Unlock instant, AI-driven research and patent intelligence for your innovation.

Secure communication method, device, mobile terminal and storage medium

A secure communication and algorithm technology, applied in the field of information encryption and decryption, can solve problems such as brute force cracking of user passwords, single encryption method, loss of privacy, etc., and achieve the effect of preventing interception or tampering, preventing being read, and ensuring safe and stable operation

Active Publication Date: 2021-10-29
ONE CONNECT SMART TECH CO LTD SHENZHEN
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to propose a secure communication method, device, mobile terminal and storage medium to solve the deficiencies in the above-mentioned background technology, and to solve economic problems caused by the single encryption method between existing systems, user passwords being cracked by violence, and confidential information leakage. In order to avoid serious problems such as loss and privacy exposure, multiple encryption methods are used to shield security vulnerabilities to prevent user privacy information or important business data from being stolen, and data from being intercepted or tampered with by a third party, thereby ensuring the safe and stable operation of the system. Two checkpoints for password verification to avoid information leakage and ensure that the caller of the data access interface has matching permissions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure communication method, device, mobile terminal and storage medium
  • Secure communication method, device, mobile terminal and storage medium
  • Secure communication method, device, mobile terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0051] Such as figure 1 As shown, the present invention provides a kind of technical scheme:

[0052] A secure communication method, the specific steps of the secure communication method are as follows:

[0053] S1: The interface caller on the client calls the interface provided by the server, generates a secret key and an algorithm, performs encryption operations on the business parameters and the secret key respectively, generates the corresponding business para...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to the technical field of information encryption, in particular to a secure communication method, device, mobile terminal and storage medium, comprising the steps of: generating a secret key, an algorithm and a ciphertext, performing an obfuscation operation, performing a summary operation to generate signature data; Encode, generate a new string, and send it to the server together with the AppID of the caller as a parameter; obtain the license data according to the AppID, verify the validity of the data and service call permissions, and confuse the secret in the license data with the ciphertext in the parameter to generate a signature , perform signature comparison and verify legality; decrypt the ciphertext in the parameter to obtain the secret key and then decrypt it twice, generate plaintext and send it to the transaction core, obtain the response result data, encrypt and generate ciphertext and send it to the client; apply the secret key and algorithm Decrypt to generate plaintext. The invention adopts multiple encryption methods to ensure the safe and stable operation of the system and avoid information leakage.

Description

technical field [0001] The present invention relates to the technical field of information encryption and decryption, in particular to a secure communication method, device, mobile terminal and storage medium. Background technique [0002] In the information age, communication is an indispensable foundation, which not only facilitates the connection between people but also is more conducive to social management. However, how to ensure the security of communication information is the top priority. At this time, information encryption must be introduced. technology. [0003] At present, the network communication encryption platforms in the domestic market are mainly divided into two categories: dedicated encryption chips and software encryption systems. The development cost of dedicated encryption chips is high. In most cases, only one encryption algorithm can be implemented, and it is difficult to connect well with upper-layer applications, so that most dedicated encryption ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3247H04L9/3249H04L63/045H04L63/0876
Inventor 菅文涛洪光宝
Owner ONE CONNECT SMART TECH CO LTD SHENZHEN