Communication encryption method, device and system

An encryption method and ciphertext technology, applied in the field of communication, can solve problems such as increasing server resource overhead and affecting server performance, and achieve the effect of preventing malicious behavior and high security

Active Publication Date: 2016-08-03
VIVO MOBILE COMM CO LTD
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The first method is that the user needs to set the account and password first, and then establish a stable encrypted https connection after logging in through the account and password to avoid malicious access through encryption. However, this method not only requires the server to store the password of the user's account, In the process of user login verification, it is also necessary to find the password of the corresponding account in the database, which increases the resource overhead of the server and affects the performance of the server.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication encryption method, device and system
  • Communication encryption method, device and system
  • Communication encryption method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0065] In the embodiment of the present invention, the client can sort the access time information, the name information of the client, and the access interface identifier using a preset sorting rule to generate a first character string, encrypt the first character string by using the MD5 algorithm, and generate a first ciphertext, Then adopt the preset encryption rule to encrypt the first ciphertext, generate the second ciphertext, and splicing the access time information, the name information of the client, the access interface identifier and the second ciphertext into the Uniform Resource Locator URL 2 sent to the server. Because the access time information and the access interface identifier used to generate the second ciphert...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the present invention provide a communication encryption method, a device and a system. The method comprises the steps of respectively acquiring a uniform resource locator (URL1) corresponding to an access operation, the access time information, the name information of hardware equipment corresponding to a client, and the identifier of the preset access interface of the client; according to a preset sorting rule, sorting the access time information, the name information and the identifier of the access interface to generate a first character string; encrypting the first character string based on the MD5 algorithm to generate a first cipher text; encrypting the first cipher text by using a preset encryption rule to generate a second cipher text; splicing up the access time information, the name information, the identifier of the access interface and the second cipher text in the uniform resource locator (URL1) to generate a uniform resource locator (URL2); and sending the uniform resource locator (URL2) to a server. Embodiments of the present invention show that, the communication encryption method is higher in safety, and is capable of effectively preventing the malicious behavior of disturbing the generation of a ranking list.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a communication encryption method, a communication encryption device and a communication encryption system. Background technique [0002] With the large-scale popularization of 3G and 4G networks, users increasingly prefer to use clients to access servers to browse and obtain required information through servers. [0003] The client usually accesses the server through the access interface. During the access process, criminals can monitor the client's access through means such as packet capture tools, intercept the access interface, and then use the intercepted access interface to conduct a large number of malicious access. [0004] Due to the existence of a large number of malicious accesses, a large number of server resources are occupied, resulting in jagged server performance, which seriously affects the normal operation of the server; at the same time, these large amoun...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0478
Inventor 王保和王文峰刘海燕
Owner VIVO MOBILE COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products