Method and system for protecting internet chat privacy

An Internet and privacy technology, applied in the field of Internet information technology transmission security, can solve the problems of unprotected chat records, high difficulty in technical means, privacy, etc., achieve fast chat privacy protection, reasonable allocation of manpower and time, and solve chat privacy leaked effect

Inactive Publication Date: 2021-08-20
CHENGDU DBAPP SECURITY
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] (1) It only protects the chat records on its own terminal, and does not protect the chat records on the server and the chat partner's terminal;
[0008] (2) Additional hardware support is required;
[0009] (3) It is more in the ideological content, and it is more difficult to r...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for protecting internet chat privacy
  • Method and system for protecting internet chat privacy
  • Method and system for protecting internet chat privacy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] This embodiment proposes a method for protecting the privacy of Internet chatting. A privacy protection system is embedded in the Internet terminals of both parties or more than two parties in the chat, and then the following operations are performed on sending chat content and receiving chat content: figure 1 , figure 2 Shown:

[0052] For sending chat content:

[0053] Step 1: input chat content through the input module of the privacy protection system; the chat content includes text, video and image;

[0054] Step 2: Send the chat content input by the input module to the key control program through the master control and statistics program;

[0055] Step 3: In the key control program, the chat content is sent to the encryption module for encryption after the key is set by the key controller;

[0056] Step 4: Output the encrypted chat content as encrypted chat content through the ciphertext output program and send it to the chat software of the Internet terminal of ...

Embodiment 2

[0063] This embodiment is based on the above-mentioned embodiment 1, in order to better realize the present invention, further, as Figure 4 , Figure 5 As shown, the encryption module and the decryption module use the twofish online encryption algorithm to perform encryption operations.

[0064] The operation of the encryption module to encrypt the text is: use the twofish online encryption algorithm to cut the text input by the chat sender into 128-bit blocks, then encrypt the 128-bit blocks with a variable-length key, and then use the sub-block generated by the key controller. The key is encrypted.

[0065] Example:

[0066] User A intends to send "hello" to user B.

[0067] User A finishes typing through the ciphertext output program, and then selects "Hello".

[0068] Under UTF-8 encoding, a Chinese character has 24 binary digits, and "Hello" has 48 digits in total, which is less than 128 digits. The program will automatically add '\0' to the text until 128 digits are...

Embodiment 3

[0079] In this embodiment, on the basis of any one of the above-mentioned embodiments 1-2, in order to better realize the present invention, further, in the operation of encrypting the chat content by the encryption module, a function is used to iterate the encryption process 16 times. During an iterative encryption process, the relevant replacement of the key is carried out, and the relevant replacement of the key and data is also carried out at the same time.

[0080] Other parts of this embodiment are the same as those of any one of Embodiments 1-2 above, so details are not repeated here.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a system for protecting internet chat privacy, a privacy protection system is embedded in internet terminals of both parties, and the privacy protection system comprises an input module, a reading module, a general control and statistics program, a key control program, a ciphertext output program and a plaintext output program; hardware does not need to be additionally arranged, the privacy protection system is not connected with the Internet for data interaction, chat content encryption and decryption are performed offline, the security is higher, and meanwhile, under the condition that an Internet terminal is lost, substantial content acquisition cannot be performed on the encrypted chat content without a secret key. According to the invention, through the setting, the fast, simple and safer Internet private chat is realized.

Description

technical field [0001] The invention belongs to the technical field of Internet information technology transmission security, and in particular relates to a method and system for protecting Internet chat privacy. Background technique [0002] With the rapid development of Internet technology, Internet-based chat services have become a common way of socializing in people's lives, and users' chat data are stored on hosts of various chat service providers and users' mobile Internet terminals. Users' chat data are not only owned by users, Internet chat service providers also hold their users' chat data, and users have no way of knowing whether Internet chat providers keep chat data properly. This solution provides a solution to protect chat privacy. By recording and sending encrypted chat content, no third party except the user can obtain any meaningful chat information even if they obtain the chat data. [0003] Even if the Internet chat service provider promises not to leak u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/58H04L29/06
CPCH04L51/04H04L63/0428H04L51/52
Inventor 马铂翔刘韬范渊吴永越郑学新
Owner CHENGDU DBAPP SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products