Communication encryption verification method, device, computer equipment and storage medium

A verification method and computer technology, which are applied in the field of communication security, can solve the problems of judging the encryption status of the inability to communicate, and achieve the effect of accurate and reliable judgment results and encryption status judgment results.

Active Publication Date: 2022-02-11
SUZHOU KEDA TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Therefore, the technical problem to be solved by the present invention is to overcome the defect in the prior art that cannot accurately judge the encryption status of the communication process, thereby providing a communication encryption verification method and device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication encryption verification method, device, computer equipment and storage medium
  • Communication encryption verification method, device, computer equipment and storage medium
  • Communication encryption verification method, device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] In order to keep the communication process confidential, some R&D personnel try to encrypt the communication process by means of national secrets, so as to ensure the security and reliability of the communication process. When studying the use of national secrets to encrypt the communication process, not only the encryption method must be studied, but also the encryption must be verified. At present, the research and development personnel indirectly check the terminal encryption status through the protocol version number, but because there is no There are public standards, and there may be misjudgments in judging only by this method.

[0029] An embodiment of the present invention provides a verification method for communication encryption, such as figure 1 shown, including:

[0030] Step S101: Obtain the communication transmission data transmitted by the communication parties, where the communication transmission data is the first original data transmitted after the c...

Embodiment 2

[0061] This embodiment provides a verification device for communication encryption, such as Figure 9 shown, including:

[0062] The communication transmission data acquisition module 110 is used to acquire the communication transmission data transmitted by the communication parties. The communication transmission data is the first original data transmitted after the communication is established by the communication parties. For a detailed description, see the description of step S101 in the above-mentioned embodiment 1.

[0063] The judging module 120 is configured to judge whether the first raw data contains the first key field. For a detailed description, refer to the description of step S102 in the first embodiment above.

[0064] Encryption determination module 130, if all the first original data contains the first key field, the encryption determination module 130 is used to determine that the data transmitted by the communication parties is encrypted. For detailed descr...

Embodiment 3

[0067] An embodiment of the present invention provides a computer device, such as Figure 10 As shown, the computer device mainly includes one or more processors 31 and memory 32, Figure 10 A processor 31 is taken as an example.

[0068] The computer device may also include: an input device 33 and an output device 34 .

[0069] Processor 31, memory 32, input device 33 and output device 34 can be connected by bus or other methods, image 3 Take connection via bus as an example.

[0070]The processor 31 may be a central processing unit (Central Processing Unit, CPU). Processor 31 can also be other general processors, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate array (Field-Programmable Gate Array, FPGA) or Other chips such as programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or combinations of the a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a verification method and device for communication encryption, wherein the verification method for communication encryption includes: obtaining communication transmission data transmitted by two parties in communication, where the communication transmission data is the first original data transmitted after the two parties establish communication; judging the first Whether the original data contains the first key field, where the first key field is the characteristic field generated by the encryption of the transmitted data by the two parties in communication; if all the first original data contain the first key field, then it is determined of data is encrypted. The verification method for communication encryption provided by the present invention analyzes the data generated in the communication process in depth, and finally obtains the judgment result of whether to encrypt or not, so the judgment result is more accurate and reliable.

Description

technical field [0001] The invention relates to the field of communication security, in particular to a verification method and device for communication encryption. Background technique [0002] Most of the national secrets are used for enterprise access control management, transmission encryption and storage encryption of various sensitive information within the enterprise. Process safety and reliability. When studying the use of national secrets to encrypt communications, it is not only necessary to study the encryption method, but also to verify whether the encryption is actually implemented. At present, R&D personnel indirectly check the encryption status of the terminal through the protocol version number, but because there is no There will be misjudgments only by this method based on the public standards. In order to ensure the security of communication, it is an urgent problem to be solved to verify whether the encryption is encrypted or not. Contents of the inven...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/08
CPCH04L63/0428H04L9/0838H04L69/22
Inventor 朱杰周登祥胡懿敏许世林
Owner SUZHOU KEDA TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products