CN112118574B - Safe communication method and system based on machine chat - Google Patents
Safe communication method and system based on machine chat Download PDFInfo
- Publication number
- CN112118574B CN112118574B CN202010796501.0A CN202010796501A CN112118574B CN 112118574 B CN112118574 B CN 112118574B CN 202010796501 A CN202010796501 A CN 202010796501A CN 112118574 B CN112118574 B CN 112118574B
- Authority
- CN
- China
- Prior art keywords
- user
- communication
- chat
- agent
- intelligent
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses a safe communication method and system based on machine chatting, which establishes a safe communication secret key between a user and an intelligent agent to be communicated, when the user establishes chatting communication with the intelligent agent, the intelligent agent randomly extracts a plurality of safe communication secret keys from the safe communication secret key and sends the secret keys to the user for identification, when the user answers all received safe communication secret keys correctly, the user is confirmed to be a correct chatting object, otherwise, the intelligent agent finishes the communication with the user, the safe communication secret key established between the user and the intelligent agent is used as a chatting object verification mechanism, a third party is not needed for safe authentication, safety and reliability are realized, the safe communication secret key between the intelligent agent and the user is initially set by the user, the safe communication secret key is randomly generated, the safe communication secret key does not need to be transmitted for communication, the safe communication secret key is prevented from being stolen, and a new safe communication secret key can be formed in the communication process, the communication safety of the intelligent agent can be greatly improved, the balance of usability and safety can be realized, and the robustness is good.
Description
Technical Field
The invention belongs to the field of intelligent agent safety, and particularly relates to a safe communication method and system based on machine chat.
Background
With the development of artificial intelligence and the Internet of things, human beings can chat with an intelligent machine and carry out remote control, and great convenience is brought to industrial production and home life. The communication security is mainly realized by encrypting the content by adopting a symmetric encryption technology and encrypting the password by using a public key and a private key technology which are asymmetrically encrypted, theoretically, the distribution of the public key and the control right of a machine have security loopholes, namely, any illegal intelligent agent can generate a pair of the public key and the private key and sends the public key to serve as a legal person, and the legal machine can also be controlled by an illegal user such as a hacker or violence, so that the communication process is illegal and the content is stolen. Although the public key can be confirmed by using the block chain technology, the public key has certain technical complexity, and is not easy to understand by common users, so that the trust degree is limited; digital certificates can also be used for confirming the public key, but the digital certificates are difficult for a plurality of embedded intelligent machines with limited computing capability and have complex operation methods; the public key can also be confirmed by using a quantum communication technology, but the technology is still under research and development, so that for example, taking smart homes as an example, although the technology has appeared for many years, the technology does not enter thousands of households, and in addition to reasons such as functions, prices and the like, in many application fields, a safety problem is a key factor influencing the mass popularization of an internet of things system, so that how to improve the communication use safety of the smart machine is a problem which needs to be solved urgently.
Disclosure of Invention
The invention aims to provide a safe communication method and a system based on machine chat, which overcome the defects of the prior art.
In order to achieve the purpose, the invention adopts the following technical scheme:
a secure communication method based on machine chat comprises the following steps:
step 1), establishing a secure communication secret key between a user and an intelligent agent to be communicated;
and 2) when the user establishes chat communication with the intelligent agent, the intelligent agent randomly extracts a plurality of secure communication keys from the secure communication keys and sends the secure communication keys to the user for identification, when the user answers all the received secure communication keys correctly, the user is confirmed to be a correct chat object, otherwise, the intelligent agent finishes the communication with the user.
Further, after the registration and installation of the intelligent agent are completed, communication chatting is carried out between the user and the intelligent agent, and the intelligent agent saves the communication chatting records between the intelligent agent and the user to form a secure communication secret key.
Furthermore, the intelligent agent generates a random password to carry out AES encryption on communication chatting records between the intelligent agent and the user, the random password is stored in a memory of the intelligent agent, and a serial number is given to each chatting record.
Furthermore, for the communication between the intelligent agents, a chat mechanism among the intelligent agents is established, chat records among the intelligent agents are stored and encrypted to form a secure communication secret key between the intelligent agents, and after the number of the secure communication secret keys between the intelligent agents reaches a set value, the chat among the intelligent agents is finished.
Further, the user side sends a public key K to the intelligent body, the user side is provided with a private key corresponding to the public key K for decryption, the intelligent body extracts a plurality of secure communication secret keys from the secure communication secret keys stored in the intelligent body, the extracted secure communication secret keys are encrypted according to the received public key K and then sent to the user side, the user side decrypts the encrypted secure communication secret keys according to the private key of the user side and answers the encrypted secure communication secret keys, answers corresponding to the secure communication secret keys are sent to the intelligent body, and the intelligent body judges whether the user is a correct chat object according to questions answered by the user.
Further, after the current chat user is determined to be the correct chat object, the intelligent agent and the user perform normal communication chat communication, meanwhile, the normal communication chat communication content is stored, the security communication secret key stored by the intelligent agent is updated, and the responded security communication secret key is deleted.
Further, when the current chat user is determined to be a correct chat object, the user encrypts the password K1 by using a private key and sends the encrypted password K1 to the intelligent agent, the intelligent agent decrypts the encrypted password K1 by using a public key K sent by the user, and the user and the intelligent agent communication content use the password K1 to carry out AES symmetric encryption on the chat content and send the chat content to the network, and then the chat content is decrypted by obtaining the passwords respectively.
Further, if the secure communication key stored by the agent is less than the security setting threshold, the agent will not establish a chat and will need to perform an initial registration setup for the agent.
Further, a secure communication secret key between the user and the server and a secure communication secret key between the intelligent agent and the server are established, when the user establishes communication chat with the new intelligent agent, security authentication is performed between the user and the server, after the security authentication is passed, the server is used as the guarantee of the user by using the secure communication secret key between the server and the intelligent agent, the user is confirmed to be a credible chat object, the user establishes contact with the new intelligent agent, and the new secure communication secret key is established in the chat process.
A machine chatting secure communication system comprises a storage module, a computer control module and a transmission module, wherein the storage module is used for storing secure communication keys between a user and an intelligent agent and between the intelligent agent and the intelligent agent; the computer control module is used for establishing communication between the intelligent agent and the user and between the intelligent agent and the intelligent agent, extracting a plurality of safe communication keys from the safe communication keys of the chat receiving party, sending the safe communication keys to the chat initiating party through the transmission module for identification, confirming that the chat initiating party is a correct chat object when the chat initiating party answers all the received safe communication keys correctly, and otherwise, finishing the communication between the chat receiving party and the chat initiating party.
Compared with the prior art, the invention has the following beneficial technical effects:
the invention relates to a safe communication method based on machine chatting, which establishes a safe communication secret key between a user and an intelligent agent to be communicated, when the user establishes chatting communication with the intelligent agent, the intelligent agent randomly extracts a plurality of safe communication secret keys from the safe communication secret keys and sends the safe communication secret keys to the user for identification, when the user answers all the received safe communication secret keys correctly, the user is confirmed to be a correct chatting object, otherwise, the intelligent agent finishes the communication with the user, the safe communication secret keys established between the user and the intelligent agent are used as a chatting object verification mechanism, third party safe authentication is not needed, the safety and reliability are realized, the safe communication secret keys between the intelligent agent and the user are initially set by the user, the safe communication secret keys are randomly generated, the safe communication secret keys are not needed to be transmitted for communication, the safe communication secret keys are prevented from being stolen, and new safe communication secret keys can be formed in the communication process, the method can greatly improve the safe communication of the machine chat, can realize the balance of usability and safety, has a relatively complete safety system, and has good robustness and practical value.
Furthermore, after the intelligent agent is registered and installed, communication chatting is carried out between the user and the intelligent agent, the intelligent agent saves communication chatting records between the intelligent agent and the user to form a safe communication secret key, the safe communication secret key does not need to be specially set, and the method is simple and reliable.
Furthermore, the user sends a public key K to the intelligent agent, the user has a private key corresponding to the public key K for decryption, the intelligent agent extracts a plurality of secure communication secret keys from the secure communication secret keys stored in the intelligent agent, the extracted secure communication secret keys are encrypted according to the received public key K and then sent to the user, the user decrypts the encrypted secure communication secret keys according to the private key of the user and answers the encrypted secure communication secret keys, and therefore communication safety between the user and the intelligent agent is formed, and the intelligent agent is safe and reliable.
The safe communication system for machine chatting is simple in structure, safe and reliable, and suitable for development of future artificial intelligence and Internet of things, and the longer the system service time is, the more chatting records are, and the higher the safety is.
Drawings
Fig. 1 is a schematic diagram of a communication structure according to an embodiment of the present invention.
Fig. 2 is a schematic diagram of a composition structure of an agent in the embodiment of the present invention.
Detailed Description
The invention is described in further detail below with reference to the accompanying drawings:
a secure communication method based on machine chat comprises the following steps:
step 1), establishing a secure communication secret key between a user and an intelligent agent to be communicated;
specifically, after the installation of the intelligent agent is completed, a user opens chat software, connects with a server, registers and logs in, the intelligent agent automatically connects with the server, registers and logs in, communicates and chats on the chat software, and records communication records as a secure communication secret key; specifically, a user presses a physical key C (namely, a secure communication key recording button) on the intelligent agent, clicks an equipment icon to chat, the topic is not limited, and can be sports, entertainment or other topics, and the intelligent agent randomly and actively converts various topics; the intelligent agent generates a random password to carry out AES encryption on communication chatting records between the intelligent agent and the user, the random password is stored in a memory of the intelligent agent, and a serial number is given to each chatting record. When the number of the communication records reaches a set value (M are set in the application), the intelligent body prompts that the chat is finished, the user loosens a physical key C on the equipment body to complete the setting of the secure communication secret key, and the secure communication secret key is the chat record which is encrypted by the AES and stored in the memory of the intelligent body.
For communication between the intelligent agents, a chat mechanism among the intelligent agents is established, chat records among the intelligent agents are stored and encrypted to form security communication secret keys among the intelligent agents, and similarly, after the number of the security communication secret keys among the intelligent agents reaches a set value (M is set in the application), the chat among the intelligent agents is finished.
And 2) when the user establishes chat communication with the intelligent agent, the intelligent agent randomly extracts a plurality of secure communication keys from the secure communication keys and sends the secure communication keys to the user for identification, when the user answers all the received secure communication keys correctly, the user is confirmed to be a correct chat object, otherwise, the intelligent agent finishes the communication with the user.
Specifically, a user side, namely a chat software client side, sends a public key K to an intelligent agent (namely a chat object needing to establish chat), the user side has a private key corresponding to the public key K, the intelligent agent extracts a plurality of secure communication keys from a secure communication key stored in the intelligent agent, the extracted secure communication keys are encrypted according to the received public key K and then sent to a user, the user side decrypts and displays the encrypted secure communication keys by using the private key, the user answers, the user side sends answers corresponding to the secure communication keys to the intelligent agent, the intelligent agent judges whether the user is a correct chat object according to questions answered by the user, and if the answers received by the intelligent agent are consistent with the answers of the secure communication keys stored in the intelligent agent, the current communication user is considered to be the correct chat object.
And after the intelligent agent judges that the chat object is the correct chat object, the intelligent agent and the user carry out normal communication chat communication, meanwhile, the normal communication chat communication content is stored, the safety communication secret key stored by the intelligent agent is updated, and the used safety communication secret key is deleted.
After the chat object is judged to be correct, the user side uses a private key to encrypt the password K1 and sends the password K1 to the intelligent agent, the intelligent agent uses a public key K sent by the user side to decrypt to obtain a password K1, then the user and the intelligent agent use the password K1 to carry out AES symmetric encryption on the chat content and send the chat content to the network, and then the chat content is decrypted according to the obtained passwords, so that the security of the chat record is improved.
Specifically, the method comprises the following steps: the agent randomly extracts N records (N < M) of the secure communication key (i.e., the historical chat set after the agent is installed), and performs N questions, such as: according to the chat records, the preorder of the continuous content of the chat records is used as a question, then the preorder is used as an answer, the user is consulted for what you say at the moment, or what I say at the moment, and if the answers of the N questions are correct, the identity confirmation is completed. The number of times of questioning N may be determined as required. The agent marks the used secure communication key with the old record and does not ask any questions about the old record. If the security communication secret key stored by the intelligent agent is less than the security setting threshold value, the intelligent agent will not establish chat, and the user needs to go to the site to set the intelligent agent. At ordinary times, the user can chat with the intelligent agent from time to time, and the number of the fresh chat records is increased. The intelligent agent and the intelligent agent communicate with each other, when the intelligent agent actively initiates communication with a user, the intelligent agent generates a public key and a private key, sends the public key to the other party, and adopts the same encryption and decryption mechanism. The same encryption and decryption mechanism is adopted for communication between the intelligent agents.
As shown in fig. 2, various agents in the home form a chat group to form a "block," and chat with each other in the group, each agent generates a random password to form a secure communication key from the chat record, and performs AES encryption on the secure communication key and stores the secure communication key in its own memory, so that the user can randomly chat with any agent, and so on between different agents.
Example (b): when a user wants to control agent a, if the user cannot answer the question of agent a, the user may ask agent J to secure him, and when J is 1, the user selects an agent, for example, agent B secures him, for private chat with agent B first, and establishes a connection with agent B to answer the question of agent B, and if so, agent B transmits a trust mechanism to agent a to tell agent a that the user is reliable, thereby forming block security. And the agent A and the agent B communicate with each other to establish mutual safe communication. The value of J may be set according to the security level requirement of the application field, for example, security level J ═ 1, general civil use, security level J ═ 2, for business use, security level J ═ 3, for military use, or according to the importance of the equipment, for example, general level J ═ 1, secret level J ═ 2, and secret level J ═ 3. For communication without considering security, J may be set to 0, thereby improving communication efficiency and system usability.
The communication security can also be ensured by the server, and the authentication is carried out by the user and the server, and the intelligent agent and the server through the method. Before the intelligent agent leaves factory and is installed, a safe communication secret key is established with the server, namely, the intelligent agent and the server are in chat connection, so that both the intelligent agent and the server have chat records with set quantity. After the intelligent agent leaves the factory and is installed, a user chats with the intelligent agent X, after the safety of the user is confirmed by the intelligent agent X, safety information is transmitted to the server, the trust of the server is obtained, then the user chats with the server, and when the user and the server establish enough safe communication secret keys, the identity of the user can be directly guaranteed by the server. The server can be one or more, and can provide safety service for one to a plurality of blocks.
And a timeout confirmation mechanism is adopted, when the chat between the user and the intelligent agent or between the intelligent agents starts, the idle time exceeds a certain time TF, the chat needs to be confirmed from the beginning, and the value of the TF is set according to the needs.
If the intelligent body is invaded or hijacked by hacker, because the hacker or hijacker does not know the historical security communication secret key between the user and the intelligent body, when the user is hijacked to chat with the intelligent body, the problem related to the answer history record will be wrong or overtime, the intelligent body can continue false chat, and simultaneously alarm to the server, so that the illegal visitors are not easy to detect, and strive for solving time and protect the legal owner.
The chatting between the intelligent agents can not use natural language, but random character strings with enough length are adopted each time and recorded, the problems provided by the natural language can be guessed, but the random character strings can not be guessed theoretically. Illegal devices on the network cannot masquerade as legal devices unless physical brute force cracking is carried out, programs and records are read out and analyzed, time is spent at least in week calculation, only local trust can be obtained, and physical safety is guaranteed by other safety systems such as monitoring and the like.
The natural language processing method in the intelligent agent adopts the prior art of key word search and web crawler based on the analysis of an attention mechanism, the analysis based on a neural network, the mapping based on knowledge graph popularization, the understanding based on language dynamics and the like, and because the system aims at not carrying out accurate conversation, the requirement can be met by using relatively simple key word search and web crawler. The block trust mechanism formed by the invention is not provided with super passwords, and the server does not store chatting records among intelligent agents and between people and the intelligent agents, thereby ensuring the overall safety of the system.
Compared with a safety guarantee method of a block chain and a CA center, the method is closer to the habit of human beings, and the trust between the user and the intelligent agent, the trust between the intelligent agent and the intelligent agent, such as the trust established in a community, a family and friends, is easy to understand and adopt by the user, the longer the system service time is, the more chatting records are, and the higher the safety is. The range size is variable, the range size is small to a point, the range size is medium to a block, the range size is large to a cloud, the number of times of answering the security question, namely the security intensity, can be set to be 0 to n times, a multi-level and multi-range security system is formed, and balance of usability and security can be achieved. The invention is suitable for the development of future artificial intelligence and the Internet of things, has a relatively complete safety system, good robustness and practical value.
A safe communication system based on machine chat comprises a storage module, a computer control module and a transmission module, wherein the storage module is used for storing safe communication keys between users and intelligent agents and between the intelligent agents; the computer control module is used for establishing communication between the intelligent agent and the user and between the intelligent agent and the intelligent agent, extracting a plurality of safe communication keys from the safe communication keys of the chat receiving party, sending the safe communication keys to the chat initiating party through the transmission module for identification, confirming that the chat initiating party is a correct chat object when the chat initiating party answers all the received safe communication keys correctly, and otherwise, finishing the communication between the chat receiving party and the chat initiating party.
As shown in fig. 1, the agent and the user are connected to the internet through a mobile device (mobile phone, tablet, notebook) or a desktop computer, and communicate through chat software, and the server serves as a transfer station to provide login, registration, and information record forwarding services. The agents may be different kinds of machine devices.
The hardware layer of the intelligent agent comprises a CPU, an RAM, a ROM and a communication module, the middle layer is an operating system, the application layer is chat software, the chat software in the mobile phone and the PC has a graphical interface for man-machine interaction, and the chat software in the machine equipment does not need the interface.
Examples of the hardware of the agent include, but are not limited to, a raspberry pi or a Dspic/ARM single chip/51 MCU + W5500 network module, and the chat software can be implemented using C #, Delphi, Lazarus, QT or Python.
The point-to-point (between the user and the intelligent agent or between the intelligent agent and the intelligent agent) safety is guaranteed by the two communication parties, the block safety is mutually guaranteed by the inside of the block, and the cloud safety is guaranteed by the server.
Claims (6)
1. A secure communication method based on machine chat is characterized by comprising the following steps:
step 1), after the registration and installation of the intelligent agent are finished, communication chatting is carried out between the user and the intelligent agent, and the intelligent agent saves communication chatting records between the intelligent agent and the user to form a secure communication secret key;
step 2), when the user establishes chat communication with the intelligent agent, the user presses a physical key on the intelligent agent, the intelligent agent randomly extracts a plurality of secure communication secret keys from the secure communication secret keys and sends the secure communication secret keys to the user for identification, when the user answers all received secure communication secret keys correctly, the user is confirmed to be a correct chat object, otherwise, the intelligent agent finishes the communication with the user; specifically, the preamble of the continuous content of the chat record is used as a question, and the subsequent is used as an answer; the user side sends a public key K to the intelligent body, the user side is provided with a private key which is decrypted corresponding to the public key K, the intelligent body extracts a plurality of safe communication secret keys from the safe communication secret keys stored in the intelligent body, the extracted safe communication secret keys are encrypted according to the received public key K and then sent to the user side, the user side decrypts and answers the encrypted safe communication secret keys according to the private key of the user side, answers corresponding to the safe communication secret keys are sent to the intelligent body, the intelligent body judges whether the user is a correct chat object according to questions answered by the user, if the answer received by the intelligent body is consistent with the answer of the safe communication secret keys stored in the intelligent body, the current communication user is considered as the correct chat object, after the current chat user is determined to be the correct chat object, the intelligent body carries out normal communication chat communication with the user, meanwhile, the contents of normal communication chat are stored, and the safe communication secret keys stored in the intelligent body are updated, deleting the safe communication key which has already been replied; adopting an overtime confirmation mechanism, when the chat between the user and the intelligent agent or between the intelligent agents starts, the idle time exceeds a certain time TF, and the chat needs to be confirmed from the beginning; when the user chats with the intelligent agent, errors or overtime can occur when the questions related to the answer history records, and the intelligent agent continues false chatting and simultaneously gives an alarm to the server.
2. The method as claimed in claim 1, wherein the agent generates a random password to AES encrypt the communication chatting records between the agent and the user and stores the encrypted communication chatting records in its own memory, and gives a serial number to each chatting record.
3. The secure communication method based on machine chat as claimed in claim 1, wherein a chat mechanism between the plurality of agents is established for communication between the agents, a chat record between the plurality of agents is stored and encrypted to form a secure communication key between the agent and the agent, and the chat between the plurality of agents is terminated when the number of the secure communication keys between the agent and the agent reaches a set value.
4. The method of claim 1, wherein if the secure communication key stored by the agent is less than the security threshold, the agent will not establish the chat and an initial registration setup is required for the agent.
5. The secure communication method based on machine chat according to claim 1, wherein a secure communication key between the user and the server and a secure communication key between the agent and the server are established, when the user establishes communication chat with the new agent, security authentication is performed between the user and the server, after the security authentication is passed, the server is used as a guarantee of the user by using the secure communication key between the server and the agent, the user is confirmed to be a trusted chat object, the user establishes contact with the new agent, and the new secure communication key is established during the chat.
6. A secure communication system for machine chat, which is used for the secure communication method of machine chat according to claim 1, and is characterized by comprising a storage module, a computer control module and a transmission module, wherein the storage module is used for storing secure communication keys between users and agents and between agents; the computer control module is used for establishing communication between the intelligent agent and the user and between the intelligent agent and the intelligent agent, extracting a plurality of safe communication keys from the safe communication keys of the chat receiving party, sending the safe communication keys to the chat initiating party through the transmission module for identification, confirming that the chat initiating party is a correct chat object when the chat initiating party answers all the received safe communication keys correctly, and otherwise, finishing the communication between the chat receiving party and the chat initiating party.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010796501.0A CN112118574B (en) | 2020-08-10 | 2020-08-10 | Safe communication method and system based on machine chat |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010796501.0A CN112118574B (en) | 2020-08-10 | 2020-08-10 | Safe communication method and system based on machine chat |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112118574A CN112118574A (en) | 2020-12-22 |
CN112118574B true CN112118574B (en) | 2022-02-22 |
Family
ID=73804034
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010796501.0A Active CN112118574B (en) | 2020-08-10 | 2020-08-10 | Safe communication method and system based on machine chat |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112118574B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103729193A (en) * | 2014-01-11 | 2014-04-16 | 苏州思必驰信息科技有限公司 | Method and device for man-machine interaction |
CN107220532A (en) * | 2017-04-08 | 2017-09-29 | 网易(杭州)网络有限公司 | For the method and apparatus by voice recognition user identity |
CN107508814A (en) * | 2017-08-30 | 2017-12-22 | 恒宝股份有限公司 | Data ciphering method, decryption method, apparatus and system |
CN108880822A (en) * | 2018-06-29 | 2018-11-23 | 郑州云海信息技术有限公司 | A kind of identity identifying method, device, system and a kind of intelligent wireless device |
CN109088735A (en) * | 2018-09-21 | 2018-12-25 | 杭州师范大学 | A kind of safety certifying method based on smart home |
CN110830270A (en) * | 2019-12-13 | 2020-02-21 | 李建军 | Instant communication platform for controlling intelligent equipment and intelligent equipment control system |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102666331B1 (en) * | 2016-11-11 | 2024-05-17 | 삼성전자주식회사 | A method and terminal device for encrypting a message |
CN107920017A (en) * | 2017-11-27 | 2018-04-17 | 唐佐 | A kind of chat record and content time slot scrambling |
CN109862040B (en) * | 2019-03-27 | 2021-08-24 | 北京经纬恒润科技股份有限公司 | Security authentication method and authentication system |
-
2020
- 2020-08-10 CN CN202010796501.0A patent/CN112118574B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103729193A (en) * | 2014-01-11 | 2014-04-16 | 苏州思必驰信息科技有限公司 | Method and device for man-machine interaction |
CN107220532A (en) * | 2017-04-08 | 2017-09-29 | 网易(杭州)网络有限公司 | For the method and apparatus by voice recognition user identity |
CN107508814A (en) * | 2017-08-30 | 2017-12-22 | 恒宝股份有限公司 | Data ciphering method, decryption method, apparatus and system |
CN108880822A (en) * | 2018-06-29 | 2018-11-23 | 郑州云海信息技术有限公司 | A kind of identity identifying method, device, system and a kind of intelligent wireless device |
CN109088735A (en) * | 2018-09-21 | 2018-12-25 | 杭州师范大学 | A kind of safety certifying method based on smart home |
CN110830270A (en) * | 2019-12-13 | 2020-02-21 | 李建军 | Instant communication platform for controlling intelligent equipment and intelligent equipment control system |
Also Published As
Publication number | Publication date |
---|---|
CN112118574A (en) | 2020-12-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wazid et al. | Secure remote user authenticated key establishment protocol for smart home environment | |
US11057210B1 (en) | Distribution and recovery of a user secret | |
US7231526B2 (en) | System and method for validating a network session | |
US8275984B2 (en) | TLS key and CGI session ID pairing | |
CN102685749B (en) | Wireless safety authentication method orienting to mobile terminal | |
CN111935714B (en) | Identity authentication method in mobile edge computing network | |
CN107833317A (en) | Control of bluetooth access control system and method | |
CN102638459A (en) | Authentication information transmission system, authentication information transmission service platform and authentication information transmission method | |
CN107864124B (en) | Terminal information security protection method, terminal and Bluetooth lock | |
CN104063650B (en) | A kind of key storage device and using method thereof | |
CN107204983B (en) | System for wind power plant SCADA system safety data transmission based on SIP protocol | |
CN113316149B (en) | Identity security authentication method, device, system, wireless access point and medium | |
CN107612949B (en) | Wireless intelligent terminal access authentication method and system based on radio frequency fingerprint | |
CN115118419A (en) | Data transmission method of security chip, security chip device, equipment and medium | |
CN113643134A (en) | Internet of things block chain transaction method and system based on multi-key homomorphic encryption | |
CN114401087B (en) | Passive lock identity authentication and key agreement system based on state cryptographic algorithm | |
CN112425116B (en) | Intelligent door lock wireless communication method, intelligent door lock, gateway and communication equipment | |
CN113593088A (en) | Intelligent unlocking method, intelligent lock, mobile terminal and server | |
CN112118574B (en) | Safe communication method and system based on machine chat | |
CN111698203A (en) | Cloud data encryption method | |
CN106815907A (en) | A kind of method and intelligent access control system based on picture password management intelligent entrance guard | |
CN111368271A (en) | Method and system for realizing password management based on multiple encryption | |
CN215186781U (en) | Quantum computing resistant mobile communication system based on quantum secret communication network | |
CN101521571A (en) | Method for authenticating safety unit and server side of mobile hardware | |
CN212519015U (en) | Local area network quantum communication center and system accessed to quantum secure communication network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |