Unlock instant, AI-driven research and patent intelligence for your innovation.

End-to-end communication encryption method and device

An encryption method and algorithm technology, applied in the field of communication security, can solve the problems of low communication security, stealing and leakage, and inability to encrypt communication information, and achieve the effect of high communication security and ensuring communication security.

Active Publication Date: 2019-01-04
SHENZHEN FORWARD IND CO LTD
View PDF8 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in practice, it is found that the existing encrypted communication methods cannot encrypt the communication information inside the LAN, so that the communication information inside the communication network is transmitted in the form of plain text, there is a risk of theft and leakage, and the communication security is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • End-to-end communication encryption method and device
  • End-to-end communication encryption method and device
  • End-to-end communication encryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] see figure 1 , figure 1 It is a schematic flowchart of an end-to-end communication encryption method provided by an embodiment of the present invention. Among them, such as figure 1 As shown, the end-to-end communication encryption method may include the following steps:

[0047] S101. Before the sending device sends the information to be communicated to the receiving device, obtain the key information generated by the private key generation server.

[0048] In this embodiment, both the sending device and the receiving device are electronic devices with a communication function. The communication device can be a wired communication device or a wireless communication device, specifically, a smart phone (such as an Android phone, an iOS phone, etc.), a tablet computer, a handheld computer, a smart watch, a mobile Internet device (Mobile Internet Devices, MID), a PC, etc. equipment, which is not limited in this embodiment.

[0049] As an optional implementation manner...

Embodiment 2

[0071] see figure 2 , figure 2 It is a schematic flowchart of an end-to-end communication encryption method provided by an embodiment of the present invention. Among them, such as figure 2 As shown, the end-to-end communication encryption method may include the following steps:

[0072] S201. Before the sending device sends the information to be communicated to the receiving device, acquire the key information generated by the private key generation server.

[0073] In this embodiment, the key information includes the public key information published by the private key generation server, the public key information corresponding to the private key generation server, the encrypted random number generated by the private key generation server, and the public key information published by the private key generation server. The algorithm and the private key information corresponding to the sending device are not limited in this embodiment.

[0074] S202. Generate a decryption ...

Embodiment 3

[0102] see image 3 , image 3 It is a schematic structural diagram of an end-to-end communication encryption device provided by an embodiment of the present invention. Among them, such as image 3 As shown, the end-to-end communication encryption device includes:

[0103] The obtaining module 301 is used to obtain the key information generated by the private key generation server when the information to be communicated is sent to the receiving device; and generate a decryption key for communication decryption according to the preset double interactive key generation algorithm and key information session key.

[0104] In this embodiment, the double interactive key generation algorithm includes a decryption algorithm and an encryption algorithm.

[0105] In this embodiment, during the process of encrypted communication between the private key generation server and the sending device through the double interactive key generation algorithm, there will be an exchange of encryp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an end-to-end communication encryption method and device. The method comprises acquiring the key information generated by a private key generation server when the information to be communicated is sent to a receiving device; generating a decryption session key according to the preset double-interaction key generation algorithm and the key information, determining whether the identity verification success information is received or not; if the identity verification success information is received, receiving the encryption private key information sent by the private key generation server, and decrypting the encryption private key information according to the decryption session key to obtain the private key information; obtaining the public key information corresponding to the receiving equipment and generating the encryption session key according to the preset zero-interaction key generation algorithm, private key information, and the public key information; and encrypting the information to be communicated according to the encryption session key to obtain encrypted communication information, and sending the encrypted communication information to the receivingequipment. According to the terminal-to-end communication encryption method and device, communication encryption between any two communication devices can be realized, the safety is high, and the communication safety between the communication networks and inside the communication network can be effectively guaranteed.

Description

technical field [0001] The present invention relates to the technical field of communication security, in particular, to an end-to-end communication encryption method and device. Background technique [0002] Communication security issues are closely related to people's lives. In order to prevent the communication data from being stolen by others during the communication process, the communication data needs to be encrypted. When the communication between local area networks is carried out through the existing encrypted communication method, when the communication information leaves the local area network where the sending device is located, the network communication device connected to the sending device will encrypt the communication information to obtain the communication ciphertext, Then the communication information is transmitted through the Internet in the form of communication ciphertext. When it reaches the local area network where the receiving device is located, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/08H04L9/32
CPCH04L9/0822H04L9/083H04L9/0869H04L9/3247H04L63/0442H04L63/062
Inventor 张帆熊浩
Owner SHENZHEN FORWARD IND CO LTD