[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN115603957A - Communication data processing method and device based on VOIP communication and computer equipment - Google Patents

Communication data processing method and device based on VOIP communication and computer equipment Download PDF

Info

Publication number
CN115603957A
CN115603957A CN202211189424.8A CN202211189424A CN115603957A CN 115603957 A CN115603957 A CN 115603957A CN 202211189424 A CN202211189424 A CN 202211189424A CN 115603957 A CN115603957 A CN 115603957A
Authority
CN
China
Prior art keywords
communication
data
preset
character string
rule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211189424.8A
Other languages
Chinese (zh)
Inventor
廖定端
傅强
张舜华
吴兴
任文涛
谭汉坚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
CCB Finetech Co Ltd
Original Assignee
China Construction Bank Corp
CCB Finetech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp, CCB Finetech Co Ltd filed Critical China Construction Bank Corp
Priority to CN202211189424.8A priority Critical patent/CN115603957A/en
Publication of CN115603957A publication Critical patent/CN115603957A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/1016IP multimedia subsystem [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present application relates to the field of mobile internet technologies, and in particular, to a communication data processing method and apparatus, a computer device, a storage medium, and a computer program product based on VOIP communication. The method comprises the following steps: collecting communication data when a user communicates based on VOIP; generating an encryption key by using a preset seed key and a counter value; combining the communication data and the encryption key according to a preset convention rule to obtain a combined character string; encoding the combined character string by using a preset encoding rule to obtain encrypted data; the encrypted data is transmitted to a data recipient. By adopting the method, the transmission safety of the communication data in the network communication process can be effectively improved.

Description

Communication data processing method and device based on VOIP communication and computer equipment
Technical Field
The present application relates to the field of mobile internet technologies, and in particular, to a communication data processing method and apparatus, a computer device, a storage medium, and a computer program product based on VOIP communication.
Background
With the rapid development of internet and mobile communication technology, the rapid increase of network speed and the wider and wider coverage of network, internet phone gradually appears in the public view. When communication is performed based on VOIP, different communication links are easily attacked by third-party attackers during interaction, such as communication interception, eavesdropping, phishing attack by manipulating incoming call displays, and the like, which easily results in important data being stolen or lost, or processed by third parties to achieve bad purposes.
In the conventional technology, data in a communication link is usually stolen by adding a new functional entity such as an authentication center in a VOIP networking, and during transmission, encryption and decryption of data need to be processed by the authentication center. The traditional method for encrypting the VOIP call needs to add corresponding basic hardware facilities on the basis of the existing networking, and needs to purchase a digital certificate and an intelligent card of a hardware manufacturer to a qualified CA (certificate authority), so that the cost is high, the deployment is not flexible enough, the existing rapidly developed stealing means cannot be rapidly responded, and the security of the network call is reduced.
Disclosure of Invention
In view of the foregoing, it is necessary to provide a communication data processing method, apparatus, computer device, computer readable storage medium and computer program product based on VOIP communication, which can improve the security of network communication.
In a first aspect, the present application provides a communication data processing method based on VOIP communication, which is applied to a data sender, and the method includes:
collecting communication data when a user communicates based on VOIP;
generating an encryption key by using a preset seed key and a counter value;
combining the communication data and the encryption key according to a preset convention rule to obtain a combined character string;
coding the combined character string by using a preset coding rule to obtain encrypted data;
and transmitting the encrypted data to a data receiving party, obtaining the communication data and the encryption key according to the encrypted data after the data receiving party receives the encrypted data, verifying the encryption key, and outputting the communication data if the verification is passed.
In one embodiment, the preset engagement rule includes a first engagement rule and a second engagement rule;
the combining the communication data and the encryption key according to a preset convention rule to obtain a combined character string includes:
acquiring timestamp information of the communication data;
combining the communication data and the encryption key according to a first agreed rule to obtain a first character string;
and combining the timestamp information and the first character string according to a second agreed rule to obtain a combined character string.
In a second aspect, the present application further provides a communication data processing method based on VOIP communication, which is applied to a data receiving side, and the method includes:
receiving encrypted data transmitted by a data sender, wherein the encrypted data is obtained by the data sender by encoding a combined character string by using a preset encoding rule, and the combined character string is obtained by combining communication data and an encryption key based on a preset agreed rule; the encryption key is generated based on a preset seed key and a counter value.
Decoding the encrypted data by using the preset encoding rule to obtain the combined character string;
according to the preset convention rule, deconstructing the combined character string to obtain the communication data and the encryption key;
generating a verification key by using the preset seed key and the counter value;
and verifying the encryption key based on the verification key, and outputting the communication data if the verification is passed.
In one embodiment, the method further comprises:
and if the verification fails, discarding the communication data, cutting off the current communication based on the VOIP, and reporting errors to both communication parties.
In one embodiment, the method further comprises:
monitoring the communication time of communication based on VOIP in real time;
comparing the communication time length with a preset communication time length, and when the communication time length reaches the preset communication time length, carrying out identity verification on both communication parties carrying out communication based on the VOIP;
if the identity authentication is unsuccessful, the current communication based on the VOIP is cut off, and an error is reported to both communication parties.
In one embodiment, the preset engagement rule includes a first engagement rule and a second engagement rule;
the deconstructing the combined character string according to the preset agreed rule to obtain the communication data and the encryption key includes:
deconstructing the combined character string according to a second agreed rule to obtain timestamp information and a first character string of the communication data;
and if the difference value between the timestamp information and the local time of the system is smaller than or equal to a preset threshold value, deconstructing the first character string according to the first agreed rule to obtain the communication data and the encryption key.
In one embodiment, if the difference between the timestamp information and the system local time is greater than the preset threshold, the communication between the two communication parties is cut off, and an error is reported to the two communication parties.
In a third aspect, the present application further provides a communication data processing apparatus based on VOIP communication, which is applied to a data sender, and the apparatus includes:
the acquisition module is used for acquiring communication data of a user during communication based on VOIP;
the key generation module is used for generating an encryption key by using a preset seed key and a counter value;
the combination module is used for combining the communication data and the encryption key according to a preset convention rule to obtain a combined character string;
the encoding module is used for encoding the combined character string by using a preset encoding rule to obtain encrypted data;
and the data transmission module is used for transmitting the encrypted data to a data receiving party, the data receiving party obtains the communication data and the encryption key according to the encrypted data after receiving the encrypted data, verifies the encryption key, and outputs the communication data if the communication data passes the verification.
In one embodiment, the combination module further comprises: acquiring timestamp information of the communication data; combining the communication data and the encryption key according to a first agreed rule to obtain a first character string; and combining the timestamp information and the first character string according to a second agreed rule to obtain a combined character string.
In a fourth aspect, the present application further provides a communication data processing apparatus based on VOIP communication, which is applied to a data receiving party, and the apparatus includes:
the data receiving module is used for receiving encrypted data transmitted by a data sending party, wherein the encrypted data is obtained by the data sending party by encoding a combined character string by using a preset encoding rule, and the combined character string is obtained by combining communication data and an encryption key based on a preset convention rule; the encryption key is generated based on a preset seed key and a counter value;
the decoding module is used for decoding the encrypted data by using the preset encoding rule to obtain the combined character string;
the deconstruction module is used for deconstructing the combined character string according to the preset agreed rule to obtain the communication data and the encryption key;
the verification key generation module is used for generating a verification key by using the preset seed key and the counter value;
and the verification module is used for verifying the encryption key based on the verification key and outputting the communication data if the verification is passed.
In one embodiment, the apparatus further comprises:
and the communication cutting-off module is used for discarding the communication data if the verification fails, cutting off the current communication based on the VOIP and reporting errors to both communication parties.
In one embodiment, the apparatus further comprises:
the identity authentication module is used for monitoring the communication time of communication based on VOIP in real time; comparing the communication time with a preset communication time, and when the communication time reaches the preset communication time, carrying out identity verification on both communication parties communicating based on the VOIP; if the identity authentication is unsuccessful, the current communication based on the VOIP is cut off, and an error is reported to both communication parties.
In one embodiment, the deconstruction module further comprises: according to the second agreed rule, deconstructing the combined character string to obtain timestamp information and a first character string of the communication data; and if the difference value between the timestamp information and the local time of the system is smaller than or equal to a preset threshold value, deconstructing the first character string according to the first agreed rule to obtain the communication data and the encryption key.
In one embodiment, the deconstruction module further comprises: and if the difference value between the timestamp information and the local time of the system is greater than the preset threshold value, cutting off the communication of the two communication parties and reporting an error to the two communication parties.
In a fifth aspect, the present application further provides a computer device comprising a memory and a processor, wherein the memory stores a computer program, and the processor implements the steps of the method when executing the computer program.
In a sixth aspect, the present application also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method described above.
In a seventh aspect, the present application also provides a computer program product comprising a computer program which, when executed by a processor, performs the steps of the method described above.
The communication data processing method, the device, the computer equipment, the storage medium and the computer program product based on the VOIP communication collect communication data of users during communication based on the VOIP, and generate the encryption key by using the preset seed key and the counter value. And combining the communication data and the encryption key according to a preset convention rule to obtain a combined character string, coding the combined character string by using a preset coding rule to obtain encrypted data, and transmitting the encrypted data to a data receiver. Because the encrypted data is obtained by processing the communication data and the encryption key based on the preset convention rule and the preset encoding rule, even if a user communicates based on the VOIP, the encrypted data is obtained by an attacker, the communication data and the encryption key are fused together due to the two-layer processing of the preset convention rule and the preset encoding rule, and the attacker cannot obtain the communication data in the encrypted data under the condition that the encryption key, the preset convention rule and the preset encoding rule are unknown, so that the transmission safety of the communication data in the network communication process is effectively improved, additional hardware is not required to be added in the whole encryption process, the communication cost is further reduced, and the deployment flexibility is improved.
Drawings
Fig. 1 is a diagram of an application environment of a communication data processing method based on VOIP communication in an embodiment;
fig. 2 is a flow diagram of a communication data processing method based on VOIP communication in one embodiment;
FIG. 3 is a flowchart illustrating a step of combining communication data and an encryption key according to a predetermined rule to obtain a combined string according to an embodiment;
fig. 4 is a flow chart illustrating a communication data processing method based on VOIP communication in another embodiment;
fig. 5 is a flow diagram of a communication data processing method based on VOIP communication in another embodiment;
fig. 6 is a timing diagram of a communication data processing method based on VOIP communication in another embodiment;
fig. 7 is a block diagram of a communication data processing apparatus for VOIP communication in one embodiment;
fig. 8 is a block diagram showing a configuration of a communication data processing apparatus for VOIP communication in another embodiment;
FIG. 9 is a diagram of an internal structure of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
It should be noted that the user information (including but not limited to user device information, user personal information, etc.) and data (including but not limited to data for analysis, stored data, displayed data, etc.) referred to in the present application are information and data authorized by the user or sufficiently authorized by each party.
The communication data processing method based on the VOIP communication provided in the embodiment of the present application can be applied to the application environment shown in fig. 1. Wherein the data sender 102 communicates with the data receiver 104 based on VOIP. The data storage system may store data that the data sender 102 and the data receiver 104 need to process. The data storage systems are integrated on the data sender 102 and the data receiver 104, respectively. The data receiving part 102 collects communication data of a user during communication based on VOIP, generates an encryption key by using a preset seed key and a counter value, combines the communication data and the encryption key according to a preset convention rule to obtain a combined character string, encodes the combined character string by using a preset encoding rule to obtain encrypted data, and transmits the encrypted data to the data receiving part 104. After receiving the encrypted data, the data receiver 104 obtains communication data and an encryption key according to the encrypted data, verifies the encryption key, and outputs the communication data if the verification is passed. The data receiver 102 and the data sender 104 may be, but are not limited to, various personal computers, notebook computers, smart phones, tablet computers, internet of things devices, and portable wearable devices, and the internet of things devices may be smart speakers, smart televisions, smart air conditioners, smart car-mounted devices, and the like. The portable wearable device can be a smart watch, a smart bracelet, a head-mounted device, and the like. It can be understood that the data sending party and the data receiving party in the application are not fixed, and the data sending party and the data receiving party can be switched in turn in the actual communication process.
In one embodiment, the VOIP may be a network of SIP protocol that extends the communication range, it being understood that the SIP protocol may limit VOIP to not only voice-only calls, but may also support video conferencing, instant messaging, text, or other multimedia communication scenarios.
In one embodiment, as shown in fig. 2, a communication data processing method based on VOIP communication is provided, which is described by taking the method as an example of being applied to the data sender in fig. 1, and includes the following steps:
step 202, collecting communication data of a user during communication based on the VOIP.
VOIP refers to the transmission of voice in packets using IP protocol over IP networks. In one VOIP network used, voice signals are digitized, compressed and converted into IP packets, which are then transmitted over the IP network.
Specifically, the data sender collects communication data of communication users when the communication users communicate based on the VOIP network.
Step 204, an encryption key is generated by using the preset seed key and the counter value.
The preset seed key is a key determined by the data sending party and the data receiving party through handshake in advance and is used for generating an encryption key. It is understood that the preset seed key is a dynamically changeable value, and the number of times of occurrence of each preset seed key is recorded by using a counter. The counter is an unordered container, is used for recording the occurrence times of various values, and is generally stored in a Key value pair form, a value to be recorded is keyed, and the occurrence times of the value is a counter value (value).
Specifically, the data sender uses a preset seed key negotiated in advance by both communication parties and a counter value corresponding to the preset seed key to generate an encryption key. It is to be understood that, since the preset seed key is a dynamically changing value, the encryption key generated based on the preset seed key and the counter value is also a one-time encryption key. And the security of data transmission can be greatly encrypted by encrypting and transmitting data based on a one-time pad encryption mode.
In one embodiment, the encryption key may be generated based on an event synchronization pattern. Specifically, the number of times of encrypted data transmission (i.e., the event sequence) performed by both communication parties is used as an operation factor of the encryption key, for example, if the current encryption number is 10, the preset seed key value is 10, and an encryption key for encrypting the current communication data is generated according to the counter value corresponding to the preset seed key value being 10 and the preset seed key value.
And step 206, combining the communication data and the encryption key according to a preset convention rule to obtain a combined character string.
The preset engagement rule is an engagement rule used for obtaining the combined character string, the communication data and the encryption key are combined according to the preset engagement rule, and the communication data and the encryption key can be combined to obtain a whole. It is understood that the predetermined engagement rule is obtained by engagement between the data receiver and the data sender in advance.
Specifically, the data sender combines the communication data and the encryption key according to a preset engagement rule agreed by the two communication parties in advance to obtain a combined character string.
And step 208, encoding the combined character string by using a preset encoding rule to obtain encrypted data.
The preset encoding rule is a rule used for encoding the combined character string, and the combined character string can be converted into encryption data which can be transmitted by processing the combined character string through the preset encoding rule. It can be understood that the preset encoding rule is obtained by the data receiver and the data sender in advance.
Specifically, the data sender performs coding processing on the combined character string according to a preset coding rule agreed by the two communication parties in advance to obtain encrypted data which can be used for transmission.
In one embodiment, the predetermined encoding rule may be obtained by using a predetermined encoding algorithm. Specifically, the data sending party and the data receiving party negotiate a preset encoding algorithm to be used in advance, and when the combined character string needs to be encoded, the data sending party calls the preset encoding algorithm to encode the combined character string to obtain encrypted data.
In one embodiment, the encoding the combined character string using the preset encoding rule includes:
and coding the combined character string by using a preset coding rule, modulating the combined character string into analog information, and performing analog-to-digital conversion on the analog information to obtain encrypted data, wherein the encrypted data is in a digital signal form.
Step 210, transmitting the encrypted data to a data receiving party, after receiving the encrypted data, the data receiving party obtains communication data and an encryption key according to the encrypted data, verifies the encryption key, and outputs the communication data if the verification is passed.
Specifically, the data sender transmits the encrypted data to the data receiver based on the VOIP network. And the data receiving party performs preset decryption operation according to the encrypted data after receiving the encrypted data to obtain communication data and an encryption key, verifies the encryption key based on a verification key generated by the data receiving party, and outputs the communication data if the verification is passed.
In the communication data processing method based on the VOIP communication, the communication data of the user during communication based on the VOIP is collected, the preset seed key and the counter value are used for generating the encryption key, and the counter value is changed randomly, so that the encryption key generated according to the preset seed key and the counter value has higher safety. And combining the communication data and the encryption key according to a preset convention rule to obtain a combined character string, coding the combined character string by using a preset coding rule to obtain encrypted data, and transmitting the encrypted data to a data receiver. Because the encrypted data is obtained by processing the communication data and the encryption key based on the preset convention rule and the preset encoding rule, even if a user communicates based on the VOIP, the encrypted data is obtained by an attacker, the communication data and the encryption key are fused together due to the two-layer processing of the preset convention rule and the preset encoding rule, and the attacker cannot obtain the communication data in the encrypted data under the condition that the encryption key, the preset convention rule and the preset encoding rule are unknown, so that the transmission safety of the communication data in the network communication process is effectively improved, the whole encryption process does not need to increase extra hardware, the communication cost is further reduced, and the deployment flexibility is improved.
In an embodiment, as shown in fig. 3, the preset engagement rule includes a first engagement rule and a second engagement rule, and the obtaining the combined character string by combining the communication data and the encryption key according to the preset engagement rule includes:
step 302, obtaining the time stamp information of the communication data.
Where a timestamp is a sequence of characters or encoded information that identifies when a particular event occurred, typically given a date and time, sometimes accurate to a fraction of a second. The main purpose of the time stamp is to authenticate the time of data generation by a certain technical means, so as to verify whether the data is falsified after being generated. The time stamp information of the communication data is a time stamp generated based on the time at which the data sender collected the communication data.
Specifically, the data transmitting side acquires time stamp information generated based on the time at which the communication data is acquired.
Step 304, the communication data and the encryption key are combined according to the first agreed rule to obtain a first character string.
The first agreed rule is a splicing rule for generating a character string of the communication data and the encryption key.
Specifically, the data sender combines the communication data and the encryption key according to a first agreed rule, and combines the communication data and the encryption key into a first character string.
For example, the data sender and the data receiver may agree to occupy the space by splicing random characters of fixed numbers, arrange the communication data and the encryption key according to a specific sequence, and combine the communication data and the encryption key with the space occupied by the random characters to obtain the first character string.
And step 306, combining the timestamp information and the first character string according to a second agreed rule to obtain a combined character string.
And the second agreed rule is a splicing rule for splicing the timestamp information and the first character string.
Specifically, the data sender combines the timestamp information and the first character string according to a second agreed rule to obtain a combined character string.
For example, the data sender and the data receiver may agree to occupy the random character occupying with the same or different splicing fixed number as the first agreed rule, arrange the timestamp information and the first character string according to a specific sequence, and combine the timestamp information and the random character occupying to obtain a combined character string.
In this embodiment, the timestamp information corresponding to the time when the communication data is acquired, and the timestamp information and the first character string are combined according to the second agreed rule to obtain the combined character string.
In one embodiment, as shown in fig. 4, a communication data processing method based on VOIP communication is provided, which is described by taking the method as an example of being applied to the data receiving side in fig. 1, and the method includes the following steps:
step 402, receiving encrypted data transmitted by a data sender, wherein the encrypted data is obtained by the data sender by using a preset encoding rule to encode a combined character string, and the combined character string is obtained by combining communication data and an encryption key based on a preset convention rule; the encryption key is generated based on the preset seed key and the counter value.
Specifically, the data receiving side receives the encrypted data transmitted by the data sending side, and the encrypted data generating step is described in detail in the foregoing description of step 202 to step 210, and is not described herein again.
And step 404, decoding the encrypted data by using a preset encoding rule to obtain a combined character string.
Specifically, since the encrypted data is obtained by the data sending party encoding the combined character string according to the preset encoding rule, after receiving the encrypted data, the data receiving party decodes the encrypted data by using the preset encoding rule agreed with the data sending party in advance to obtain the combined character string.
And 406, deconstructing the combined character string according to a preset convention rule to obtain communication data and an encryption key.
Specifically, since the combined character string is obtained by the data sending party combining the communication data and the encryption key according to the preset engagement rule, after the data receiving party obtains the combined character string, in order to obtain the encryption key and the communication data therein, the combined character string is deconstructed by using the preset engagement rule which is engaged with the data sending party in advance, so that the communication data and the encryption key can be obtained.
Step 408, a verification key is generated using the predetermined seed key and the counter value.
The verification key is generated by the data receiver based on a preset seed key consistent with the data transmitter and a counter value, and is used for comparing with the encryption key and judging whether the encrypted data is tampered in the transmission process according to a comparison result.
The preset seed key is a seed key negotiated by the data receiver and the data sender in advance, the data receiver and the data sender are both provided with the same counter, and the counter values corresponding to the preset seed keys are also consistent, so that the encryption key generated by the data sender can be verified based on the key generated by the preset seed key and the counter values.
Specifically, the data receiving side obtains the value of the counter, and generates the verification key by using the preset seed key and the counter value negotiated in advance with the data sending side.
And step 410, verifying the encryption key based on the verification key, and outputting communication data if the verification is passed.
Specifically, the data receiving party compares the verification key with the encryption key, verifies the encryption key based on the verification key, and if the verification is passed, it indicates that the encrypted data is not tampered in the data transmission process, the communication data carried in the encrypted data is safe, and the user outputs the communication data.
In one embodiment, verifying the encryption key based on the verification key comprises: if the verification key is consistent with the encryption key, the verification is passed; if the verification key is inconsistent with the encryption key, the verification fails.
In the method in the above embodiment, the data receiver decodes and deconstructs the received encrypted data according to the preset encoding rule and the preset engagement rule negotiated with the data transmitter to obtain the encryption key and the communication data, obtains the counter value corresponding to the same preset seed key through the preset counter consistent with the data receiver, generates the verification key according to the preset seed key and the counter value, verifies the encryption key based on the verification key, and outputs the communication data to the user only when the encryption key passes the verification, thereby effectively ensuring the security of the communication data output to the user.
Further, in an embodiment, the communication data processing method based on VOIP communication further includes: if the verification fails, the communication data is discarded, the current communication based on the VOIP is cut off, and an error is reported to both communication parties.
Specifically, if the verification fails, it indicates that the encrypted data received by the current data receiver has been tampered by a person in the transmission process, and communication performed by two current communication parties based on VOIP is likely to be invaded by an attacker, and the communication data in the obtained encrypted data does not have security, and the communication data is not necessary to be retained, so that the data receiver discards the communication data, cuts off the current communication performed based on the VOIP network, and generates a prompt message, and sends the prompt message to the data sender, where the prompt message is used to report an error to users of the two communication parties, and informs that the current communication network has an invasion risk.
In this embodiment, when the verification key generated by the data receiver is inconsistent with the encryption key generated by the data sender, it is indicated that the security of the encrypted data received by the data receiver cannot be guaranteed at this time, and the data receiver discards the communication data and cuts off the current communication in time, so that a greater risk of data eavesdropping or data tampering is effectively avoided, and the security of communication data transmission in the communication process is effectively improved.
In order to further enhance the security of the communication process, as shown in fig. 5, in an embodiment, the communication data processing method based on VOIP communication further includes the following steps:
step 502, monitoring the communication duration of communication based on VOIP in real time.
Specifically, when the data receiver communicates between two communication parties, the communication time of the two communication parties communicating based on the VOIP network is monitored in real time.
And step 504, comparing the communication time length with a preset communication time length, and when the communication time length reaches the preset communication time length, performing identity verification on both communication parties communicating based on the VOIP.
The preset communication time length is time length data used for determining whether identity authentication is needed to be carried out on two communication parties. It can be understood that the preset communication time is preset by a designer according to an actual situation, and a specific numerical value of the preset communication time is not limited in the present application.
Specifically, the communication time length is compared with the preset communication time length, when the communication time length reaches the preset communication time length, it indicates that the two communication parties have performed communication for a certain time based on the VOIP network, a period of time has elapsed since the two communication parties are authenticated, and in order to further improve the security of the communication process, the data receiving party performs authentication on the two communication parties performing communication based on VOIP at present.
In one embodiment, if the data receiver only has the authentication authority for the communication user corresponding to the data receiver and the data sender does not have the authentication authority, the data receiver may generate an authentication request instruction, send the authentication request instruction to the data sender, and apply for authentication of the communication user corresponding to the data sender.
Step 506, if the identity authentication is unsuccessful, the current communication based on the VOIP is cut off, and an error is reported to both communication parties.
Specifically, if the identity authentication is unsuccessful, it is stated that the communication parties have a situation in which the identity information is not matched, which affects the security of the communication process, the data receiving party cuts off the current communication based on the VOIP network, generates the prompt information, and sends the prompt information to the data sending party, where the prompt information is used to report an error to the users of the communication parties, and informs the current communication network of the existence of the communication risk.
In one embodiment, the authentication of the two communication parties may be a periodic operation, and the specific number of times of authentication is determined by the total communication duration of the two communication parties.
In the method in the above embodiment, the data sender authenticates the identity of the communication party performing communication, and cuts off communication in time when the fact that the identity authentication is unsuccessful is found. By carrying out identity authentication on the communication participants in the communication, the situation that an attacker avoids identity authentication operation before communication, cuts off and pretends to be the communication participants to carry out communication data stealing in the communication process is effectively avoided, and the safety of the network communication process is further improved.
In the actual communication process, after obtaining the encrypted data, although the attacker cannot unlock the obtained communication data, the attacker can repeatedly send the obtained encrypted data to the data receiving party, so that the normal work of the data receiving party is disturbed.
Based on this, in one embodiment, the preset engagement rule comprises a first engagement rule and a second engagement rule. According to a preset convention rule, deconstructing the combined character string to obtain communication data and an encryption key, comprising the following steps of: deconstructing the combined character string according to a second agreed rule to obtain timestamp information and a first character string of the communication data; and if the difference value between the timestamp information and the local time of the system is less than or equal to a preset threshold value, deconstructing the first character string according to a first agreed rule to obtain communication data and an encryption key.
The first agreed rule is a splicing rule for generating a character string of communication data and an encryption key; the second agreed rule is a splicing rule for splicing the timestamp information and the first character string; the time stamp information of the communication data is a time stamp generated based on the time when the communication data was collected by the data sender.
The preset threshold is a time difference for judging the validity of the communication data. It is understood that the preset threshold is set by the designer according to the data transmission rate at the time of actual communication.
Specifically, in order to further enhance the effect of preventing the replay attack, the data receiving side needs to judge the validity of the communication data by the time stamp information of the communication data. When the data sender generates the combined character string, firstly, the communication data and the encryption key are combined according to a first agreed rule to obtain a first character string, and then the timestamp information and the first character string are combined according to a second agreed rule to obtain the combined character string.
Therefore, the data receiver firstly deconstructs the combined character string according to the second agreed rule negotiated with the data transmitter to obtain the timestamp information and the first character string. The method comprises the steps of obtaining the local time of a system at the current moment, calculating the obtained timestamp information and the local time of the system, and if the time difference value between the timestamp information and the local time of the system is smaller than or equal to a preset threshold value, indicating that the encrypted data received by a current data receiving party is sent within an effective time period, and at the moment, determining that the timeliness verification of the currently received communication data is successful. And the data receiver deconstructs the first character string according to a first agreed rule negotiated with the data transmitter to obtain the encryption key and the communication data with successful timeliness verification.
In the embodiment, the data receiving party carries out timeliness verification on the received communication data according to the timestamp information of the communication data, so that an attacker can be effectively prevented from using replay attack on the data receiving party, the system order is disturbed, and the safety of the communication process is further improved.
Further, in an embodiment, the communication data processing method based on VOIP communication further includes: and if the difference value between the timestamp information and the local time of the system is greater than the preset threshold value, cutting off the communication of the two communication parties and reporting an error to the two communication parties.
Specifically, the data receiving side obtains the system local time at the current moment, calculates the obtained timestamp information and the system local time, and if the time difference between the timestamp information and the system local time is greater than a preset threshold value, it is determined that the encrypted data received by the current data receiving side is not sent within an effective time period, and at this time, it can be determined that the timeliness verification of the currently received communication data fails and the data receiving side may be under the replay attack of an attacker. And the data receiving party cuts off the communication of the two communication parties and generates prompt information, and the prompt information is used for reporting errors to the two communication parties and prompting that the current communication process has risks.
In this embodiment, when the data receiving side determines that the communication data does not have timeliness through the timestamp information, the communication between the two communication sides is quickly cut off, the situation that the data receiving side receives disorderly and the communication data is received wrongly due to a large number of replay attacks is avoided, and the safety and the stability of the communication process are further improved.
In an embodiment, as shown in fig. 6, a communication data processing method based on VOIP communication is provided, where the method is applied to a VOIP Network based on Session Initiation Protocol (SIP) networking, and since such established communication links generally need to be connected to the internet and a Public Switched Telephone Network (PSTN), a third-party attacker can easily perform activities such as interception of communication and eavesdropping during interaction of different communication links, the method starts from the whole, ensures security of communication data transmission during communication, and improves difficulty in cracking encrypted data. The method comprises the following specific steps:
firstly, a PSTN side terminal acquires communication data of a user during communication based on VOIP through terminal integrated communication acquisition equipment such as a microphone and transmits the data to a PSTN server.
The PSTN server generates a one-time encryption key (OTP) by using a preset seed key and a counter value, combines communication data and the OTP by a first agreed rule to obtain a first character string, acquires timestamp information of the communication data, and combines the timestamp information and the first character string by a second agreed rule to obtain a combined character string. And coding the combined character string by using a Turbo coding algorithm, then carrying out analog-to-digital conversion to obtain encrypted data, and transmitting the encrypted data to the PSTN landing gateway. And the PSTN floor gateway transmits the encrypted data to the SIP side server side through the PBX floor gateway.
And after the SIP side server-side performs digital-to-analog conversion on the received encrypted data, decoding the converted data by using a Turbo coding algorithm to obtain a combined character string. And deconstructing the combined character string according to a second agreed rule to obtain the timestamp information of the first character string and the communication data. And the SIP side server side acquires the current system time, calculates the time difference between the timestamp information and the current system time, cuts off the current communication and reports an error to both communication parties if the time difference is greater than a preset threshold value. And if the time difference is smaller than or equal to the preset threshold, deconstructing the first character string according to a first agreed rule to obtain the OTP and the communication data.
And the SIP side server generates a verification key by using the preset seed key and the counter value, compares the verification key with the OTP, fails verification if the verification key is inconsistent with the OTP, cuts off the current communication and reports an error to both communication parties. And if the verification key is consistent with the OTP, the verification is successful, and the communication data is output to the user.
It should be understood that, although the steps in the flowcharts related to the embodiments described above are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a part of the steps in the flowcharts related to the embodiments described above may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, and the execution order of the steps or stages is not necessarily sequential, but may be rotated or alternated with other steps or at least a part of the steps or stages in other steps.
Based on the same inventive concept, the embodiment of the application also provides a communication data processing device based on the VOIP communication for realizing the communication data processing method based on the VOIP communication. The implementation scheme for solving the problem provided by the device is similar to the implementation scheme described in the above method, so specific limitations in one or more embodiments of the communication data processing device based on VOIP communication provided below can be referred to the above limitations on the communication data processing method based on VOIP communication, and are not described herein again.
In one embodiment, as shown in fig. 7, a communication data processing apparatus 700 for VOIP communication is provided, which is applied to a data transmitting side, and includes: an acquisition module 701, a key generation module 702, a combination module 703, an encoding module 704 and a data transmission module 705, wherein:
the collecting module 701 is used for collecting communication data when the user communicates based on the VOIP.
A key generating module 702, configured to generate an encryption key by using the preset seed key and the counter value.
The combining module 703 is configured to combine the communication data and the encryption key according to a preset agreement rule to obtain a combined character string.
And the encoding module 704 is configured to encode the combined character string by using a preset encoding rule to obtain encrypted data.
The data transmission module 705 is configured to transmit the encrypted data to a data receiving party, and after receiving the encrypted data, the data receiving party obtains communication data and an encryption key according to the encrypted data, verifies the encryption key, and outputs the communication data if the verification is passed.
The communication data processing device based on the VOIP communication collects the communication data of the user during communication based on the VOIP, and generates the encryption key by using the preset seed key and the counter value. And combining the communication data and the encryption key according to a preset convention rule to obtain a combined character string, coding the combined character string by using a preset coding rule to obtain encrypted data, and transmitting the encrypted data to a data receiver. Because the encrypted data is obtained by processing the communication data and the encryption key based on the preset convention rule and the preset encoding rule, even if a user communicates based on the VOIP, the encrypted data is obtained by an attacker, the communication data and the encryption key are fused together due to the two-layer processing of the preset convention rule and the preset encoding rule, and the attacker cannot obtain the communication data in the encrypted data under the condition that the encryption key, the preset convention rule and the preset encoding rule are unknown, so that the transmission safety of the communication data in the network communication process is effectively improved, the whole encryption process does not need to increase extra hardware, the communication cost is further reduced, and the deployment flexibility is improved.
In one embodiment, the combination module further comprises: acquiring timestamp information of communication data; combining the communication data and the encryption key according to a first agreed rule to obtain a first character string; and combining the timestamp information and the first character string according to a second agreed rule to obtain a combined character string.
In one embodiment, as shown in fig. 8, a communication data processing apparatus 800 based on VOIP communication is provided, which is applied to a data receiving side, and includes: a data receiving module 801, a decoding module 802, a deconstruction module 803, a verification key generating module 804 and a verification module 805, wherein:
the data receiving module 801 is configured to receive encrypted data transmitted by a data sender, where the encrypted data is obtained by the data sender encoding a combined character string using a preset encoding rule, and the combined character string is obtained by combining communication data and an encryption key based on a preset agreed rule; the encryption key is generated based on the preset seed key and the counter value.
The decoding module 802 is configured to decode the encrypted data using a preset encoding rule to obtain a combined character string.
And the deconstruction module 803 is configured to deconstruct the combined character string according to a preset agreed rule to obtain communication data and an encryption key.
The verification key generation module 804 is configured to generate a verification key by using the preset seed key and the counter value.
And the verification module 805 is configured to verify the encryption key based on the verification key, and output the communication data if the verification passes.
In one embodiment, the communication data processing apparatus based on VOIP communication further includes: and the communication cutting-off module is used for discarding the communication data if the verification fails, cutting off the current communication based on the VOIP and reporting errors to both communication parties.
In one embodiment, the communication data processing apparatus based on VOIP communication further includes: the identity authentication module is used for monitoring the communication time of communication based on VOIP in real time; comparing the communication time with a preset communication time, and when the communication time reaches the preset communication time, carrying out identity verification on two communication parties carrying out communication based on VOIP; if the identity authentication is unsuccessful, the current communication based on the VOIP is cut off, and an error is reported to both communication parties.
In one embodiment, the deconstruction module further comprises: deconstructing the combined character string according to a second agreed rule to obtain timestamp information and a first character string of the communication data; and if the difference value between the timestamp information and the local time of the system is less than or equal to a preset threshold value, deconstructing the first character string according to a first agreed rule to obtain communication data and an encryption key.
In one embodiment, the deconstruction module further comprises: and if the difference value between the timestamp information and the local time of the system is greater than the preset threshold value, cutting off the communication of the two communication parties and reporting an error to the two communication parties.
The modules in the communication data processing device based on VOIP communication can be wholly or partially implemented by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a server or a terminal integrated with a data sending side or a data receiving side, and an internal structure diagram thereof may be as shown in fig. 9. The computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operating system and the computer program to run on the non-volatile storage medium. The database of the computer equipment is used for storing data such as communication data, preset seed keys, counter values, preset convention rules, preset coding rules and the like. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a communication data processing method based on VOIP communication.
It will be appreciated by those skilled in the art that the configuration shown in fig. 9 is a block diagram of only a portion of the configuration associated with the present application, and is not intended to limit the computing device to which the present application may be applied, and that a particular computing device may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, which includes a memory and a processor, the memory stores a computer program, and the processor realizes the steps of the communication data processing based on VOIP communication of the above embodiments when executing the computer program.
In one embodiment, a computer-readable storage medium is provided, on which a computer program is stored, which, when being executed by a processor, realizes the steps of the communication data processing based on VOIP communication of the above-mentioned embodiments.
In one embodiment, a computer program product is provided, comprising a computer program that when executed by a processor implements the steps of the communication data processing based on VOIP communication of the various embodiments described above.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, databases, or other media used in the embodiments provided herein can include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high-density embedded nonvolatile Memory, resistive Random Access Memory (ReRAM), magnetic Random Access Memory (MRAM), ferroelectric Random Access Memory (FRAM), phase Change Memory (PCM), graphene Memory, and the like. Volatile Memory can include Random Access Memory (RAM), external cache Memory, and the like. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others. The databases referred to in various embodiments provided herein may include at least one of relational and non-relational databases. The non-relational database may include, but is not limited to, a block chain based distributed database, and the like. The processors referred to in the embodiments provided herein may be general purpose processors, central processing units, graphics processors, digital signal processors, programmable logic devices, quantum computing based data processing logic devices, etc., without limitation.
All possible combinations of the technical features in the above embodiments may not be described for the sake of brevity, but should be considered as being within the scope of the present disclosure as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present application should be subject to the appended claims.

Claims (17)

1. A communication data processing method based on VOIP communication is characterized in that the method is applied to a data sender and comprises the following steps:
collecting communication data when a user communicates based on VOIP;
generating an encryption key by using a preset seed key and a counter value;
combining the communication data and the encryption key according to a preset convention rule to obtain a combined character string;
encoding the combined character string by using a preset encoding rule to obtain encrypted data;
and transmitting the encrypted data to a data receiving party, obtaining the communication data and the encryption key according to the encrypted data after the data receiving party receives the encrypted data, verifying the encryption key, and outputting the communication data if the verification is passed.
2. The method of claim 1, wherein the predetermined engagement rules comprise a first engagement rule and a second engagement rule;
the combining the communication data and the encryption key according to a preset convention rule to obtain a combined character string includes:
acquiring timestamp information of the communication data;
combining the communication data and the encryption key according to a first agreed rule to obtain a first character string;
and combining the timestamp information and the first character string according to a second agreed rule to obtain a combined character string.
3. A communication data processing method based on VOIP communication is characterized in that the method is applied to a data receiver and comprises the following steps:
receiving encrypted data transmitted by a data sender, wherein the encrypted data is obtained by encoding a combined character string by the data sender by using a preset encoding rule, and the combined character string is obtained by combining communication data and an encryption key based on a preset convention rule; the encryption key is generated based on a preset seed key and a counter value;
decoding the encrypted data by using the preset encoding rule to obtain the combined character string;
according to the preset convention rule, deconstructing the combined character string to obtain the communication data and the encryption key;
generating a verification key by using the preset seed key and the counter value;
and verifying the encryption key based on the verification key, and outputting the communication data if the verification is passed.
4. The method of claim 3, further comprising:
and if the verification fails, discarding the communication data, cutting off the current communication based on the VOIP, and reporting errors to both communication parties.
5. The method of claim 3, further comprising:
monitoring the communication time of communication based on VOIP in real time;
comparing the communication time with a preset communication time, and when the communication time reaches the preset communication time, carrying out identity verification on both communication parties communicating based on the VOIP;
if the identity authentication is unsuccessful, the current communication based on VOIP is cut off, and an error is reported to both communication parties.
6. The method of claim 3, wherein the predetermined engagement rules comprise a first engagement rule and a second engagement rule;
the deconstructing the combined character string according to the preset agreed rule to obtain the communication data and the encryption key includes:
deconstructing the combined character string according to the second agreed rule to obtain timestamp information and a first character string of the communication data;
and if the difference value between the timestamp information and the local time of the system is smaller than or equal to a preset threshold value, deconstructing the first character string according to the first agreed rule to obtain the communication data and the encryption key.
7. The method according to claim 6, wherein if the difference between the timestamp information and the system local time is greater than the preset threshold, the communication between the two parties is cut off, and an error is reported to the two parties.
8. A communication data processing apparatus based on VOIP communication, which is applied to a data sender, the apparatus comprising:
the acquisition module is used for acquiring communication data of a user during communication based on VOIP;
the key generation module is used for generating an encryption key by using a preset seed key and a counter value;
the combination module is used for combining the communication data and the encryption key according to a preset convention rule to obtain a combined character string;
the encoding module is used for encoding the combined character string by using a preset encoding rule to obtain encrypted data;
and the data transmission module is used for transmitting the encrypted data to a data receiving party, the data receiving party obtains the communication data and the encryption key according to the encrypted data after receiving the encrypted data, verifies the encryption key, and outputs the communication data if the communication data passes the verification.
9. The apparatus of claim 8, wherein the combining module further comprises: acquiring timestamp information of the communication data; combining the communication data and the encryption key according to a first agreed rule to obtain a first character string; and combining the timestamp information and the first character string according to a second agreed rule to obtain a combined character string.
10. A communication data processing apparatus based on VOIP communication, which is applied to a data receiver, the apparatus comprising:
the data receiving module is used for receiving encrypted data transmitted by a data sending party, wherein the encrypted data is obtained by the data sending party by encoding a combined character string by using a preset encoding rule, and the combined character string is obtained by combining communication data and an encryption key based on a preset convention rule; the encryption key is generated based on a preset seed key and a counter value;
the decoding module is used for decoding the encrypted data by using the preset encoding rule to obtain the combined character string;
the deconstruction module is used for deconstructing the combined character string according to the preset agreed rule to obtain the communication data and the encryption key;
the verification key generation module is used for generating a verification key by using the preset seed key and the counter value;
and the verification module is used for verifying the encryption key based on the verification key and outputting the communication data if the verification is passed.
11. The apparatus of claim 10, further comprising:
and the communication cutting-off module is used for discarding the communication data if the verification fails, cutting off the current communication based on the VOIP and reporting errors to both communication parties.
12. The apparatus of claim 10, further comprising:
the identity authentication module is used for monitoring the communication time of communication based on VOIP in real time; comparing the communication time length with a preset communication time length, and when the communication time length reaches the preset communication time length, carrying out identity verification on both communication parties carrying out communication based on the VOIP; if the identity authentication is unsuccessful, the current communication based on the VOIP is cut off, and an error is reported to both communication parties.
13. The apparatus of claim 10, wherein the deconstruction module further comprises: deconstructing the combined character string according to a second agreed rule to obtain timestamp information and a first character string of the communication data; and if the difference value between the timestamp information and the local time of the system is smaller than or equal to a preset threshold value, deconstructing the first character string according to the first agreed rule to obtain the communication data and the encryption key.
14. The apparatus of claim 13, wherein the deconstruction module further comprises: and if the difference value between the timestamp information and the local time of the system is greater than the preset threshold value, cutting off the communication of the two communication parties and reporting an error to the two communication parties.
15. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, implements the steps of the method of any of claims 1 to 7.
16. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 7.
17. A computer program product comprising a computer program, characterized in that the computer program, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN202211189424.8A 2022-09-28 2022-09-28 Communication data processing method and device based on VOIP communication and computer equipment Pending CN115603957A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211189424.8A CN115603957A (en) 2022-09-28 2022-09-28 Communication data processing method and device based on VOIP communication and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211189424.8A CN115603957A (en) 2022-09-28 2022-09-28 Communication data processing method and device based on VOIP communication and computer equipment

Publications (1)

Publication Number Publication Date
CN115603957A true CN115603957A (en) 2023-01-13

Family

ID=84845915

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211189424.8A Pending CN115603957A (en) 2022-09-28 2022-09-28 Communication data processing method and device based on VOIP communication and computer equipment

Country Status (1)

Country Link
CN (1) CN115603957A (en)

Similar Documents

Publication Publication Date Title
US10764043B2 (en) Identity and content authentication for phone calls
MXPA03003710A (en) Methods for remotely changing a communications password.
CN112989426B (en) Authorization authentication method and device, and resource access token acquisition method
CN113806772A (en) Information encryption transmission method and device based on block chain
CN111294203B (en) Information transmission method
WO2007053255A1 (en) Total exchange session security
CN107094156A (en) A kind of safety communicating method and system based on P2P patterns
CN108599926A (en) A kind of HTTP-Digest modified AKA identity authorization systems and method based on pool of symmetric keys
US9515989B1 (en) Methods and apparatus for silent alarm channels using one-time passcode authentication tokens
WO2016082401A1 (en) Conversation method and apparatus, user terminal and computer storage medium
Di Pietro et al. A two-factor mobile authentication scheme for secure financial transactions
CN115473655B (en) Terminal authentication method, device and storage medium for access network
CN108616350A (en) A kind of HTTP-Digest class AKA identity authorization systems and method based on pool of symmetric keys
CN113365264B (en) Block chain wireless network data transmission method, device and system
CN107104888B (en) Safe instant messaging method
CN109492359B (en) Secure network middleware for identity authentication and implementation method and device thereof
CN115603957A (en) Communication data processing method and device based on VOIP communication and computer equipment
CN110809000A (en) Service interaction method, device, equipment and storage medium based on block chain network
CN113923668B (en) Method, device, chip and readable storage medium for identifying network attack behavior
CN112367329B (en) Communication connection authentication method, device, computer equipment and storage medium
CN115834038A (en) Encryption method and device based on national commercial cryptographic algorithm
CN107864136A (en) A kind of stolen method of anti-locking system short message service
CN118019000B (en) High-security mobile phone communication system based on dynamic token link encryption
CN112925535A (en) Method and device for installing embedded application of password chip
CN117134904B (en) Method based on identity recognition and dynamic encryption and decryption communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination