login password are input into the information login port, so that the user can obtain the access authentication of the communication network, and after the user enters the communication network through the client for the first time, the permission of entering the communication network is obtained.
5. The information delivery method for 5G communication environment according to claim 4, wherein the process of processing the information content required to be delivered by the user comprises:
marking information required to be transmitted by a user as original information, converting the original information into a data stream, acquiring a sequence forming the data stream, and marking the sequence forming the data stream as an original sequence;
combining the identification sequence bound with the information storage node with the original sequence to obtain an information sequence to be transmitted;
and after the online encryption of the information sequence to be transmitted is completed, the encrypted information sequence to be transmitted is sent to a mapping network for storage.
6. The information delivery method for 5G communication environment according to claim 5, wherein the process of encrypting the information sequence to be delivered online comprises:
generating an initial key according to an identification sequence in an information sequence to be transmitted;
setting an initial vector C, and acquiring the byte number of the initial vector;
setting a temporary vector L with the same byte number as the initial vector, and sequentially filling the initial key into the temporary vector;
assigning the initial vector C according to the filled temporary vector L;
scrambling the initial vector to obtain a random sequence of the initial vector, and generating a key stream according to the obtained random sequence;
and storing the key stream, carrying out XOR operation on the key stream and the information sequence to be transmitted to obtain an encrypted ciphertext of the information sequence to be transmitted, sending the obtained encrypted ciphertext into the mapping network, and sending the key stream to the client.
7. The information delivery method for 5G communication environment according to claim 6, wherein the process of sending the encrypted information sequence to be delivered to the mapping network for storage comprises:
acquiring the states of all information transfer nodes in a mapping network, wherein the states of the information transfer nodes comprise an occupied state and an idle state;
selecting any idle information transfer node, and uploading the encrypted ciphertext to the information transfer node for storage; and acquiring the address of the information transfer node, and returning the address of the information transfer node to the client.
8. The information delivery method for 5G communication environment according to claim 7, wherein the process of the fourth step comprises:
establishing an information receiving node according to an identification sequence associated with a client corresponding to an information receiving end; sending the obtained key stream and the address to an information receiving end, endowing the received address to an information receiving node by the information receiving end, and linking the information receiving node with a corresponding information storage node in a mapping network;
importing the encrypted ciphertext in the information storage node into the information receiving node;
obtaining a plaintext by reading a key stream in an information receiving end and carrying out XOR operation on the key stream and an encrypted ciphertext; reading the identification sequence and the original sequence in the plain text, and sending feedback information to the client associated with the identification sequence according to the read identification sequence.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211036840.4A CN115119200B (en) | 2022-08-29 | 2022-08-29 | Information transmission method for 5G communication environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211036840.4A CN115119200B (en) | 2022-08-29 | 2022-08-29 | Information transmission method for 5G communication environment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115119200A true CN115119200A (en) | 2022-09-27 |
CN115119200B CN115119200B (en) | 2022-11-22 |
Family
ID=83336389
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211036840.4A Active CN115119200B (en) | 2022-08-29 | 2022-08-29 | Information transmission method for 5G communication environment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115119200B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116319584A (en) * | 2023-03-24 | 2023-06-23 | 广东维信智联科技有限公司 | Data transmission method based on network layering |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1728665A (en) * | 2005-07-26 | 2006-02-01 | 华中科技大学 | Expandable storage system and control method based on objects |
AU2018339744A1 (en) * | 2017-09-30 | 2020-05-14 | Huawei Technologies Co., Ltd. | Method, apparatus, and system for security protection |
CN113923655A (en) * | 2020-12-23 | 2022-01-11 | 技象科技(浙江)有限公司 | Method and device for data decryption and reception based on adjacent nodes |
CN114039753A (en) * | 2021-10-27 | 2022-02-11 | 中国联合网络通信集团有限公司 | Access control method and device, storage medium and electronic equipment |
CN114584386A (en) * | 2022-03-11 | 2022-06-03 | 四川邦辰信息科技有限公司 | Global multistage encryption network communication method |
-
2022
- 2022-08-29 CN CN202211036840.4A patent/CN115119200B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1728665A (en) * | 2005-07-26 | 2006-02-01 | 华中科技大学 | Expandable storage system and control method based on objects |
AU2018339744A1 (en) * | 2017-09-30 | 2020-05-14 | Huawei Technologies Co., Ltd. | Method, apparatus, and system for security protection |
CN113923655A (en) * | 2020-12-23 | 2022-01-11 | 技象科技(浙江)有限公司 | Method and device for data decryption and reception based on adjacent nodes |
CN114039753A (en) * | 2021-10-27 | 2022-02-11 | 中国联合网络通信集团有限公司 | Access control method and device, storage medium and electronic equipment |
CN114584386A (en) * | 2022-03-11 | 2022-06-03 | 四川邦辰信息科技有限公司 | Global multistage encryption network communication method |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116319584A (en) * | 2023-03-24 | 2023-06-23 | 广东维信智联科技有限公司 | Data transmission method based on network layering |
CN116319584B (en) * | 2023-03-24 | 2023-12-01 | 广东维信智联科技有限公司 | Data transmission method based on network layering |
Also Published As
Publication number | Publication date |
---|---|
CN115119200B (en) | 2022-11-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113067699B (en) | Data sharing method and device based on quantum key and computer equipment | |
CN100533456C (en) | Security code production method and methods of using the same, and programmable device therefor | |
CN101662765B (en) | Encryption system and method of short message of mobile telephone | |
AU2008327506B2 (en) | Method and system for encryption of data | |
CN101677269B (en) | Method and system for transmitting keys | |
CN102223364A (en) | Method and system for accessing e-book data | |
CN112035827B (en) | Cipher data processing method, device, equipment and readable storage medium | |
CN110795762A (en) | Reserved format encryption method based on stream cipher | |
CN110365468B (en) | Anonymization processing method, device, equipment and storage medium | |
CN101179582A (en) | Method for securely communicating data between members of a group of mobile devices using a wireless channel. | |
CN110061967A (en) | Business datum providing method, device, equipment and computer readable storage medium | |
CN102684877A (en) | Method and device for carrying out user information processing | |
CN108471404A (en) | File sharing method, device, computer equipment and storage medium | |
CN113360936B (en) | Data analysis system based on block chain | |
CN106161224B (en) | Method for interchanging data, device and equipment | |
CN115119200B (en) | Information transmission method for 5G communication environment | |
CN104640091A (en) | Method for encryption communication of short message of mobile phone | |
CN1269648A (en) | Internal-core mode type encryption method and apparatus for computer telephone | |
EP1013031A2 (en) | Improved tri-signature security architecture systems and methods | |
WO2009064002A1 (en) | System for safely transmitting and/or managing file | |
CN114422230B (en) | Information transmission system based on data encryption | |
KR20230124207A (en) | Document sharing service server for managing document sharing service based on cloud, and the operating method thereof | |
CN100550083C (en) | The conversion method of character string and the generation of intelligent net service card and authentication method | |
CN112668353A (en) | Bargun authentication method, device, equipment and storage medium | |
CN115580840B (en) | SMS short message system based on security policy |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |