A Infinite Key Internet Communication Encryption Method

A technology of Internet communication and encryption method, applied in the field of Internet communication encryption, can solve the problem of insufficient security, and achieve the effect of simple encryption algorithm, high security, and small calculation amount

Active Publication Date: 2017-03-15
金子光
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The present invention mainly solves the technical problems of existing loopholes and insufficient security in the prior art, and provides a safe and reliable Internet communication encryption method with an infinitely long key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Infinite Key Internet Communication Encryption Method
  • A Infinite Key Internet Communication Encryption Method
  • A Infinite Key Internet Communication Encryption Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0030] Embodiment: An infinite-length-key Internet communication encryption method in this embodiment is based on a system including a communication platform, at least one sender user, and at least one receiver user. The communication platform generates a unique unordered data sequence as a key for each user. The key has no arrangement rules but is large enough (16Mb). The communication platform sends the key to the corresponding user and saves a copy of the key.

[0031] Such as figure 1 As shown, the encryption method includes the following steps: 1. The communication platform issues a unique key to the user who needs encrypted communication, and the communication platform stores a copy of the exact same key;

[0032] 2. The sender user and the receiver user go to the communication platform for verification. If the verification passes, enter step 3. If the verification fails, the communication is terminated;

[0033] 3. The sender user uses a key to encrypt the original da...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of internet communication safety, in particular to an internet communication encryption method which performs decryption and then encryption through a transfer platform and has an infinite length key. The main technical problem that in the prior art, holes exist, and safety is not sufficiently high are solved. The internet communication encryption method which has the infinite length key and is safe and reliable is provided. The infinite length key internet communication encryption method has the advantages that a third-party platform is used as a communication media party, a receiver and a sender use different keys, the infinite length key is obtained through a random position, therefore, safety is high, the encryption algorithm is simple, the quantity of calculations is small, the key is large in size, and a pointer is adopted for enabling an eavesdropper to be not capable of obtaining the real initial position.

Description

technical field [0001] The invention relates to the field of Internet communication security, in particular to an Internet communication encryption method with an infinitely long key which is decrypted and re-encrypted through a transfer platform. Background technique [0002] The openness of Internet communication makes it difficult to guarantee the confidentiality of communication, especially there is no secret at all in the last network segment, and the computers in the segment can receive any information from other computers. Therefore, communicating in the clear is tantamount to publishing information publicly. The content that requires encrypted communication is very wide. Although there is no ulterior secret for ordinary people. However, for various types of online payments that are increasingly popular and some communications that require identity verification, the information cannot be stolen. Otherwise, the money in the personal account will be stolen, and some ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 金子光
Owner 金子光
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products