CN104486072A - Secret communication system - Google Patents
Secret communication system Download PDFInfo
- Publication number
- CN104486072A CN104486072A CN201410846069.6A CN201410846069A CN104486072A CN 104486072 A CN104486072 A CN 104486072A CN 201410846069 A CN201410846069 A CN 201410846069A CN 104486072 A CN104486072 A CN 104486072A
- Authority
- CN
- China
- Prior art keywords
- data
- processing module
- data processing
- identification module
- transmitting terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Telephonic Communication Services (AREA)
Abstract
The invention provides a secret communication system. The secret communication system comprises a transmitting end sub-system and a receiving end sub-system. The transmitting end sub-system comprises a data processing module and a data recognition module corresponding to the data processing module, the data recognition module can be called remotely, original data needing to be transmitted are processed through the data processing module and then transmitted, and after receiving processed data, the receiving end sub-system remotely calls the data recognition module to recognize the data, so that the original data are obtained, or the recognizable synonymy form of the original data is obtained, or displaying is performed through the displaying function of the remotely called data recognition module to obtain information. One or two of the data processing module and the data recognition module can be used for forming a service end sub-system, and can be remotely called from the service end sub-system in case of need. The invention further provides a secret communication terminal of the secret communication system. Compared with existing channel encryption and end-to-end encryption modes, the secret communication system and the secret communication terminal are low in cost, the secret technology and intensity can be flexibly selected and configured according to needs, and the secret communication system and the secret communication terminal can be used for various occasions such as the private occasion and the commercial occasion.
Description
Technical field
The invention belongs to electronics field, particularly relate to a kind of secret signalling.
Background technology
Communication security is very necessary in some occasions, especially when relating to individual privacy, business secret, state secret.Current conventional communication security method has two kinds of modes, and one is channel encryption, and two is End to End Encryptions.Channel encryption refers to that data are encryptions in transmitting procedure, and its ciphering process is transparent for communication user.End to End Encryption refers to that, in transmitting terminal encryption then in receiving terminal deciphering, its ciphering process is that user oneself controls.But the encryption technology adopted all can crack, although the cost paid varies, its cost comprises break time cost and direct economy cost.The encryption technology that can not crack at present only has a kind of one-time pad (one-time pad).One-time pad refers to use the random key isometric with message-length in the middle of stream cipher, and key itself only uses once.Specifically, first select a random bit string as key, then expressly will be transformed into a bit string, such as use ascii table expressly to show method.Finally, the XOR value of step-by-step computation these two string, the ciphertext that result obtains can not be cracked, even if because there has been the ciphertext sample of sufficient amount, the probability of occurrence of each character is equal, and every arbitrarily probability that a monogram occurs also is equal.This method is called as " one-time pad ".Its advantage is owing to using the random key isometric with message, and produce and the random output of original text without any statistical relationship, therefore one-time pad scheme can not crack, and its defect is that key exists very large difficulty in transmission and distribution.Therefore still there is much inconvenience in this mode of one-time pad in use, therefore all do not adopt in current channel encryption and End to End Encryption.Current, along with the development of the Internet and universal, based on the Internet various communication modes more and more adopt by people, even rely on, mail, instant communication software, social software, many business systems, government and even military system have all extended on the Internet, so divulging a secret on the Internet, intrusion event emerge in an endless stream.
Summary of the invention
The object of the invention is to solve the problem that communication security degree is not high, this mode of one-time pad is difficult to effectively application.Thinking of the present invention is the transmission adopting the mode of far call to realize key, thus reaches the object of communication security.Secret signalling technical scheme of the present invention is as follows:
Comprise transmitting terminal subsystem, receiving terminal system, whether comprise other subsystem and do not limit, lower same.Transmitting terminal subsystem comprises data processing module and corresponding can be had by far call the data identification module identifying the deal with data function after the data processing module process of self, so-called correspondingly refer to that two modules can be with the use of, as data processing module is used for data encryption, data identification module is then for data deciphering, with the data that identification data processing module has been encrypted, lower same.Initial data that transmitting terminal subsystem will send first through self data processing module process and then send, what certainly send is data after process, lower with.After receiving terminal system acceptance to deal with data, the data identification module of far call transmitting terminal subsystem identifies, thus acquisition initial data, also can be the identifiable design synonym form of initial data, such as some software transforms figure word now, thus prevent copy and sensitive word from detecting, what also have is mingled with some characters in the literature, and computer is difficult to distinguish itself and normal character, but naked eyes can identify easily; Can also be cannot obtain the identifiable design synonym form of initial data or initial data but the data identification module of far call also has display function and can only by this function demonstration with obtaining information, this situation is to prevent recipient from privately retaining the communication information, such communication information only once uses effectively, here once refer to the identification of whole far call data identification module this time.
Aforementioned schemes also can change, by data processing module, data identification module is put into another subsystem---in the middle of service terminals system, at this moment secret signalling just comprises transmitting terminal subsystem, receiving terminal system and service terminal system, service terminals system comprises and by the data processing module of far call and corresponding can be had by far call the data identification module identifying the deal with data function after data processing module process, initial data that transmitting terminal subsystem will send is first through the data processing module process of remote call service terminal system and then send, after receiving terminal system acceptance to deal with data, the data identification module of remote call service terminal system identifies, thus obtain the identifiable design synonym form of initial data or initial data or the identifiable design synonym form of initial data or initial data cannot be obtained but the data identification module of far call also has display function and can only by this function demonstration with obtaining information.
Aforementioned two schemes can be compromised, another subsystem is put into by data processing module, one of them module of data identification module---in the middle of service terminals system, so just there are two kinds of situations, at this moment secret signalling comprises transmitting terminal subsystem, receiving terminal system and service terminal system equally.The first situation is: transmitting terminal subsystem comprises data processing module, service terminals system comprises corresponding to transmitting terminal subsystem data processing module can be had by far call the data identification module identifying the deal with data function after the data processing module process of transmitting terminal subsystem, the initial data elder generation that transmitting terminal subsystem will send is through data processing module process and then send, after receiving terminal system acceptance to deal with data, the data identification module of remote call service terminal system identifies, thus obtain the identifiable design synonym form of initial data or initial data or the identifiable design synonym form of initial data or initial data cannot be obtained but the data identification module of far call also has display function and can only by this function demonstration with obtaining information.The second situation is: transmitting terminal subsystem comprises corresponding to service terminals system data processing module can be had by far call the data identification module identifying the deal with data function after the data processing module process of service terminals system, initial data that transmitting terminal subsystem will send is first through the data processing module process of remote call service terminal system and then send, after receiving terminal system acceptance to deal with data, the data identification module of far call transmitting terminal subsystem identifies, thus obtain the identifiable design synonym form of initial data or initial data or the identifiable design synonym form of initial data or initial data cannot be obtained but the data identification module of far call also has display function and can only by this function demonstration with obtaining information.
Comparable data secret signalling technical scheme can make corresponding secret communication terminal, its technical scheme is:
Comprise transmitting terminal subsystem, transmitting terminal subsystem comprises data processing module and corresponding can be had by far call the data identification module identifying the deal with data function after data processing module process, namely two modules after comprising: data processing module, data identification module, whether comprise other data processing module, data identification module is not limit, other terminal that initial data that transmitting terminal subsystem will send first communicates with it through data processing module process and then send to also is pointed out the data identification module of self to be used as above-mentioned deal with data identification the data identification module of self to be called for other terminal remote communicated with it simultaneously.Transmitting terminal subsystem also can comprise data processing module but not comprise and corresponding can be had by far call the data identification module identifying the deal with data function after data processing module process, namely the data processing module after including, but the data identification module after not comprising, whether comprise or do not comprise other data processing module, data identification module is not limit, other terminal that initial data that transmitting terminal subsystem will send first communicates with it through data processing module process and then send to also points out nonself corresponding data identification module in this communication system to be used as above-mentioned deal with data identification.Transmitting terminal subsystem also can not comprise data processing module but comprise and corresponding can be had by far call the data identification module identifying the deal with data function after data processing module process, namely the data processing module after not comprising, but the data identification module after including, whether comprise or do not comprise other data processing module, data identification module is not limit, initial data that transmitting terminal subsystem will send other terminal that first the nonself data processing module process for far call and then send to communicates with it in this communication system of far call is also pointed out the data identification module of self to be used as above-mentioned deal with data identification the data identification module of self to be called for other terminal remote communicated with it simultaneously.Transmitting terminal subsystem also neither can comprise data processing module and not comprise again and corresponding can be had by far call the data identification module identifying the deal with data function after data processing module process, namely two modules after not comprising: data processing module, data identification module, whether do not comprise other data processing module, data identification module is not limit, initial data that transmitting terminal subsystem will send other terminal that first the nonself data processing module process for far call and then send to communicates with it in this communication system of far call also points out nonself corresponding data identification module in this communication system to be used as above-mentioned deal with data identification.Secret communication terminal also can comprise receiving terminal system simultaneously or only comprise receiving terminal system, after the deal with data that receiving terminal system acceptance sends to other terminal communicated with it, the data identification module of this terminal of far call instruction identifies, thus obtains the identifiable design synonym form of initial data or initial data or cannot obtain the identifiable design synonym form of initial data or initial data but the data identification module of far call also has display function and can only by this function demonstration with obtaining information.
Such scheme can also be specialized further, such as data processing module wherein comprises data encryption step, data identification module comprises corresponding data decryption step simultaneously, research and the achievement of the algorithm of current relevant data encryption and decryption are a lot, use can be taken back according to the occasion of maintaining secrecy and needs, enough all right, need not in all case all select that Cipher Strength very high-leveled and difficult with the algorithm cracked.Data identification module is such as allowed to have communication data delete function and/or communication data hold function, the information of some occasion need to be keep secret will be destroyed after seeing, how to ensure to destroy, not reliable by the conscious of party, it is also problematic that program by party concerned is deleted automatically, and only reliable far call data identification module is deleted and just can be guaranteed that information can be deleted; As for hold function, because information is finally by data identification module process, be therefore also beneficial to the preservation of information, if reliable user, sometimes also need this hold function.
Secret signalling of the present invention and terminal, the data after identifying processing are carried out owing to adopting far call data identification module, distribution and the transmission of random key isometric with message-length required for one-time pad can be realized in far call process, under this mode, encryption for transmitted information does not just need the cryptographic algorithm adopting those complexity, corresponding deciphering also can be very simple, and in the process of far call, generally need the long random key of cryptographic algorithm equity with some strength to be encrypted.And can the data identification module of far call can change at any time, such as interface does not change but recognizer is changed, or interface and algorithm are all changed, certainly the simplest mode changes key, successfully identify so call specifically, calling next time not necessarily can be successful again, so just further enhancing difficult cracking.Due to one-time pad mode can be adopted, there is leap with regard to its security performances of mode such as more existing channel encryption, End to End Encryptions like this.The present invention also adopts other data processing method, simple transposition encryption etc., be picture by text conversion, insert the character not affecting eye recognition in the literature, etc., secrecy technology and intensity can be matched as required flexibly, cost is low, can be used for individual, commercial affairs and even the various occasion such as military.
Accompanying drawing explanation
Fig. 1 is a kind of secret signalling structure chart;
Fig. 2 is a kind of secret communication terminal structure chart.
Embodiment
Embodiment 1
A kind of secret signalling
NetMeeting instant communication terminal program based on Microsoft is transformed, makes it have a data encryption feature and data deciphering and display function, and data deciphering and display function make one can the process of far call--data deciphering and show process.Both sides' program of dialogue is the same, but the key of encrypting and decrypting is different, can be arranged voluntarily by user.When conversing, after Party A passes through to press the transmission of transmission button by the picture and text keyed in, first by Party A's data encryption feature with oneself arranging encryption keys and then sending out ciphertext and indicate data deciphering and the displaying process of Party B's far call oneself, after receiving ciphertext, then the data deciphering of far call Party A and displaying process (having difference on the data streams for the process of far call because Party A does not grudge decruption key and the different so process called of Party B and self) are decrypted and show Party B, exit this far call process related data all to destroy, any data are not preserved Party B in this process.
Claims (3)
1. a secret signalling, is characterized in that:
Comprise transmitting terminal subsystem, receiving terminal system, transmitting terminal subsystem comprises data processing module and corresponding can be had by far call the data identification module identifying the deal with data function after data processing module process, the initial data elder generation that transmitting terminal subsystem will send is through data processing module process and then send, after receiving terminal system acceptance to deal with data, the data identification module of far call transmitting terminal subsystem identifies, thus obtain the identifiable design synonym form of initial data or initial data or the identifiable design synonym form of initial data or initial data cannot be obtained but the data identification module of far call also has display function and can only by this function demonstration with obtaining information,
Or comprise transmitting terminal subsystem, receiving terminal system and service terminal system, service terminals system comprises and by the data processing module of far call and corresponding can be had by far call the data identification module identifying the deal with data function after data processing module process, initial data that transmitting terminal subsystem will send is first through the data processing module process of remote call service terminal system and then send, after receiving terminal system acceptance to deal with data, the data identification module of remote call service terminal system identifies, thus obtain the identifiable design synonym form of initial data or initial data or the identifiable design synonym form of initial data or initial data cannot be obtained but the data identification module of far call also has display function and can only by this function demonstration with obtaining information,
Or comprise transmitting terminal subsystem, receiving terminal system and service terminal system, transmitting terminal subsystem comprises data processing module, service terminals system comprises corresponding to transmitting terminal subsystem data processing module can be had by far call the data identification module identifying the deal with data function after the data processing module process of transmitting terminal subsystem, the initial data elder generation that transmitting terminal subsystem will send is through data processing module process and then send, after receiving terminal system acceptance to deal with data, the data identification module of remote call service terminal system identifies, thus obtain the identifiable design synonym form of initial data or initial data or the identifiable design synonym form of initial data or initial data cannot be obtained but the data identification module of far call also has display function and can only by this function demonstration with obtaining information,
Or comprise transmitting terminal subsystem, receiving terminal system and service terminal system, service terminals system comprises data processing module, transmitting terminal subsystem comprises corresponding to service terminals system data processing module can be had by far call the data identification module identifying the deal with data function after the data processing module process of service terminals system, initial data that transmitting terminal subsystem will send is first through the data processing module process of remote call service terminal system and then send, after receiving terminal system acceptance to deal with data, the data identification module of far call transmitting terminal subsystem identifies, thus obtain the identifiable design synonym form of initial data or initial data or the identifiable design synonym form of initial data or initial data cannot be obtained but the data identification module of far call also has display function and can only by this function demonstration with obtaining information.
2. a secret communication terminal, is characterized in that:
Comprise transmitting terminal subsystem,
Transmitting terminal subsystem comprises data processing module and corresponding can be had by far call the data identification module identifying the deal with data function after data processing module process, other terminal that initial data that transmitting terminal subsystem will send first communicates with it through data processing module process and then send to also is pointed out the data identification module of self to be used as above-mentioned deal with data identification the data identification module of self to be called for other terminal remote communicated with it simultaneously
Or transmitting terminal subsystem comprises data processing module but does not comprise and corresponding can be had by far call the data identification module identifying the deal with data function after data processing module process, other terminal that initial data that transmitting terminal subsystem will send first communicates with it through data processing module process and then send to also points out nonself corresponding data identification module in this communication system to be used as above-mentioned deal with data identification
Or transmitting terminal subsystem does not comprise data processing module but comprises and corresponding can be had by far call the data identification module identifying the deal with data function after data processing module process, initial data that transmitting terminal subsystem will send other terminal that first the nonself data processing module process for far call and then send to communicates with it in this communication system of far call is also pointed out the data identification module of self to be used as above-mentioned deal with data identification the data identification module of self to be called for other terminal remote communicated with it simultaneously
Or transmitting terminal subsystem neither comprises data processing module and do not comprise again and corresponding can be had by far call the data identification module identifying the deal with data function after data processing module process, the initial data that transmitting terminal subsystem will send other terminal that first the nonself data processing module process for far call and then send to communicates with it in this communication system of far call also points out nonself corresponding data identification module in this communication system to be used as above-mentioned deal with data identification;
Simultaneously/or comprise receiving terminal system, after the deal with data that receiving terminal system acceptance sends to other terminal communicated with it, the data identification module of this terminal of far call instruction identifies, thus obtains the identifiable design synonym form of initial data or initial data or cannot obtain the identifiable design synonym form of initial data or initial data but the data identification module of far call also has display function and can only by this function demonstration with obtaining information.
3. secret signalling according to claim 1 or secret communication terminal according to claim 2, is characterized in that:
Data processing module wherein comprises data encryption step, and data identification module comprises corresponding data decryption step simultaneously;
Simultaneously/or data identification module there is communication data delete function and/or communication data hold function.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410846069.6A CN104486072A (en) | 2014-12-31 | 2014-12-31 | Secret communication system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410846069.6A CN104486072A (en) | 2014-12-31 | 2014-12-31 | Secret communication system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104486072A true CN104486072A (en) | 2015-04-01 |
Family
ID=52760580
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410846069.6A Pending CN104486072A (en) | 2014-12-31 | 2014-12-31 | Secret communication system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104486072A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107359994A (en) * | 2017-07-19 | 2017-11-17 | 国家电网公司 | The integrated encryption device that a kind of quantum cryptography blends with classical password |
CN107766341A (en) * | 2017-11-20 | 2018-03-06 | 北京会务通科技有限公司 | A kind of data processing equipment and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1434388A (en) * | 2001-05-30 | 2003-08-06 | 环球拓普技术有限公司 | Method for information encryption |
CN1801699A (en) * | 2004-12-31 | 2006-07-12 | 联想(北京)有限公司 | Method for accessing cipher device |
CN1859081A (en) * | 2006-02-17 | 2006-11-08 | 华为技术有限公司 | Immediate news enciphering transmission method and system |
CN103825698A (en) * | 2014-01-20 | 2014-05-28 | 中国建设银行股份有限公司 | Password security management system and method |
US20140270141A1 (en) * | 2013-03-15 | 2014-09-18 | Genesys Telecommunications Laboratories, Inc. | Call event tagging and call recording stitching for contact center call recordings |
-
2014
- 2014-12-31 CN CN201410846069.6A patent/CN104486072A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1434388A (en) * | 2001-05-30 | 2003-08-06 | 环球拓普技术有限公司 | Method for information encryption |
CN1801699A (en) * | 2004-12-31 | 2006-07-12 | 联想(北京)有限公司 | Method for accessing cipher device |
CN1859081A (en) * | 2006-02-17 | 2006-11-08 | 华为技术有限公司 | Immediate news enciphering transmission method and system |
US20140270141A1 (en) * | 2013-03-15 | 2014-09-18 | Genesys Telecommunications Laboratories, Inc. | Call event tagging and call recording stitching for contact center call recordings |
CN103825698A (en) * | 2014-01-20 | 2014-05-28 | 中国建设银行股份有限公司 | Password security management system and method |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107359994A (en) * | 2017-07-19 | 2017-11-17 | 国家电网公司 | The integrated encryption device that a kind of quantum cryptography blends with classical password |
CN107766341A (en) * | 2017-11-20 | 2018-03-06 | 北京会务通科技有限公司 | A kind of data processing equipment and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111130803B (en) | Method, system and device for digital signature | |
CN101188496B (en) | A SMS encryption transport method | |
CN103731270B (en) | Communication data encryption and decryption method based on BBS, RSA and SHA-1 encryption algorithm | |
CN110100422B (en) | Data writing method and device based on block chain intelligent contract and storage medium | |
CN104052658A (en) | Privacy protection system and method based on social network | |
CN106464488A (en) | Information transmission method and mobile device | |
CN105792190B (en) | Data encryption, decryption and transmission method in communication system | |
CN107342977A (en) | Suitable for the information security method of point-to-point instant messaging | |
CN104243149A (en) | Encrypting and decrypting method, device and server | |
CN108090370A (en) | Instant messaging encryption method and system based on index | |
CN107579903B (en) | Picture message secure transmission method and system based on mobile device | |
CN107682303B (en) | System and method for encrypting and inquiring personal sensitive information | |
CN107666395A (en) | One population file management method, user terminal, group chat system | |
CN102572750A (en) | Method and terminal for protecting short messages | |
Rahman et al. | Development of cryptography-based secure messaging system | |
US11902421B2 (en) | Server device, communication terminal, communication system, and program | |
CN108390755A (en) | The safe input method of SIM pasting cards based on built-in security chip | |
CN105119923B (en) | A kind of information decoding method and terminal | |
CN104486072A (en) | Secret communication system | |
Barukab et al. | Secure communication using symmetric and asymmetric cryptographic techniques | |
CN103634292A (en) | Method and system for communication information transmission | |
CN103441854A (en) | Link protection method and system | |
CN108337233B (en) | Method for encrypting content information, electronic equipment and storage medium | |
Siahaan | Securing short message service using Vernam cipher in android operating system | |
CN104243291A (en) | Instant messaging method and system thereof capable of guaranteeing safety of user communication content |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150401 |
|
RJ01 | Rejection of invention patent application after publication |