End-to-end communication encryption method and device
An encryption method and algorithm technology, applied in the field of communication security, can solve the problems of low communication security, stealing and leakage, and inability to encrypt communication information, and achieve the effect of high communication security and ensuring communication security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0046] see figure 1 , figure 1 It is a schematic flowchart of an end-to-end communication encryption method provided by an embodiment of the present invention. Among them, such as figure 1 As shown, the end-to-end communication encryption method may include the following steps:
[0047] S101. Before the sending device sends the information to be communicated to the receiving device, obtain the key information generated by the private key generation server.
[0048] In this embodiment, both the sending device and the receiving device are electronic devices with a communication function. The communication device can be a wired communication device or a wireless communication device, specifically, a smart phone (such as an Android phone, an iOS phone, etc.), a tablet computer, a handheld computer, a smart watch, a mobile Internet device (Mobile Internet Devices, MID), a PC, etc. equipment, which is not limited in this embodiment.
[0049] As an optional implementation manner...
Embodiment 2
[0071] see figure 2 , figure 2 It is a schematic flowchart of an end-to-end communication encryption method provided by an embodiment of the present invention. Among them, such as figure 2 As shown, the end-to-end communication encryption method may include the following steps:
[0072] S201. Before the sending device sends the information to be communicated to the receiving device, acquire the key information generated by the private key generation server.
[0073] In this embodiment, the key information includes the public key information published by the private key generation server, the public key information corresponding to the private key generation server, the encrypted random number generated by the private key generation server, and the public key information published by the private key generation server. The algorithm and the private key information corresponding to the sending device are not limited in this embodiment.
[0074] S202. Generate a decryption ...
Embodiment 3
[0102] see image 3 , image 3 It is a schematic structural diagram of an end-to-end communication encryption device provided by an embodiment of the present invention. Among them, such as image 3 As shown, the end-to-end communication encryption device includes:
[0103] The obtaining module 301 is used to obtain the key information generated by the private key generation server when the information to be communicated is sent to the receiving device; and generate a decryption key for communication decryption according to the preset double interactive key generation algorithm and key information session key.
[0104] In this embodiment, the double interactive key generation algorithm includes a decryption algorithm and an encryption algorithm.
[0105] In this embodiment, during the process of encrypted communication between the private key generation server and the sending device through the double interactive key generation algorithm, there will be an exchange of encryp...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


