Unlock instant, AI-driven research and patent intelligence for your innovation.

A method of encrypted communication based on application layer

A technology of encrypted communication and encryption method, which is applied in the field of communication security and can solve problems such as data volume encryption

Active Publication Date: 2022-06-17
STATE GRID ZHEJIANG TONGXIANG POWER SUPPLY
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main existing encryption scheme of the present invention only encrypts the data body and does not encrypt the data body, causing hackers to affect the business by intercepting the data header. Encrypting the data header will solve the problem of communication services, and provide a virtual data header by setting. The encrypted communication method based on the application layer and the virtual data head will change in real time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of encrypted communication based on application layer
  • A method of encrypted communication based on application layer
  • A method of encrypted communication based on application layer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0045] This embodiment is an encrypted communication method based on an application layer, which is used for mutual communication between a first client and a second client. The second client information reply encryption method and the first client first information reception decryption method, the first client first information transmission encryption method includes: figure 1 shown, the following steps:

[0046] S01: generate a first virtual data header, the virtual data header includes a version number, a data length and a data type, the data length is the length of a data body that forms user data with the virtual data header, and the version number and the data type are according to preset The rules are changed, and the same rules are stored in the first client and the second client, that is, after the first virtual data header is known, the first client and the second client generate the second virtual data header according to the first virtual data header. The virtual ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to an encryption communication method based on the application layer, including a first client information sending encryption method, a second client information reception decryption method, a second client information reply encryption method and a first client information reception encryption method The decryption method, the encryption method for the first information transmission of the first client includes the following steps: generating the first virtual data header; generating the first user data; generating the second virtual data header, adding the first data receiving whitelist; establishing the first mapping relationship table and storing; generating the first ciphertext and sending it; generating second user data; encrypting the data body of the second user data to obtain third user data and sending it. The invention has the advantages of: ensuring that the original data header information is not leaked and can inform the other client of the virtual data header corresponding to the original data header; it can prevent hackers from intercepting the data header for data counterfeiting; it avoids the inability to determine the ciphertext due to the data header encryption The size and the issue of when to start decrypting.

Description

technical field [0001] The invention relates to the technical field of communication security, in particular to an application layer-based encrypted communication method. Background technique [0002] Since the 20th century, with the development of computer technology, network transmission technology has become an important means of information transmission in the fields of industry, agriculture and national defense, and gradually began to enter other fields of society. As the network gradually penetrates into people's life, work and entertainment, information security issues during network transmission have increasingly become a focus of attention. In order to improve the security of user information in network transmission, network transmission data encryption technology has gradually become a research hotspot. At present, the commonly used data encryption technologies include digital signature authentication, personal identity authentication, and electronic seal. Althou...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L69/164H04L69/22G06F21/60
CPCH04L63/12H04L63/0428H04L69/164H04L69/22G06F21/602
Inventor 胡遨洋钱伟朱重希花志伟刘书涵徐宏
Owner STATE GRID ZHEJIANG TONGXIANG POWER SUPPLY