Unlock instant, AI-driven research and patent intelligence for your innovation.

Encryption and authentication method for communication software

A technology of encryption authentication and communication software, applied in wireless communication, electrical components, transmission systems, etc., can solve problems such as sending messages

Inactive Publication Date: 2009-11-18
成都娱音科技股份有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Therefore, this encryption method can ensure that even if the cracker cracks the communication software used by himself, as long as the communication software of the receiver is not cracked, the cracker cannot use the cracking software to send messages to the receiver normally.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and authentication method for communication software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] 1. Both the sender A and the receiver B implement the encryption algorithm F internally. The encryption algorithm F is kept secret from the user. The content of the message sent by sender A to receiver B is: identity password P A + send content T;

[0020] 2. After the receiver B receives the communication message, the receiver B will first query the communication system S to obtain the characteristic V of the sender A , and then the receiver B uses the encryption algorithm F according to the sender's characteristic V A Encrypt and calculate its identity password F(V A ), then receiver B compares F(V A ) and P A , if F(V A ) = P A , then the sender A is a legal user, and the receiver B will receive the message; otherwise, the sender A is an illegal user, and the receiver B discards the message.

[0021] In the communication process, the present invention judges the identity of the sender each time by the receiver, thereby preventing cracked software from using n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an encryption and authentication method for communication software, which is applicable to encryption and authentication for intercommunication software. The applied environment of the invention requires that a receiver can obtain the characteristics of a sender when the receiver receives the communication message sent by the sender in the communication system. The invention is applicable to communication between part A and part B, the process of part B sending message to part A is the same as that of part A sending message to part B. The keypoint of the invention is that in every process of the communication, identity authentication is carried out on the sender by the receiver, if identity password sent by the sender is wrong, the receiver discards the received communication message so that illegal sender cannot send messages correctly. The method in the invention ensures that if the software of the sender is decrypted, the decrypted software of the sender can not be in normal use as long as the software of the receiver is not decrypted.

Description

technical field [0001] The invention relates to the technical field of software. technical background [0002] Encrypted, it is possible to be decrypted. In common encryption methods, as long as the cracker decrypts the software he uses, he can use the function of the encryption software. [0003] For communication software, this encryption method overcomes this disadvantage. In the communication software, this encryption method will go through the legality check of the sender once in each communication to prevent the sender from using the decryption software. [0004] Therefore, this encryption method can ensure that even if the cracker cracks the communication software used by himself, as long as the communication software of the receiver is not cracked, the cracker cannot normally use the cracking software to send a message to the receiver. [0005] The characteristic of the encryption authentication method is that the identity verification of the sender will be carrie...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/02H04W12/06H04W12/03
Inventor 卢军
Owner 成都娱音科技股份有限公司