Communication encryption method and system

An encryption method and encryption module technology, applied in the fields of electronic information and the Internet of Things, can solve problems such as inability to protect user privacy, achieve the effects of improving security, strengthening privacy protection, and protecting user privacy

Inactive Publication Date: 2017-08-11
南京优尼科软件有限公司
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The existing related communication encryption technology server can obtain user information through instructions, but cannot protect user privacy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication encryption method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to make the purpose, technical solution and advantages of the present invention clearer, the technical solution of the present invention will be described in detail below. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other implementations obtained by persons of ordinary skill in the art without making creative efforts fall within the protection scope of the present invention.

[0031] The first preferred technical solution

[0032] The core idea embodied in the anti-theft door encryption algorithm is not to save the password entered by the user to the server, so as to protect the privacy of the user technically. Each door will have a mk (the identity of the door) when it is generated, and the first user of each door is the super administrator of this door, and the super administrator can assign ordinary administrators to this door.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a communication encryption method and system. Each door has a fixed identity mark mk, this identity exists in the production of each door, and the mk is an only communication key to each door. The user can set an own (user 1) private password mk1, the exclusive or operation between mk1 and mk is carried out to get mk2, and the mk2 is saved to a server. Then the user 1 sets a key mk1' for other general administrators (user 2), the exclusive or operation between mk1 and mk2 is carried out to obtain mk, the exclusive or operation between mk and mk1' is carried out to obtain mk2', and mk2' is stored in the server. The addition mode of each new user is identical, and the key to each user' room is unique. When the user needs to open the door, the user sends their own private password mk1 to the server, the server combines the user's mk1 and mk2 stored in the server to get the final key mk, and the mk is destroyed immediately after use. Therefore, mk cannot be leaked when the user' key is leaked or the server is broken by the hacker.

Description

technical field [0001] The invention relates to the fields of electronic information and the Internet of Things, in particular to a communication encryption method and system. Background technique [0002] Confidential communication, computer keys, anti-copy floppy disks, etc. all belong to information encryption technology. Encryption in the communication process mainly uses passwords. In digital communication, computers can use encryption methods to change the digital structure of the load information. Computer information protection is mainly based on software encryption. At present, the most popular encryption systems and encryption algorithms in the world are: RSA algorithm and CCEP algorithm. In order to prevent cracking, encryption software often uses hardware encryption and encrypted floppy disks. Some software products often have a small hard card, which is the hardware encryption method. Use laser perforation on the floppy disk to make the software storage area...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 郦恒叶兆屏金晔昕
Owner 南京优尼科软件有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products