Multi-end message encryption transmission method and system

A technology for encrypting transmission and messages, which is applied in transmission systems, digital transmission systems, and key distribution. It can solve problems such as potential safety hazards and key leakage, so as to avoid the risk of attacks, improve the security of data transmission, and reduce the risk of attack interception. Effect

Active Publication Date: 2019-03-26
北京云中融信网络科技有限公司
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As the above-mentioned method is becoming more and more common, communication between multiple terminals has a very large security risk
[0004] The existing solution to improve security performance is to store the key required for communication in the server during multi-terminal communication, and multiple terminals synchronize the key through the server. However, this solution has the risk of key leakage when the server is attacked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-end message encryption transmission method and system
  • Multi-end message encryption transmission method and system
  • Multi-end message encryption transmission method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] figure 1 A schematic flowchart of a multi-terminal message encryption transmission method provided by an embodiment of the present invention is shown. The method is applied to multiple terminal groups, each terminal group corresponds to one user, and at least one terminal group includes multiple terminals.

[0063] The terminal may include any terminal device such as a computer (personal computer), a mobile phone, a tablet computer, a PDA (Personal Digital Assistant, personal digital assistant), and a vehicle-mounted computer.

[0064] For example, in an IM (Instant Messaging, instant messaging) system, the first terminal group A corresponding to the first user may include terminal A1, terminal A2, etc., and the second terminal group B corresponding to the second user may include terminal B1, terminal B2, etc. Wait. When the first user A and the second user B communicate, when a terminal in the second terminal group B sends a communication message to the first user A,...

Embodiment 2

[0166] Image 6 A schematic structural diagram of a multi-terminal message encryption transmission system provided by an embodiment of the present invention is shown. The multi-terminal message encryption transmission system 400 includes multiple terminal groups, and at least one terminal group includes multiple terminals in the multiple terminal groups.

[0167] Specifically, as Image 6 As shown, the multi-terminal message encryption transmission system 400 may include a first terminal group 410 and a second terminal group 420 , the first terminal group 410 may include multiple terminals 411 , and the second terminal group 420 may include multiple terminals 411 .

[0168] In some other embodiments, the first terminal group 410 may further include one terminal 411 , and the second terminal group 420 may include multiple terminals 411 . In some other embodiments, the first terminal group 410 may include multiple terminals 411 , and the second terminal group 420 may include o...

Embodiment 3

[0178] Figure 7 A schematic structural diagram of a multi-terminal message encryption transmission device provided by an embodiment of the present invention is shown. The multi-terminal message encryption transmission apparatus 500 is applied to multiple terminal groups, and at least one terminal group includes multiple terminals.

[0179] The multi-terminal message encryption transmission device 500 includes a first exchange module 510 , a first encryption module 520 , a second exchange module 530 , a second encryption module 540 , a first decryption module 550 and a second decryption module 560 .

[0180] The first exchange module 510 is configured to exchange a first key between a first terminal of a first terminal group and a second terminal of a second terminal group randomly selected by the first terminal.

[0181] The first encryption module 520 is used for the first terminal to encrypt the communication message according to the first key, and to send the encrypted co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multi-end message encryption transmission method and system. The method includes: exchanging a first key by a first terminal of a first terminal group and a second terminal of a second terminal group randomly selected by the first terminal; encrypting a communication message by the first terminal according to the first key, and sending encrypted communication message to all terminals of the second terminal group; exchanging a second key by all terminals other than the second terminal in the second terminal group and the second terminal; encrypting the first key by thesecond terminal according to the second key, and sending an encrypted first key to all the other terminals; decrypting the encrypted first key by all the other terminals according to the exchanged second key to obtain the first key; and decrypting the communication message by all the terminals in the second terminal group according to the first key. The method can realize encryption and decryption between the different terminal groups, and improve data transmission security.

Description

technical field [0001] The present invention relates to the technical field of terminal security, and in particular, to a method and system for encrypted transmission of multi-terminal messages. Background technique [0002] With the increasing development of social science and technology, the information Internet connects all things, and all aspects of life are inseparable from the network. In particular, the rapid development of the mobile Internet of Things in recent years has brought earth-shaking changes to people's production and lifestyle. Due to the development of communication technology and the popularization of intelligent terminals, terminals play an increasingly important role in users' lives, and users can interact, shop, and play games through the terminals. [0003] With the improvement of people's living standards, users are often not limited to interacting with other users through one terminal. For example, users can communicate online simultaneously throu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0822H04L63/0428H04L63/061H04L63/065
Inventor 赵炳东杜立召李淼杨攀
Owner 北京云中融信网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products