CN116366249A - Interactive communication system based on digital information - Google Patents

Interactive communication system based on digital information Download PDF

Info

Publication number
CN116366249A
CN116366249A CN202310636288.0A CN202310636288A CN116366249A CN 116366249 A CN116366249 A CN 116366249A CN 202310636288 A CN202310636288 A CN 202310636288A CN 116366249 A CN116366249 A CN 116366249A
Authority
CN
China
Prior art keywords
data
digital information
module
transmission
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310636288.0A
Other languages
Chinese (zh)
Other versions
CN116366249B (en
Inventor
杨吉伟
许柳飞
杜伟豪
陈健斌
梁伟锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Weixin Zhilian Technology Co ltd
Original Assignee
Guangdong Weixin Zhilian Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Weixin Zhilian Technology Co ltd filed Critical Guangdong Weixin Zhilian Technology Co ltd
Priority to CN202310636288.0A priority Critical patent/CN116366249B/en
Publication of CN116366249A publication Critical patent/CN116366249A/en
Application granted granted Critical
Publication of CN116366249B publication Critical patent/CN116366249B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication

Abstract

The invention discloses an interactive communication system based on digital information, which relates to the technical field of data interaction and comprises a management and control center, wherein the management and control center is in communication connection with a data processing module, a data sending module, a transmission judging module and a data receiving module, and the data processing module is used for converting data to be transmitted into digital information; the data transmitting module is used for encrypting the digital information and transmitting the digital information to the data receiving module; the transmission judgment module is used for judging whether to execute the sending or receiving operation; the data processing module is used for receiving the digital information from the data sending module; the invention avoids the unnecessary waste of system resources and storage space caused by the repeated transmission of the same kind of data under the condition that the user has transmitted the same kind of data; and meanwhile, the data security protection capability of the system is improved.

Description

Interactive communication system based on digital information
Technical Field
The invention relates to the technical field of data interaction, in particular to an interactive communication system based on digital information.
Background
Along with the continuous development of communication technology, the application of digital information is more and more extensive, and the requirements on the digital information transmission technology and confidentiality are higher and higher, and the traditional digital information transmission technology ignores the step of checking whether the two transmission parties send or accept the same digital information in the transmission process, so that the waste of storage resources of a system is caused and the transmission efficiency is reduced; and how to improve the confidentiality of digital information in the transmission process is always a concern at present, so that an interactive communication system based on digital information is provided.
Disclosure of Invention
The interactive communication system based on the digital information comprises a management and control center, wherein the management and control center is in communication connection with a data processing module, a data sending module, a transmission judging module and a data receiving module;
the data processing module is used for converting data to be transmitted into digital information;
the data transmission module is used for encrypting the digital information;
the transmission judgment module is used for judging whether to execute the sending or receiving operation;
the data receiving module is used for receiving the digital information from the data transmitting module.
Further, the process of converting the transmitted data into digital information includes:
the data processing module acquires data to be transmitted from the database, classifies the data into three types of document data, audio data and image data based on the types of the data, and numbers the data;
and converting various kinds of data into preset UTF-8 character codes, further converting the preset UTF-8 character codes into binary codes, further converting the various kinds of data into corresponding digital information, randomly generating a string of 8-bit digital sequences, and combining the digital sequences with the numbers of the data based on the numbers of the data.
Further, the process of encrypting the digital information by the data sending module comprises the following steps:
the data transmitting module divides the digital information into a plurality of character strings with equal length, and dynamically selects the reverse positions of the character strings according to the lengths of the character strings and the total number of the character strings;
after the character string is reversed, the data sending module encrypts a request to the character string of the data receiving module, and after the data receiving module responds to the request, the data sending module sends a string of password character strings, wherein the password character strings are binary codes with random lengths.
Further, the method for encrypting the digital information according to the data type corresponding to the digital information comprises the following steps:
if the data corresponding to the digital information is document data, encrypting the reversed character string and the password character string in a staggered mode, namely, starting from the first bit of the reversed character string, inserting characters in one password character string behind the characters every other bit of characters until all characters in the password character string are inserted into the reversed character string;
if the data corresponding to the digital information is image data, encrypting the reversed character string and the password character string in a staggered replacement mode, namely, starting from the first character of the reversed character string, replacing the characters in one password character string every other character until all the characters in the password character string are replaced into the reversed character string;
if the data corresponding to the digital information is audio data, the password character string is directly inserted into the end of the reversed character string.
Further, the process of deciding the transmission request of the transmission decision module includes:
the transmission judgment module acquires a data transmission record from the database, and judges whether the data transmission module transmits encrypted digital information and an encrypted number in a transmission request or not according to the data transmission record;
if the encrypted digital information and the encrypted number in the transmitted request are judged, the transmission judgment module acquires the data receiving record of the data receiving module from the database, and judges whether the data receiving module receives the encrypted digital information and the encrypted number in the transmission application according to the data receiving record;
if the judging data receiving module has received the encrypted digital information and the encrypted serial number, the transmission judging module refuses the transmission application;
if the judging data receiving module does not receive the encrypted digital information and the encrypted serial number, the transmission judging module applies for transmission;
if the encrypted digital information and the encrypted number in the transmission request are judged not to be sent, the transmission judgment module applies for the transmission.
Further, the process of the data receiving module receiving the digital information includes:
the data receiving module decrypts the encrypted number by using the private key, acquires the number corresponding to the encrypted digital information from the database, compares the decrypted number with the number acquired from the database,
if the comparison result is consistent with the comparison result, the data receiving module receives the encrypted digital information, generates a data receiving record based on the decrypted number and sends the data receiving record to the database;
if the comparison results are inconsistent, the data receiving module refuses the encrypted digital information transmission, and requests the data sending module to encrypt and transmit the digital information again;
the data receiving module receives the encrypted digital information, sequentially decrypts the encrypted digital information twice according to the encryption process in the encryption log, and converts the digital information into corresponding data based on preset UTF-8 character codes after decryption is finished.
Compared with the prior art, the invention has the beneficial effects that:
the two-way transmission verification is carried out on the sender and the receiver before the digital information transmission, so that the situation that users repeatedly transmit the same kind of data under the condition that the users already transmit the same kind of data is avoided, and unnecessary waste of system resources and storage space is caused;
and verifying the number corresponding to the transmitted digital information, further judging whether the received digital information is correct, encrypting the digital information by adopting a randomly generated password character string, reducing the condition that the system receives false digital information and the confidentiality of the data information to a certain extent, and further improving the data security protection capability of the system.
Drawings
Fig. 1 is a schematic diagram of the present invention.
Detailed Description
As shown in fig. 1, an interactive communication system based on digital information comprises a management and control center and a database, wherein the management and control center is in communication connection with a data processing module, a data sending module, a transmission judging module and a data receiving module;
the database is used for storing data generated by each module, and a user can upload the data to be transmitted to the database;
the data processing module is used for converting data to be transmitted into digital information, and the specific process comprises the following steps:
the data processing module obtains the data to be transmitted from the database, classifies the data into three types of document data, audio data and image data based on the types of the data, and numbers the data, wherein the document data is numbered A 1 、A 2 、A 3 、……、A n The audio data number is B 1 、B 2 、B 3 、……、B n The image data number is C 1 、C 2 、C 3 、……、C n N is a natural number greater than 1;
further, the data processing module converts various kinds of data into preset UTF-8 character codes, further converts the codes into binary codes, and further converts the various kinds of data into corresponding digital information;
it should be noted that, when a string of data is converted into a preset UTF-8 character code, the data processing module will randomly generate a string of 8-bit digital sequences at the same time, and combine the digital sequences with the numbers of the data based on the numbers of the data, for example, a new number a corresponding to the digital information of the audio data 1 12345678 binding the new number with the converted data information, transmitting the new number to the database, and setting it as the corresponding data in the databaseNumbering, wherein each digital information corresponds to a unique digital sequence;
the data processing module sends the digital information and the new number to the data sending module.
The data transmitting module is used for encrypting the digital information and transmitting the digital information to the data receiving module, and the specific process comprises the following steps:
after receiving the digital information and the new number from the data processing module, the data sending module sends a number encryption request to the data receiving module, and after receiving the response and the public key of the data receiving module, the data sending module encrypts the new number by using the public key;
further, the digital information is encrypted, and the encryption process comprises:
the method comprises the steps of first encryption, dividing digital information into N character strings with equal length by a data sending module, and dynamically selecting the reverse positions of the character strings according to the length L of the character strings and the number N of the total character strings, wherein the calculation process of the reverse digits X of the character strings comprises the following steps: s=an 2 +bL, wherein a, b E (0, 1), a, b are dynamically selected by the data transmission module and a is smaller than b, the string inversion number X is the integer number of S, and the string inversion number X is inverted from the X bits of the string based on the string inversion number X;
after the second encryption and the reversal of the character string are finished, the data sending module sends a character string encryption request to the data receiving module, and after the data receiving module responds to the request, a string of password character strings is sent to the data sending module, wherein the password character strings are binary codes with random lengths;
after the data sending module receives the password character string, different encryption methods are adopted based on the data type corresponding to the digital information;
if the data corresponding to the digital information is document data, encrypting the reversed character string and the password character string in a staggered manner, namely, inserting characters in one password character string behind the characters every other one character from the first bit of the reversed character string until all the characters in the password character string are inserted into the reversed character string, for example, one string of reversed character string is 0000000 and the password character string is 1111, and encrypting in a staggered manner to obtain a result 01010101000;
if the data corresponding to the digital information is image data, encrypting the reversed character string and the password character string in a staggered replacement mode, namely, starting from the first character of the reversed character string, replacing each one character with a character in the password character string until all characters in the password character string are replaced in the reversed character string, for example, one string of reversed character string is 00000000 and the password character string is 1111, and encrypting in a staggered replacement mode to obtain the result of 01010101;
if the data corresponding to the digital information is audio data, the password character string is directly inserted into the last bit of the reversed character string, for example, the reversed character string is 000000, the password character string is 1111, and the result of encryption by adopting a direct insertion mode is 0000001111;
the method comprises the steps that all character strings are integrated to obtain encrypted digital information, the encrypted digital information is bound with an encrypted number, a data sending module automatically generates an encrypted log based on an encryption process and sends the encrypted log to a database, meanwhile, a transmission request is sent to a transmission judging module, if the transmission request passes, the encrypted digital information and the encrypted number are sent to a data receiving module to generate a data transmission record, and the data transmission record is uploaded to the database;
the encrypted log includes the reverse number of bits of the first encryption and the insertion mode and the insertion position of the password string of the second encryption.
The transmission judgment module is used for judging whether to execute the sending or receiving operation, and the specific process comprises the following steps:
after receiving a transmission request from the data transmission module, the transmission judgment module acquires a data transmission record of the data transmission module from the database, and judges whether the data transmission module transmits encrypted digital information and an encrypted number in the transmission request according to the data transmission record;
if the encrypted digital information and the encrypted number in the transmitted request are judged, the transmission judgment module acquires the data receiving record of the data receiving module from the database, and judges whether the data receiving module receives the encrypted digital information and the encrypted number in the transmission application according to the data receiving record;
if the judging data receiving module has received the encrypted digital information and the encrypted serial number, the transmission judging module refuses the transmission application;
if the judging data receiving module does not receive the encrypted digital information and the encrypted serial number, the transmission judging module applies for transmission;
if the encrypted digital information and the encrypted serial number in the transmission request are judged not to be sent, the transmission judgment module applies for the transmission;
the transmission judgment module performs bidirectional transmission verification on the data sending module and the data receiving module, so that unnecessary waste of system resources and storage space is avoided due to the fact that users repeatedly transmit similar data under the condition that the similar data are transmitted.
The data receiving module is used for receiving the digital information from the data sending module, and the specific process comprises the following steps:
after receiving the serial number decryption application from the data sending module, the data receiving module randomly generates a pair of public key and private key and sends the public key to the data sending module;
the data receiving module randomly sends a string of password character strings to the data sending module every time the data receiving module receives a character string encryption application from the data sending module;
for the encrypted digital information and the encrypted number from the data sending module, the data receiving module decrypts the encrypted number by using a private key, and simultaneously acquires the number corresponding to the encrypted digital information from the database, and compares the decrypted number with the number acquired from the database;
if the comparison result is consistent with the comparison result, the data receiving module receives the encrypted digital information, generates a data receiving record based on the decrypted number and sends the data receiving record to the database;
if the comparison results are inconsistent, the data receiving module refuses the encrypted digital information transmission, and requests the data sending module to encrypt and transmit the digital information again;
further, the data receiving module receives the encrypted digital information, acquires a corresponding encrypted log from the database, sequentially decrypts the encrypted digital information twice according to the encryption process in the encrypted log, and converts the digital information into corresponding data based on a preset UTF-8 character code after decryption is finished;
the number corresponding to the digital information is verified, so that whether the received digital information is correct or not is judged, the data receiving module encrypts the digital information by adopting a randomly generated password character string, the condition that the data receiving module receives false digital information and the confidentiality of the data information are reduced to a certain extent, and the data security protection capability of the system is improved.
The above embodiments are only for illustrating the technical method of the present invention and not for limiting the same, and it should be understood by those skilled in the art that the technical method of the present invention may be modified or substituted without departing from the spirit and scope of the technical method of the present invention.

Claims (6)

1. The interactive communication system based on the digital information comprises a management and control center, and is characterized in that the management and control center is in communication connection with a data processing module, a data sending module, a transmission judging module and a data receiving module;
the data processing module is used for converting data to be transmitted into digital information;
the data transmission module is used for encrypting the digital information;
the transmission judgment module is used for judging whether to execute the sending or receiving operation;
the data receiving module is used for receiving the digital information from the data transmitting module.
2. An interactive communication system based on digital information according to claim 1 wherein the process of converting the transmitted data into digital information comprises:
the data processing module acquires data to be transmitted from the database, classifies the data into three types of document data, audio data and image data based on the types of the data, and numbers the data;
and converting various kinds of data into preset UTF-8 character codes, further converting the preset UTF-8 character codes into binary codes, further converting the various kinds of data into corresponding digital information, randomly generating a string of 8-bit digital sequences, and combining the digital sequences with the numbers of the data based on the numbers of the data.
3. The interactive communication system according to claim 2, wherein the process of encrypting the digital information by the data transmission module comprises:
the data transmitting module divides the digital information into a plurality of character strings with equal length, and dynamically selects the reverse positions of the character strings according to the lengths of the character strings and the total number of the character strings;
after the character string is reversed, the data sending module sends a character string encryption request to the data receiving module, and after the data receiving module responds to the request, the data sending module sends a string of password character strings, wherein the password character strings are binary codes with random lengths.
4. A digital information based interactive communication system according to claim 3, wherein the use of different encryption methods according to the data type corresponding to the digital information comprises:
if the data corresponding to the digital information is document data, encrypting the reversed character string and the password character string in a staggered mode, namely, starting from the first bit of the reversed character string, inserting characters in one password character string behind the characters every other bit of characters until all characters in the password character string are inserted into the reversed character string;
if the data corresponding to the digital information is image data, encrypting the reversed character string and the password character string in a staggered replacement mode, namely, starting from the first character of the reversed character string, replacing the characters in one password character string every other character until all the characters in the password character string are replaced into the reversed character string;
if the data corresponding to the digital information is audio data, the password character string is directly inserted into the last bit of the reversed character string.
5. The interactive communication system according to claim 4, wherein said transmission decision module decides a transmission request comprising:
the transmission judgment module acquires a data transmission record from the database, and judges whether the data transmission module transmits encrypted digital information and an encrypted number in a transmission request or not according to the data transmission record;
if the encrypted digital information and the encrypted number in the transmitted request are judged, the transmission judgment module acquires the data receiving record of the data receiving module from the database, and judges whether the data receiving module receives the encrypted digital information and the encrypted number in the transmission application according to the data receiving record;
if the judging data receiving module has received the encrypted digital information and the encrypted serial number, the transmission judging module refuses the transmission application;
if the judging data receiving module does not receive the encrypted digital information and the encrypted serial number, the transmission judging module applies for transmission;
if the encrypted digital information and the encrypted number in the transmission request are judged not to be sent, the transmission judgment module applies for the transmission.
6. The interactive communication system according to claim 5, wherein said data accepting module accepts digital information comprising:
the data receiving module decrypts the encrypted number by using the private key, acquires the number corresponding to the encrypted digital information from the database, compares the decrypted number with the number acquired from the database,
if the comparison result is consistent with the comparison result, the data receiving module receives the encrypted digital information, generates a data receiving record based on the decrypted number and sends the data receiving record to the database;
if the comparison results are inconsistent, the data receiving module refuses the encrypted digital information transmission, and requests the data sending module to encrypt and transmit the digital information again;
the data receiving module receives the encrypted digital information, sequentially decrypts the encrypted digital information twice according to the encryption process in the encryption log, and converts the digital information into corresponding data based on preset UTF-8 character codes after decryption is finished.
CN202310636288.0A 2023-06-01 2023-06-01 Interactive communication system based on digital information Active CN116366249B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310636288.0A CN116366249B (en) 2023-06-01 2023-06-01 Interactive communication system based on digital information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310636288.0A CN116366249B (en) 2023-06-01 2023-06-01 Interactive communication system based on digital information

Publications (2)

Publication Number Publication Date
CN116366249A true CN116366249A (en) 2023-06-30
CN116366249B CN116366249B (en) 2023-11-03

Family

ID=86939975

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310636288.0A Active CN116366249B (en) 2023-06-01 2023-06-01 Interactive communication system based on digital information

Country Status (1)

Country Link
CN (1) CN116366249B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103684760A (en) * 2012-09-24 2014-03-26 腾讯科技(深圳)有限公司 Method, device and system for encryption and decryption of communication
CN111460129A (en) * 2020-03-27 2020-07-28 泰康保险集团股份有限公司 Method and device for generating identification, electronic equipment and storage medium
CN114584407A (en) * 2022-05-09 2022-06-03 御天守(江苏)信息科技有限公司 System for embedding and extracting multilingual hidden data in online message
CN115964728A (en) * 2022-12-27 2023-04-14 上海柯林布瑞信息技术有限公司 File encryption method and device based on consensus algorithm

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103684760A (en) * 2012-09-24 2014-03-26 腾讯科技(深圳)有限公司 Method, device and system for encryption and decryption of communication
WO2014044137A1 (en) * 2012-09-24 2014-03-27 腾讯科技(深圳)有限公司 Communication encryption and decryption method, device and system
CN111460129A (en) * 2020-03-27 2020-07-28 泰康保险集团股份有限公司 Method and device for generating identification, electronic equipment and storage medium
CN114584407A (en) * 2022-05-09 2022-06-03 御天守(江苏)信息科技有限公司 System for embedding and extracting multilingual hidden data in online message
CN115964728A (en) * 2022-12-27 2023-04-14 上海柯林布瑞信息技术有限公司 File encryption method and device based on consensus algorithm

Also Published As

Publication number Publication date
CN116366249B (en) 2023-11-03

Similar Documents

Publication Publication Date Title
US8401186B2 (en) Cloud storage data access method, apparatus and system based on OTP
CN107566407B (en) Bidirectional authentication data secure transmission and storage method based on USBKey
US7095851B1 (en) Voice and data encryption method using a cryptographic key split combiner
CN1224211C (en) Sychronization of session keys
CN1244998C (en) Enciphering method using double keys and its wireless local network system
AU2008327506B2 (en) Method and system for encryption of data
US7047420B2 (en) Exclusive encryption
CN100536393C (en) Secret shared key mechanism based user management method
CN113824728B (en) Network communication method and system based on data encryption
CN102282798B (en) Bandwidth efficient method and system for obscuring the existence of encryption in a communications channel
NO306890B1 (en) Procedure for establishing secure communication
CN1124718C (en) Decryption of retransmitted data in an encrypted communication system
CN1211976C (en) Method for negotiating weakened keys in encryption systems
CN102073977A (en) Methods and equipment for generating and authenticating digital signatures and digital signature system
CN107294964B (en) Information transmission method
WO2007001075A1 (en) Encryption device, encryption method, decryption device, decryption method, and data structure
CN115834060B (en) Electronic document security import and export method and system based on cryptography
US20090010433A1 (en) Schryption method and device
CN114499857A (en) Method for realizing data correctness and consistency in big data quantum encryption and decryption
CN111698252B (en) Cloud platform data encryption transmission method and system
CN1599313A (en) Password dynamic enciphering inputmethod of public emipering mode
CN116366249B (en) Interactive communication system based on digital information
AU753951B2 (en) Voice and data encryption method using a cryptographic key split combiner
CN114244635B (en) Encryption type data coding method of communication equipment
CN115119200A (en) Information transfer method for 5G communication environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant