Dynamic encryption method, terminal and server

A dynamic encryption and server technology, applied to the usage of multiple keys/algorithms, user identity/authority verification, digital transmission systems, etc., can solve cumbersome operations, waste of network resources, and failure to meet the requirements of dynamic keys and tamper-proof and other issues to achieve the effect of ensuring tamper-proof and improving security

Active Publication Date: 2017-04-05
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The existing HTTPS technology requires high computing resources due to the use of asymmetric encryption algorithms, and requires a session handshake mechanism of Secure Socket Layer / Transport Layer Security (SSL / TLS, Secure Socket Layer / Transport Layer Security), which wastes network resources; In terms of configuration, authentication certificates need to be prepared, and follow-up maintenance is required, and the operation is cumbersome
[0005] Simple symmetric encryption systems such as Advanced Encryption Standard (AES, Advanced Encryption Standard) cannot meet the requirements of dynamic keys and tamper-proof

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic encryption method, terminal and server
  • Dynamic encryption method, terminal and server
  • Dynamic encryption method, terminal and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to understand the characteristics and technical contents of the embodiments of the present invention in more detail, the implementation of the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. The attached drawings are only for reference and description, and are not intended to limit the embodiments of the present invention.

[0056] figure 1 It is a schematic flow chart of the dynamic encryption signature method in Embodiment 1 of the present invention. The dynamic encryption signature method in this example is applied to the terminal side, such as figure 1 As shown, the dynamic encryption signature method comprises the following steps:

[0057] Step 101: Generate more than one key and more than one signature through raw data.

[0058]Here, the terminal can be a fixed electronic device such as a personal computer (PC, Personal Computer), or a portable electronic device such as a personal digi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a dynamic encryption method, a terminal and a server. The method comprises: generating more than one secret keys and more than one signatures through native data; when the session connection is performed, selecting a predetermined first secret key index and random first signature index; according to the first secret key index and random first signature index, indexing a first secret key and a first signature from the more than one secret keys and the more than one signatures; employing the first signature to perform signature of the session request data, and employing the first secret key to perform encryption of the session request data and then send the encrypted session request data to a server; and after the server performs decryption of the session request data and the signature checking passes, receiving the session response data which employs random second signature to perform signature and employs random second secret key to perform encryption.

Description

technical field [0001] The invention relates to encryption technology, in particular to a dynamic encryption method, a terminal and a server. Background technique [0002] The communication between the terminal and the server generally uses a security-oriented Hypertext Transfer Protocol channel (HTTPS, Hyper Text Transfer Protocol over Secure Socket Layer) to authenticate the server's identity and establish a trusted channel, specifically through the browser's CA certificate Authenticate the server certificate to obtain the server's public key, and use the server's public key and the private key stored in the server to negotiate an asymmetric key. Once negotiated, it will be kept in the session object. Both the terminal and the server use asymmetric key encryption in subsequent sessions. [0003] The communication between the terminal and the server can also develop a symmetric encryption system through the business itself, and hard-code the symmetric key to the terminal. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/18H04L29/06
CPCH04L9/14H04L9/0869H04L9/3247H04L9/3297H04L63/0457H04L63/061
Inventor 郭懿心于航汪春杜现华
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products