Communication encryption method based on communication network

An encryption method and communication network technology, applied in the field of communication encryption, can solve the problems of low confidentiality of encrypted communication methods, communication eavesdropping, etc., and achieve the effects of convenient generation, flexible and simple negotiation, and high confidentiality.

Inactive Publication Date: 2014-03-26
QINGDAO HISENSE ELECTRONICS EQUIP
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the problem of low confidentiality of the existing encrypted communication methods, the present invention provides a communication encryption method based on a communication network, which adopts a user-defined key method, and the system side cannot eavesdrop on the communication, and has stronger confidentiality

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication encryption method based on communication network
  • Communication encryption method based on communication network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] Embodiment one, see figure 1 As shown, this embodiment discloses a communication encryption method based on a communication network, comprising the following steps:

[0026] S1. Before performing encrypted communication, the terminal first completes the initialization of local data, and then the terminal performs system-side authentication and registration;

[0027] S2. Select a custom key mode, negotiate a custom key between terminals, and save the custom key in each terminal;

[0028] S3. Steps for enabling the terminal custom key, selecting to enable the negotiated custom key;

[0029] S4. Communication encryption steps:

[0030] S41. One terminal initiates an encrypted call request with an encryption type identifier to another terminal;

[0031] S42. According to the encrypted identification, if the called party terminal determines that the communication is encrypted with a custom key, find out the custom key enabled and stored in the local terminal, and use an a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a communication encryption method based on a communication network. The communication encryption method based on the communication network is characterized by comprising the following steps that (1) authentication and registration are conducted on the system side of terminals; (2) secret keys are self-defined between the terminals, and the self-defined secret keys are stored in the terminals; (3) the self-defined secret keys of the terminals start to be used; (4) communication encryption is conduced, wherein communication encryption comprises the steps that (41) one terminal makes an encryption call request with an encryption identification to the other terminal, (42) if the called-party terminal judges out self-defined encryption communication according to the encryption identification, a working secret key which is processed through the corresponding self-defined secret key starts to be used, (43) the called party accepts communication, the terminals of the two parties respectively conduct encryption or decryption on communication data with the working secret keys which are processed through the corresponding self-defined secret keys, and encryption communication is conducted. By the adoption of the communication encryption method based on the communication network, the self-defined secret keys can be allocated offline through coordination, so that the confidentiality is higher, the privacy is better, and monitoring of communication cannot be realized on the system side.

Description

technical field [0001] The invention belongs to the technical field of communication encryption methods, and in particular relates to a communication network-based communication encryption method. Background technique [0002] The current encryption communication method is mainly based on the encryption communication under the management control of the network side management device, and its registration, key management, key negotiation and other behaviors are all under the control of the key management server, which is a An encrypted communication system with purely centralized management. This method realizes the controllability and confidentiality of communication activities. However, the encrypted communication in this method completely depends on the management of equipment such as the key management server on the system side. To a certain extent, its confidentiality is not reliable. For example, when internal If there is a problem with the personnel, the key informati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04W12/02
Inventor 邵东志
Owner QINGDAO HISENSE ELECTRONICS EQUIP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products