Unlock instant, AI-driven research and patent intelligence for your innovation.

Multiplayer online dynamic encryption method and apparatus

A dynamic encryption and encrypted technology, used in secure communication devices and key distribution, can solve problems such as slow processing speed, and achieve the effect of ensuring decryption speed and information transmission security.

Active Publication Date: 2017-02-22
BEIJING DATANG TELECOM CONVERGENCE COMMTECH
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Asymmetric encryption is more secure than symmetric encryption, but is slower to process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multiplayer online dynamic encryption method and apparatus
  • Multiplayer online dynamic encryption method and apparatus
  • Multiplayer online dynamic encryption method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] The present invention is a software program implemented by J2EE. The main principle is to support multiple people to input different key fragments they have mastered online in real time. Through the background program, the key fragments of multiple people are mixed into key A according to the set mechanism. . Key A is encrypted with private key M through an asymmetric encryption algorithm to generate ciphertext B encrypted by key A. Pass the ciphertext B and the data encrypted with the key A to the data receiver, and the receiver uses the public key M corresponding to the private key M to decrypt the key B, restore the key A, and then use the key A to encrypt the encrypted data File decryption.

[0035] The method of dynamically generating keys by inputting key fragments online by multiple people allows the encrypted password to change every time without setting an expiration time limit. The complete key is obtained, and the technical method of transmitting the symmet...

Embodiment 2

[0039] Due to business needs, a certain operator needs to make a large number of recharge cards, and the password of the recharge card needs to be sent to the card manufacturer. In this process, the invented technology is used to encrypt and transmit the recharge card password to the cooperative card manufacturer. Mass production of recharge cards.

[0040] When transferring, multiple employees of the operator input their own key fragments online (the input is different for each data transfer), and when all the input is completed, the key fragments are synthesized into a unique key using an obfuscation program. Then use the unique key to encrypt the password data of the recharge card. At the same time, the unique key itself is also passed to the third-party card manufacturer through asymmetric encryption. The card manufacturer uses the built-in decryption logic of the decryption program to restore the unique key, and then use Unique key restores encrypted files.

[0041] In t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multiplayer online dynamic encryption method and apparatus. The method comprises the following steps: obtaining different key sections input by multiple players online in real time, mixing the key sections of the multiple players to a key A by a background program; encrypting the key A by using a private key M through an asymmetric encryption algorithm to generate ciphertext B of the encrypted key A; and transmitting the ciphertext B and data encrypted by the key A to a data receiver, encrypting a key B by the data receiver by using a public key M corresponding to the private key M to reduce the key A, and decrypting an encrypted data file by using the key A. According to the multiplayer online dynamic encryption method and apparatus disclosed by the invention, the security and efficiency problems in password generation, transmission and use are well solved by the unique key generation and the asymmetric key transmission.

Description

technical field [0001] The invention relates to the field of online dynamic encryption, in particular to a multi-person online dynamic encryption method and device. Background technique [0002] Encryption technology: Encryption technology is the main security measure for electronic information, and it is the most commonly used security method. The process uses technical means to convert important data into unreadable garbled files (ciphertext) for transmission. After reaching the destination Then use the same or different means to restore the original data (decryption). Encryption technology is mainly divided into symmetric encryption and asymmetric encryption. [0003] Key: A key is a parameter that is entered in an algorithm that converts plaintext to ciphertext or ciphertext to plaintext. Keys are divided into symmetric keys and asymmetric keys. Its existence form can be a character string, a digital certificate or a USB-Shield. [0004] Symmetric encryption: Symmetr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0822H04L9/0825H04L63/0428H04L63/045H04L63/0457
Inventor 姜冰张彬彬
Owner BEIJING DATANG TELECOM CONVERGENCE COMMTECH