Information encryption and decryption processing method and system

A processing method and encryption and decryption technology, applied in the field of information encryption and decryption processing methods and systems, can solve problems such as information content leakage, hidden dangers of end user information security, and inability to control information content security, so as to improve security and avoid information leakage. Effect

Inactive Publication Date: 2016-03-30
THUNDERSOFT
View PDF11 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Specifically, traditional smart phones and other mobile terminals cannot safely control the information content after the short message is sent. If the information is intercepted during the transmission process, it will lead to the leakage of the information content, thereby providing a guarantee for the information security of end users. It brings great hidden dangers. Based on this, it is urgent to provide a short message encryption and decryption processing scheme for terminal equipment in this field to ensure the security of terminal information.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information encryption and decryption processing method and system
  • Information encryption and decryption processing method and system
  • Information encryption and decryption processing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0072] Embodiment 1 of the present invention discloses an information encryption and decryption processing method applicable to a sending terminal. The sending terminal may specifically be a mobile terminal such as a smart phone, a wearable device, or a tablet computer. Refer to figure 1 , the information encryption and decryption processing method may include the following steps:

[0073] S101: Obtain identification information of a target receiving terminal and pre-stored public key parameters.

[0074] This application aims to implement end-to-end encryption of user information such as user short messages based on asymmetric encryption technology, so as to prevent any third party from obtaining the information content of the end user. This embodiment specifically uses a mobile phone device as an example to encrypt and decrypt the information The processing method is described, wherein the identification information may be information such as a mobile phone number that can i...

Embodiment 2

[0086] Embodiment 2 of the present invention discloses an information encryption and decryption processing method applicable to a receiving terminal. Refer to figure 2 , the information encryption and decryption processing method may include the following steps:

[0087] S201: Receive and identify encrypted information;

[0088] S202: When it is recognized that the received information is encrypted information, acquire a pre-stored private key of the receiving terminal;

[0089] S203: Perform preset decryption processing on the encrypted information based on the private key to obtain decrypted information.

[0090] When the receiving terminal receives the encrypted information sent by the sending terminal, it first recognizes that the received information is encrypted information through the encrypted identification of the information header, such as "#", "*" or "$", and then filters out the information header Part of the encrypted identification to obtain ciphertext inform...

Embodiment 3

[0094] Embodiment 3 of the present invention discloses a sending terminal, refer to image 3 , the sending terminal includes a first acquiring module 301 , a generating module 302 , an encryption processing module 303 and a sending module 304 .

[0095] The first obtaining module 301 is configured to obtain identification information of a target receiving terminal and pre-stored public key parameters.

[0096] The generation module 302 is configured to use the identification information and the public key parameters to generate the public key of the target receiving terminal.

[0097] The encryption processing module 303 is configured to perform preset encryption processing on the target information based on the public key to obtain encrypted information.

[0098] Wherein, the encryption processing module 303 includes an encryption unit and an encryption identification adding unit.

[0099] An encryption unit, configured to use the public key to encrypt the target informatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an information encryption and decryption processing method, a sending terminal, a receiving terminal and an information encryption and decryption processing system. According to the method, a public key of a target receiving terminal is generated at the sending terminal based on identification information of the target receiving terminal, information to be sent is encrypted by the generated public key to improve the security of the information, the received encrypted information is decrypted by a particular private key of the terminal at the receiving terminal. Therefore, end-to-end encryption of the user information is realized by a "public key-private key" key based on the asymmetric encryption technology, any third party cannot obtain the information contents of a user, so information leakage of terminal information resulting from illegal interception and other reasons in a transmission process is avoided, and the security of the terminal information is further improved.

Description

technical field [0001] The invention belongs to the technical field of terminal information security, and in particular relates to an information encryption and decryption processing method and system. Background technique [0002] With the development and popularization of mobile terminals such as smart phones, users have higher and higher security awareness and security requirements for terminal information. In order to ensure the security of user terminal information, the encryption of terminal information has become the focus of attention in this field. [0003] Specifically, traditional smart phones and other mobile terminals cannot safely control the information content after the short message is sent. If the information is intercepted during the transmission process, it will lead to the leakage of the information content, thereby providing a guarantee for the information security of end users. This brings great hidden dangers. Based on this, there is an urgent need in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L63/0428H04L9/0825H04L63/0876
Inventor 吴春阳杨光王四军
Owner THUNDERSOFT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products