[go: up one dir, main page]

CN118200043A - Information encryption and decryption method, system and storage medium for communication security - Google Patents

Information encryption and decryption method, system and storage medium for communication security Download PDF

Info

Publication number
CN118200043A
CN118200043A CN202410584892.8A CN202410584892A CN118200043A CN 118200043 A CN118200043 A CN 118200043A CN 202410584892 A CN202410584892 A CN 202410584892A CN 118200043 A CN118200043 A CN 118200043A
Authority
CN
China
Prior art keywords
communication
information
password
delay
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202410584892.8A
Other languages
Chinese (zh)
Other versions
CN118200043B (en
Inventor
陈震
王海军
张欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hainan Jike Technology Co ltd
Tianjin Tianyida Technology Development Co ltd
Original Assignee
Hainan Jike Technology Co ltd
Tianjin Tianyida Technology Development Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hainan Jike Technology Co ltd, Tianjin Tianyida Technology Development Co ltd filed Critical Hainan Jike Technology Co ltd
Priority to CN202410584892.8A priority Critical patent/CN118200043B/en
Publication of CN118200043A publication Critical patent/CN118200043A/en
Application granted granted Critical
Publication of CN118200043B publication Critical patent/CN118200043B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/062Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying encryption of the keys

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses an information encryption and decryption method, a system and a storage medium for communication security, which relate to the technical field of information security and comprise the following steps: when communication is started, network communication characteristics of both communication parties are obtained, and a network communication password is set; judging whether to start transmission or not by using a network communication password, acquiring information communication characteristics, encrypting information and setting an information unpacking password; decrypting and receiving the information by using the information unpacking password; the invention is used for solving the problem that in the aspect of encrypting and decrypting information in the aspect of communication in the prior art, the address and network change information of the other party cannot be acquired by encrypting and decrypting because of the lack of improvement on the aspect of taking the address of both parties of communication and the network as encryption bases.

Description

Information encryption and decryption method, system and storage medium for communication security
Technical Field
The invention relates to the technical field of information security, in particular to an information encryption and decryption method, an information encryption and decryption system and a storage medium for communication security.
Background
Information encryption is a technique for protecting data security, and by using a specific algorithm and a key, original information is converted into an unreadable form; such conversion renders the information unreadable without the proper decryption method, thereby preventing unauthorized access and data leakage, and information encryption techniques can be divided into two main categories: symmetric encryption and asymmetric encryption; in addition, there are various encryption modes such as hybrid algorithm, etc. to adapt to different security requirements and communication conditions.
In the conventional information encryption and decryption method for communication security, information security is usually protected by encryption, for example, in China patent with application publication number CN105450395A, an information encryption and decryption processing method and system are disclosed.
Disclosure of Invention
The invention aims to solve at least one of the technical problems in the prior art to a certain extent, and provides an information encryption and decryption method, an information encryption and decryption system and a storage medium for communication security, which are used for solving the problems that in the prior art, in the aspect of encrypting and decrypting information in the aspect of communication, the address and network based on two communication parties are lack of improvement in the aspect of taking the network as an encryption basis, so that when the two parties communicate, one party cannot acquire the address and network change information of the other party through encryption and decryption, the change of a communication object cannot be detected, and the communication information is leaked.
In order to achieve the above object, in a first aspect, the present invention provides an information encryption and decryption method for communication security, including:
When communication is started, acquiring network communication characteristics of both communication parties, and setting a network communication password based on the network communication characteristics of both communication parties, wherein the network communication password comprises a sending communication password and a receiving communication password;
judging whether to start transmission by using a network communication password, acquiring information communication characteristics of the information when the information starts transmission, encrypting the information based on the information communication characteristics and setting an information unpacking password;
When the information is received, the communication receiver decrypts and receives the information using the information unpacking password.
Further, when starting communication, acquiring the network communication characteristics of the two communication parties, and setting the network communication password based on the network communication characteristics of the two communication parties includes:
When communication is started, a party sending information is marked as a communication sender, and a party receiving information is marked as a communication receiver, wherein the number of the communication senders is more than or equal to 1 and the number of the communication receivers is more than or equal to 1;
When the communication sender sends information to the communication receiver, the communication sender needs to propose a communication application to the communication receiver, and after the communication application is filed, the network communication characteristics of the two communication parties are obtained, and the network communication password is set based on the network communication characteristics of the two communication parties, wherein the network communication characteristics comprise an IP address and network delay.
Further, when starting communication, acquiring the network communication characteristics of the two communication parties, and setting the network communication password based on the network communication characteristics of the two communication parties further includes:
For any communication sender A and any communication receiver B, when the communication sender A submits a communication application to the communication receiver B, the IP address of the communication sender A is acquired and marked as communication IP-A, the IP address of the communication receiver B is acquired and marked as communication IP-B;
Sequentially marking four numbers of communication IP-A as alpha 1-alpha 4 from left to right; sequentially recording four numbers of communication IP-B as beta 1-beta 4 from left to right;
the first-level IP password is obtained by using an IP password generating algorithm, wherein the IP password generating algorithm comprises the following steps:
wherein D is the primary IP password, α0 is the average of α1 to α4, and β0 is the average of β1 to β4.
Further, when starting communication, acquiring the network communication characteristics of the two communication parties, and setting the network communication password based on the network communication characteristics of the two communication parties further includes:
acquiring network delay of a communication sender A in standard connection time before a communication application is put forward, and recording the network delay as network delay data A; acquiring network delay in standard connection time after a communication receiver B receives a communication application, and recording the network delay as network delay data B;
Establishing a plane rectangular coordinate system, and marking the plane rectangular coordinate system as a delay coordinate system, wherein the unit of an X axis of the delay coordinate system is time, and the unit of a Y axis of the delay coordinate system is ms;
The method comprises the steps of putting corresponding data of network delay and time in network delay data A into a delay coordinate system, marking an obtained curve as a delay curve A, marking a point with the smallest X coordinate in the delay curve A as a line starting point, and marking a point with the largest X coordinate in the delay curve A as a line ending point;
the line connecting the start point and the end point of the line A is marked as a delay line.
Further, when starting communication, acquiring the network communication characteristics of the two communication parties, and setting the network communication password based on the network communication characteristics of the two communication parties further includes:
Equally dividing the delay line into Q parts, and sequentially marking each part from left to right as a delay sub-line 1 to a delay sub-line Q;
For any one delay sub-line Q1 from the delay sub-line 1 to the delay sub-line Q, acquiring a midpoint of the delay sub-line Q1, marking the midpoint as a midpoint Q1, making a straight line parallel to a Y axis at the midpoint Q1, and marking an intersection point of the straight line and the delay curve A as a delay sub-point Q1;
Acquiring delay sub-points corresponding to all delay sub-lines, sequentially marking Y-axis coordinates corresponding to all delay sub-points as sub-delay numbers 1 to Q, and marking an average value of the sub-delay numbers 1 to Q as a delay average value;
obtaining a fluctuation value of a delay curve A by using a delay fluctuation algorithm, wherein the delay fluctuation algorithm is as follows: wherein G is the fluctuation value of the delay curve A, zi is the ith sub-delay number, i is less than or equal to Q and greater than or equal to 1,/> Is the delay average;
based on the delay curve A and the acquisition mode of the fluctuation value of the delay curve A, acquiring a delay curve B and the fluctuation value of the delay curve B by using network delay data B;
the value obtained by adding the fluctuation value of the delay curve A with the primary IP password is recorded as a sending communication password; the value obtained by adding the fluctuation value of the delay curve B to the primary IP cipher is recorded as the received communication cipher.
Further, judging whether to start transmission using the network communication password, when the transmission of the information is started, acquiring the information communication characteristic of the information, encrypting the information based on the information communication characteristic, and setting the information unpacking password includes:
Transmitting the transmission communication password to the communication receiver B, and transmitting the reception communication password to the communication sender A;
Setting communication encryption at a communication sender A and a communication receiver B, wherein the communication encryption can only be unlocked by using a transmission communication password or a reception communication password;
When the communication sender a and the communication receiver B each unlock the communication encryption, the transmission of information is started.
Further, judging whether to start transmission by using the network communication password, when the transmission of the information is started, acquiring the information communication characteristic of the information, encrypting the information based on the information communication characteristic and setting the information unpacking password further comprises:
after starting to transmit information, recording the transmitted information data as real-time transmission data;
Carrying out data extraction on the real-time transmission data by using an information extraction method, and acquiring information communication characteristics based on an extraction result;
The information extraction method comprises the following steps:
Acquiring text data in real-time transmission data, performing Chinese word segmentation processing on the text data, and respectively marking the obtained Chinese words as Chinese words 1 to N;
Putting the same Chinese words from the Chinese word 1 to the Chinese word N into one Chinese word set, obtaining the number of the Chinese word sets, marking the number as K, and marking all the Chinese word sets as the Chinese word sets 1 to the Chinese word sets K respectively;
for any one Chinese word set K1, acquiring the number of words corresponding to any one Chinese word in the Chinese word set K1, and recording the number as the number of unit words of the Chinese word set K1 The characteristic value is marked as a characteristic value of the Chinese word set K1, wherein T1 is the number of Chinese words in the Chinese word set K1, T2 is the number of unit words of the Chinese word set K1, and the characteristic value is rounded upwards when the characteristic value is not an integer;
acquiring all characteristic values of all Chinese word sets, and sequentially marking the characteristic values as a character characteristic value 1 to a character characteristic value K; the average value from the character characteristic value 1 to the character characteristic value K is recorded as a character decoding value;
Acquiring picture data in real-time transmission data, and sequentially marking all pictures in the real-time transmission data as visual pictures 1 to visual pictures U; for any one visual picture U1, marking the value of the memory occupied by the visual picture U1 as the characteristic value of the visual picture U1, acquiring all the characteristic values of all the visual pictures, sequentially marking the characteristic values as picture characteristic values 1 to picture characteristic values U, and marking the average value of the picture characteristic values 1 to the picture characteristic values U as a picture decoding value, wherein the unit of the characteristic values of all the visual pictures is MB;
Acquiring video data in real-time transmission data, sequentially marking all videos in the real-time transmission data as transmission videos 1 to transmission videos P, marking the number of seconds corresponding to the time of the transmission video P1 as L for any one transmission video P1 in the transmission videos P1, acquiring the number of frames per second of the transmission video P1, sequentially marking the number of frames P1-1 to transmission frames P1-L, marking the maximum value of the transmission frames P1-1 to transmission frames P1-L as a frame peak value P1, marking the minimum value of the transmission frames P1-1 to transmission frames P1-L as a frame bottom value P1, and marking the value of the frame peak value P1 minus the frame bottom value P1 as a frame characteristic value of the transmission video P1;
And acquiring all frame characteristic values of all transmission videos, sequentially marking the frame characteristic values as video characteristic values 1 to video characteristic values P, and marking the average value of the video characteristic values 1 to the video characteristic values P as a video decoding value.
Further, judging whether to start transmission by using the network communication password, when the transmission of the information is started, acquiring the information communication characteristic of the information, encrypting the information based on the information communication characteristic and setting the information unpacking password further comprises:
the character decoding value, the picture decoding value and the video decoding value are marked as information communication characteristics;
The information communication characteristics are sent to an information receiver B, encryption processing is carried out on the real-time transmission data, the encrypted password is recorded as an information unpacking password, and the information unpacking password is as follows: (V1, V2, V3), wherein V1 is a text decoding value, V2 is a picture decoding value, and V3 is a video decoding value.
In a second aspect, the invention also provides an information encryption and decryption system for communication security, which comprises a network password acquisition module, an information password acquisition module and a password docking module:
The network password acquisition module is used for acquiring network communication characteristics of both communication parties when communication is started, setting a network communication password based on the network communication characteristics of both communication parties, wherein the network communication password comprises a sending communication password and a receiving communication password;
The information password acquisition module is used for judging whether transmission is started or not by using the network communication password, acquiring information communication characteristics of the information when the information starts to be transmitted, encrypting the information based on the information communication characteristics and setting an information unpacking password;
And the password docking module is used for decrypting and receiving the information by the communication receiver by using the information unpacking password after the information is received.
In a third aspect, the invention provides a storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method as described above.
The invention has the beneficial effects that: when the communication is started, the network communication characteristics of the two communication parties are acquired, the network communication passwords are set based on the network communication characteristics of the two communication parties, and the network communication passwords comprise the sending communication passwords and the receiving communication passwords;
The invention also judges whether to start transmission by using the network communication password, when the information starts to be transmitted, the information communication characteristics of the information are acquired, the information is encrypted based on the information communication characteristics, the information unpacking password is set, and finally after the information is received, the communication receiver decrypts and receives the information by using the information unpacking password.
Additional features and advantages of the application will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the application. The objectives and other advantages of the application will be realized and attained by the structure particularly pointed out in the written description and claims thereof as well as the appended drawings.
Drawings
Fig. 1 is a functional block diagram of the system of the present invention.
Fig. 2 is a flow chart of the steps of the method of the present invention.
FIG. 3 is a schematic diagram of the delay profile of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
In embodiment 1, referring to fig. 1, in a first aspect, the present application provides an information encryption and decryption system for communication security, including a network password acquisition module, an information password acquisition module, and a password docking module:
The network password acquisition module is used for acquiring network communication characteristics of both communication parties when communication is started, setting a network communication password based on the network communication characteristics of both communication parties, wherein the network communication password comprises a sending communication password and a receiving communication password;
The network password acquisition module is configured with an IP password acquisition policy, the IP password acquisition policy comprising: when communication is started, a party sending information is marked as a communication sender, and a party receiving information is marked as a communication receiver, wherein the number of the communication senders is more than or equal to 1 and the number of the communication receivers is more than or equal to 1;
In the specific implementation process, in the embodiment, the number of the two parties performing communication is not unique, namely, the communication sender can have multiple people, and the communication receiver can have multiple people;
When the communication sender sends information to the communication receiver, the communication sender needs to propose a communication application to the communication receiver, and after the communication application is filed, the network communication characteristics of the two communication parties are obtained, and the network communication password is set based on the network communication characteristics of the two communication parties, wherein the network communication characteristics comprise an IP address and network delay.
The IP password acquisition policy further includes: for any communication sender A and any communication receiver B, when the communication sender A submits a communication application to the communication receiver B, the IP address of the communication sender A is acquired and marked as communication IP-A, the IP address of the communication receiver B is acquired and marked as communication IP-B;
Step S104, the four numbers of the communication IP-A are sequentially recorded as alpha 1 to alpha 4 from left to right; sequentially recording four numbers of communication IP-B as beta 1-beta 4 from left to right; 0.517 0.277 0.926 2.277
In a specific implementation process, for example, in one data acquisition, communication IP-A is 58.31.104.255, communication IP-B is 123.112.55.255, α1 to α4 are 58, 31, 104 and 255, β1 to β4 are 123, 112, 55 and 255 through analysis, the average number of α1 to α4 is 112, the average number of β1 to β4 is 136.25, the primary IP passwords of communication IP-A and communication IP-B are 0.999, in the embodiment, the calculation results all retain three decimal places, and in the actual calculation, the number of retained decimal places can be adjusted according to the actual calculation conditions;
the first-level IP password is obtained by using an IP password generating algorithm, wherein the IP password generating algorithm comprises the following steps:
wherein D is the primary IP password, α0 is the average of α1 to α4, and β0 is the average of β1 to β4.
The network password acquisition module is further configured with a communication password acquisition policy, the communication password acquisition policy comprising:
acquiring network delay of a communication sender A in standard connection time before a communication application is put forward, and recording the network delay as network delay data A; acquiring network delay in standard connection time after a communication receiver B receives a communication application, and recording the network delay as network delay data B;
Establishing a plane rectangular coordinate system, and marking the plane rectangular coordinate system as a delay coordinate system, wherein the unit of an X axis of the delay coordinate system is time, and the unit of a Y axis of the delay coordinate system is ms;
Referring to fig. 3, EE0 is a delay curve a, a point corresponding to EE1 is an a-line start point, a point corresponding to EE2 is an a-line end point, a straight line corresponding to EE3 is a delay straight line, a line segment corresponding to EE4 is a delay sub-line, a point corresponding to EE5 is a midpoint of the delay sub-line corresponding to EE4, a point corresponding to EE6 is a delay sub-point corresponding to midpoint EE5, and a point corresponding to EE7 is a sub-delay number corresponding to delay sub-point EE 6;
The method comprises the steps of putting corresponding data of network delay and time in network delay data A into a delay coordinate system, marking an obtained curve as a delay curve A, marking a point with the smallest X coordinate in the delay curve A as a line starting point, and marking a point with the largest X coordinate in the delay curve A as a line ending point;
the line connecting the start point and the end point of the line A is marked as a delay line.
The communication password acquisition strategy further comprises: equally dividing the delay line into Q parts, and sequentially marking each part from left to right as a delay sub-line 1 to a delay sub-line Q;
In a specific implementation process, the value of Q can be set according to the number that can be actually analyzed, by dividing the delay sub-lines, the fluctuation value corresponding to the delay curve can be obtained based on the obtained delay sub-lines, the fluctuation value can reflect the characteristics of the delay curve, and thus the characteristics corresponding to the network delay data are obtained, and in the embodiment, Q is set to be 4;
For any one delay sub-line Q1 from the delay sub-line 1 to the delay sub-line Q, acquiring a midpoint of the delay sub-line Q1, marking the midpoint as a midpoint Q1, making a straight line parallel to a Y axis at the midpoint Q1, and marking an intersection point of the straight line and the delay curve A as a delay sub-point Q1;
Acquiring delay sub-points corresponding to all delay sub-lines, sequentially marking Y-axis coordinates corresponding to all delay sub-points as sub-delay numbers 1 to Q, and marking an average value of the sub-delay numbers 1 to Q as a delay average value;
obtaining a fluctuation value of a delay curve A by using a delay fluctuation algorithm, wherein the delay fluctuation algorithm is as follows: wherein G is the fluctuation value of the delay curve A, zi is the ith sub-delay number, i is less than or equal to Q and greater than or equal to 1,/> Is the delay average; 26.75 10.5625 3.0625 18.0625 33.0625.
In a specific implementation process, for example, in one data acquisition, all obtained sub-delay numbers are 30, 25, 31 and 21 respectively, and then the fluctuation value of the delay curve is obtained through calculation, in this embodiment, the fraction of the fluctuation value of the delay curve is reserved for two bits of fraction, and in actual calculation, the reserved fraction can be adjusted according to actual data.
Based on the delay curve A and the acquisition mode of the fluctuation value of the delay curve A, acquiring a delay curve B and the fluctuation value of the delay curve B by using network delay data B;
The value obtained by adding the fluctuation value of the delay curve A with the primary IP password is recorded as a sending communication password; the value obtained by adding the fluctuation value of the delay curve B to the primary IP password is recorded as a receiving communication password;
In a specific implementation process, for example, in one data acquisition, the fluctuation value of the obtained delay curve a is 4, the fluctuation value of the obtained delay curve B is 5, the primary IP password is 0.999, and then the sending communication password is 4.999, and the receiving communication password is 5.999.
The information password acquisition module is used for judging whether transmission is started or not by using the network communication password, acquiring information communication characteristics of the information when the information starts to be transmitted, encrypting the information based on the information communication characteristics and setting an information unpacking password;
the information password acquisition module is configured with an information transmission judgment strategy, and the information transmission judgment strategy comprises:
Transmitting the transmission communication password to the communication receiver B, and transmitting the reception communication password to the communication sender A;
In the specific implementation process, the sending communication password is sent to the communication receiver B, and the receiving communication password is sent to the communication sender A, so that both communication parties can obtain the passwords related to the corresponding IP and network delay, and whether to continue information transmission is judged;
setting communication encryption at a communication sender A and a communication receiver B, wherein the communication encryption can only be unlocked by using a transmission communication password or a reception communication password; when the communication sender a and the communication receiver B each unlock the communication encryption, the transmission of information is started.
The information password acquisition module is also configured with an unpacking password acquisition strategy, and the unpacking password acquisition strategy comprises the following steps:
after starting to transmit information, recording the transmitted information data as real-time transmission data;
And carrying out data extraction on the real-time transmission data by using an information extraction method, and acquiring information communication characteristics based on the extraction result.
The information extraction method comprises the following steps: acquiring text data in real-time transmission data, performing Chinese word segmentation processing on the text data, and respectively marking the obtained Chinese words as Chinese words 1 to N;
Putting the same Chinese words from the Chinese word 1 to the Chinese word N into one Chinese word set, obtaining the number of the Chinese word sets, marking the number as K, and marking all the Chinese word sets as the Chinese word sets 1 to the Chinese word sets K respectively;
for any one Chinese word set K1, acquiring the number of words corresponding to any one Chinese word in the Chinese word set K1, and recording the number as the number of unit words of the Chinese word set K1 The characteristic value is marked as a characteristic value of the Chinese word set K1, wherein T1 is the number of Chinese words in the Chinese word set K1, T2 is the number of unit words of the Chinese word set K1, and the characteristic value is rounded upwards when the characteristic value is not an integer;
In a specific implementation process, for example, a chinese word set K1 contains 100 chinese words, and the chinese words in the chinese word set K1 are "valid", the number of unit words in the chinese word set K1 is 3, and the feature value of the chinese word set K1 is 34.
Acquiring all characteristic values of all Chinese word sets, and sequentially marking the characteristic values as a character characteristic value 1 to a character characteristic value K; the average value from the character characteristic value 1 to the character characteristic value K is recorded as a character decoding value;
In the implementation process, the text decoding value is a value capable of reflecting the character data characteristics in the real-time transmission data;
Acquiring picture data in real-time transmission data, and sequentially marking all pictures in the real-time transmission data as visual pictures 1 to visual pictures U; for any one visual picture U1, marking the value of the memory occupied by the visual picture U1 as the characteristic value of the visual picture U1, acquiring all the characteristic values of all the visual pictures, sequentially marking the characteristic values as picture characteristic values 1 to picture characteristic values U, and marking the average value of the picture characteristic values 1 to the picture characteristic values U as a picture decoding value, wherein the unit of the characteristic values of all the visual pictures is MB;
in the specific implementation process, the picture decoding value is a value capable of reflecting the picture data characteristics in the real-time transmission data;
Acquiring video data in real-time transmission data, sequentially marking all videos in the real-time transmission data as transmission videos 1 to transmission videos P, marking the number of seconds corresponding to the time of the transmission video P1 as L for any one transmission video P1 in the transmission videos P1, acquiring the number of frames per second of the transmission video P1, sequentially marking the number of frames P1-1 to transmission frames P1-L, marking the maximum value of the transmission frames P1-1 to transmission frames P1-L as a frame peak value P1, marking the minimum value of the transmission frames P1-1 to transmission frames P1-L as a frame bottom value P1, and marking the value of the frame peak value P1 minus the frame bottom value P1 as a frame characteristic value of the transmission video P1;
Acquiring all frame characteristic values of all transmission videos, sequentially marking the frame characteristic values as video characteristic values 1 to video characteristic values P, and marking an average value of the video characteristic values 1 to the video characteristic values P as a video decoding value;
In an implementation, the video decoding value is a value that reflects a characteristic of video data in the real-time transmission data.
The unpacking password acquisition strategy further comprises: the character decoding value, the picture decoding value and the video decoding value are marked as information communication characteristics;
The information communication characteristics are sent to an information receiver B, encryption processing is carried out on the real-time transmission data, the encrypted password is recorded as an information unpacking password, and the information unpacking password is as follows: (V1, V2, V3), wherein V1 is a text decoding value, V2 is a picture decoding value, and V3 is a video decoding value;
The password docking module is used for decrypting and receiving the information by the communication receiver through the information unpacking password after the information is received; in the specific implementation process, when the information starts to be transmitted, the two communication parties are trusted parties, and the information communication characteristics are acquired to ensure that the information unpacking passwords for encrypting the information are different when different information is transmitted, so that the information security is ensured.
Embodiment 2 referring to fig. 2, in a second aspect, the present invention provides an information encryption and decryption method for communication security, including:
Step S1, when communication is started, network communication characteristics of both communication parties are obtained, a network communication password is set based on the network communication characteristics of both communication parties, and the network communication password comprises a sending communication password and a receiving communication password;
the step S1 comprises the following steps: step S101, when communication is started, a party sending information is marked as a communication sender, and a party receiving information is marked as a communication receiver, wherein the number of the communication senders is more than or equal to 1 and the number of the communication receivers is more than or equal to 1;
Step S102, when a communication sender sends information to a communication receiver, the communication sender needs to propose a communication application to the communication receiver, and after the communication application is proposed, network communication characteristics of the two communication parties are obtained, and a network communication password is set based on the network communication characteristics of the two communication parties, wherein the network communication characteristics comprise an IP address and network delay;
step S103, for any communication sender A and any communication receiver B, when the communication sender A submits a communication application to the communication receiver B, the IP address of the communication sender A is obtained and marked as communication IP-A, the IP address of the communication receiver B is obtained and marked as communication IP-B;
step S104, the four numbers of the communication IP-A are sequentially recorded as alpha 1 to alpha 4 from left to right; sequentially recording four numbers of communication IP-B as beta 1-beta 4 from left to right;
the first-level IP password is obtained by using an IP password generating algorithm, wherein the IP password generating algorithm comprises the following steps:
wherein D is the primary IP password, α0 is the average of α1 to α4, and β0 is the average of β1 to β4;
Step S105, obtaining network delay of a communication sender A in standard connection time before the communication application is put forward, and recording the network delay as network delay data A; acquiring network delay in standard connection time after a communication receiver B receives a communication application, and recording the network delay as network delay data B;
Step S106, a plane rectangular coordinate system is established and is marked as a delay coordinate system, wherein the unit of an X axis of the delay coordinate system is time, and the unit of a Y axis of the delay coordinate system is ms;
The method comprises the steps of putting corresponding data of network delay and time in network delay data A into a delay coordinate system, marking an obtained curve as a delay curve A, marking a point with the smallest X coordinate in the delay curve A as a line starting point, and marking a point with the largest X coordinate in the delay curve A as a line ending point;
Step S107, the connection line between the starting point of the line A and the ending point of the line A is marked as a delay straight line;
Step S108, equally dividing the delay line into Q parts, and sequentially marking each part from left to right as a delay sub-line 1 to a delay sub-line Q;
For any one delay sub-line Q1 from the delay sub-line 1 to the delay sub-line Q, acquiring a midpoint of the delay sub-line Q1, marking the midpoint as a midpoint Q1, making a straight line parallel to a Y axis at the midpoint Q1, and marking an intersection point of the straight line and the delay curve A as a delay sub-point Q1;
step S109, obtaining delay sub-points corresponding to all delay sub-lines, sequentially marking Y-axis coordinates corresponding to all delay sub-points as sub-delay numbers 1 to Q, and marking an average value of the sub-delay numbers 1 to Q as a delay average value; obtaining a fluctuation value of a delay curve A by using a delay fluctuation algorithm, wherein the delay fluctuation algorithm is as follows: wherein G is the fluctuation value of the delay curve A, zi is the ith sub-delay number, i is less than or equal to Q and greater than or equal to 1,/> Is the delay average;
step S1010, based on the delay curve A and the acquisition mode of the fluctuation value of the delay curve A, acquiring the fluctuation value of the delay curve B and the fluctuation value of the delay curve B by using the network delay data B, and recording the value of the fluctuation value of the delay curve A plus the primary IP password as the transmission communication password; the value obtained by adding the fluctuation value of the delay curve B to the primary IP cipher is recorded as the received communication cipher.
Step S2, judging whether to start transmission by using a network communication password, acquiring information communication characteristics of the information when the information starts transmission, encrypting the information based on the information communication characteristics and setting an information unpacking password;
The step S2 comprises the following steps: step S201, the sending communication password is sent to the communication receiver B, and the receiving communication password is sent to the communication sender A; setting communication encryption at a communication sender A and a communication receiver B, wherein the communication encryption can only be unlocked by using a transmission communication password or a reception communication password; when the communication sender A and the communication receiver B unlock the communication encryption, starting to transmit information;
Step S202, after starting to transmit information, recording the transmitted information data as real-time transmission data;
Step S203, data extraction is carried out on the real-time transmission data by using an information extraction method, and information communication characteristics are obtained based on the extraction result;
the information extraction method comprises the following steps: step S2031, acquiring text data in real-time transmission data, performing Chinese word segmentation processing on the text data, and respectively marking the obtained Chinese words as Chinese words 1 to N;
step S2032, putting the same Chinese words from the Chinese word 1 to the Chinese word N into a Chinese word set, obtaining the number of the Chinese word sets, marking the number as K, and marking all the Chinese word sets as the Chinese word sets 1 to the Chinese word sets K respectively;
Step S2033, for any one Chinese word set K1, obtaining the number of words corresponding to any one Chinese word in the Chinese word set K1, and recording the number of words as the number of unit words of the Chinese word set K1 The characteristic value is marked as a characteristic value of the Chinese word set K1, wherein T1 is the number of Chinese words in the Chinese word set K1, T2 is the number of unit words of the Chinese word set K1, and the characteristic value is rounded upwards when the characteristic value is not an integer;
step S2034, obtaining all characteristic values of all Chinese word sets, and sequentially marking the characteristic values as a character characteristic value 1 to a character characteristic value K; the average value from the character characteristic value 1 to the character characteristic value K is recorded as a character decoding value;
Step S2035, obtaining picture data in the real-time transmission data, and sequentially marking all pictures in the real-time transmission data as visual picture 1 to visual picture U; for any one visual picture U1, marking the value of the memory occupied by the visual picture U1 as the characteristic value of the visual picture U1, acquiring all the characteristic values of all the visual pictures, sequentially marking the characteristic values as picture characteristic values 1 to picture characteristic values U, and marking the average value of the picture characteristic values 1 to the picture characteristic values U as a picture decoding value, wherein the unit of the characteristic values of all the visual pictures is MB;
Step S2036, acquiring video data in the real-time transmission data, sequentially marking all videos in the real-time transmission data as transmission videos 1 to transmission videos P, marking a second corresponding to the time of transmitting the video P1 as L for any one of the transmission videos 1 to transmission videos P, acquiring the number of frames per second of the transmission video P1, sequentially marking the number of frames P1-1 to transmission frames P1-L, marking the maximum value of the number of frames P1-1 to transmission frames P1-L as a frame number peak value P1, marking the minimum value of the number of frames P1-1 to transmission frames P1-L as a frame number bottom value P1, and marking the value of the frame number peak value P1 minus the frame number bottom value P1 as a frame number characteristic value of the transmission video P1;
In step S2037, all frame characteristic values of all transmission videos are acquired and sequentially recorded as video characteristic values 1 to P, and an average value of the video characteristic values 1 to P is recorded as a video decoding value.
Step S2 further includes: step S204, the character decoding value, the picture decoding value and the video decoding value are marked as information communication characteristics;
Step S205, the information communication characteristics are sent to an information receiver B, encryption processing is carried out on the real-time transmission data, the encrypted password is recorded as an information unpacking password, and the information unpacking password is as follows: (V1, V2, V3), wherein V1 is a text decoding value, V2 is a picture decoding value, and V3 is a video decoding value.
And step S3, after the information is received, the communication receiver decrypts and receives the information by using the information unpacking password.
Embodiment 3, a third aspect, the present application provides a storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method as above. By the above technical solution, the computer program, when executed by the processor, performs the method in any of the alternative implementations of the above embodiments to implement the following functions: firstly, when communication is started, network communication characteristics of both communication parties are obtained, a network communication password is set based on the network communication characteristics of both communication parties, and the network communication password comprises a sending communication password and a receiving communication password; then, judging whether to start transmission or not by using a network communication password, when the transmission of the information is started, acquiring the information communication characteristics of the information, encrypting the information based on the information communication characteristics and setting an information unpacking password; finally, when the information is received, the communication receiver uses the information unpacking password to decrypt and receive the information.
In the foregoing embodiments of the present application, the descriptions of the embodiments are emphasized, and for a portion of this disclosure that is not described in detail in this embodiment, reference is made to the related descriptions of other embodiments.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media having computer-usable program code embodied therein. The storage medium may be implemented by any type or combination of volatile or nonvolatile Memory devices, such as static random access Memory (Static Random Access Memory, SRAM), electrically erasable programmable Read-Only Memory (ELECTRICALLY ERASABLE PROGRAMMABLE READ-Only Memory, EEPROM), erasable programmable Read-Only Memory (Erasable Programmable Read Only Memory, EPROM), programmable Read-Only Memory (Programmable Read-Only Memory, PROM), read-Only Memory (ROM), magnetic Memory, flash Memory, magnetic disk, or optical disk. These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. The above-described apparatus embodiments are merely illustrative, for example, the division of the units is merely a logical function division, and there may be other manners of division in actual implementation, and for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some communication interface, device or unit indirect coupling or communication connection, which may be in electrical, mechanical or other form.

Claims (10)

1. An information encryption and decryption method for communication security, comprising:
When communication is started, acquiring network communication characteristics of both communication parties, and setting a network communication password based on the network communication characteristics of both communication parties, wherein the network communication password comprises a sending communication password and a receiving communication password;
judging whether to start transmission by using a network communication password, acquiring information communication characteristics of the information when the information starts transmission, encrypting the information based on the information communication characteristics and setting an information unpacking password;
When the information is received, the communication receiver decrypts and receives the information using the information unpacking password.
2. The information encryption and decryption method for communication security according to claim 1, wherein when communication is started, acquiring network communication characteristics of both communication parties, setting a network communication password based on the network communication characteristics of both communication parties comprises:
When communication is started, a party sending information is marked as a communication sender, and a party receiving information is marked as a communication receiver, wherein the number of the communication senders is more than or equal to 1 and the number of the communication receivers is more than or equal to 1;
When the communication sender sends information to the communication receiver, the communication sender needs to propose a communication application to the communication receiver, and after the communication application is filed, the network communication characteristics of the two communication parties are obtained, and the network communication password is set based on the network communication characteristics of the two communication parties, wherein the network communication characteristics comprise an IP address and network delay.
3. The information encryption and decryption method for communication security according to claim 2, wherein when communication is started, acquiring network communication characteristics of both communication parties, setting a network communication password based on the network communication characteristics of both communication parties further comprises:
For any communication sender A and any communication receiver B, when the communication sender A submits a communication application to the communication receiver B, the IP address of the communication sender A is acquired and marked as communication IP-A, the IP address of the communication receiver B is acquired and marked as communication IP-B;
Sequentially marking four numbers of communication IP-A as alpha 1-alpha 4 from left to right; sequentially recording four numbers of communication IP-B as beta 1-beta 4 from left to right;
the first-level IP password is obtained by using an IP password generating algorithm, wherein the IP password generating algorithm comprises the following steps:
wherein D is the primary IP password, α0 is the average of α1 to α4, and β0 is the average of β1 to β4.
4. The information encryption and decryption method for communication security according to claim 3, wherein when communication is started, acquiring network communication characteristics of both communication parties, setting a network communication password based on the network communication characteristics of both communication parties further comprises:
acquiring network delay of a communication sender A in standard connection time before a communication application is put forward, and recording the network delay as network delay data A; acquiring network delay in standard connection time after a communication receiver B receives a communication application, and recording the network delay as network delay data B;
Establishing a plane rectangular coordinate system, and marking the plane rectangular coordinate system as a delay coordinate system, wherein the unit of an X axis of the delay coordinate system is time, and the unit of a Y axis of the delay coordinate system is ms;
The method comprises the steps of putting corresponding data of network delay and time in network delay data A into a delay coordinate system, marking an obtained curve as a delay curve A, marking a point with the smallest X coordinate in the delay curve A as a line starting point, and marking a point with the largest X coordinate in the delay curve A as a line ending point;
the line connecting the start point and the end point of the line A is marked as a delay line.
5. The information encryption and decryption method for communication security according to claim 4, wherein when communication is started, acquiring network communication characteristics of both communication parties, setting a network communication password based on the network communication characteristics of both communication parties further comprises:
Equally dividing the delay line into Q parts, and sequentially marking each part from left to right as a delay sub-line 1 to a delay sub-line Q;
For any one delay sub-line Q1 from the delay sub-line 1 to the delay sub-line Q, acquiring a midpoint of the delay sub-line Q1, marking the midpoint as a midpoint Q1, making a straight line parallel to a Y axis at the midpoint Q1, and marking an intersection point of the straight line and the delay curve A as a delay sub-point Q1;
Acquiring delay sub-points corresponding to all delay sub-lines, sequentially marking Y-axis coordinates corresponding to all delay sub-points as sub-delay numbers 1 to Q, and marking an average value of the sub-delay numbers 1 to Q as a delay average value;
obtaining a fluctuation value of a delay curve A by using a delay fluctuation algorithm, wherein the delay fluctuation algorithm is as follows: wherein G is the fluctuation value of the delay curve A, zi is the ith sub-delay number, i is less than or equal to Q and greater than or equal to 1,/> Is the delay average;
based on the delay curve A and the acquisition mode of the fluctuation value of the delay curve A, acquiring a delay curve B and the fluctuation value of the delay curve B by using network delay data B;
the value obtained by adding the fluctuation value of the delay curve A with the primary IP password is recorded as a sending communication password; the value obtained by adding the fluctuation value of the delay curve B to the primary IP cipher is recorded as the received communication cipher.
6. The method for encrypting and decrypting information for communication security according to claim 5, wherein judging whether transmission is started or not using a network communication password, when transmission of information is started, acquiring information communication characteristics of the information, encrypting the information based on the information communication characteristics, and setting an information unpacking password comprises:
Transmitting the transmission communication password to the communication receiver B, and transmitting the reception communication password to the communication sender A;
Setting communication encryption at a communication sender A and a communication receiver B, wherein the communication encryption can only be unlocked by using a transmission communication password or a reception communication password;
When the communication sender a and the communication receiver B each unlock the communication encryption, the transmission of information is started.
7. The method for encrypting and decrypting information for communication security according to claim 6, wherein judging whether transmission is started or not using a network communication password, when transmission of information is started, acquiring information communication characteristics of the information, encrypting the information based on the information communication characteristics, and setting an information unpacking password further comprises:
after starting to transmit information, recording the transmitted information data as real-time transmission data;
Carrying out data extraction on the real-time transmission data by using an information extraction method, and acquiring information communication characteristics based on an extraction result;
The information extraction method comprises the following steps:
Acquiring text data in real-time transmission data, performing Chinese word segmentation processing on the text data, and respectively marking the obtained Chinese words as Chinese words 1 to N;
Putting the same Chinese words from the Chinese word 1 to the Chinese word N into one Chinese word set, obtaining the number of the Chinese word sets, marking the number as K, and marking all the Chinese word sets as the Chinese word sets 1 to the Chinese word sets K respectively;
for any one Chinese word set K1, acquiring the number of words corresponding to any one Chinese word in the Chinese word set K1, and recording the number as the number of unit words of the Chinese word set K1 The characteristic value is marked as a characteristic value of the Chinese word set K1, wherein T1 is the number of Chinese words in the Chinese word set K1, T2 is the number of unit words of the Chinese word set K1, and the characteristic value is rounded upwards when the characteristic value is not an integer;
acquiring all characteristic values of all Chinese word sets, and sequentially marking the characteristic values as a character characteristic value 1 to a character characteristic value K; the average value from the character characteristic value 1 to the character characteristic value K is recorded as a character decoding value;
Acquiring picture data in real-time transmission data, and sequentially marking all pictures in the real-time transmission data as visual pictures 1 to visual pictures U; for any one visual picture U1, marking the value of the memory occupied by the visual picture U1 as the characteristic value of the visual picture U1, acquiring all the characteristic values of all the visual pictures, sequentially marking the characteristic values as picture characteristic values 1 to picture characteristic values U, and marking the average value of the picture characteristic values 1 to the picture characteristic values U as a picture decoding value;
Acquiring video data in real-time transmission data, sequentially marking all videos in the real-time transmission data as transmission videos 1 to transmission videos P, marking the number of seconds corresponding to the time of the transmission video P1 as L for any one transmission video P1 in the transmission videos P1, acquiring the number of frames per second of the transmission video P1, sequentially marking the number of frames P1-1 to transmission frames P1-L, marking the maximum value of the transmission frames P1-1 to transmission frames P1-L as a frame peak value P1, marking the minimum value of the transmission frames P1-1 to transmission frames P1-L as a frame bottom value P1, and marking the value of the frame peak value P1 minus the frame bottom value P1 as a frame characteristic value of the transmission video P1;
And acquiring all frame characteristic values of all transmission videos, sequentially marking the frame characteristic values as video characteristic values 1 to video characteristic values P, and marking the average value of the video characteristic values 1 to the video characteristic values P as a video decoding value.
8. The method for encrypting and decrypting information for communication security according to claim 7, wherein the judging of whether or not to start transmission using the network communication password, when the transmission of the information is started, acquiring the information communication characteristic of the information, encrypting the information based on the information communication characteristic, and setting the information unpacking password further comprises:
the character decoding value, the picture decoding value and the video decoding value are marked as information communication characteristics;
The information communication characteristics are sent to an information receiver B, encryption processing is carried out on the real-time transmission data, the encrypted password is recorded as an information unpacking password, and the information unpacking password is as follows: (V1, V2, V3), wherein V1 is a text decoding value, V2 is a picture decoding value, and V3 is a video decoding value.
9. The information encryption and decryption system for communication security is realized based on the information encryption and decryption method for communication security according to any one of claims 1 to 8, and is characterized by comprising a network password acquisition module, an information password acquisition module and a password docking module:
The network password acquisition module is used for acquiring network communication characteristics of both communication parties when communication is started, setting a network communication password based on the network communication characteristics of both communication parties, wherein the network communication password comprises a sending communication password and a receiving communication password;
The information password acquisition module is used for judging whether transmission is started or not by using the network communication password, acquiring information communication characteristics of the information when the information starts to be transmitted, encrypting the information based on the information communication characteristics and setting an information unpacking password;
And the password docking module is used for decrypting and receiving the information by the communication receiver by using the information unpacking password after the information is received.
10. A storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method according to any of claims 1-8.
CN202410584892.8A 2024-05-13 2024-05-13 Information encryption and decryption method, system and storage medium for communication security Active CN118200043B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410584892.8A CN118200043B (en) 2024-05-13 2024-05-13 Information encryption and decryption method, system and storage medium for communication security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410584892.8A CN118200043B (en) 2024-05-13 2024-05-13 Information encryption and decryption method, system and storage medium for communication security

Publications (2)

Publication Number Publication Date
CN118200043A true CN118200043A (en) 2024-06-14
CN118200043B CN118200043B (en) 2024-08-20

Family

ID=91398863

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410584892.8A Active CN118200043B (en) 2024-05-13 2024-05-13 Information encryption and decryption method, system and storage medium for communication security

Country Status (1)

Country Link
CN (1) CN118200043B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007318518A (en) * 2006-05-26 2007-12-06 Nippon Telegraph & Telephone West Corp Common encrypting and decrypting method, common encrypting and decrypting device, encryption communication system, program, and recording medium
CN111224995A (en) * 2020-01-15 2020-06-02 成都安舟信息技术有限公司 SSL/TLS network encryption communication information real-time decryption method based on memory analysis
CN112153072A (en) * 2020-09-30 2020-12-29 重庆电子工程职业学院 Computer network information safety control device
CN112351422A (en) * 2020-09-11 2021-02-09 深圳Tcl新技术有限公司 Method, device and equipment for encrypting and decrypting data and computer storage medium
CN115470533A (en) * 2022-09-14 2022-12-13 重庆长安汽车股份有限公司 Storage method and device of vehicle sensitive data, electronic equipment and storage medium
CN117914594A (en) * 2024-01-18 2024-04-19 杭州师范大学 Dynamic ciphertext communication method and system supporting integrity verification and access control

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007318518A (en) * 2006-05-26 2007-12-06 Nippon Telegraph & Telephone West Corp Common encrypting and decrypting method, common encrypting and decrypting device, encryption communication system, program, and recording medium
CN111224995A (en) * 2020-01-15 2020-06-02 成都安舟信息技术有限公司 SSL/TLS network encryption communication information real-time decryption method based on memory analysis
CN112351422A (en) * 2020-09-11 2021-02-09 深圳Tcl新技术有限公司 Method, device and equipment for encrypting and decrypting data and computer storage medium
CN112153072A (en) * 2020-09-30 2020-12-29 重庆电子工程职业学院 Computer network information safety control device
CN115470533A (en) * 2022-09-14 2022-12-13 重庆长安汽车股份有限公司 Storage method and device of vehicle sensitive data, electronic equipment and storage medium
CN117914594A (en) * 2024-01-18 2024-04-19 杭州师范大学 Dynamic ciphertext communication method and system supporting integrity verification and access control

Also Published As

Publication number Publication date
CN118200043B (en) 2024-08-20

Similar Documents

Publication Publication Date Title
US5638444A (en) Secure computer communication method and system
Ku et al. Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards
CN113067823B (en) Mail user identity authentication and key distribution method, system, device and medium
CN109587162B (en) Login verification method, device, terminal, password server and storage medium
CA1292790C (en) Controlled use of cryptographic keys via generating station establishedcontrol values
CN1224213C (en) Method for issuing an electronic identity
US7100048B1 (en) Encrypted internet and intranet communication device
CN106059760B (en) A kind of cryptographic system from user terminal crypto module calling system private key
CN109067766A (en) A kind of identity identifying method, server end and client
EP2309673A1 (en) Method for accessing data safely suitable for electronic tag
CN113938283B (en) Code scanning login method, system, device, electronic equipment and storage medium
CN103825738A (en) Registration information authentication method and device
US20070081672A1 (en) Methods to enhance wlan security
US8560847B2 (en) Light access authentication method and system
CN111526021A (en) Block chain private key security management method
CN114006736A (en) Instant communication message protection system and method based on hardware password equipment
CN114697113A (en) Hardware accelerator card-based multi-party privacy calculation method, device and system
CN105592431B (en) SMS encryption system based on iOS system mobile terminal
CN118200043B (en) Information encryption and decryption method, system and storage medium for communication security
CN101159542B (en) Method and system for saving and/or obtaining authentication parameter on terminal network appliance
CN111783070A (en) File information acquisition method, device, equipment and storage medium based on block chain
CN111698203A (en) Cloud data encryption method
CN106972928B (en) Bastion machine private key management method, device and system
CN113411347B (en) Transaction message processing method and processing device
CN112713987B (en) System and method for establishing session key between CA and TA

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant