CN112804259A - Audio and video communication encryption method and system based on asymmetric encryption - Google Patents
Audio and video communication encryption method and system based on asymmetric encryption Download PDFInfo
- Publication number
- CN112804259A CN112804259A CN202110281268.7A CN202110281268A CN112804259A CN 112804259 A CN112804259 A CN 112804259A CN 202110281268 A CN202110281268 A CN 202110281268A CN 112804259 A CN112804259 A CN 112804259A
- Authority
- CN
- China
- Prior art keywords
- encryption
- information
- asymmetric encryption
- command
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000006854 communication Effects 0.000 title claims abstract description 58
- 238000004891 communication Methods 0.000 title claims abstract description 57
- 238000000034 method Methods 0.000 title claims abstract description 32
- 230000009471 action Effects 0.000 claims description 17
- 230000006870 function Effects 0.000 claims description 9
- 238000012795 verification Methods 0.000 claims description 8
- 230000003993 interaction Effects 0.000 abstract description 5
- 238000010586 diagram Methods 0.000 description 10
- 230000008569 process Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides an audio and video communication encryption method and system based on asymmetric encryption, and relates to the technical field of information security. An audio and video communication encryption method based on asymmetric encryption comprises the following steps: acquiring message information to be sent, and generating a command instruction and a symmetric key; encrypting the message information by adopting a symmetric key to obtain first ciphertext information; acquiring an asymmetric encryption public key, and encrypting the symmetric key by adopting the asymmetric encryption public key to obtain second ciphertext information; and signing the command instruction by adopting the second ciphertext information to generate a command message. The safety of information interaction between the terminal equipment and the service terminal is ensured. In addition, the invention also provides an audio and video communication encryption system based on asymmetric encryption, which comprises: the device comprises an acquisition module, a first encryption module, a second encryption module and a generation module.
Description
Technical Field
The invention relates to the technical field of information security, in particular to an audio and video communication encryption method and system based on asymmetric encryption.
Background
In the existing control system, a service terminal communicates with a communication device, generally, the service terminal sends a multi-frame control command message to the communication device, the control command is, for example, a command of switching off a machine or switching off a load, after receiving the multi-frame control command message, the communication device confirms the content of the multi-frame message, and after confirming that the content is correct, executes a specified control command action.
In a typical audio and video communication method, a user communicates on a mobile terminal, a mobile phone encrypts a user account, a password and a mobile phone identifier by using a symmetric key, and sends the encrypted user account, password and mobile phone identifier to a server; the server decrypts by using the symmetric key to obtain the user account, the password and the mobile phone identifier, and then verifies whether the user account is matched with the password; when the user account number is matched with the password, the server binds the user account number and the mobile phone identification and opens a mobile phone searching function for the mobile phone. The Mobile phone identifier may be represented by an International Mobile Equipment Identity (IMEI).
When the mobile phone is obtained by a malicious person, the symmetric key in the mobile phone is easily leaked or deciphered. At this time, the user account and the password are leaked, so that the communication function has a security problem, and the traditional communication method of the control system has a problem of low security.
Disclosure of Invention
The invention aims to provide an audio and video communication encryption method based on asymmetric encryption, which can store an asymmetric encryption public key in communication equipment, generate a symmetric key during encryption, and encrypt message information by adopting the symmetric key to obtain first ciphertext information; encrypting the symmetric key by using the asymmetric encryption public key to obtain second ciphertext information; even if the asymmetric encryption public key in the terminal equipment is leaked, malicious personnel cannot decrypt the symmetric public key and cannot decrypt the message information due to the characteristic of asymmetric encryption, and therefore the safety of information interaction between the terminal equipment and the service terminal is guaranteed.
Another object of the present invention is to provide an audio/video communication encryption system based on asymmetric encryption, which is capable of operating an audio/video communication encryption method based on asymmetric encryption.
The embodiment of the invention is realized by the following steps:
in a first aspect, an embodiment of the present application provides an audio/video communication encryption method based on asymmetric encryption, which includes obtaining message information to be sent, and generating a command instruction and a symmetric key; encrypting the message information by adopting a symmetric key to obtain first ciphertext information; acquiring an asymmetric encryption public key, and encrypting the symmetric key by adopting the asymmetric encryption public key to obtain second ciphertext information; and signing the command instruction by adopting the second ciphertext information to generate a command message.
In some embodiments of the present invention, the obtaining message information to be sent, and the generating the command instruction and the symmetric key include: acquiring at least one item of information for functions of communication terminal equipment, wherein the at least one item of information comprises at least one of a login password, an equipment identifier, a mobile phone number and a login token, and generating message information to be sent according to the at least one item of information.
In some embodiments of the present invention, the obtaining message information to be sent, and the generating the command instruction and the symmetric key include: and receiving and storing the transmitted command instruction, wherein the command instruction is generated by the communication device according to the action command request when the action command request is initiated.
In some embodiments of the present invention, the obtaining the asymmetric encryption public key includes: and when the communication connection is established for the first time, generating an asymmetric encryption public key according to an asymmetric encryption algorithm.
In some embodiments of the present invention, the encrypting the symmetric key by using the asymmetric encryption public key to obtain the second ciphertext information includes: and sending the first ciphertext information and the second ciphertext information to the service terminal, wherein the service terminal stores an asymmetric encryption private key corresponding to the asymmetric encryption public key.
In some embodiments of the present invention, the above further includes: and sending the first ciphertext information and the second ciphertext information to the service terminal by adopting the pre-established encryption connection.
In some embodiments of the present invention, the above further includes: and sending the command message to the service terminal at preset time intervals, acquiring signature information and the command message from the command message by the service terminal, and performing signature verification on the signature information by using the asymmetric encryption public key.
In some embodiments of the present invention, the above further includes: and after the signature verification is passed, if the contents of the received command message are the same, executing an action command of the command message.
In a second aspect, an embodiment of the present application provides an audio/video communication encryption system based on asymmetric encryption, which includes an obtaining module, configured to obtain message information to be sent, and generate a command instruction and a symmetric key; the first encryption module is used for encrypting the message information by adopting a symmetric key to obtain first ciphertext information; the second encryption module is used for acquiring an asymmetric encryption public key and encrypting the symmetric key by adopting the asymmetric encryption public key to obtain second ciphertext information; and the generating module is used for signing the command instruction by adopting the second ciphertext information to generate a command message.
In some embodiments of the invention, the above includes: at least one memory for storing computer instructions; at least one processor in communication with the memory, wherein the at least one processor, when executing the computer instructions, causes the system to: the device comprises an acquisition module, a first encryption module, a second encryption module and a generation module.
Compared with the prior art, the embodiment of the invention has at least the following advantages or beneficial effects:
the asymmetric encryption public key can be stored in the communication equipment, a symmetric key is generated during encryption, and the message information is encrypted by adopting the symmetric key to obtain first ciphertext information; encrypting the symmetric key by using the asymmetric encryption public key to obtain second ciphertext information; even if the asymmetric encryption public key in the terminal equipment is leaked, malicious personnel cannot decrypt the symmetric public key and cannot decrypt the message information due to the characteristic of asymmetric encryption, and therefore the safety of information interaction between the terminal equipment and the service terminal is guaranteed.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a schematic step diagram of an audio-video communication encryption method based on asymmetric encryption according to an embodiment of the present invention;
fig. 2 is a detailed step schematic diagram of an audio-video communication encryption method based on asymmetric encryption according to an embodiment of the present invention;
fig. 3 is a schematic diagram of an audio-video communication encryption system module based on asymmetric encryption according to an embodiment of the present invention.
Icon: 10-an acquisition module; 20-a first cryptographic module; 30-a second encryption module; 40-generating module.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures. Meanwhile, in the description of the present application, the terms "first", "second", and the like are used only for distinguishing the description, and are not to be construed as indicating or implying relative importance.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
Some embodiments of the present application will be described in detail below with reference to the accompanying drawings. The embodiments described below and the individual features of the embodiments can be combined with one another without conflict.
Example 1
Referring to fig. 1, fig. 1 is a schematic diagram of steps of an audio/video communication encryption method based on asymmetric encryption according to an embodiment of the present invention, and the steps are as follows:
step S100, obtaining message information to be sent, and generating a command instruction and a symmetric key;
in some embodiments, the communication terminal device obtains message information to be sent, where the message information may be any information.
Step S110, encrypting the message information by adopting a symmetric key to obtain first ciphertext information;
in some embodiments, symmetric encryption means that the encrypting party and the decrypting party have the same encryption key X. After the encryption party encrypts the message information by using the encryption key X, the decryption party decrypts the message information by using the same encryption key X. Once the encryption key X is revealed, malicious personnel can decrypt the message information.
Step S120, obtaining an asymmetric encryption public key, and encrypting the symmetric key by adopting the asymmetric encryption public key to obtain second ciphertext information;
in some embodiments, the asymmetric encryption public key (public key for short) refers to a public key, and does not need to be kept secret, and a decrypter can obtain the public key through various channels; one public key corresponds to one private key; the public key and the private key together constitute an asymmetric encryption mode. The asymmetric encryption mode means that the message information encrypted by the public key can only be decrypted by the corresponding private key, and the message information encrypted by the private key can only be decrypted by the corresponding public key. That is, the keys used for encryption and decryption are not the same.
Such as: assuming that an encryption party needs to send ciphertext information to a decryption party, the encryption party needs to obtain a public key corresponding to the decryption party first, then encrypts the message information by using the public key corresponding to the decryption party and sends the ciphertext information to the decryption party, and after receiving the ciphertext information sent by the encryption party, the decryption party needs to use a private key corresponding to the decryption party to decrypt the ciphertext information and obtain the message information. Since the private key corresponding to the decryption party is owned only by the decryption party, the ciphertext information sent by the encryption party is secure.
And step S130, signing the command instruction by adopting the second ciphertext information to generate a command message.
In some embodiments, in addition to containing the command message, the signature performed by the service terminal based on the command instruction generated by the asymmetric encryption algorithm is also included, wherein the specific signature action is performed by the service terminal according to the asymmetric encryption algorithm. The signature information may be in the form of data, an asymmetric encryption algorithm such as the SM2 algorithm or the RSA algorithm, etc., that ultimately generates the command message.
Example 2
Referring to fig. 2, fig. 2 is a detailed step diagram of an audio/video communication encryption method based on asymmetric encryption according to an embodiment of the present invention, which is shown as follows:
step S200, at least one item of information used for the functions of the communication terminal equipment is obtained, and message information to be sent is generated according to the at least one item of information.
In some embodiments, the at least one item of information comprises at least one of a login password, a device identification, a phone number, and a login token.
Step S210, receiving and storing the sent command instruction, where the command instruction is generated by the communication device according to the action command request when initiating the action command request.
Step S220, when the communication connection is established for the first time, an asymmetric encryption public key is generated according to the asymmetric encryption algorithm.
Step S230, sending the first ciphertext information and the second ciphertext information to the service terminal, where the service terminal stores the asymmetric encryption private key corresponding to the asymmetric encryption public key.
Step S240, the first ciphertext information and the second ciphertext information are sent to the service terminal by adopting the pre-established encryption connection.
And step S250, sending the command message to the service terminal at preset time intervals, obtaining signature information and the command message from the command message by the service terminal, and performing signature verification on the signature information by using the asymmetric encryption public key.
And step S260, after the signature verification is passed, if the contents of the received command message are the same, executing the action command of the command message.
In some embodiments, the preset time interval may be a system setting or a manual setting, for example, sending command messages every 3 s. Specifically, the service terminal sends a command message to the communication device at preset time intervals, that is, repeatedly sends the command message to the communication device, and the communication device performs operations of signature verification, content judgment and action execution.
Taking three frames of command messages as an example, if each frame of command message is spaced by 3.3ms, the original control system does not use a signature, the service terminal sends the command messages in three frames, and the receiving device receives and confirms the 3 frames of command messages after the service terminal initiates an action command request for 6.6ms without considering communication delay. In this embodiment, the service terminal uses the signature, the first frame of command message uses the command message, and starts the signature by using the interval time, the receiving device starts the receiving judgment after receiving the first command message, the receiving device performs the signature verification by using the interval time after receiving the frame command message, that is, the first frame of command message, and completes the receiving judgment when receiving the third frame of command message, that is, the second frame of command message, and similarly, the receiving device receives and confirms the 3 frames of command message after the service terminal initiates the action command request for 6.6ms, regardless of the communication delay. After the signature mechanism is added, the real-time performance of the control system is not affected.
In this embodiment, after the service terminal sends the original code command message in the first frame, based on the asymmetric encryption algorithm, the service terminal signs the original code command message by using the interval time for sending the message, and can determine that command data is sent by the master station device and is not tampered by a third party, thereby ensuring the integrity and real-time performance of data transmission and improving the security of the communication process of the control system.
Example 3
Referring to fig. 3, fig. 3 is a schematic diagram of an audio/video communication encryption system module based on asymmetric encryption according to an embodiment of the present invention, which is shown as follows:
an obtaining module 10, configured to obtain message information to be sent, and generate a command instruction and a symmetric key;
the first encryption module 20 is configured to encrypt the message information by using a symmetric key to obtain first ciphertext information;
the second encryption module 30 is configured to obtain an asymmetric encryption public key, and encrypt the symmetric key by using the asymmetric encryption public key to obtain second ciphertext information;
and the generating module 40 is configured to sign the command instruction by using the second ciphertext information to generate a command message.
Also included are a memory, a processor, and a communication interface, which are electrically connected, directly or indirectly, to each other to enable transmission or interaction of data. For example, the components may be electrically connected to each other via one or more communication buses or signal lines. The memory may be used to store software programs and modules, and the processor may execute various functional applications and data processing by executing the software programs and modules stored in the memory. The communication interface may be used for communicating signaling or data with other node devices.
The Memory may be, but is not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), an Erasable Read-Only Memory (EPROM), an electrically Erasable Read-Only Memory (EEPROM), and the like.
The processor may be an integrated circuit chip having signal processing capabilities. The Processor may be a general-purpose Processor including a Central Processing Unit (CPU), a Network Processor (NP), etc.; but also Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components.
It will be appreciated that the configuration shown in fig. 3 is merely illustrative and may include more or fewer components than shown in fig. 3, or have a different configuration than shown in fig. 3. The components shown in fig. 3 may be implemented in hardware, software, or a combination thereof.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The apparatus embodiments described above are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
To sum up, the audio and video communication encryption method and system based on asymmetric encryption provided by the embodiment of the present application can obtain first ciphertext information by storing an asymmetric encryption public key in a communication device, generating a symmetric key during encryption, and encrypting message information by using the symmetric key; encrypting the symmetric key by using the asymmetric encryption public key to obtain second ciphertext information; even if the asymmetric encryption public key in the terminal equipment is leaked, malicious personnel cannot decrypt the symmetric public key and cannot decrypt the message information due to the characteristic of asymmetric encryption, and therefore the safety of information interaction between the terminal equipment and the service terminal is guaranteed.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
Claims (10)
1. An audio and video communication encryption method based on asymmetric encryption is characterized by comprising the following steps:
acquiring message information to be sent, and generating a command instruction and a symmetric key;
encrypting the message information by adopting a symmetric key to obtain first ciphertext information;
acquiring an asymmetric encryption public key, and encrypting the symmetric key by adopting the asymmetric encryption public key to obtain second ciphertext information;
and signing the command instruction by adopting the second ciphertext information to generate a command message.
2. The asymmetric encryption-based audio-video communication encryption method according to claim 1, wherein the acquiring message information to be sent, and generating the command instruction and the symmetric key comprises:
acquiring at least one item of information for functions of communication terminal equipment, wherein the at least one item of information comprises at least one of a login password, an equipment identifier, a mobile phone number and a login token, and generating message information to be sent according to the at least one item of information.
3. The asymmetric encryption-based audio-video communication encryption method according to claim 1, wherein the acquiring message information to be sent, and generating the command instruction and the symmetric key comprises:
and receiving and storing the transmitted command instruction, wherein the command instruction is generated by the communication device according to the action command request when the action command request is initiated.
4. The asymmetric encryption-based audio-video communication encryption method according to claim 1, wherein the obtaining of the asymmetric encryption public key comprises:
and when the communication connection is established for the first time, generating an asymmetric encryption public key according to an asymmetric encryption algorithm.
5. The asymmetric encryption-based audio-video communication encryption method according to claim 1, wherein the encrypting the symmetric key by using the asymmetric encryption public key to obtain the second ciphertext information comprises:
and sending the first ciphertext information and the second ciphertext information to the service terminal, wherein the service terminal stores an asymmetric encryption private key corresponding to the asymmetric encryption public key.
6. An asymmetric encryption based audio-video communication encryption method as recited in claim 5, further comprising:
and sending the first ciphertext information and the second ciphertext information to the service terminal by adopting the pre-established encryption connection.
7. The asymmetric encryption-based audio-video communication encryption method as claimed in claim 1, further comprising:
and sending the command message to the service terminal at preset time intervals, acquiring signature information and the command message from the command message by the service terminal, and performing signature verification on the signature information by using the asymmetric encryption public key.
8. An asymmetric encryption based audio-video communication encryption method as recited in claim 7, further comprising:
and after the signature verification is passed, if the contents of the received command message are the same, executing an action command of the command message.
9. An audio-video communication encryption system based on asymmetric encryption is characterized by comprising:
the acquisition module is used for acquiring message information to be sent and generating a command instruction and a symmetric key;
the first encryption module is used for encrypting the message information by adopting a symmetric key to obtain first ciphertext information;
the second encryption module is used for acquiring an asymmetric encryption public key and encrypting the symmetric key by adopting the asymmetric encryption public key to obtain second ciphertext information;
and the generating module is used for signing the command instruction by adopting the second ciphertext information to generate a command message.
10. An asymmetric encryption based audio-visual communication encryption system as claimed in claim 9, comprising:
at least one memory for storing computer instructions;
at least one processor in communication with the memory, wherein the at least one processor, when executing the computer instructions, causes the system to perform: the device comprises an acquisition module, a first encryption module, a second encryption module and a generation module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110281268.7A CN112804259A (en) | 2021-03-16 | 2021-03-16 | Audio and video communication encryption method and system based on asymmetric encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110281268.7A CN112804259A (en) | 2021-03-16 | 2021-03-16 | Audio and video communication encryption method and system based on asymmetric encryption |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112804259A true CN112804259A (en) | 2021-05-14 |
Family
ID=75817081
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110281268.7A Pending CN112804259A (en) | 2021-03-16 | 2021-03-16 | Audio and video communication encryption method and system based on asymmetric encryption |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112804259A (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160357980A1 (en) * | 2015-06-04 | 2016-12-08 | Microsoft Technology Licensing, Llc | Secure storage and sharing of data by hybrid encryption using predefined schema |
CN107070909A (en) * | 2017-04-01 | 2017-08-18 | 广东欧珀移动通信有限公司 | Information sending method, information receiving method, device and system |
-
2021
- 2021-03-16 CN CN202110281268.7A patent/CN112804259A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160357980A1 (en) * | 2015-06-04 | 2016-12-08 | Microsoft Technology Licensing, Llc | Secure storage and sharing of data by hybrid encryption using predefined schema |
CN107070909A (en) * | 2017-04-01 | 2017-08-18 | 广东欧珀移动通信有限公司 | Information sending method, information receiving method, device and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11831753B2 (en) | Secure distributed key management system | |
EP3324572B1 (en) | Information transmission method and mobile device | |
CN110868301B (en) | Identity authentication system and method based on state cryptographic algorithm | |
CN108111497B (en) | Mutual authentication method and device for camera and server | |
CN113067823B (en) | Mail user identity authentication and key distribution method, system, device and medium | |
CN104836784B (en) | A kind of information processing method, client and server | |
CN107317677B (en) | Secret key storage and equipment identity authentication method and device | |
WO2022022009A1 (en) | Message processing method and apparatus, device, and storage medium | |
CN103378971B (en) | A kind of data encryption system and method | |
US9917694B1 (en) | Key provisioning method and apparatus for authentication tokens | |
CN111294203B (en) | Information transmission method | |
CN111131416A (en) | Business service providing method and device, storage medium and electronic device | |
CN115314313B (en) | Information encryption method, device, storage medium and computer equipment | |
CN114465803A (en) | Object authorization method, device, system and storage medium | |
CN115102768A (en) | Data processing method and device and computer equipment | |
CN112003697B (en) | Encryption and decryption method and device for cryptographic module, electronic equipment and computer storage medium | |
CN114793184B (en) | Security chip communication method and device based on third-party key management node | |
CN109492359B (en) | Secure network middleware for identity authentication and implementation method and device thereof | |
CN106549754A (en) | The method and apparatus of management key | |
CN111934862B (en) | Server access method and device, readable medium and electronic equipment | |
CN115242471B (en) | Information transmission method, information transmission device, electronic equipment and computer readable storage medium | |
CN114554485B (en) | Asynchronous session key negotiation and application method, system, electronic equipment and medium | |
CN112804259A (en) | Audio and video communication encryption method and system based on asymmetric encryption | |
CN115361140A (en) | Method and device for verifying security chip key | |
CN111431846B (en) | Data transmission method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210514 |