CN115119200B - Information transmission method for 5G communication environment - Google Patents

Information transmission method for 5G communication environment Download PDF

Info

Publication number
CN115119200B
CN115119200B CN202211036840.4A CN202211036840A CN115119200B CN 115119200 B CN115119200 B CN 115119200B CN 202211036840 A CN202211036840 A CN 202211036840A CN 115119200 B CN115119200 B CN 115119200B
Authority
CN
China
Prior art keywords
information
sequence
network
transmitted
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211036840.4A
Other languages
Chinese (zh)
Other versions
CN115119200A (en
Inventor
洪金萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Huicheng Zhilian Technology Co ltd
Original Assignee
Shenzhen Huicheng Zhilian Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Huicheng Zhilian Technology Co ltd filed Critical Shenzhen Huicheng Zhilian Technology Co ltd
Priority to CN202211036840.4A priority Critical patent/CN115119200B/en
Publication of CN115119200A publication Critical patent/CN115119200A/en
Application granted granted Critical
Publication of CN115119200B publication Critical patent/CN115119200B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses an information transmission method for a 5G communication environment, which relates to the technical field of communication, and is characterized in that a communication network consisting of a local area network and a mapping network is established, so that information required to be transmitted by a user is subjected to data processing and encryption processes in the local area network, the encrypted information content is sent to the mapping network, the information content required to be transmitted cannot be obtained by others in the mapping network, meanwhile, when an information receiving end receives the encrypted information content in the mapping network, an information receiving node is utilized to make transition between a client corresponding to the information receiving end and the mapping network, the encrypted information content is directly extracted by utilizing an address received by the information receiving end, after extraction, address information in the information receiving node is cleared, an encrypted ciphertext is decrypted in the information receiving end, and the confidentiality of the information receiving process is improved.

Description

Information transmission method for 5G communication environment
Technical Field
The invention relates to the technical field of communication, in particular to an information transmission method for a 5G communication environment.
Background
The computer network functions mainly include resource sharing, rapid data information transmission, reliability improvement, load balancing and distributed processing capacity provision, centralized management and comprehensive information service provision; the functions can be abstractly summarized as follows: three parts of information flow transmission, information processing of network key nodes or node clusters and network performance optimization are adopted;
in the process of transmitting information flow in a network node, information content is easy to be attacked or stolen, so that the information content is leaked, and how to increase the confidentiality of information in the transmission process is a problem to be solved.
Disclosure of Invention
The invention aims to provide an information transfer method for a 5G communication environment.
The purpose of the invention can be realized by the following technical scheme: an information delivery method for a 5G communication environment, comprising the steps of:
the method comprises the following steps: constructing a communication network for information transfer based on the 5G communication environment;
step two: obtaining an admission authentication of the communication network so that a user obtains a right to enter the communication network;
step three: processing the information to be transmitted by the user and storing the processed information;
step four: an information receiving node is established to enable an information receiving end to obtain information content from within a communication network.
Further, the process of constructing the communication network for information transfer includes:
utilizing a 5G communication environment to establish a local area network, setting n information storage nodes in the local area network, establishing a client associated with each information storage node according to each information storage node, randomly generating an identification sequence according to the association relationship between the information storage nodes and the client, and binding the identification sequence with the corresponding information storage nodes and the client;
and establishing a mapping network linked with the local area network, marking the established mapping network and the local area network, and obtaining a communication network for information transfer.
Furthermore, the mapping network comprises m information transfer nodes, each information transfer node is provided with a unique address, and m is greater than n.
Further, the process of obtaining an admission authentication of the communication network for a user to gain access to the communication network comprises:
setting an information registration port and an information login port in a client;
inputting personal basic information through the information registration port, and auditing the input personal basic information;
after the verification is passed, generating a login account and a login password, and sending the generated login account and login password to the corresponding mobile phone terminal;
binding and associating an identification sequence related to a client with a login account;
the obtained login account and the login password are input to the information login port, so that the user can obtain the access authentication of the communication network, and after the user enters the communication network through the client for the first time, the user can obtain the permission to enter the communication network.
Further, the process of processing the information content that the user needs to deliver includes:
marking information required to be transmitted by a user as original information, converting the original information into a data stream, acquiring a sequence forming the data stream, and marking the sequence forming the data stream as an original sequence;
combining the identification sequence bound with the information storage node with the original sequence to obtain an information sequence to be transmitted;
and after the online encryption of the information sequence to be transmitted is completed, the encrypted information sequence to be transmitted is sent to a mapping network for storage.
Further, the process of encrypting the information sequence to be transmitted on line includes:
generating an initial key according to an identification sequence in an information sequence to be transmitted;
setting an initial vector C, and acquiring the byte number of the initial vector;
setting a temporary vector L with the same byte number as the initial vector, and sequentially filling the initial key into the temporary vector;
assigning the initial vector C according to the filled temporary vector L;
scrambling the initial vector to obtain a random sequence of the initial vector, and generating a key stream according to the obtained random sequence;
and storing the key stream, carrying out XOR operation on the key stream and the information sequence to be transmitted to obtain an encrypted ciphertext of the information sequence to be transmitted, sending the obtained encrypted ciphertext into a mapping network, and sending the key stream to a client.
Further, the process of sending the encrypted information sequence to be transmitted to the mapping network for storage includes:
acquiring the states of all information transfer nodes in a mapping network, wherein the states of the information transfer nodes comprise an occupied state and an idle state;
selecting any idle information transfer node, and uploading the encrypted ciphertext to the information transfer node for storage; and acquiring the address of the information transfer node, and returning the address of the information transfer node to the client.
Further, the process of the fourth step includes:
establishing an information receiving node according to an identification sequence associated with a client corresponding to an information receiving end; the obtained key stream and the address are sent to an information receiving end, the information receiving end gives the received address to an information receiving node, and the information receiving node is linked with a corresponding information storage node in the mapping network;
importing the encrypted ciphertext in the information storage node into the information receiving node;
obtaining a plaintext by reading a key stream in an information receiving end and carrying out XOR operation on the key stream and an encrypted ciphertext; reading the identification sequence and the original sequence in the plain text, and sending feedback information to the client associated with the identification sequence according to the read identification sequence.
Compared with the prior art, the invention has the beneficial effects that: the communication network composed of the local area network and the mapping network is established, so that the information required to be transmitted by a user is processed and encrypted in the local area network, the encrypted information content is sent into the mapping network, the information content required to be transmitted cannot be obtained by other people in the mapping network, meanwhile, when the information receiving end receives the encrypted information content in the mapping network, the information receiving node is used for carrying out transition between the client corresponding to the information receiving end and the mapping network, the encrypted information content is directly extracted by using the address received by the information receiving end, after extraction, the address information in the information receiving node is cleared, the encrypted ciphertext is decrypted in the information receiving end, and the confidentiality of the information receiving process is improved.
Drawings
Fig. 1 is a schematic diagram of the present invention.
Detailed Description
As shown in fig. 1, an information delivery method for a 5G communication environment includes the steps of:
the method comprises the following steps: constructing a communication network for information transfer based on the 5G communication environment;
step two: obtaining admission authentication of a communication network so that a user obtains permission to enter the communication network;
step three: processing the information to be transmitted by the user and storing the processed information;
step four: an information receiving node is established to enable an information receiving end to obtain information content from within a communication network.
It should be further noted that, in the implementation process, the construction process of the communication network for information transfer includes:
utilizing a 5G communication environment to establish a local area network, setting n information storage nodes in the local area network, establishing a client associated with each information storage node according to each information storage node, randomly generating an identification sequence according to the association relationship between the information storage nodes and the client, and binding the identification sequence with the corresponding information storage nodes and the client;
establishing a mapping network linked with a local area network, wherein the mapping network comprises m information transfer nodes, and each information transfer node is provided with a unique address; it is further noted that, in the specific implementation process, m and n are integers, and m > n;
and marking the established mapping network and the local area network to obtain a communication network for information transfer.
It should be further noted that, in the implementation process, before information is transferred, it is necessary to obtain admission authentication of the communication network, so that a user obtains an authority to enter the communication network, and the process of obtaining the admission authentication of the communication network includes:
setting an information registration port and an information login port in a client;
inputting personal basic information through the information registration port, and auditing the input personal basic information; it should be further noted that, in the implementation process, the personal basic information includes name, gender, age and mobile phone number of real-name authentication;
after the verification is passed, generating a login account and a login password according to the mobile phone number in the input personal basic information, and sending the generated login account and login password to the corresponding mobile phone terminal;
binding and associating an identification sequence related to the client with the login account;
the obtained login account and the login password are input into the information login port, so that the user can obtain the access authentication of the communication network, and after the user enters the communication network through the client for the first time, the permission of entering the communication network is obtained.
It should be further noted that, in the specific implementation process, after obtaining the admission authentication for entering the communication network and the authority for entering the communication network, the information content to be transferred is uploaded to the information storage node associated with the client through the client, the information receiving end to be transferred is selected, and then the information content uploaded to the information storage node is processed, so that the information storage node is configured to perform the method for transferring the information content to the information storage node
The process of processing the information content required to be delivered by the user comprises the following steps:
marking information required to be transmitted by a user as original information, converting the original information into a data stream, acquiring a sequence forming the data stream, and marking the sequence forming the data stream as an original sequence; it should be further noted that, in the specific implementation process, the characters constituting the original sequence are coded into binary codes;
combining the identification sequence bound with the information storage node with the original sequence to obtain a new sequence, and marking the new sequence as an information sequence to be transmitted;
and after the online encryption of the information sequence to be transmitted is completed, the encrypted information sequence to be transmitted is sent to a mapping network for storage.
It should be further noted that, in the specific implementation process, the process of encrypting the information sequence to be transmitted online includes:
generating an initial key according to an identification sequence in an information sequence to be transmitted;
setting an initial vector C, acquiring the byte number of the initial vector, and recording the byte number of the initial vector as n, wherein n =256 in the specific implementation process;
setting a temporary vector L, and sequentially filling the initial keys into the temporary vector; it should be further noted that, in the specific implementation process, the number of bytes of the temporary vector is the same as that of the initial vector, and when the initial key is sequentially filled into the temporary vector, if the number of character codes of the initial vector is less than the number of bytes of the temporary vector, rotation is performed, for example:
if the initial key is 12138, the temporary vector is filled with the initial key, which becomes 1213812138 \8230, 8230, and so on, until all bytes are filled;
assigning the initial vector C according to the filled temporary vector;
scrambling the initial vector to obtain a random sequence of the initial vector, and generating a key stream according to the obtained random sequence;
and storing the key stream, carrying out XOR operation on the key stream and the information sequence to be transmitted to obtain an encrypted ciphertext of the information sequence to be transmitted, sending the obtained encrypted ciphertext into the mapping network, and sending the key stream to the client.
It should be further noted that, in the specific implementation process, the process of sending the encrypted information sequence to be transmitted to the mapping network for storage includes:
acquiring the state of each information transfer node in a mapping network; it should be further noted that, in the implementation process, the states of the information transfer node include an occupied state and an idle state;
selecting any idle information transfer node, uploading the encrypted ciphertext to the information transfer node for storage, and changing the state of the information transfer node into an occupied state;
and acquiring the address of the information transfer node, and returning the address of the information transfer node to the client.
The communication network composed of the local area network and the mapping network is established, so that the information required to be transmitted by a user is subjected to data processing and encryption in the local area network, and the encrypted information content is sent to the mapping network, so that the information content required to be transmitted cannot be obtained by others in the mapping network.
The specific process of the fourth step comprises the following steps:
establishing an information receiving node according to an identification sequence associated with a client corresponding to an information receiving end; sending the obtained key stream and the address to an information receiving end, endowing the received address to an information receiving node by the information receiving end, and linking the information receiving node with a corresponding information storage node in a mapping network;
importing the encrypted ciphertext in the information storage node into the information receiving node, and then updating the state of the corresponding information storage node into an idle state;
it should be further noted that, in the specific implementation process, after the information receiving node imports the encrypted ciphertext, the address assigned in the information receiving node is cleared;
obtaining a plaintext by reading a key stream in an information receiving end and carrying out XOR operation on the key stream and an encrypted ciphertext;
reading the identification sequence and the original sequence in the plain text, and sending feedback information to the client associated with the identification sequence according to the read identification sequence, namely the information is successfully transmitted.
When the information receiving end receives the encrypted information content in the mapping network, the information receiving node is used for transiting the client corresponding to the information receiving end and the mapping network, the address received by the information receiving end is used for directly extracting the encrypted information content, after extraction, the address information in the information receiving node is removed, the encrypted ciphertext is decrypted in the information receiving end, and the confidentiality of the information receiving process is improved.
Although the present invention has been described in detail with reference to the preferred embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the spirit and scope of the present invention.

Claims (1)

1. An information transfer method for a 5G communication environment, comprising the steps of:
the method comprises the following steps: constructing a communication network for information transfer based on the 5G communication environment;
step two: obtaining admission authentication of a communication network so that a user obtains permission to enter the communication network;
step three: processing the information to be transmitted by the user and storing the processed information;
step four: establishing an information receiving node so that an information receiving end obtains information content from a communication network;
the construction process of the communication network for information transfer comprises the following steps:
utilizing a 5G communication environment to establish a local area network, setting n information storage nodes in the local area network, establishing a client associated with each information storage node according to each information storage node, randomly generating an identification sequence according to the association relationship between the information storage nodes and the client, and binding the identification sequence with the corresponding information storage nodes and the client;
establishing a mapping network linked with a local area network, marking the established mapping network and the local area network, and obtaining a communication network for information transmission;
the mapping network comprises m information transfer nodes, each information transfer node is provided with a unique address, and m is greater than n;
the process of obtaining an admission authentication for a communication network to enable a user to gain access to the communication network comprises:
setting an information registration port and an information login port in a client;
inputting personal basic information through the information registration port, and auditing the input personal basic information;
after the verification is passed, generating a login account and a login password, and sending the generated login account and login password to the corresponding mobile phone terminal;
binding and associating an identification sequence related to a client with a login account;
inputting the obtained login account and the login password into an information login port to enable a user to obtain the access authentication of the communication network, and obtaining the permission of entering the communication network after the user enters the communication network through a client for the first time;
the process of processing the information content required to be delivered by the user comprises the following steps:
marking information required to be transmitted by a user as original information, converting the original information into a data stream, acquiring a sequence forming the data stream, and marking the sequence forming the data stream as an original sequence;
combining the identification sequence bound with the information storage node with the original sequence to obtain an information sequence to be transmitted;
the method comprises the steps that an information sequence to be transmitted is encrypted on line, and after the information sequence to be transmitted is encrypted on line, the encrypted information sequence to be transmitted is sent to a mapping network for storage;
the process of encrypting the information sequence to be transmitted on line comprises the following steps:
generating an initial key according to an identification sequence in an information sequence to be transmitted;
setting an initial vector C, and acquiring the byte number of the initial vector;
setting a temporary vector L with the same byte number as the initial vector, and sequentially filling the initial secret keys into the temporary vector;
assigning the initial vector C according to the filled temporary vector L;
scrambling the initial vector to obtain a random sequence of the initial vector, and generating a key stream according to the obtained random sequence;
storing the key stream, carrying out XOR operation on the key stream and the information sequence to be transmitted to obtain an encrypted ciphertext of the information sequence to be transmitted, sending the obtained encrypted ciphertext into a mapping network, and sending the key stream to a client;
the process of sending the encrypted information sequence to be transmitted to the mapping network for storage comprises the following steps:
acquiring the states of all information transfer nodes in a mapping network, wherein the states of the information transfer nodes comprise an occupied state and an idle state;
selecting any idle information transfer node, and uploading the encrypted ciphertext to the information transfer node for storage; acquiring an address of an information transfer node, and returning the address of the information transfer node to the client;
the process of the fourth step comprises the following steps:
establishing an information receiving node according to an identification sequence associated with a client corresponding to an information receiving end; the obtained key stream and the address are sent to an information receiving end, the information receiving end gives the received address to an information receiving node, and the information receiving node is linked with a corresponding information storage node in the mapping network;
importing the encrypted ciphertext in the information storage node into the information receiving node;
obtaining a plaintext by reading a key stream in an information receiving end and carrying out XOR operation on the key stream and an encrypted ciphertext; reading the identification sequence and the original sequence in the plain text, and sending feedback information to the client associated with the identification sequence according to the read identification sequence.
CN202211036840.4A 2022-08-29 2022-08-29 Information transmission method for 5G communication environment Active CN115119200B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211036840.4A CN115119200B (en) 2022-08-29 2022-08-29 Information transmission method for 5G communication environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211036840.4A CN115119200B (en) 2022-08-29 2022-08-29 Information transmission method for 5G communication environment

Publications (2)

Publication Number Publication Date
CN115119200A CN115119200A (en) 2022-09-27
CN115119200B true CN115119200B (en) 2022-11-22

Family

ID=83336389

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211036840.4A Active CN115119200B (en) 2022-08-29 2022-08-29 Information transmission method for 5G communication environment

Country Status (1)

Country Link
CN (1) CN115119200B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116319584B (en) * 2023-03-24 2023-12-01 广东维信智联科技有限公司 Data transmission method based on network layering

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114039753A (en) * 2021-10-27 2022-02-11 中国联合网络通信集团有限公司 Access control method and device, storage medium and electronic equipment

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100367727C (en) * 2005-07-26 2008-02-06 华中科技大学 Expandable storage system and control method based on objects
CN109362108B (en) * 2017-09-30 2019-11-01 华为技术有限公司 A kind of methods, devices and systems of safeguard protection
CN113923655B (en) * 2020-12-23 2023-08-25 技象科技(南京)有限公司 Data decryption receiving method and device based on adjacent nodes
CN114584386B (en) * 2022-03-11 2023-02-17 四川邦辰信息科技有限公司 Global multistage encryption network communication method

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114039753A (en) * 2021-10-27 2022-02-11 中国联合网络通信集团有限公司 Access control method and device, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN115119200A (en) 2022-09-27

Similar Documents

Publication Publication Date Title
US10979221B2 (en) Generation of keys of variable length from cryptographic tables
CN101662765B (en) Encryption system and method of short message of mobile telephone
AU2008327506B2 (en) Method and system for encryption of data
CN101677269B (en) Method and system for transmitting keys
CN110795762B (en) Reserved format encryption method based on stream cipher
CN113067699B (en) Data sharing method and device based on quantum key and computer equipment
CN102223364A (en) Method and system for accessing e-book data
CN108471404A (en) File sharing method, device, computer equipment and storage medium
CN102684877A (en) Method and device for carrying out user information processing
CN110061967A (en) Business datum providing method, device, equipment and computer readable storage medium
CN110365468B (en) Anonymization processing method, device, equipment and storage medium
CN115119200B (en) Information transmission method for 5G communication environment
CN104640091A (en) Method for encryption communication of short message of mobile phone
CN109995739A (en) A kind of information transferring method, client, server and storage medium
US6088449A (en) Tri-signature security architecture systems and methods
CN1269648A (en) Internal-core mode type encryption method and apparatus for computer telephone
CN1615036A (en) Electronic paymenting service system and realizing method based on fixed telephone net short message
WO2009064002A1 (en) System for safely transmitting and/or managing file
KR20230124207A (en) Document sharing service server for managing document sharing service based on cloud, and the operating method thereof
Bachrach et al. # h00t: Censorship resistant microblogging
Ramtri et al. Secure banking transactions using RSA and two fish algorithms
WO2006075339A1 (en) Method and system for secure authentication and data exchange in client server architecture
CN100550083C (en) The conversion method of character string and the generation of intelligent net service card and authentication method
CN115580840B (en) SMS short message system based on security policy
CN117057804B (en) Financial transaction data secure storage method and system based on hash sequence

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant