CN116346497A - Mechanism for supporting audit of end-to-end encryption - Google Patents

Mechanism for supporting audit of end-to-end encryption Download PDF

Info

Publication number
CN116346497A
CN116346497A CN202310434308.6A CN202310434308A CN116346497A CN 116346497 A CN116346497 A CN 116346497A CN 202310434308 A CN202310434308 A CN 202310434308A CN 116346497 A CN116346497 A CN 116346497A
Authority
CN
China
Prior art keywords
private key
chat
request
chat record
record
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310434308.6A
Other languages
Chinese (zh)
Inventor
郑文伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Lingshiji Information Technology Co ltd
Original Assignee
Guangzhou Lingshiji Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Lingshiji Information Technology Co ltd filed Critical Guangzhou Lingshiji Information Technology Co ltd
Priority to CN202310434308.6A priority Critical patent/CN116346497A/en
Publication of CN116346497A publication Critical patent/CN116346497A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/216Handling conversation history, e.g. grouping of messages in sessions or threads
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Abstract

The application discloses a mechanism for supporting auditing of end-to-end encryption, which relates to the technical field of network communication and comprises a user key generation stage, a message sending stage and a chat record recovery stage; the user generates a secret key stage comprising generating a public key and publishing the public key to a server, storing the generated private key on a device and arranging a private key node of a sub-volume, wherein the private key node comprises the following components: setting a system and an authorized mechanism as two keeping nodes, splitting a private key into two parts and respectively sending the two parts to the two keeping nodes for keeping; and the chat record recovery stage comprises the steps that an auditing mechanism initiates a chat record recovery request, partial private keys in the two storage nodes are obtained after the system corresponding to the two storage nodes and the authorizing mechanism agree, and the chat record is recovered after the two partial private keys are combined. The method and the device realize that the auditing mechanism can check corresponding chat records on the premise of safety.

Description

Mechanism for supporting audit of end-to-end encryption
Technical Field
The application relates to the technical field of network communication, in particular to a mechanism for supporting auditing of end-to-end encryption.
Background
As illustrated in the messaging service block diagram of fig. 3, in many messaging services, a third party will store data that is encrypted only during transmission. This server-side encryption method can only protect data of unauthorized viewers. But this method would allow the sender to view the information too, which is not applicable to transmission processes where protection of data privacy is required for the whole process.
In end-to-end encryption, the encrypted data can only be viewed by a person with a decryption key. In other words, end-to-end encryption may prevent unintended users (including third parties) from reading or modifying data, while only intended readers have such access rights and capabilities.
Asymmetric encryption or public key encryption uses two separate encryption keys to encrypt and decrypt data. The public key is used to encrypt the message and send it to the owner of the public key. The message can then only be decrypted using the corresponding private key (also referred to as the decryption key). For example, the Transport Layer Security (TLS) encryption protocol may prevent third parties from intercepting messages in transmission.
However, since the user's key is stored separately on the device, the corresponding institution cannot audit the user's chat log in the case of national security and social public interests.
Disclosure of Invention
The purpose of the application is to provide an audit supporting mechanism encrypted end-to-end, so that an audit mechanism can view corresponding chat records on the premise of safety.
In order to achieve the above purpose, the present application discloses the following technical solutions:
an end-to-end encryption mechanism supporting auditing comprises a user generation key stage, a message sending stage and a chat record recovery stage;
the user generates a secret key stage comprising generating a public key and publishing the public key to a server, storing the generated private key on a device and arranging a private key node of a sub-volume, wherein the private key node comprises the following components: setting a system and an authorized mechanism as two keeping nodes, splitting a private key into two parts and respectively sending the two parts to the two keeping nodes for keeping;
and the chat record recovery stage comprises the steps that an auditing mechanism initiates a chat record recovery request, partial private keys in the two storage nodes are obtained after the system corresponding to the two storage nodes and the authorizing mechanism agree, and the chat record is recovered after the two partial private keys are combined.
In one embodiment, when the private key is split into two parts and sent to the two storage nodes for storage, the system encrypts the split two parts of private key.
In one embodiment, in the arrangement of the split volume private key nodes, private key splitting and encryption are performed in a split volume encryption compression mode.
In one embodiment, the user provides the decompressed password when the chat log is restored after the two sections of private keys are combined, and the chat log is restored after the decompressed password is successfully verified.
In one embodiment, the recovering chat record phase specifically includes:
the auditing mechanism initiates a request for requesting to recover chat records to the system;
after receiving the request for recovering the chat record, the system operates the request for recovering the chat record, and when the request for recovering the chat record is passed through the request, the system sends a request for recovering the chat record to an authority corresponding to the storage node, otherwise, the chat record cannot be recovered;
the corresponding authority in the storage node receives the recovery record request and operates the recovery record request, and when the authority does not agree with the recovery record request, the chat record cannot be recovered; otherwise, the system combines the partial private key stored by the system with the partial private key stored in the authorization mechanism to obtain the complete private key, and the chat record is recovered.
In one embodiment, when the private key is split into two parts and sent to the two storage nodes for storage, the system performs splitting and encryption of the private key in a manner of split-volume encryption compression.
In one embodiment, in the resume chat logging phase:
when the authorization mechanism agrees to the request for recovering the record, the system verifies the decompression password input by the auditing mechanism, and after the verification is passed, the recovery of the chat record is carried out.
The beneficial effects are that: according to the mechanism for supporting the audit by end-to-end encryption, the private key is split and stored on the system and the authorized mechanism, when the chat record is required to be checked, the audit mechanism can recover the private key and obtain the corresponding chat record after the agreement of the system and the authorized mechanism is obtained, and other personnel cannot interfere, prevent and intercept the private key, so that the legal audit mechanism can acquire the required chat record content on the premise of safety when required, and reliable data base and technical support are provided for subsequent corresponding programs (such as judicial evidence and the like).
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a block flow diagram of a user generated key stage in an embodiment of the present application;
FIG. 2 is a block flow diagram of a recovery chat logging phase in an embodiment of the application;
fig. 3 is a block diagram of a prior art end-to-end information transfer mode.
Detailed Description
The following description of the technical solutions in the embodiments of the present application will be clear and complete, and it is obvious that the described embodiments are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
In this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
The embodiment discloses a mechanism for supporting auditing of end-to-end encryption, which comprises a user generation key stage, a message sending stage and a chat record recovery stage.
As shown in fig. 1, in the key generation stage of the user, when the user generates the key, in addition to publishing the public key to the server and storing the private key on the device, a system and an authority are set as storage nodes of the private key, wherein the authority is an information storage mechanism/platform agreed by the user when using a communication protocol/system, and when storing the private key to the storage nodes, the system divides the private key into two parts by means of split-volume encryption compression (an algorithm commonly used in the prior art), and stores the two parts of private key in the two storage nodes of the system and the authority respectively.
In this embodiment, in the message sending stage, the basic operation is the same as that of the existing end-to-end mode, but under the condition that the system agrees and the partial private key stored by the system is sent, the authority only holds the partial private key stored by itself, so that the complete private key of the user cannot be obtained to decrypt the message of the user, and the message security of the user is ensured. If the authorized entity needs to audit the chat records of the user, the authorized entity needs to apply the system for the corresponding audit entity through legal programs so as to further obtain another part of private keys stored by the system, and finally, the chat records of the user are decrypted and recovered through the complete private keys. It should be noted that, in this embodiment, the auditing mechanism may be an authority that stores a part of the private key, or may be a related mechanism (such as a judicial authority or the like) that is authorized to perform chat record recovery of the user through the legal procedure.
As shown in fig. 2, in the stage of recovering the chat record, the auditing mechanism initiates a request for recovering the chat record, obtains partial private keys in the two storage nodes after the system and the authorizing mechanism corresponding to the two storage nodes agree, and recovers the chat record after the two sections of partial private keys are combined. It should be noted that, when the auditing mechanism is an authority mechanism storing a part of private keys, the auditing mechanism can acquire another part of private keys only by obtaining the system agreement.
Furthermore, when the auditing mechanism acquires the complete private key, the decompression password of the private key is also required to be provided, and after the decompression password is successfully verified, the chat record can be recovered.
Specifically, the recovery chat logging phase includes:
the auditing mechanism initiates a request for requesting to recover chat records to the system;
after receiving the request for recovering the chat record, the system operates the request for recovering the chat record, and when the request for recovering the chat record is passed through the request, the system sends a request for recovering the chat record to an authority corresponding to the storage node, otherwise, the chat record cannot be recovered;
the corresponding authority in the storage node receives the recovery record request and operates the recovery record request, and when the authority does not agree with the recovery record request, the chat record cannot be recovered; otherwise, the system combines the partial private key stored by the system with the partial private key stored in the authorization mechanism to obtain a complete private key, and at the same time, the system verifies the decompressed password input by the auditing mechanism and resumes the chat record after verification is passed.
According to the mechanism for supporting the audit by end-to-end encryption, the private key is split and stored on the system and the authorized mechanism, when the chat record is required to be checked, the audit mechanism can recover the private key and obtain the corresponding chat record after the agreement of the system and the authorized mechanism is obtained, and other personnel cannot interfere, prevent and intercept the private key, so that the legal audit mechanism can acquire the required chat record content on the premise of safety when required, and reliable data base and technical support are provided for subsequent corresponding programs (such as judicial evidence and the like).
Those of ordinary skill in the art will appreciate that all or a portion of the steps of implementing the above embodiments may be implemented by hardware, or may be implemented by a program to instruct related hardware, where the program may be stored in a computer readable storage medium, where the computer readable storage medium may be a read-only memory, a magnetic disk or optical disk, etc. disposed in a network switch.
Finally, it should be noted that: the foregoing description is only a preferred embodiment of the present application, and although the present application has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the technical solutions described in the foregoing embodiments, or equivalents may be substituted for some of the technical features thereof, and any modifications, equivalents, improvements or changes that fall within the spirit and principles of the present application are intended to be included in the scope of protection of the present application.

Claims (7)

1. An end-to-end encryption mechanism supporting auditing is characterized by comprising a user generation key stage, a message sending stage and a chat record recovery stage;
the user generates a secret key stage comprising generating a public key and publishing the public key to a server, storing the generated private key on a device and arranging a private key node of a sub-volume, wherein the private key node comprises the following components: setting a system and an authorized mechanism as two keeping nodes, splitting a private key into two parts and respectively sending the two parts to the two keeping nodes for keeping;
and the chat record recovery stage comprises the steps that an auditing mechanism initiates a chat record recovery request, partial private keys in the two storage nodes are obtained after the system corresponding to the two storage nodes and the authorizing mechanism agree, and the chat record is recovered after the two partial private keys are combined.
2. The audit capable mechanism according to claim 1 wherein the system encrypts the split two partial private keys when the private key is split into two parts and sent to the two escrow nodes for storage respectively.
3. The audit capable mechanism of end-to-end encryption of claim 2, wherein in the arrangement of split volume private key nodes, private key splitting and encryption is performed by way of split volume encryption compression.
4. A mechanism for supporting audit according to claim 3 wherein the user provides a decompressed cipher when the chat log is restored after the two-part private key combination is completed and the restoration of the chat log is performed after the decompressed cipher verification is successful.
5. The audit capable mechanism for end-to-end encryption of claim 1, wherein the recovery chat logging phase comprises:
the auditing mechanism initiates a request for requesting to recover chat records to the system;
after receiving the request for recovering the chat record, the system operates the request for recovering the chat record, and when the request for recovering the chat record is passed through the request, the system sends a request for recovering the chat record to an authority corresponding to the storage node, otherwise, the chat record cannot be recovered;
the corresponding authority in the storage node receives the recovery record request and operates the recovery record request, and when the authority does not agree with the recovery record request, the chat record cannot be recovered; otherwise, the system combines the partial private key stored by the system with the partial private key stored in the authorization mechanism to obtain the complete private key, and the chat record is recovered.
6. The audit supporting mechanism according to claim 5 wherein the system performs splitting and encryption of the private key by split-volume encryption compression when the private key is split into two parts and sent to the two escrow nodes for storage respectively.
7. The audit capable mechanism for end-to-end encryption of claim 6, characterized in that in the resume chat logging phase:
when the authorization mechanism agrees to the request for recovering the record, the system verifies the decompression password input by the auditing mechanism, and after the verification is passed, the recovery of the chat record is carried out.
CN202310434308.6A 2023-04-21 2023-04-21 Mechanism for supporting audit of end-to-end encryption Pending CN116346497A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310434308.6A CN116346497A (en) 2023-04-21 2023-04-21 Mechanism for supporting audit of end-to-end encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310434308.6A CN116346497A (en) 2023-04-21 2023-04-21 Mechanism for supporting audit of end-to-end encryption

Publications (1)

Publication Number Publication Date
CN116346497A true CN116346497A (en) 2023-06-27

Family

ID=86885987

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310434308.6A Pending CN116346497A (en) 2023-04-21 2023-04-21 Mechanism for supporting audit of end-to-end encryption

Country Status (1)

Country Link
CN (1) CN116346497A (en)

Similar Documents

Publication Publication Date Title
US9893892B2 (en) Authenticated remote pin unblock
US9537864B2 (en) Encryption system using web browsers and untrusted web servers
CN106104562B (en) System and method for securely storing and recovering confidential data
US9094194B2 (en) Method and system for automating the recovery of a credential store when a user has forgotten their password using a temporary key pair created based on a new password provided by the user
US6549626B1 (en) Method and apparatus for encoding keys
US7725716B2 (en) Methods and systems for encrypting, transmitting, and storing electronic information and files
CN109981255B (en) Method and system for updating key pool
US11252161B2 (en) Peer identity verification
CN113472793A (en) Personal data protection system based on hardware password equipment
US20020021804A1 (en) System and method for data encryption
GB2584455A (en) An encryption process
JP2022542095A (en) Hardened secure encryption and decryption system
EP0912011A2 (en) Method and apparatus for encoding and recovering keys
CN113779619A (en) Encryption and decryption method for ceph distributed object storage system based on state cryptographic algorithm
CN113868684A (en) Signature method, device, server, medium and signature system
CN112202713A (en) User data security protection method under Kubernetes environment
CN108494724B (en) Cloud storage encryption system based on multi-authority attribute encryption algorithm
KR101336069B1 (en) Apparatus and Method for Secure Update for Conditional Access Images
CN115412236A (en) Method for key management and password calculation, encryption method and device
CN115102694A (en) Sensitive information sharing method and system based on centralized storage
CN116346497A (en) Mechanism for supporting audit of end-to-end encryption
JP7086163B1 (en) Data processing system
CN116980170A (en) Chat record retrieving mechanism with end-to-end encryption
CN116319059A (en) Multi-party simultaneous authentication mechanism for end-to-end encryption
Reddy et al. Data Storage on Cloud using Split-Merge and Hybrid Cryptographic Techniques

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination