Unlock instant, AI-driven research and patent intelligence for your innovation.

Encrypted communication method based on application layer

A technology for encrypted communication and encryption method, applied in the field of communication security, can solve problems such as data body encryption, and achieve the effect of preventing data counterfeiting

Active Publication Date: 2020-12-11
STATE GRID ZHEJIANG TONGXIANG POWER SUPPLY
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main existing encryption scheme of the present invention only encrypts the data body and does not encrypt the data body, causing hackers to affect the business by intercepting the data header. Encrypting the data header will solve the problem of communication services, and provide a virtual data header by setting. The encrypted communication method based on the application layer and the virtual data head will change in real time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypted communication method based on application layer
  • Encrypted communication method based on application layer
  • Encrypted communication method based on application layer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0045] This embodiment is an encryption communication method based on the application layer, which is used for mutual communication between the first client and the second client, including a method for encrypting information sent by the first client for the first time, a method for decrypting information received by the second client for the first time, The second client information reply encryption method and the first client first information reception decryption method, the first client first information transmission encryption method includes as follows: figure 1 As shown, the following steps:

[0046] S01: Generate the first virtual data header. The virtual data header includes a version number, data length and data type. The data length is the length of the data body that forms user data with the virtual data header. The version number and data type are based on the preset The rules are changed, and the same rules are stored in the first client and the second client, th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an encrypted communication method based on an application layer. The method comprises a first client first information sending encryption method, a second client first information receiving decryption method, a second client information reply encryption method and a first client first information receiving decryption method. The first client first information sending encryption method comprises the following steps: generating a first virtual data head; generating first user data; generating a second virtual data head, and adding the second virtual data head into the first data receiving white list; establishing and storing a first mapping relation table; generating and sending a first ciphertext; generating second user data; and encrypting the data volume of the second user data to obtain third user data, and sending the third user data. The method has the advantages that it is guaranteed that original data head information is not leaked, and an opposite clientcan be informed of the virtual data head corresponding to the original data head; a hacker can be prevented from intercepting a data head to counterfeit data; the problem that the ciphertext size andwhen to start decryption cannot be determined due to data head encryption is avoided.

Description

technical field [0001] The invention relates to the technical field of communication security, in particular to an encryption communication method based on an application layer. Background technique [0002] Since the 20th century, with the development of computer technology, network transmission technology has become an important means of information transmission in the fields of industry, agriculture and national defense, and gradually began to enter other fields of society. As the network gradually penetrates into people's life, work and entertainment, the information security problem in the network transmission process has increasingly become a hot spot that everyone pays attention to. In order to improve the security of user information in network transmission, network transmission data encryption technology has gradually become a research hotspot. At present, the commonly used data encryption technologies include digital signature authentication, personal identity aut...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/60
CPCH04L63/12H04L63/0428H04L69/164H04L69/22G06F21/602
Inventor 胡遨洋钱伟朱重希花志伟刘书涵徐宏
Owner STATE GRID ZHEJIANG TONGXIANG POWER SUPPLY