CN116847337A - Message decryption method, device, communication equipment and storage medium - Google Patents

Message decryption method, device, communication equipment and storage medium Download PDF

Info

Publication number
CN116847337A
CN116847337A CN202310822559.1A CN202310822559A CN116847337A CN 116847337 A CN116847337 A CN 116847337A CN 202310822559 A CN202310822559 A CN 202310822559A CN 116847337 A CN116847337 A CN 116847337A
Authority
CN
China
Prior art keywords
key
decryption
indication information
terminal
hop network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310822559.1A
Other languages
Chinese (zh)
Inventor
胡鹏
何峣
唐铭蔚
张�荣
卢燕青
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Technology Innovation Center
China Telecom Corp Ltd
Original Assignee
China Telecom Technology Innovation Center
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Technology Innovation Center, China Telecom Corp Ltd filed Critical China Telecom Technology Innovation Center
Priority to CN202310822559.1A priority Critical patent/CN116847337A/en
Publication of CN116847337A publication Critical patent/CN116847337A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0433Key management protocols

Abstract

The application relates to a message decryption method, a message decryption device, a communication device and a storage medium, and relates to the technical field of mobile communication. The method comprises the following steps: under the condition that a key updating condition is met, a key acquisition request is sent to a management platform, wherein the key acquisition request carries decryption state information, and the decryption state information is used for indicating whether a first terminal has a requirement of continuing decryption by using a first key existing locally; further receiving a second key and key indication information sent by the management platform, wherein the key indication information is used for indicating whether the first key is reserved or not; further, the local key is subjected to key updating processing according to the key indication information and the second key, and after the key updating processing, encrypted messages sent by other terminals in the multi-hop network are decrypted based on the local key. After the second key is issued, the method can decrypt the information encrypted by the first key, optimize the new and old key replacement mode and ensure the stability of information transmission.

Description

Message decryption method, device, communication equipment and storage medium
Technical Field
The present application relates to the field of mobile communications technologies, and in particular, to a message decryption method, a device, a communication device, and a storage medium.
Background
When a multi-hop network is constructed based on a wireless network communication Direct Wi-Fi Direct technology, public keys used by different terminals are often updated in order to ensure the security of interactive information transmission between the different terminals. After the terminal obtains the new key issued by the service management platform, the old key is replaced by the new key, and the interaction information to be transmitted is encrypted by the new key. However, in practical application, after the terminal obtains the new key, the old key is replaced by the new key, so that there is a problem that the historical interaction information cannot be decrypted. At present, the interaction information encrypted by the old key cannot be decrypted after the new key is issued, and a mechanism for smoothly transiting the new key and the old key is lacked.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a message decryption method, apparatus, communication device, and storage medium that can decrypt interaction information encrypted by an old key after a new key is issued.
In a first aspect, the present application provides a message decryption method, applied to a first terminal in a multi-hop network, the method comprising:
under the condition that a key updating condition is met, a key acquisition request is sent to a management platform corresponding to the multi-hop network, wherein the key acquisition request carries decryption state information, and the decryption state information is used for indicating whether a first terminal has a requirement of continuing decryption by using a first key existing locally;
Receiving a second key and key indication information sent by the management platform based on the key acquisition request; the key indication information is used for indicating whether the first key is reserved;
and carrying out key updating processing on the local key according to the key indication information and the second key, and decrypting encrypted messages sent by other terminals in the multi-hop network based on the local key after the key updating processing.
In one embodiment, before sending the key acquisition request to the management platform corresponding to the multihop network, the method further includes:
detecting whether an encrypted message needing to be decrypted by using a first key exists in a decrypted message queue, wherein the decrypted message queue is used for storing the encrypted message sent by other terminals in the multi-hop network;
if so, determining that the first terminal has the requirement of continuing decryption by using the first key;
if not, it is determined that the first terminal does not have a need to continue decryption using the first key.
In one embodiment, the key indication information includes key deletion indication information for indicating that the first key is not reserved; performing key updating processing on the local key according to the key indication information and the second key, and decrypting encrypted messages sent by other terminals in the multi-hop network based on the local key after the key updating processing, including:
Storing the second key to the local according to the key deletion indication information, and deleting the first key and the context corresponding to the first key;
and after the deletion, the encrypted messages sent by other terminals in the multi-hop network are decrypted by using the second key alone.
In one embodiment, the key deletion indication information is sent by the management platform when the decryption state information indicates that the first terminal does not have a need to continue decryption using the first key.
In one embodiment, the key indication information includes key reservation indication information for indicating that the first key is reserved; performing key updating processing on the local key according to the key indication information and the second key, and decrypting encrypted messages sent by other terminals in the multi-hop network based on the local key after the key updating processing, including:
storing the second key to the local according to the key reservation indication information, and reserving the first key for a preset time locally;
and within a preset duration, decrypting the encrypted messages sent by other terminals in the multi-hop network by utilizing the first key and the second key together.
In one embodiment, the method further comprises:
After the preset duration is over, deleting the first key and the context corresponding to the first key, and independently decrypting the encrypted messages sent by other terminals in the multi-hop network by using the second key after deleting.
In one embodiment, the key retention indication information is sent by the management platform when the decryption state information indicates that the first terminal has a need to continue decryption using the first key.
In one embodiment, decrypting encrypted messages sent by other terminals in the multi-hop network using the first key and the second key together includes:
and decrypting the encrypted messages sent by other terminals in the multi-hop network by sequentially utilizing the first key and the second key until the decryption is successful or all the keys locally used are used for decryption.
In one embodiment, the method further comprises:
receiving a target encryption message sent by a second terminal in the multi-hop network, and decrypting the target encryption message by adopting a first key;
and under the condition that decryption of the target encrypted message fails, determining that the first terminal meets the key updating condition.
In a second aspect, the present application also provides a message decryption method, which is applied to a management platform corresponding to a multi-hop network, where the method includes:
Receiving a key acquisition request sent by a first terminal in a multi-hop network under the condition that a key updating condition is met, wherein the key acquisition request carries decryption state information which is used for indicating whether the first terminal has a requirement of continuing decryption by using a first key existing locally;
generating key indication information according to the decryption state information, wherein the key indication information is used for indicating whether the first key is reserved;
and sending the key indication information and the second key to the first terminal to indicate the first terminal to perform key updating processing on the local key according to the key indication information and the second key, and decrypting the encrypted messages sent by other terminals in the multi-hop network based on the local key after the key updating processing.
In one embodiment, generating key indication information from decryption state information includes:
generating key deletion indicating information when the decryption state information indicates that the first terminal does not use the first key to continue decryption; the key deletion instruction information is used to instruct that the first key is not retained.
In one embodiment, the method further includes generating key indication information according to the decryption state information, and further including:
Generating key reservation indication information when the decryption state information indicates that the first terminal has a need to continue decryption by using the first key; the key reservation indication information is used to indicate reservation of the first key.
In a third aspect, the present application also provides a message decrypting apparatus, the apparatus comprising:
the sending module is used for sending a key acquisition request to a management platform corresponding to the multi-hop network under the condition that a key updating condition is met, wherein the key acquisition request carries decryption state information which is used for indicating whether the first terminal has a requirement of continuing decryption by using a first key existing locally;
the receiving module is used for receiving a second key and key indication information sent by the management platform based on the key acquisition request; the key indication information is used for indicating whether the first key is reserved;
and the decryption module is used for carrying out key updating processing on the local key according to the key indication information and the second key, and decrypting encrypted messages sent by other terminals in the multi-hop network based on the local key after the key updating processing.
In a fourth aspect, the present application also provides a message decrypting apparatus, the apparatus comprising:
The receiving module is used for receiving a key acquisition request sent by a first terminal in the multi-hop network under the condition that a key updating condition is met, wherein the key acquisition request carries decryption state information which is used for indicating whether the first terminal has a requirement of continuing decryption by using a locally existing first key;
the generation module is used for generating key indication information according to the decryption state information, wherein the key indication information is used for indicating whether the first key is reserved or not;
and the sending module is used for sending the key indication information and the second key to the first terminal so as to indicate the first terminal to carry out key updating processing on the local key according to the key indication information and the second key, and decrypting the encrypted messages sent by other terminals in the multi-hop network based on the local key after the key updating processing.
In a fifth aspect, the present application also provides a communication device comprising a transmitter, a receiver, a processor and a memory, the memory storing a computer program;
the system comprises a transmitter, a first terminal and a second terminal, wherein the transmitter is used for transmitting a key acquisition request to a management platform corresponding to a multi-hop network under the condition that a key updating condition is met, wherein the key acquisition request carries decryption state information which is used for indicating whether the first terminal has a requirement of continuing decryption by using a first key existing locally;
The receiver is used for receiving a second key and key indication information sent by the management platform based on the key acquisition request; the key indication information is used for indicating whether the first key is reserved;
the processor executes a computer program for performing a key update process on the local key according to the key indication information and the second key, and decrypting encrypted messages sent by other terminals in the multi-hop network based on the local key after the key update process.
In a sixth aspect, the present application also provides a communication device comprising a transmitter, a receiver, a processor and a memory, the memory storing a computer program;
the device comprises a receiver, a first terminal and a second terminal, wherein the receiver is used for receiving a key acquisition request sent by the first terminal in the multi-hop network under the condition that a key updating condition is met, wherein the key acquisition request carries decryption state information, and the decryption state information is used for indicating whether the first terminal has a requirement of continuing decryption by using a locally existing first key;
the processor executing a computer program for generating key indication information according to the decryption state information, the key indication information being for indicating whether to retain the first key;
and the transmitter is used for transmitting the key indication information and the second key to the first terminal so as to indicate the first terminal to perform key updating processing on the local key according to the key indication information and the second key, and decrypting the encrypted messages transmitted by other terminals in the multi-hop network based on the local key after the key updating processing.
In a seventh aspect, the present application also provides a computer readable storage medium having stored thereon a computer program which when executed by a processor implements the steps of the method of the first and/or second aspects.
In an eighth aspect, the present application also provides a computer program product comprising a computer program which, when executed by a processor, implements the steps of the method of the first and/or second aspects.
The message decryption method, the device, the communication equipment and the storage medium send a key acquisition request to a management platform corresponding to the multi-hop network under the condition that the key update condition is met, wherein the key acquisition request carries decryption state information, and the decryption state information is used for indicating whether a first terminal has a requirement of continuing decryption by using a first key existing locally; further receiving a second key and key indication information sent by the management platform based on the key acquisition request; the key indication information is used for indicating whether the first key is reserved; further, the local key is subjected to key updating processing according to the key indication information and the second key, and after the key updating processing, encrypted messages sent by other terminals in the multi-hop network are decrypted based on the local key. Compared with the prior art, the method and the device indicate whether the first terminal has the requirement of continuing to decrypt by sending the decryption state information to the management platform, so that the management platform can feed back the key indication information based on the decryption state information to indicate whether the first terminal reserves the first key, and therefore, when the first terminal has the requirement of continuing to decrypt by using the local existing first key, the reserved first key can be adopted to decrypt, the fact that after the second key is issued, the message encrypted by the first key can be decrypted, the new and old key replacement mode is optimized, and the stability of message transmission is ensured.
Drawings
FIG. 1 is a schematic diagram of an application scenario of a message decryption method in one embodiment;
fig. 2 is a flow chart of a message decryption method applied to a first terminal in one embodiment;
FIG. 3 is a flow diagram of decrypting an encrypted message in one embodiment;
FIG. 4 is a flow chart of decrypting an encrypted message in another embodiment;
FIG. 5 is a flow diagram of a message decryption method applied to a management platform in one embodiment;
FIG. 6 is a flow chart of a message decrypting method according to another embodiment;
FIG. 7 is a flow chart of a message decrypting method in yet another embodiment;
FIG. 8 is a block diagram of a message decrypting apparatus in one embodiment;
FIG. 9 is a block diagram showing a message decrypting apparatus according to another embodiment;
FIG. 10 is a block diagram showing the construction of a message decrypting apparatus according to still another embodiment;
FIG. 11 is a block diagram showing a message decrypting apparatus according to still another embodiment;
fig. 12 is a block diagram of another message decrypting apparatus in an embodiment.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
Fig. 1 is a schematic diagram of an application scenario of message decryption according to an embodiment of the present application. As shown in fig. 1, the multi-hop network in this scenario includes a plurality of different terminals for data transmission through Wi-Fi direct connection, such as a first terminal 101 and a second terminal 102 (fig. 1 is only shown as an example, in practical applications, the multi-hop network may include more than two terminals), and the multi-hop network further includes a management platform 103, where the management platform 103 is used to store a key and issue the key to each terminal in the multi-hop network, and the management platform 103 may be integrated on a server 104, or may be placed on a cloud or other network servers. The first terminal 101 and the second terminal 102 may access the server 104 through a communication network. The first terminal 101 and the second terminal 102 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, internet of things devices and portable wearable devices, and the internet of things devices may be smart speakers, smart televisions, smart air conditioners, smart vehicle devices, and the like. The portable wearable device may be a smart watch, smart bracelet, headset, or the like. The server 104 corresponding to the management platform 103 may be implemented by an independent server or a server cluster formed by a plurality of servers.
In order to ensure the safety of the message transmission between the first terminal and the second terminal, the public key issued by the management platform corresponding to the multi-hop network is required to be used for encrypting the messages. However, after the management platform issues a new public key to the terminal in the multi-hop network, the terminal has a problem that it cannot decrypt the historical encrypted message because the old key is replaced by the new key when the terminal acquires the new key.
For example, the management platform issues an initial public key to each terminal in the multi-hop network, so as to instruct each terminal to store the initial public key locally, and encrypt a message sent to other terminals by using the initial public key, so that the other terminals can decrypt the encrypted message by using the initial public key. In the case that a terminal newly joins the multi-hop network, the management platform directly transmits the latest key to the terminal, and accordingly, the terminal encrypts a message transmitted to other terminals by using the latest key, thereby causing that a terminal without the updated key cannot decrypt the message encrypted by using the latest key.
In order to decrypt the interaction information encrypted by the old key after the new key is issued, in one embodiment, as shown in fig. 2, a message decryption method is provided, which is applied to a first terminal in a multi-hop network, and includes the following steps:
S201, when the key updating condition is met, a key obtaining request is sent to a management platform corresponding to the multi-hop network.
The multi-hop network is composed of a plurality of terminals communicating through a wireless network and a management platform corresponding to the terminals. The first terminal may be any terminal in the multi-hop network, and the management platform may be a near domain service management platform running on a server, for issuing a key to each terminal in the multi-hop network.
It should be noted that whether the first terminal satisfies the key update condition depends on whether the first key existing locally in the first terminal can be decrypted normally. And the first terminal sends a key acquisition request to the management platform under the condition that the key updating condition is met, wherein the key acquisition request is used for indicating the management platform to issue a new key, namely a second key, to the first terminal.
The key acquisition request carries decryption state information, and the decryption state information is used for indicating whether the first terminal has a requirement of continuing decryption by using a locally existing first key. In this way, the decryption state information is synchronously transmitted to the management platform, so that the management platform can judge whether the first terminal has a requirement of continuing to decrypt by using the locally existing first key based on the decryption state information, and further execute the corresponding steps.
In an alternative embodiment, the target encrypted message sent by the second terminal in the multi-hop network may be received, and the target encrypted message may be decrypted using the first key; and under the condition that decryption of the target encrypted message fails, determining that the first terminal meets the key updating condition.
In practical application, the first terminal decrypts the encrypted messages sent by all the received terminals. The terminal that transmits the encrypted message may have a terminal that has updated the first key with the second key or may have a terminal that has not updated the first key with the second key, and thus the encrypted message may have a message encrypted with the second key or may have a message encrypted with the first key.
The second terminal may be any terminal other than the first terminal in the multihop network. After receiving the target encryption message sent by the second terminal, the first terminal decrypts the target encryption message by adopting the first key, determines that the first terminal meets the key updating condition under the condition of decryption failure, and then sends a key acquisition request to the management platform so as to acquire the second key.
S202, receiving the second key and key indication information sent by the management platform based on the key acquisition request.
The key indication information is generated according to decryption state information carried by the key acquisition request. For example, the decryption state information indicates that the first terminal has a need to continue decryption using the locally existing first key by "0", and indicates that the first terminal has no need to continue decryption using the locally existing first key by "1". Accordingly, in the case where the decryption state information is "0", the generated key indication information is expressed as "0" for indicating that the first key is reserved; in the case where the decryption state information is "1", the generated key instruction information is denoted as "1" for indicating that the first key is not reserved.
S203, carrying out key updating processing on the local key according to the key indication information and the second key, and decrypting encrypted messages sent by other terminals in the multi-hop network based on the local key after the key updating processing.
Taking the second key as a key local to the first terminal and reserving the first key under the condition that the key indication information is 0; in the case that the key indication information is "1", the second key is used as a key local to the first terminal, and the first key is not reserved, i.e., the first key is deleted from the local. Further, the encrypted messages sent by other terminals in the multi-hop network are decrypted based on the local key.
It should be noted that "0" or "1" is only one possible representation of the decryption status information and the key indicating information, which is not limited in this embodiment.
Compared with the prior art, under the condition that the key updating condition is met, the scheme sends the key acquisition request to the management platform corresponding to the multi-hop network, and further receives the second key and the key indication information sent by the management platform based on the key acquisition request; further, the local key is subjected to key updating processing according to the key indication information and the second key, and after the key updating processing, encrypted messages sent by other terminals in the multi-hop network are decrypted based on the local key. The first terminal is indicated whether to continue decrypting by sending the decryption state information to the management platform, so that the management platform can feed back the key indication information based on the decryption state information to indicate whether the first terminal reserves the first key, and therefore, when the first terminal has the requirement of continuing decrypting by using the local existing first key, the reserved first key can be adopted to decrypt, after the second key is issued, the message encrypted by the first key can be decrypted, the new and old key replacement mode is optimized, and the stability of message transmission is ensured.
As an implementation manner of the embodiment of the present application, it may be detected whether an encrypted message that needs to be decrypted using the first key exists in the decrypted message queue; if so, determining that the first terminal has the requirement of continuing decryption by using the first key; if not, it is determined that the first terminal does not have a need to continue decryption using the first key.
For example, the first terminal stores the encrypted messages sent by other terminals in the multi-hop network in the decrypted message queue, and then sequentially decrypts each encrypted message in the decrypted message queue by using the local key. Since each encrypted message may have a message encrypted with the second key or may have a message encrypted with the first key, before sending a key acquisition request to the management platform, it is detected whether a message encrypted with the first key exists in the decrypted message queue, that is, whether an encrypted message that needs to be decrypted with the first key exists.
If so, determining that the first terminal has a requirement of continuing to decrypt by using the first key, generating decryption state information as 0, and sending the decryption state information and the key acquisition request to the management platform synchronously to instruct the management platform to generate key instruction information as 0 so as to instruct the first terminal to reserve the first key.
If the first key does not exist, determining that the first terminal does not use the first key to continue decryption, generating decryption state information as '1', and sending the decryption state information and the key acquisition request to the management platform synchronously to instruct the management platform to generate key indication information as '1', thereby instructing the first terminal not to reserve the first key.
It can be understood that detecting whether the encrypted message requiring the first key to be decrypted exists in the decrypted message queue is convenient for generating different decryption state information based on the detection result in the subsequent step, and is favorable for adopting different new and old key replacement modes under different key updating conditions, thereby ensuring the stability of message transmission.
In order to decrypt the encrypted message when the first terminal does not use the first key to continue decrypting, in the above embodiment, in one embodiment, the method of S203 may be refined by performing a key update process on the local key, that is, deleting the first key. As shown in fig. 3, the method specifically includes the following steps:
and S301, storing the second key locally according to the key deletion instruction information, and deleting the first key and the context corresponding to the first key.
The key indication information includes key deletion indication information for indicating that the first key is not reserved. The first terminal can perform key updating processing on the local key through the key management module. Specifically, deleting the first key and the context corresponding to the first key may be implemented by setting fields of the first key and the context corresponding to the first key to be empty.
In an alternative embodiment, the key deletion indication information is sent by the management platform when the decryption state information indicates that the first terminal does not have a need to continue decryption using the first key.
For example, when the first terminal sends a key acquisition request to the management platform, decryption state information carried by the key acquisition request is denoted as "1" and is used for indicating that the first terminal does not use the first key to continue decryption. Further, the management platform feeds back key deletion instruction information, denoted by "1", for instructing not to reserve the first key to the first terminal.
S302, after deleting, the encrypted messages sent by other terminals in the multi-hop network are decrypted by using the second key alone.
It will be appreciated that the second key is stored locally, and after deleting the first key, the key local to the first terminal is the second key. In this embodiment, when the first terminal does not use the first key to continue the decryption, the first key is directly deleted to save terminal resources, and the encrypted messages sent by other terminals are decrypted by using the second key alone until the decryption fails or all the encrypted messages in the decrypted message queue are decrypted.
In order to decrypt the encrypted message when the first terminal has a need to continue decrypting using the first key, in the above embodiment, in one embodiment, the local key may be subjected to a key update process, that is, the first key is reserved, so as to refine the method of S203. As shown in fig. 4, the method specifically includes the following steps:
s401, storing the second key to the local according to the key reservation indication information, and reserving the first key locally for a preset time period.
The key indication information includes key reservation indication information for indicating reservation of the first key. The first terminal can perform key updating processing on the local key through the key management module. Specifically, the preset duration of the first key reserved locally may be set according to actual requirements, which is not limited in this embodiment.
In an alternative embodiment, the key retention indication information is sent by the management platform when the decryption state information indicates that the first terminal has a need to continue decryption using the first key.
For example, when the first terminal sends a key acquisition request to the management platform, decryption state information carried by the key acquisition request is denoted as "0" for indicating that the first terminal has a need to continue decryption by using the first key. And further, the management platform feeds back key reservation indication information, which is denoted as '0', to the first terminal and is used for indicating that the first key is locally reserved for a preset duration, and deleting the first key after the preset duration is over.
And S402, decrypting the encrypted messages sent by other terminals in the multi-hop network by utilizing the first key and the second key together within a preset duration.
It will be appreciated that the second key is stored locally, and that the key local to the first terminal includes the first key and the second key within a preset time period in which the first key is retained.
In an alternative embodiment, the first key and the second key may be used sequentially to decrypt the encrypted message sent by the other terminals in the multi-hop network until the decryption is successful or all the keys locally have been used for decryption.
For example, for each encrypted message in the decrypted message queue, the first key is used for decryption, and when the first key fails to decrypt, the second key is used for decryption, or when the second key fails to decrypt, the first key is used for decryption, until decryption is successful or all local keys are used for decryption.
In this embodiment, when the first terminal has a need to use the first key to continue decryption, the first key and the second key are used to decrypt the encrypted messages sent by other terminals together, so that the encrypted messages encrypted by the first key or the encrypted messages encrypted by the second key can be successfully decrypted, and message transmission among the terminals in the multi-hop network is not affected.
As an implementation manner of the embodiment of the present application, after the preset duration is over, the first key and the context corresponding to the first key may be deleted, and after deletion, the encrypted message sent by the other terminals in the multi-hop network may be decrypted by using the second key alone.
After the preset duration is over, no encrypted message encrypted by the first key exists in a decrypted message queue of the first terminal, the first terminal does not use the first key to continue decrypting, at the moment, the first key and the context corresponding to the first key are deleted, so that terminal resources are saved, and subsequently, decryption can be carried out by independently using the second key, so that smooth transition of new and old keys is realized.
In order to decrypt the interaction information encrypted by the old key after the new key is issued, in one embodiment, as shown in fig. 5, a message decryption method is provided, which is applied to a management platform corresponding to the multi-hop network, and includes the following steps:
s501, receiving a key acquisition request sent by a first terminal in a multi-hop network when a key update condition is met.
The key acquisition request carries decryption state information, and the decryption state information is used for indicating whether the first terminal has a requirement of continuing decryption by using a locally existing first key. For example, the decryption state information indicates that the first terminal has a need to continue decryption using the locally existing first key by "0", and indicates that the first terminal has no need to continue decryption using the locally existing first key by "1".
S502, key indication information is generated according to the decryption state information.
The decryption state information corresponds to two indication cases that the first terminal has a need to continue decryption using the locally existing first key and that the first terminal does not continue decryption using the locally existing first key. Accordingly, the key indication information includes key reservation indication information and key deletion indication information.
For example, in the case where the decryption state information is "0", the generated key instruction information is expressed as "0" for instructing to retain the first key; in the case where the decryption state information is "1", the generated key instruction information is denoted as "1" for indicating that the first key is not reserved.
Alternatively, when the decryption state information indicates that the first terminal has a need to continue decryption using the first key, key reservation indication information indicating that the first key is reserved may be generated, and the key reservation indication information may be represented as "0".
Alternatively, when the decryption state information indicates that the first terminal does not use the first key to continue decryption, key deletion indicating information may be generated, where the key deletion indicating information is used to indicate that the first key is not reserved, and the key deletion indicating information may be represented as "1".
It should be noted that "0" or "1" is only one possible representation of the decryption status information and the key indicating information, which is not limited in this embodiment.
And S503, the key indication information and the second key are sent to the first terminal so as to indicate the first terminal to perform key updating processing on the local key according to the key indication information and the second key, and after the key updating processing, the encrypted message sent by other terminals in the multi-hop network is decrypted based on the local key.
The second key may be a new key manually configured and pre-stored in the management platform, or may be a new key obtained by the management platform from a preset address, which is not limited in this embodiment.
And synchronously transmitting the key indication information and the second key to the first terminal so as to indicate the first terminal to perform key updating processing on the local key, and continuously executing the step of decrypting the encrypted message.
Optionally, the key indication information is key reservation indication information, and indicates the first terminal to store the second key locally, and reserve the first key locally for a preset time period, and in the preset time period, decrypt the encrypted messages sent by other terminals in the multi-hop network by using the first key and the second key together until the decryption is successful or all the keys in the local are used for decryption, further, after the preset time period is over, delete the first key and the context corresponding to the first key, and after the deletion, decrypt the encrypted messages sent by other terminals in the multi-hop network by using the second key alone.
Optionally, the key indication information is key deletion indication information, and indicates the first terminal to store the second key locally, delete the first key and the context corresponding to the first key, and further, after deleting, independently decrypt the encrypted message sent by other terminals in the multi-hop network by using the second key.
Compared with the prior art, the scheme has the advantages that the key acquisition request sent by the first terminal in the multi-hop network under the condition that the key updating condition is met is received, wherein the key acquisition request carries decryption state information, and the decryption state information is used for indicating whether the first terminal has the requirement of continuing decryption by using the locally existing first key; generating key indication information according to the decryption state information, wherein the key indication information is used for indicating whether the first key is reserved or not; further, the key indication information and the second key are sent to the first terminal so as to indicate the first terminal to perform key updating processing on the local key according to the key indication information and the second key, and after the key updating processing, the encrypted message sent by other terminals in the multi-hop network is decrypted based on the local key. By analyzing the decryption state information carried by the key acquisition request, the corresponding key indication information is fed back to the first terminal based on the analysis result to indicate whether the first terminal reserves the first key, so that the first terminal can decrypt by adopting the reserved first key when the requirement of continuing to decrypt by using the local existing first key exists, after the second key is issued, the encrypted message of the first key can be decrypted, the new and old key replacement mode is optimized, and the stability of message transmission is ensured.
In one embodiment, as shown in fig. 6, an alternative example of a message decryption method is provided, with the following specific procedures:
s601, detecting whether an encrypted message needing to be decrypted by using a first key exists in a decrypted message queue.
The decryption message queue is used for storing encryption messages sent by other terminals in the multi-hop network;
s602, determining whether the first terminal has a requirement of continuing decryption by using the first key according to the detection result.
Specifically, if there is an encrypted message that needs to be decrypted by using the first key, determining that the first terminal has a requirement of continuing to decrypt by using the first key; if there is no encrypted message that needs to be decrypted using the first key, it is determined that the first terminal does not have a need to continue decryption using the first key.
S603, determining whether the first terminal meets the key updating condition according to whether the first terminal has the requirement of continuing decryption by using the first key.
Specifically, a target encryption message sent by a second terminal in the multi-hop network is received, and the target encryption message is decrypted by adopting a first key; and under the condition that decryption of the target encrypted message fails, determining that the first terminal meets the key updating condition.
S604, when the key updating condition is met, a key acquisition request is sent to a management platform corresponding to the multi-hop network.
The key acquisition request carries decryption state information, and the decryption state information is used for indicating whether the first terminal has a requirement of continuing to decrypt by using a locally existing first key.
S605, the receiving management platform sends the second key and the key indication information based on the key acquisition request.
Wherein the key indication information is used for indicating whether the first key is reserved.
S606, the local key is subjected to key updating processing according to the key indication information and the second key, and after the key updating processing, the encrypted messages sent by other terminals in the multi-hop network are decrypted based on the local key.
Wherein the key indication information includes key deletion indication information and key reservation indication information.
Optionally, according to the key deletion indication information, storing the second key locally, and deleting the first key and the context corresponding to the first key; and after the deletion, the encrypted messages sent by other terminals in the multi-hop network are decrypted by using the second key alone.
The key deletion indication information is used for indicating that the first key is not reserved, and is sent by the management platform when the decryption state information indicates that the first terminal does not use the first key to continue decryption.
Optionally, storing the second key locally according to the key reservation indication information, and reserving the first key locally for a preset duration; within a preset duration, sequentially utilizing the first key and the second key to decrypt the encrypted messages sent by other terminals in the multi-hop network until the decryption is successful or all the keys locally used are decrypted; after the preset duration is over, deleting the first key and the context corresponding to the first key, and independently decrypting the encrypted messages sent by other terminals in the multi-hop network by using the second key after deleting.
The key reservation indication information is used for indicating to reserve the first key, and is sent by the management platform when the decryption state information indicates that the first terminal has a requirement of continuing to decrypt by using the first key.
The specific processes of S601 to S606 may be referred to the description of the above method embodiments, and the implementation principle and technical effects are similar, and are not repeated herein.
In one embodiment, as shown in fig. 7, an alternative example of a message decryption method is provided, with the following specific procedures:
the management platform transmits an initial public key, namely a first key, to the first terminal and the second terminal; after receiving the first key, the first terminal and the second terminal store the first key locally, for example, store the first key through a key management module.
The second terminal encrypts the message by using the local first key to obtain an encrypted message, and directly transmits the encrypted message to the first terminal through Wi-Fi; the first terminal uses the local first key to successfully decrypt the encrypted message, so that the key updating condition is not satisfied.
The second terminal encrypts the message by using a local second key to obtain an encrypted message, and directly transmits the encrypted message to the first terminal through Wi-Fi; the first terminal fails to decrypt the encrypted message using the local first key, and thus satisfies the key update condition.
Under the condition that the first terminal meets the key updating condition, sending a key acquisition request carrying decryption state information to a management platform; wherein the decryption status information is used to indicate whether the first terminal has a need to continue decryption using the locally existing first key.
The management platform responds to the key acquisition request and feeds back a second key and key indication information to the first terminal; wherein the key indication information is used for indicating whether the first key is reserved.
Specifically, the key indication information includes key deletion indication information and key reservation indication information, where the key deletion indication information is used to indicate that the first key is not reserved, and is sent when the decryption state information indicates that the first terminal does not use the first key to continue decryption; the key reservation indication information is used to indicate that the first key is reserved and is transmitted when the decryption state information indicates that the first terminal has a need to continue decryption using the first key.
The first terminal responds to the key indication information, performs key updating processing, and decrypts the encrypted message by using the second key.
Specifically, if the key indication information is key deletion indication information, storing the second key locally, and deleting the first key and the context corresponding to the first key; decrypting the encrypted message with the second key alone after the deletion; if the key indication information is key reservation indication information, storing the second key locally, and reserving the first key locally for a preset time period; and within a preset duration, the encrypted message is decrypted by utilizing the first key and the second key together.
It should be understood that, although the steps in the flowcharts related to the embodiments described above are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
Based on the same inventive concept, the embodiment of the application also provides a message decryption device for realizing the above related message decryption method. The implementation of the solution provided by the device is similar to the implementation described in the above method, so the specific limitation in one or more embodiments of the message decrypting device provided below may refer to the limitation of the message decrypting method hereinabove, and will not be repeated here.
In one embodiment, as shown in fig. 8, there is provided a message decrypting apparatus 1 including: a transmitting module 10, a receiving module 20 and a decrypting module 30, wherein:
and the sending module 10 is used for sending a key acquisition request to a management platform corresponding to the multi-hop network when the key updating condition is met.
The key acquisition request carries decryption state information, and the decryption state information is used for indicating whether the first terminal has a requirement of continuing to decrypt by using a locally existing first key.
And a receiving module 20, configured to receive the second key and the key indication information sent by the management platform based on the key obtaining request.
Wherein the key indication information is used for indicating whether the first key is reserved.
The decryption module 30 is configured to perform a key update process on the local key according to the key indication information and the second key, and decrypt encrypted messages sent by other terminals in the multi-hop network based on the local key after the key update process.
In one embodiment, on the basis of fig. 8, as shown in fig. 9, the message decryption device 1 further includes:
a detection module 40, configured to detect whether an encrypted message that needs to be decrypted using the first key exists in the decrypted message queue.
The decryption message queue is used for storing encryption messages sent by other terminals in the multi-hop network.
A determining module 50, configured to determine that the first terminal has a need to continue decrypting using the first key in the case where there is an encrypted message that needs to be decrypted using the first key, and determine that the first terminal does not have a need to continue decrypting using the first key in the case where there is no encrypted message that needs to be decrypted using the first key.
In one embodiment, on the basis of fig. 8, as shown in fig. 10, the decryption module 30 includes:
and a deleting unit 31, configured to store the second key locally according to the key deletion instruction information, and delete the first key and the context corresponding to the first key.
The first decryption unit 32 is configured to decrypt the encrypted message sent by the other terminal in the multi-hop network by using the second key alone after deletion.
The key indication information comprises key deletion indication information, and the key deletion indication information is used for indicating that the first key is not reserved. The key deletion indication information is transmitted by the management platform when the decryption state information indicates that the first terminal does not have a need to continue decryption using the first key.
In one embodiment, on the basis of fig. 8, as shown in fig. 11, the decryption module 30 further includes:
a retaining unit 33, configured to store the second key locally according to the key retaining indication information, and retain the first key locally for a preset period of time;
and the second decryption unit 34 is configured to decrypt the encrypted message sent by the other terminal in the multi-hop network by using the first key and the second key together within a preset duration.
And the third decryption unit 35 is configured to delete the first key and the context corresponding to the first key after the preset duration is over, and decrypt the encrypted message sent by the other terminals in the multi-hop network by using the second key alone after the deletion.
The key indication information comprises key reservation indication information, and the key reservation indication information is used for indicating to reserve the first key. The key reservation indication information is transmitted by the management platform when the decryption state information indicates that the first terminal has a need to continue decryption using the first key.
In one embodiment, the second decryption unit 34 is specifically configured to:
and decrypting the encrypted messages sent by other terminals in the multi-hop network by sequentially utilizing the first key and the second key until the decryption is successful or all the keys locally used are used for decryption.
In one embodiment, as shown in fig. 12, there is provided a message decrypting apparatus 2 including: a receiving module 10, a generating module 20 and a transmitting module 30, wherein:
a receiving module 10, configured to receive a key acquisition request sent by a first terminal in a multi-hop network when a key update condition is satisfied.
The key acquisition request carries decryption state information, and the decryption state information is used for indicating whether the first terminal has a requirement of continuing to decrypt by using a locally existing first key.
The generating module 20 is configured to generate key indication information according to the decryption state information.
The key indication information is used to indicate whether the first key is reserved.
And the sending module 30 is configured to send the key indication information and the second key to the first terminal, so as to instruct the first terminal to perform a key update process on the local key according to the key indication information and the second key, and decrypt the encrypted message sent by the other terminals in the multi-hop network based on the local key after the key update process.
The respective modules in the above-described message decrypting apparatus may be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the communication device, or may be stored in software in a memory in the communication device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a communication device is provided that includes a transmitter, a receiver, a processor, and a memory storing a computer program. Wherein the processor of the communication device is configured to provide computing and control capabilities. The memory of the communication device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the communication device is used for storing data such as keys. The network interface of the communication device is used for communicating with an external terminal through a network connection.
Specifically, the transmitter is configured to send a key acquisition request to a management platform corresponding to the multihop network when a key update condition is satisfied. The key acquisition request carries decryption state information indicating whether the first terminal has a need to continue decryption using the locally existing first key. The receiver is used for receiving a second key and key indication information sent by the management platform based on the key acquisition request. The key indication information is used to indicate whether the first key is reserved. The processor executes a computer program for performing a key update process on the local key according to the key indication information and the second key, and decrypting encrypted messages sent by other terminals in the multi-hop network based on the local key after the key update process.
In one embodiment, another communication device is provided that includes a transmitter, a receiver, a processor, and a memory storing a computer program. Wherein the processor of the communication device is configured to provide computing and control capabilities. The memory of the communication device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the communication device is used for storing data such as keys. The network interface of the communication device is used for communicating with an external terminal through a network connection.
Specifically, the receiver is configured to receive a key acquisition request sent by a first terminal in the multi-hop network when a key update condition is satisfied. The key acquisition request carries decryption state information, and the decryption state information is used for indicating whether the first terminal has a requirement of continuing to decrypt by using a locally existing first key. The processor executes a computer program for generating key indication information from the decryption state information. Wherein the key indication information is used for indicating whether the first key is reserved. And the transmitter is used for transmitting the key indication information and the second key to the first terminal so as to indicate the first terminal to perform key updating processing on the local key according to the key indication information and the second key, and decrypting the encrypted messages transmitted by other terminals in the multi-hop network based on the local key after the key updating processing.
The communication device includes a processor, a memory, and a network interface connected by a system bus. Wherein the processor of the communication device is configured to provide computing and control capabilities. The memory of the communication device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the communication device is used for storing data such as the second key. The network interface of the communication device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a message decryption method.
In one embodiment, a computer readable storage medium is provided, having stored thereon a computer program which, when executed by a processor, implements the steps of the message decryption method described above.
In one embodiment, a computer program product is provided, comprising a computer program which, when executed by a processor, implements the steps of the message decryption method described above.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (Phase Change Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like. The databases referred to in the embodiments provided herein may include at least one of a relational database and a non-relational database. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processor referred to in the embodiments provided in the present application may be a general-purpose processor, a central processing unit, a graphics processor, a digital signal processor, a programmable logic unit, a data processing logic unit based on quantum computing, or the like, but is not limited thereto.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples illustrate only a few embodiments of the application and are described in detail herein without thereby limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of the application should be assessed as that of the appended claims.

Claims (18)

1. A message decryption method, applied to a first terminal in a multi-hop network, the method comprising:
under the condition that the key updating condition is met, a key obtaining request is sent to a management platform corresponding to the multi-hop network; the key acquisition request carries decryption state information, and the decryption state information is used for indicating whether the first terminal has a requirement of continuing decryption by using a first key existing locally;
Receiving a second key and key indication information sent by the management platform based on the key acquisition request; the key indication information is used for indicating whether the first key is reserved or not;
and carrying out key updating processing on the local key according to the key indication information and the second key, and decrypting encrypted messages sent by other terminals in the multi-hop network based on the local key after the key updating processing.
2. The method of claim 1, wherein before sending the key acquisition request to the management platform corresponding to the multihop network, the method further comprises:
detecting whether an encrypted message needing to be decrypted by using the first key exists in a decrypted message queue; the decryption message queue is used for storing encryption messages sent by other terminals in the multi-hop network;
if so, determining that the first terminal has the requirement of continuing decryption by using the first key;
if not, determining that the first terminal does not use the first key to continue decryption.
3. The method of claim 1, wherein the key indication information includes key deletion indication information indicating that the first key is not reserved; and performing a key updating process on the local key according to the key indication information and the second key, and decrypting the encrypted message sent by other terminals in the multi-hop network based on the local key after the key updating process, including:
Storing the second key to the local according to the key deletion indication information, and deleting the first key and the context corresponding to the first key;
and after deleting, decrypting the encrypted messages sent by other terminals in the multi-hop network by using the second key alone.
4. A method according to claim 3, wherein the key deletion indication information is sent by the management platform when the decryption state information indicates that the first terminal does not have a need to continue decryption using the first key.
5. The method according to claim 1, wherein the key indication information includes key reservation indication information indicating that the first key is reserved; and performing a key updating process on the local key according to the key indication information and the second key, and decrypting the encrypted message sent by other terminals in the multi-hop network based on the local key after the key updating process, including:
storing the second key to the local according to the key reservation indication information, and reserving the first key for a preset time locally;
And within the preset time period, decrypting the encrypted messages sent by other terminals in the multi-hop network by utilizing the first key and the second key together.
6. The method of claim 5, wherein the method further comprises:
after the preset duration is over, deleting the first key and the context corresponding to the first key, and independently utilizing the second key to decrypt the encrypted messages sent by other terminals in the multi-hop network after deleting.
7. The method of claim 5, wherein the key retention indication information is sent by the management platform when the decryption state information indicates that the first terminal has a need to continue decryption using the first key.
8. The method of claim 5, wherein decrypting the encrypted message sent by the other terminal in the multihop network using the first key and the second key together comprises:
and decrypting the encrypted messages sent by other terminals in the multi-hop network by sequentially utilizing the first key and the second key until the decryption is successful or all the keys locally used are used for decryption.
9. The method according to any one of claims 1 to 8, further comprising:
receiving a target encryption message sent by a second terminal in the multi-hop network, and decrypting the target encryption message by adopting the first key;
and under the condition that decryption of the target encrypted message fails, determining that the first terminal meets the key updating condition.
10. A message decryption method, which is applied to a management platform corresponding to a multi-hop network, the method comprising:
receiving a key acquisition request sent by a first terminal in the multi-hop network under the condition that a key updating condition is met; the key acquisition request carries decryption state information, and the decryption state information is used for indicating whether the first terminal has a requirement of continuing decryption by using a first key existing locally;
generating key indication information according to the decryption state information, wherein the key indication information is used for indicating whether the first key is reserved or not;
and sending the key indication information and the second key to the first terminal to indicate the first terminal to perform key updating processing on the local key according to the key indication information and the second key, and decrypting the encrypted messages sent by other terminals in the multi-hop network based on the local key after the key updating processing.
11. The method of claim 10, wherein generating key indication information from the decryption state information comprises:
generating key deletion indicating information when the decryption state information indicates that the first terminal does not use the first key to continue decryption; the key deletion indication information is used for indicating that the first key is not reserved.
12. The method of claim 10, wherein generating key indication information from the decryption state information further comprises:
generating key reservation indication information when the decryption state information indicates that the first terminal has a need to continue decryption by using the first key; the key reservation indication information is used for indicating reservation of the first key.
13. A message decryption apparatus, the apparatus comprising:
the sending module is used for sending a key acquisition request to a management platform corresponding to the multi-hop network under the condition that the key updating condition is met; the key acquisition request carries decryption state information, and the decryption state information is used for indicating whether the first terminal has a requirement of continuing decryption by using a first key existing locally;
The receiving module is used for receiving a second key and key indication information sent by the management platform based on the key acquisition request; the key indication information is used for indicating whether the first key is reserved or not;
and the decryption module is used for carrying out key updating processing on the local key according to the key indication information and the second key, and decrypting the encrypted messages sent by other terminals in the multi-hop network based on the local key after the key updating processing.
14. A message decryption apparatus, the apparatus comprising:
the receiving module is used for receiving a key acquisition request sent by a first terminal in the multi-hop network under the condition that a key updating condition is met; the key acquisition request carries decryption state information, and the decryption state information is used for indicating whether the first terminal has a requirement of continuing decryption by using a first key existing locally;
the generation module is used for generating key indication information according to the decryption state information, wherein the key indication information is used for indicating whether the first key is reserved or not;
and the sending module is used for sending the key indication information and the second key to the first terminal so as to indicate the first terminal to carry out key updating processing on the local key according to the key indication information and the second key, and decrypting the encrypted messages sent by other terminals in the multi-hop network based on the local key after the key updating processing.
15. A communication device, comprising: a transmitter, a receiver, a processor and a memory, the memory storing a computer program;
the transmitter is used for transmitting a key acquisition request to a management platform corresponding to the multi-hop network under the condition that the key updating condition is met; the key acquisition request carries decryption state information, and the decryption state information is used for indicating whether the first terminal has a requirement of continuing decryption by using a first key existing locally;
the receiver is used for receiving a second key and key indication information sent by the management platform based on the key acquisition request; the key indication information is used for indicating whether the first key is reserved or not;
the processor executes the computer program, and is configured to perform a key update process on a local key according to the key indication information and the second key, and decrypt an encrypted message sent by another terminal in the multihop network based on the local key after the key update process.
16. A communication device, comprising: a transmitter, a receiver, a processor and a memory, the memory storing a computer program;
The receiver is used for receiving a key acquisition request sent by a first terminal in the multi-hop network under the condition that the key update condition is met; the key acquisition request carries decryption state information, and the decryption state information is used for indicating whether the first terminal has a requirement of continuing decryption by using a first key existing locally;
the processor executes the computer program for generating key indication information according to the decryption state information, wherein the key indication information is used for indicating whether the first key is reserved;
the transmitter is configured to send the key indication information and the second key to the first terminal, so as to instruct the first terminal to perform key update processing on a local key according to the key indication information and the second key, and decrypt encrypted messages sent by other terminals in the multi-hop network based on the local key after the key update processing.
17. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 12.
18. A computer program product comprising a computer program, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any one of claims 1 to 12.
CN202310822559.1A 2023-07-05 2023-07-05 Message decryption method, device, communication equipment and storage medium Pending CN116847337A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310822559.1A CN116847337A (en) 2023-07-05 2023-07-05 Message decryption method, device, communication equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310822559.1A CN116847337A (en) 2023-07-05 2023-07-05 Message decryption method, device, communication equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116847337A true CN116847337A (en) 2023-10-03

Family

ID=88166729

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310822559.1A Pending CN116847337A (en) 2023-07-05 2023-07-05 Message decryption method, device, communication equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116847337A (en)

Similar Documents

Publication Publication Date Title
CN106612285B (en) Distributed cloud data management method and system based on peer-to-peer network
CN108762791B (en) Firmware upgrading method and device
US20100250939A1 (en) System and method of handling encrypted backup data
US10887085B2 (en) System and method for controlling usage of cryptographic keys
CN113434905B (en) Data transmission method and device, computer equipment and storage medium
JP6934973B2 (en) Methods and systems for transmitting data between sensor devices and electronic devices
CN107872315B (en) Data processing method and intelligent terminal
CN103856938A (en) Encryption and decryption method, system and device
US9363668B2 (en) Sensor network, sensor management server, key updating method and key updating program
EP4319222A1 (en) Application layer key generation
CN116847337A (en) Message decryption method, device, communication equipment and storage medium
CN115688165A (en) Node file processing method, device, equipment and storage medium
CN111181899B (en) Data processing method, device and system and electronic equipment
CN113961931A (en) Adb tool using method and device and electronic equipment
CN113709128A (en) IROS system communication method and device based on block chain
CN113132320A (en) Encryption transmission method and device and electronic equipment
CN110895456A (en) Data processing method, terminal, and computer-readable storage medium
CN114339630B (en) Method and device for protecting short message
US11431492B2 (en) Mutable encrypted system
CN114430343B (en) Data synchronization method and device, electronic equipment and readable storage medium
CN111835846B (en) Information updating method and device and electronic equipment
CN116248416B (en) Identity authentication method, device and computer equipment
US20220171844A1 (en) Secure password storage system and method
WO2023124530A1 (en) Data encryption system and related product
US20230155827A1 (en) Encryption terminal, encryption management device, encrypted communication system, and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination