Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure interaction method and device based on information transmission

An information transmission and interaction method technology, applied in the field of information transmission-based security interaction methods and devices, can solve problems such as illegal attack security risks, and achieve the goal of ensuring security protection capabilities, improving work efficiency, and ensuring data confidentiality and integrity. Effect

Active Publication Date: 2019-11-19
NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are certain security risks in illegal attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure interaction method and device based on information transmission
  • Secure interaction method and device based on information transmission
  • Secure interaction method and device based on information transmission

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The specific implementation manners of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0048] The present invention provides a safe interaction method based on information transmission, such as figure 1 shown, including:

[0049] S1 After the receiving end completes the two-way identity authentication with the sending end, it obtains the transmission ciphertext from the sending end;

[0050] S2 determines the secondary obfuscation character position in the transmission ciphertext based on the number of characters in the transmission ciphertext after deleting the first and last characters;

[0051] S3 decrypts the transmission ciphertext with the first character, the last character and the secondary obfuscated character deleted, and obtains the primary decrypted ciphertext;

[0052] S4 Determine the position of the primary obfuscation character in the primary decryption ciphertext based on the character length of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a secure interaction method and device based on information transmission. The secure interaction method comprises the steps: obtaining a transmission ciphertext from a transmitting end after a receiving end completes the bidirectional identity authentication with the transmitting end; determining the position of a secondary confusion character in the transmission ciphertextbased on the number of the transmission ciphertext characters after the first character and the last character are deleted; decrypting the transmission ciphertext with the first character, the last character and the secondary confusion character deleted to obtain a primary decrypted ciphertext; determining the position of a primary confusion character in the primary decryption ciphertext based onthe character length of the primary decryption ciphertext; and obtaining an original text before encryption of the sending end based on the position of the primary confusion character. According to the scheme, the defect that the confidentiality and integrity of information transmission cannot be guaranteed is overcome, and the safety protection level of longitudinal communication between encryption and decryption terminals is improved, and meanwhile, the potential safety hazard of attacks is solved.

Description

technical field [0001] The present invention relates to a decryption method and device, in particular to a method and device for safe interaction based on information transmission. Background technique [0002] The current transmission between systems is mainly through http and https transmission. When transmitting sensitive information, such as authentication information, passwords, phone numbers, personal identity information, personal property information, etc., the following methods are usually used: [0003] Clear text transmission without any action; [0004] Use irreversible encryption algorithm to encrypt transmission; [0005] The transmission is encrypted using a common reversible encryption algorithm. [0006] The limitations of the above three methods are as follows: [0007] Plain text transmission: without any protection, the security is poor, the attack cost is too low for the attacker, the information security is poor, and it is very easy to cause the leak...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/0869
Inventor 杨鹏
Owner NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products