Cloud-based secure instant messaging method and system

A secure and cloud-based technology, applied in the field of data security, can solve the problems of difficulty in fully ensuring the security of the entire communication chain, uncontrolled core keys, and not managed by users, achieving strong heterogeneity, high security, and compatibility. good effect

Active Publication Date: 2017-02-15
CHINESE PEOPLE'S PUBLIC SECURITY UNIVERSITY +1
View PDF7 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] However, the above existing technologies have the following disadvantages: in this scheme, the key management center is placed on the Internet platform and is not managed by the user, which means that the core key is not controlled, so in principle, all data generated based on this key also not trust...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud-based secure instant messaging method and system
  • Cloud-based secure instant messaging method and system
  • Cloud-based secure instant messaging method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0101] Micro police instant messaging system

[0102] Through the micro-police app, data sharing and information exchange among police officers can be realized. However, due to the implementation based on the cloud platform, point-to-point data transmission and data storage security on the cloud platform have been greatly challenged.

[0103] Technical implementation: The overall security technical implementation is divided into three parts:

[0104] 1. User initialization process. It mainly realizes the security requirements for users to obtain TIK and TLMK.

[0105] 2. Secure communication process. It mainly realizes the security requirements for users to obtain TMK and TAK.

[0106] 3. Data encryption storage process. It mainly realizes the security requirements of users to encrypt data through TLMK.

[0107] The specific implementation process is similar to the above, and will not be repeated here.

Embodiment 2

[0109] Encrypted Call Service of Telecom Operators

[0110] 1. Card making business

[0111] 1) Insert the TF card into the KMC;

[0112] 2) KMC burns the key pair into the TF card;

[0113]3) The ID and key pair of the TF card are stored in the KMC key store, and the key is generated but not activated at this time;

[0114] 4) The TF card storing the key is completed;

[0115] 5) Transfer the TF card to the card issuing center (business hall);

[0116] 2. Card issuance business

[0117] 1) The card issuing center hands over the TF card to the user;

[0118] 2) Insert the TF card into the mobile phone;

[0119] 3) Send SMS to activate encryption service;

[0120] 4) Activate the key stored in this TF card;

[0121] 5) Card issuance is complete.

[0122] 3. Encrypted video call service

[0123] 1) Zhang San sends a data packet;

[0124] 2) Encrypt the data through the terminal session key;

[0125] 3) Li Si receives the encrypted data packet;

[0126] 4) Decrypt th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud-based secure instant messaging method and system. The system comprises a sending end, a receiving end and a communication application server which are arranged at a cloud and a locally arranged key management center (KMC), wherein the KMC generates terminal initialization keys (TIKs), transmission master keys (TMKs), terminal local master keys (TLMKs) and terminal application keys (TAKs) and sends the keys to the sending end and the receiving end; the sending end and the receiving end each comprise a communication module and a key module, the communication module receives key data, the key module is in charge of decrypting, storing and managing the key data, establishing an encryption channel by use of the received TAKs, and the TAKs employed for establishing the encryption channel each time are different. Through the technical scheme provided by the invention, the safety of the whole system is high, the compatibility is good, and the isomerism is high.

Description

technical field [0001] The invention relates to the field of data security, in particular to a cloud-based secure instant communication method and system. Background technique [0002] As more and more applications are cloudified, efficiency has been improved, costs have been saved, and the speed of application construction has been accelerated. However, from a security point of view, due to the natural objective factors that separate data producers from data owners in the cloud, security issues are becoming more and more prominent. Especially in real-time communication applications, this problem is more obvious, such as whether the data transmitted by the two parties in the communication is eavesdropped? Whether the data stored in the cloud has been stolen by others, etc. [0003] To solve this problem, the best technical solution is to use encryption technology to realize data in the form of ciphertext during transmission, use, and storage, and then effectively prevent d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/58H04L29/06H04L29/08
CPCH04L51/04H04L63/0428H04L63/06H04L63/062H04L63/067H04L67/10
Inventor 李欣王志海郑涛胡诗妍何晋昊蒲鹏飞
Owner CHINESE PEOPLE'S PUBLIC SECURITY UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products