Information transmission encryption protection method and implementation system thereof

A protection system and information technology, applied in the field of encryption and protection of information transmission, can solve problems such as poor information security protection mechanism of communication software

Pending Publication Date: 2022-02-22
庄连豪
View PDF9 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, instant messaging technology is very popular nowadays. Users of the same communication system can transmit electronic messages (text messages or files) in real time through communication software. Among them, communication software is mainly executed and operated through information devices, and users can use information devices to Input the electronic message to be sent, and the electronic message will be further sent to a remote server, and the electronic message will be stored and exchanged through the remote server, so that the communication device at the receiving end can receive the electronic message in real time. However, the existing There are still many disadvantages in the information security of instant messaging technology. For example, electronic messages are directly displayed on information devices, and other people can directly understand the meaning of electronic messages from the display screen, or other people can directly operate information devices to open files of electronic messages. Therefore, , the existing communication software information security protection mechanism is extremely poor; please refer to China Taiwan Invention Patent No. TWI524291 "Message Encryption Method Applied to Communication Software", which discloses a message encryption method applied to communication software, mainly through a communication The software establishes the RSA encrypted chat interface between the communication parties, and the communication software can establish the private keys dedicated to the communication parties. Among them, the private keys can encrypt the messages that the communication parties want to transmit, and can also target the messages with the private keys After decryption, send their respective private keys to the other party, and attach the other party's private key to the message to be transmitted, so that when the other party receives the message, they can verify whether the private key in the message matches. If it matches, the passed message will be displayed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information transmission encryption protection method and implementation system thereof
  • Information transmission encryption protection method and implementation system thereof
  • Information transmission encryption protection method and implementation system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order to enable those skilled in the art to clearly understand the purpose, technical features and effects of the present invention after implementation, the following embodiments are described with accompanying drawings, please refer to them.

[0064] see figure 1 , shown in the figure is a schematic diagram of the composition of the present invention (1), as shown in the figure, the information transmission encryption protection system 10 of the present invention mainly has an information protection server 101, and the information protection server 101 communicates with at least one communication terminal The device 102 and the receiving end communication device 102' complete the information connection; the information protection server 101 can complete the information connection with each communication device 102 through the Internet, and the information protection server 101 can exchange information between each communication device 102 at the communication end. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an information transmission encryption protection method and an implementation system thereof. The system comprises an information protection server, a transmitting end communication device and a receiving end communication device, wherein the information protection server can be provided for communication devices of two communication parties or multiple parties to exchange an electronic message with each other; after the information protection server receives the electronic message, if a transmitting end views that the electronic message needs to be kept confidential, the transmitting end can encrypt the electronic message into an encrypted message, and transmits the encrypted message back and displays the encrypted message on the communication devices of all the communication parties; and under the condition that the transmitting end does not know decryption modes and passwords set by all receiving ends, the electronic message can be checked by the transmitting end only after decoding is completed by the receiving ends. Therefore, according to the invention, an electronic message can be prevented from being easily stolen under the condition that all communication parties do not complete safety protection verification, and the purpose of multidirectional electronic message protection is achieved.

Description

technical field [0001] The present invention relates to an information transmission encryption protection method, in particular to an information protection server to encrypt an electronic message into an encrypted message, so that the encrypted message is displayed as an image, totem or mosaic that cannot be viewed, and Before the receiving end completes the decryption, the sending end cannot view the electronic message transmission encryption protection method and its implementation system. Background technique [0002] At present, instant messaging technology is very popular nowadays. Users of the same communication system can transmit electronic messages (text messages or files) in real time through communication software. Among them, communication software is mainly executed and operated through information devices, and users can use information devices to Input the electronic message to be sent, and the electronic message will be further sent to a remote server, and th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L51/04
CPCH04L63/0435H04L63/0478H04L51/04
Inventor 庄连豪
Owner 庄连豪
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products