CN116366249A - Interactive communication system based on digital information - Google Patents
Interactive communication system based on digital information Download PDFInfo
- Publication number
- CN116366249A CN116366249A CN202310636288.0A CN202310636288A CN116366249A CN 116366249 A CN116366249 A CN 116366249A CN 202310636288 A CN202310636288 A CN 202310636288A CN 116366249 A CN116366249 A CN 116366249A
- Authority
- CN
- China
- Prior art keywords
- data
- digital information
- module
- transmission
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000004891 communication Methods 0.000 title claims abstract description 18
- 230000002452 interceptive effect Effects 0.000 title claims abstract description 13
- 230000005540 biological transmission Effects 0.000 claims abstract description 80
- 238000012545 processing Methods 0.000 claims abstract description 16
- 238000000034 method Methods 0.000 claims description 24
- 239000002699 waste material Substances 0.000 abstract description 4
- 230000003993 interaction Effects 0.000 abstract description 2
- 238000005516 engineering process Methods 0.000 description 3
- 238000003780 insertion Methods 0.000 description 3
- 230000037431 insertion Effects 0.000 description 3
- 238000012795 verification Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000002457 bidirectional effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Communication Control (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses an interactive communication system based on digital information, which relates to the technical field of data interaction and comprises a management and control center, wherein the management and control center is in communication connection with a data processing module, a data sending module, a transmission judging module and a data receiving module, and the data processing module is used for converting data to be transmitted into digital information; the data transmitting module is used for encrypting the digital information and transmitting the digital information to the data receiving module; the transmission judgment module is used for judging whether to execute the sending or receiving operation; the data processing module is used for receiving the digital information from the data sending module; the invention avoids the unnecessary waste of system resources and storage space caused by the repeated transmission of the same kind of data under the condition that the user has transmitted the same kind of data; and meanwhile, the data security protection capability of the system is improved.
Description
Technical Field
The invention relates to the technical field of data interaction, in particular to an interactive communication system based on digital information.
Background
Along with the continuous development of communication technology, the application of digital information is more and more extensive, and the requirements on the digital information transmission technology and confidentiality are higher and higher, and the traditional digital information transmission technology ignores the step of checking whether the two transmission parties send or accept the same digital information in the transmission process, so that the waste of storage resources of a system is caused and the transmission efficiency is reduced; and how to improve the confidentiality of digital information in the transmission process is always a concern at present, so that an interactive communication system based on digital information is provided.
Disclosure of Invention
The interactive communication system based on the digital information comprises a management and control center, wherein the management and control center is in communication connection with a data processing module, a data sending module, a transmission judging module and a data receiving module;
the data processing module is used for converting data to be transmitted into digital information;
the data transmission module is used for encrypting the digital information;
the transmission judgment module is used for judging whether to execute the sending or receiving operation;
the data receiving module is used for receiving the digital information from the data transmitting module.
Further, the process of converting the transmitted data into digital information includes:
the data processing module acquires data to be transmitted from the database, classifies the data into three types of document data, audio data and image data based on the types of the data, and numbers the data;
and converting various kinds of data into preset UTF-8 character codes, further converting the preset UTF-8 character codes into binary codes, further converting the various kinds of data into corresponding digital information, randomly generating a string of 8-bit digital sequences, and combining the digital sequences with the numbers of the data based on the numbers of the data.
Further, the process of encrypting the digital information by the data sending module comprises the following steps:
the data transmitting module divides the digital information into a plurality of character strings with equal length, and dynamically selects the reverse positions of the character strings according to the lengths of the character strings and the total number of the character strings;
after the character string is reversed, the data sending module encrypts a request to the character string of the data receiving module, and after the data receiving module responds to the request, the data sending module sends a string of password character strings, wherein the password character strings are binary codes with random lengths.
Further, the method for encrypting the digital information according to the data type corresponding to the digital information comprises the following steps:
if the data corresponding to the digital information is document data, encrypting the reversed character string and the password character string in a staggered mode, namely, starting from the first bit of the reversed character string, inserting characters in one password character string behind the characters every other bit of characters until all characters in the password character string are inserted into the reversed character string;
if the data corresponding to the digital information is image data, encrypting the reversed character string and the password character string in a staggered replacement mode, namely, starting from the first character of the reversed character string, replacing the characters in one password character string every other character until all the characters in the password character string are replaced into the reversed character string;
if the data corresponding to the digital information is audio data, the password character string is directly inserted into the end of the reversed character string.
Further, the process of deciding the transmission request of the transmission decision module includes:
the transmission judgment module acquires a data transmission record from the database, and judges whether the data transmission module transmits encrypted digital information and an encrypted number in a transmission request or not according to the data transmission record;
if the encrypted digital information and the encrypted number in the transmitted request are judged, the transmission judgment module acquires the data receiving record of the data receiving module from the database, and judges whether the data receiving module receives the encrypted digital information and the encrypted number in the transmission application according to the data receiving record;
if the judging data receiving module has received the encrypted digital information and the encrypted serial number, the transmission judging module refuses the transmission application;
if the judging data receiving module does not receive the encrypted digital information and the encrypted serial number, the transmission judging module applies for transmission;
if the encrypted digital information and the encrypted number in the transmission request are judged not to be sent, the transmission judgment module applies for the transmission.
Further, the process of the data receiving module receiving the digital information includes:
the data receiving module decrypts the encrypted number by using the private key, acquires the number corresponding to the encrypted digital information from the database, compares the decrypted number with the number acquired from the database,
if the comparison result is consistent with the comparison result, the data receiving module receives the encrypted digital information, generates a data receiving record based on the decrypted number and sends the data receiving record to the database;
if the comparison results are inconsistent, the data receiving module refuses the encrypted digital information transmission, and requests the data sending module to encrypt and transmit the digital information again;
the data receiving module receives the encrypted digital information, sequentially decrypts the encrypted digital information twice according to the encryption process in the encryption log, and converts the digital information into corresponding data based on preset UTF-8 character codes after decryption is finished.
Compared with the prior art, the invention has the beneficial effects that:
the two-way transmission verification is carried out on the sender and the receiver before the digital information transmission, so that the situation that users repeatedly transmit the same kind of data under the condition that the users already transmit the same kind of data is avoided, and unnecessary waste of system resources and storage space is caused;
and verifying the number corresponding to the transmitted digital information, further judging whether the received digital information is correct, encrypting the digital information by adopting a randomly generated password character string, reducing the condition that the system receives false digital information and the confidentiality of the data information to a certain extent, and further improving the data security protection capability of the system.
Drawings
Fig. 1 is a schematic diagram of the present invention.
Detailed Description
As shown in fig. 1, an interactive communication system based on digital information comprises a management and control center and a database, wherein the management and control center is in communication connection with a data processing module, a data sending module, a transmission judging module and a data receiving module;
the database is used for storing data generated by each module, and a user can upload the data to be transmitted to the database;
the data processing module is used for converting data to be transmitted into digital information, and the specific process comprises the following steps:
the data processing module obtains the data to be transmitted from the database, classifies the data into three types of document data, audio data and image data based on the types of the data, and numbers the data, wherein the document data is numbered A 1 、A 2 、A 3 、……、A n The audio data number is B 1 、B 2 、B 3 、……、B n The image data number is C 1 、C 2 、C 3 、……、C n N is a natural number greater than 1;
further, the data processing module converts various kinds of data into preset UTF-8 character codes, further converts the codes into binary codes, and further converts the various kinds of data into corresponding digital information;
it should be noted that, when a string of data is converted into a preset UTF-8 character code, the data processing module will randomly generate a string of 8-bit digital sequences at the same time, and combine the digital sequences with the numbers of the data based on the numbers of the data, for example, a new number a corresponding to the digital information of the audio data 1 12345678 binding the new number with the converted data information, transmitting the new number to the database, and setting it as the corresponding data in the databaseNumbering, wherein each digital information corresponds to a unique digital sequence;
the data processing module sends the digital information and the new number to the data sending module.
The data transmitting module is used for encrypting the digital information and transmitting the digital information to the data receiving module, and the specific process comprises the following steps:
after receiving the digital information and the new number from the data processing module, the data sending module sends a number encryption request to the data receiving module, and after receiving the response and the public key of the data receiving module, the data sending module encrypts the new number by using the public key;
further, the digital information is encrypted, and the encryption process comprises:
the method comprises the steps of first encryption, dividing digital information into N character strings with equal length by a data sending module, and dynamically selecting the reverse positions of the character strings according to the length L of the character strings and the number N of the total character strings, wherein the calculation process of the reverse digits X of the character strings comprises the following steps: s=an 2 +bL, wherein a, b E (0, 1), a, b are dynamically selected by the data transmission module and a is smaller than b, the string inversion number X is the integer number of S, and the string inversion number X is inverted from the X bits of the string based on the string inversion number X;
after the second encryption and the reversal of the character string are finished, the data sending module sends a character string encryption request to the data receiving module, and after the data receiving module responds to the request, a string of password character strings is sent to the data sending module, wherein the password character strings are binary codes with random lengths;
after the data sending module receives the password character string, different encryption methods are adopted based on the data type corresponding to the digital information;
if the data corresponding to the digital information is document data, encrypting the reversed character string and the password character string in a staggered manner, namely, inserting characters in one password character string behind the characters every other one character from the first bit of the reversed character string until all the characters in the password character string are inserted into the reversed character string, for example, one string of reversed character string is 0000000 and the password character string is 1111, and encrypting in a staggered manner to obtain a result 01010101000;
if the data corresponding to the digital information is image data, encrypting the reversed character string and the password character string in a staggered replacement mode, namely, starting from the first character of the reversed character string, replacing each one character with a character in the password character string until all characters in the password character string are replaced in the reversed character string, for example, one string of reversed character string is 00000000 and the password character string is 1111, and encrypting in a staggered replacement mode to obtain the result of 01010101;
if the data corresponding to the digital information is audio data, the password character string is directly inserted into the last bit of the reversed character string, for example, the reversed character string is 000000, the password character string is 1111, and the result of encryption by adopting a direct insertion mode is 0000001111;
the method comprises the steps that all character strings are integrated to obtain encrypted digital information, the encrypted digital information is bound with an encrypted number, a data sending module automatically generates an encrypted log based on an encryption process and sends the encrypted log to a database, meanwhile, a transmission request is sent to a transmission judging module, if the transmission request passes, the encrypted digital information and the encrypted number are sent to a data receiving module to generate a data transmission record, and the data transmission record is uploaded to the database;
the encrypted log includes the reverse number of bits of the first encryption and the insertion mode and the insertion position of the password string of the second encryption.
The transmission judgment module is used for judging whether to execute the sending or receiving operation, and the specific process comprises the following steps:
after receiving a transmission request from the data transmission module, the transmission judgment module acquires a data transmission record of the data transmission module from the database, and judges whether the data transmission module transmits encrypted digital information and an encrypted number in the transmission request according to the data transmission record;
if the encrypted digital information and the encrypted number in the transmitted request are judged, the transmission judgment module acquires the data receiving record of the data receiving module from the database, and judges whether the data receiving module receives the encrypted digital information and the encrypted number in the transmission application according to the data receiving record;
if the judging data receiving module has received the encrypted digital information and the encrypted serial number, the transmission judging module refuses the transmission application;
if the judging data receiving module does not receive the encrypted digital information and the encrypted serial number, the transmission judging module applies for transmission;
if the encrypted digital information and the encrypted serial number in the transmission request are judged not to be sent, the transmission judgment module applies for the transmission;
the transmission judgment module performs bidirectional transmission verification on the data sending module and the data receiving module, so that unnecessary waste of system resources and storage space is avoided due to the fact that users repeatedly transmit similar data under the condition that the similar data are transmitted.
The data receiving module is used for receiving the digital information from the data sending module, and the specific process comprises the following steps:
after receiving the serial number decryption application from the data sending module, the data receiving module randomly generates a pair of public key and private key and sends the public key to the data sending module;
the data receiving module randomly sends a string of password character strings to the data sending module every time the data receiving module receives a character string encryption application from the data sending module;
for the encrypted digital information and the encrypted number from the data sending module, the data receiving module decrypts the encrypted number by using a private key, and simultaneously acquires the number corresponding to the encrypted digital information from the database, and compares the decrypted number with the number acquired from the database;
if the comparison result is consistent with the comparison result, the data receiving module receives the encrypted digital information, generates a data receiving record based on the decrypted number and sends the data receiving record to the database;
if the comparison results are inconsistent, the data receiving module refuses the encrypted digital information transmission, and requests the data sending module to encrypt and transmit the digital information again;
further, the data receiving module receives the encrypted digital information, acquires a corresponding encrypted log from the database, sequentially decrypts the encrypted digital information twice according to the encryption process in the encrypted log, and converts the digital information into corresponding data based on a preset UTF-8 character code after decryption is finished;
the number corresponding to the digital information is verified, so that whether the received digital information is correct or not is judged, the data receiving module encrypts the digital information by adopting a randomly generated password character string, the condition that the data receiving module receives false digital information and the confidentiality of the data information are reduced to a certain extent, and the data security protection capability of the system is improved.
The above embodiments are only for illustrating the technical method of the present invention and not for limiting the same, and it should be understood by those skilled in the art that the technical method of the present invention may be modified or substituted without departing from the spirit and scope of the technical method of the present invention.
Claims (6)
1. The interactive communication system based on the digital information comprises a management and control center, and is characterized in that the management and control center is in communication connection with a data processing module, a data sending module, a transmission judging module and a data receiving module;
the data processing module is used for converting data to be transmitted into digital information;
the data transmission module is used for encrypting the digital information;
the transmission judgment module is used for judging whether to execute the sending or receiving operation;
the data receiving module is used for receiving the digital information from the data transmitting module.
2. An interactive communication system based on digital information according to claim 1 wherein the process of converting the transmitted data into digital information comprises:
the data processing module acquires data to be transmitted from the database, classifies the data into three types of document data, audio data and image data based on the types of the data, and numbers the data;
and converting various kinds of data into preset UTF-8 character codes, further converting the preset UTF-8 character codes into binary codes, further converting the various kinds of data into corresponding digital information, randomly generating a string of 8-bit digital sequences, and combining the digital sequences with the numbers of the data based on the numbers of the data.
3. The interactive communication system according to claim 2, wherein the process of encrypting the digital information by the data transmission module comprises:
the data transmitting module divides the digital information into a plurality of character strings with equal length, and dynamically selects the reverse positions of the character strings according to the lengths of the character strings and the total number of the character strings;
after the character string is reversed, the data sending module sends a character string encryption request to the data receiving module, and after the data receiving module responds to the request, the data sending module sends a string of password character strings, wherein the password character strings are binary codes with random lengths.
4. A digital information based interactive communication system according to claim 3, wherein the use of different encryption methods according to the data type corresponding to the digital information comprises:
if the data corresponding to the digital information is document data, encrypting the reversed character string and the password character string in a staggered mode, namely, starting from the first bit of the reversed character string, inserting characters in one password character string behind the characters every other bit of characters until all characters in the password character string are inserted into the reversed character string;
if the data corresponding to the digital information is image data, encrypting the reversed character string and the password character string in a staggered replacement mode, namely, starting from the first character of the reversed character string, replacing the characters in one password character string every other character until all the characters in the password character string are replaced into the reversed character string;
if the data corresponding to the digital information is audio data, the password character string is directly inserted into the last bit of the reversed character string.
5. The interactive communication system according to claim 4, wherein said transmission decision module decides a transmission request comprising:
the transmission judgment module acquires a data transmission record from the database, and judges whether the data transmission module transmits encrypted digital information and an encrypted number in a transmission request or not according to the data transmission record;
if the encrypted digital information and the encrypted number in the transmitted request are judged, the transmission judgment module acquires the data receiving record of the data receiving module from the database, and judges whether the data receiving module receives the encrypted digital information and the encrypted number in the transmission application according to the data receiving record;
if the judging data receiving module has received the encrypted digital information and the encrypted serial number, the transmission judging module refuses the transmission application;
if the judging data receiving module does not receive the encrypted digital information and the encrypted serial number, the transmission judging module applies for transmission;
if the encrypted digital information and the encrypted number in the transmission request are judged not to be sent, the transmission judgment module applies for the transmission.
6. The interactive communication system according to claim 5, wherein said data accepting module accepts digital information comprising:
the data receiving module decrypts the encrypted number by using the private key, acquires the number corresponding to the encrypted digital information from the database, compares the decrypted number with the number acquired from the database,
if the comparison result is consistent with the comparison result, the data receiving module receives the encrypted digital information, generates a data receiving record based on the decrypted number and sends the data receiving record to the database;
if the comparison results are inconsistent, the data receiving module refuses the encrypted digital information transmission, and requests the data sending module to encrypt and transmit the digital information again;
the data receiving module receives the encrypted digital information, sequentially decrypts the encrypted digital information twice according to the encryption process in the encryption log, and converts the digital information into corresponding data based on preset UTF-8 character codes after decryption is finished.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310636288.0A CN116366249B (en) | 2023-06-01 | 2023-06-01 | Interactive communication system based on digital information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310636288.0A CN116366249B (en) | 2023-06-01 | 2023-06-01 | Interactive communication system based on digital information |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116366249A true CN116366249A (en) | 2023-06-30 |
CN116366249B CN116366249B (en) | 2023-11-03 |
Family
ID=86939975
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310636288.0A Active CN116366249B (en) | 2023-06-01 | 2023-06-01 | Interactive communication system based on digital information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116366249B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103684760A (en) * | 2012-09-24 | 2014-03-26 | 腾讯科技(深圳)有限公司 | Method, device and system for encryption and decryption of communication |
CN111460129A (en) * | 2020-03-27 | 2020-07-28 | 泰康保险集团股份有限公司 | Method and device for generating identification, electronic equipment and storage medium |
CN114584407A (en) * | 2022-05-09 | 2022-06-03 | 御天守(江苏)信息科技有限公司 | System for embedding and extracting multilingual hidden data in online message |
CN115964728A (en) * | 2022-12-27 | 2023-04-14 | 上海柯林布瑞信息技术有限公司 | File encryption method and device based on consensus algorithm |
-
2023
- 2023-06-01 CN CN202310636288.0A patent/CN116366249B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103684760A (en) * | 2012-09-24 | 2014-03-26 | 腾讯科技(深圳)有限公司 | Method, device and system for encryption and decryption of communication |
WO2014044137A1 (en) * | 2012-09-24 | 2014-03-27 | 腾讯科技(深圳)有限公司 | Communication encryption and decryption method, device and system |
CN111460129A (en) * | 2020-03-27 | 2020-07-28 | 泰康保险集团股份有限公司 | Method and device for generating identification, electronic equipment and storage medium |
CN114584407A (en) * | 2022-05-09 | 2022-06-03 | 御天守(江苏)信息科技有限公司 | System for embedding and extracting multilingual hidden data in online message |
CN115964728A (en) * | 2022-12-27 | 2023-04-14 | 上海柯林布瑞信息技术有限公司 | File encryption method and device based on consensus algorithm |
Also Published As
Publication number | Publication date |
---|---|
CN116366249B (en) | 2023-11-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8401186B2 (en) | Cloud storage data access method, apparatus and system based on OTP | |
CN108566500B (en) | Adaptive Image Encryption Domain Reversible Hiding Method Based on Hybrid Encryption Mechanism | |
US8254570B2 (en) | Method and system for encryption of data | |
US7095851B1 (en) | Voice and data encryption method using a cryptographic key split combiner | |
CN113824728B (en) | Network communication method and system based on data encryption | |
CN1224211C (en) | Sychronization of session keys | |
CN1244998C (en) | Enciphering method using double keys and its wireless local network system | |
CN105825257A (en) | Information hiding and hidden information extraction method based on two-dimensional barcode and information hiding and hidden information extraction system thereof | |
JP2002500388A (en) | System and method for deriving an initialization vector suitable for secure communication | |
CN104052594A (en) | Bandwidth Efficient Method And System For Obscuring The Existence Of Encryption In A Communications Channel | |
CN103427987A (en) | Data encryption method, data verification method and electronic device | |
US20070195952A1 (en) | Method And System For Computational Transformation | |
CN102073977A (en) | Methods and equipment for generating and authenticating digital signatures and digital signature system | |
CN107294964B (en) | Information transmission method | |
CN100536393C (en) | Secret shared key mechanism based user management method | |
WO2007001075A1 (en) | Encryption device, encryption method, decryption device, decryption method, and data structure | |
CN111698084A (en) | Block chain-based concealed communication method | |
CN115834060B (en) | Electronic document security import and export method and system based on cryptography | |
CN111698252B (en) | Cloud platform data encryption transmission method and system | |
CN1599313A (en) | Password dynamic enciphering inputmethod of public emipering mode | |
CN116366249B (en) | Interactive communication system based on digital information | |
CN114499857A (en) | Method for realizing data correctness and consistency in big data quantum encryption and decryption | |
AU753951B2 (en) | Voice and data encryption method using a cryptographic key split combiner | |
CN113518244B (en) | Digital television signal data transmission method and device based on substitute text combination | |
US20090110193A1 (en) | Schryption method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |