Mobile information system based privacy protection and encryption method

A privacy protection and mobile information technology, applied in the field of privacy protection encryption, can solve problems such as the content of unidentifiable information, and achieve the effect of solving the speed of plaintext encryption and decryption, solving key distribution, and ensuring authenticity

Inactive Publication Date: 2013-02-27
ZHENJIANG JIANGDA KEMAO INFORMATION SYST
View PDF2 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, even if someone else intercepts the message...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile information system based privacy protection and encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the above-mentioned functions, processes and advantages of the present invention more obvious and easy to understand, the related technologies involved in the present invention will be introduced in detail one by one below.

[0037] In the privacy protection encryption method of the mobile information system in this embodiment, the source needs to do three tasks, including digital digest generation, plaintext encryption and session key encryption. The destination also includes three tasks, which are session key decryption, ciphertext decryption and digital signature verification. The specific working process is as follows:

[0038] (1) The sender uses the SHA function to form a digital digest of the plaintext M, and uses the sender's private key and the ECC digital signature algorithm to sign and generate a digital signature.

[0039] (2) The sender uses the session key d to perform DES encryption of plaintext to generate ciphertext.

[0040] (3) The ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a mobile information system based privacy protection and encryption method. On the basis of the existing security model, a DES (data encryption standard) and ECC (error checking and correcting) based digital signature algorithm scheme is provided, the scheme has the advantages of rapid arithmetic speed and high security, and better fits the application in a wireless environment, and according to the digital signature algorithm, plaintext data is encrypted by using the DES, so that the encryption and decryption speed problem of plaintexts is solved preferably; a session key of the DES is encrypted by using an ECC algorithm, so that the problem of key distribution can be effectively solved; meanwhile, through carrying out digital signature on the digital digests of plaintexts, the identity can be identified, and a situation that whether information is changed in the process of transmission can be authenticated; and therefore, the purpose of rapid and secure mobile officing is achieved, and the authenticity, integrity, and non-repudiation of officing information are ensured.

Description

technical field [0001] The invention relates to a privacy protection encryption method of a mobile information system. Background technique [0002] With the increasingly widespread application of wireless mobile network technology, the security of wireless mobile networks has become a hot issue in wireless network applications. [0003] The security method of wireless network technology includes the privacy protection mechanism of wireless local area network and mobile network technology. Network security is mainly reflected in two aspects of user authentication and data encryption. User authentication ensures that sensitive data can only be accessed by authorized users, while data encryption ensures that sent data can only be received and understood by the intended users. In a wireless mobile network, data transmission uses microwaves to radiate in the air. Hackers can listen to, intercept, and destroy user data communications at any location covered by a wireless AP (Acc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02H04W12/04H04L9/32H04L9/06H04W12/033H04W12/0431
Inventor 盛平张净倪冬玮盛垚刘晓梅韦洋宋志敏韩伟
Owner ZHENJIANG JIANGDA KEMAO INFORMATION SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products