CN101159547A - Dynamic secret method of text information input, output and transmission - Google Patents

Dynamic secret method of text information input, output and transmission Download PDF

Info

Publication number
CN101159547A
CN101159547A CNA2007101353744A CN200710135374A CN101159547A CN 101159547 A CN101159547 A CN 101159547A CN A2007101353744 A CNA2007101353744 A CN A2007101353744A CN 200710135374 A CN200710135374 A CN 200710135374A CN 101159547 A CN101159547 A CN 101159547A
Authority
CN
China
Prior art keywords
text message
dynamic
user
idc
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2007101353744A
Other languages
Chinese (zh)
Inventor
庄叶涛
许红霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HEFEI XUNTIAN TECHNOLOGY OF INFORMATION Co Ltd
Original Assignee
HEFEI XUNTIAN TECHNOLOGY OF INFORMATION Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HEFEI XUNTIAN TECHNOLOGY OF INFORMATION Co Ltd filed Critical HEFEI XUNTIAN TECHNOLOGY OF INFORMATION Co Ltd
Priority to CNA2007101353744A priority Critical patent/CN101159547A/en
Publication of CN101159547A publication Critical patent/CN101159547A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention relates to a safety system for text information input/output and transmission and a dynamic security method for the text information input/output and transmission. The invention is characterized in that a user U has an information dynamic changer (IDC) at the client side, wherein the information dynamic changer (IDC) is positioned outside computer system access environment (ENV); and an information dynamic changer (IDS) is correspondingly positioned at the server side; and the computer system access environment (ENV) only has text information ciphertext existing therein. The invention ensures illegal invader to steal the text information ciphertext instead of the text information in the computer system access environment (ENV).

Description

The dynamic secret method of text message input, output and transmission
Technical field
The present invention relates to text message input, output and transmission safety system.
Background technology
The process of text message input, output and transmission in the computer system accesses process can be divided into two classes according to the information flow direction, is described below respectively.
It 1 is that user input text information is given computer system: user U is input to system client C to text message I, is delivered to system server S by delivering path P, as shown in Figure 1;
It 2 is that computer system output text message is given the user: system server S is delivered to system client C to text message I by delivering path P, and system client C exports to user U to text message I, as shown in Figure 2.
In this process, whether text message I can be stolen by the illegal earwig E of system, and just whether text message I can divulge a secret and just become a safety issue.
Illegal earwig E can steal text message I from system client C, system server S, delivering path P three.
This mainly is to have constituted an interconnective computer system accesses environment ENV because of system client C, system server S, delivering path P, and illegal earwig E also can enter this computer system accesses environment ENV.
In the actual conditions, system server S is in general comparatively safe, and system client C is then relative with delivering path P dangerous, so illegal earwig E is that this two steals text message I from system client C, delivering path P generally speaking.
Website visiting for example: system client C is the client computer of runs web browser, system server S is a Website server, delivering path P is the Internet network, text message I is the information of importing and showing on the webpage, illegal earwig E is hacker software, the screen analyzer on the computer and the keyboard wooden horse in the Internet network, can be stolen by hacker software by the web page contents of Internet Network Transmission so, web page contents by the keyboard input can be stolen by the keyboard wooden horse, can be stolen by the screen analyzer by the web page contents of screen display.
In order to solve the safety problem in other words of maintaining secrecy in relevant text message input, output and the transmission course, the solution of available technology adopting mainly is that encryption and decryption, illegal earwig detect and remove two kinds of basic fundamental means in delivering path, below specifies.
One, encryption and decryption in the delivering path obtains text message ciphertext CI after just being to use information encryption device ENC that text message I is encrypted, and then enters delivering path P.
(1), user input text information is given computer system:
User U is input to system client C to text message I, after coming out from system client C, text message I is converted to text message ciphertext CI through information encryption device ENC earlier, text message ciphertext CI enters delivering path P again, after text message ciphertext CI leaves delivering path P, be converted to text message I through decrypts information device DEC earlier, text message I arrives system server S then, as shown in Figure 3.
(2), computer system output text message is given the user:
After coming out from system server S, text message I is converted to text message ciphertext CI through information encryption device ENC earlier, text message ciphertext CI enters delivering path P again, after text message ciphertext CI leaves delivering path P, be converted to text message I through decrypts information device DEC earlier, text message I arrives system client C then, and system client C exports to user U to text message I.
Adopt the effect after this technology to be, that transmit in delivering path P is text message ciphertext CI, thus stoped illegal earwig E from delivering path P, to steal text message I, as shown in Figure 4.
The still unresolved technical problem of this technology is to stop illegal earwig E to steal text message I from system client C.Website visiting for example: system client C is the client computer of runs web browser, system server S is a Website server, delivering path P is the Internet network, text message I is the information of importing and showing on the webpage, illegal earwig E is the hacker software in the Internet network, screen analyzer on the computer and keyboard wooden horse, information encryption device ENC and decrypts information device DEC are the HTTPS protocol softwares, perhaps VPN etc., web page contents by the Internet Network Transmission is a ciphertext so, can do not stolen by hacker software, but the web page contents by the keyboard input still can be stolen by the keyboard wooden horse, still can be stolen by the screen analyzer by the web page contents of screen display.
Two, illegal earwig detects and removes, and just is to use illegal earwig's detection and cleanout tool ECC to detect illegal earwig E in system client C and also removes.
Adopting the effect after this technology is not have illegal earwig E in system client C, so stoped illegal earwig E to steal text message I from system client C.
The still unresolved technical problem of this technology is can not stop illegal earwig E to steal text message I from delivering path P, shown in Fig. 5,6.
Website visiting for example: system client C is the client computer of runs web browser, system server S is a Website server, delivering path P is the Internet network, text message I is the information of importing and showing on the webpage, illegal earwig E is the hacker software in the Internet network, screen analyzer on the computer and keyboard wooden horse, illegal earwig detects and cleanout tool ECC is the anti-virus software etc. that can detect wooden horse, so because do not have keyboard wooden horse and screen analyzer to exist in the computer, so the web page contents by the keyboard input can not stolen by the keyboard wooden horse, web page contents by screen display can not stolen by the screen analyzer, but still can be stolen by hacker software by the web page contents of Internet Network Transmission.
Summary of the invention
Purpose of the present invention just provides the dynamic secret method of a kind of text message input, output and transmission, have only the text message ciphertext to exist among the computer system accesses environment ENV, guarantee that the illegal earwig among the computer system accesses environment ENV can only steal the text message ciphertext, can't steal text message.
For achieving the above object, the present invention has adopted following technical scheme: the dynamic secret method of a kind of text message input, output and transmission, it is characterized in that: user U comprises information dynamic converter IDC in client one side, this information dynamic converter IDC is positioned at outside the computer system accesses environment ENV, and server one side comprises a corresponding server end information dynamic converter IDS.
After adopting technique scheme, have only text message ciphertext CI to exist in computer system accesses environment ENV, the illegal earwig E among the computer system accesses environment ENV can only steal text message ciphertext CI like this, can't steal text message I.
User U uses a kind of information dynamic converter IDC in this side of client, and this information dynamic converter IDC is positioned at outside the computer system accesses environment ENV, and illegal earwig E can't touch information dynamic converter IDC from computer system accesses environment ENV.Server one side is used a corresponding server end information dynamic converter IDS.
Give in the process of computer system in user input text information, user U is input to information dynamic converter IDC to text message I by means such as keyboard or handwriting inputs earlier, information dynamic converter IDC is transformed into text message ciphertext CI to text message I, and exports to user U by means such as lcd screen or indicator screens.User U is input to system client C to text message ciphertext CI again, enters delivering path P again.After text message ciphertext CI leaves delivering path P, be converted to text message I through server end information dynamic converter IDS earlier, text message I arrives system server S at last.
Give in user's the process at computer system output text message, be converted to text message ciphertext CI through server end information dynamic converter IDS earlier after text message I comes out from system server S.Text message ciphertext CI enters delivering path P again, arrives system client C then.System client C exports to user U to text message ciphertext CI.User U is input to information dynamic converter IDC to text message ciphertext CI by means such as keyboard or handwriting inputs, information dynamic converter IDC is transformed into text message I to text message ciphertext CI, and exports to user U by means such as lcd screen or indicator screens.
And information dynamic converter IDC is to use dynamic mapping mechanism, that is to say that the text message ciphertext CI that the text message I of identical content obtains by information dynamic converter IDC conversion for many times is not identical always.
By above-mentioned technical scheme and means, the disposable illegal earwig E that has increased among the computer system accesses environment ENV steals the difficulty of text message I from system client C, delivering path P two.
Therefore, present technique can be applicable to have at least in system client C, delivering path P two places place to understand the situation that be stolen text message I by illegal earwig E.
If two places all are perfectly safe, that is to say that delivering path P has used the delivering path encryption and decryption technology that is perfectly safe, system client C has used the illegal earwig who is perfectly safe to detect and cleanout tool ECC, just not necessarily must need so in this case to have used present technique.
Present technique can be used in combination with delivering path encryption and decryption technology, illegal earwig's detection and cleanout tool ECC technology in addition, to increase the difficulty that illegal earwig E steals text message I, makes system safer.
Summary of drawings
Fig. 1-the 6th, the theory diagram of prior art; Wherein
Fig. 1 is the theory diagram that user input text information is given computer system;
Fig. 2 is the theory diagram that computer system output text message is given the user;
Fig. 3 is the theory diagram that user input text information is given computer system, is provided with information encryption device, decipher in the system;
Fig. 4 is the theory diagram that computer system output text message is given the user, is provided with information encryption device, decipher in the system;
Fig. 5 is the theory diagram that user input text information is given computer system, is provided with illegal earwig in the system and detects and cleanout tool ECC;
Fig. 6 is the theory diagram that computer system output text message is given the user, is provided with illegal earwig in the system and detects and cleanout tool ECC;
Fig. 7 is the theory diagram that user input text information is given computer system among the present invention;
Fig. 8 is the theory diagram that computer system output text message is given the user among the present invention.
Embodiment
For the ease of understanding summary of the invention, be explained as follows with regard to relevant basic conception earlier:
User U: the user of the system that uses a computer is exactly the people.
Text message I: can be by the computer version information of keyboard or handwriting input, content of text can be Chinese words, foreign letter, numeral, other textual characters etc. and their combination.For example: on the input of computer software dialog box and demonstration, the webpage button input of input and the information that shows, SMS, telephone set and voice suggestion, remote controller button input and the button input of video screen information, POS and LCD prompting etc.
System client C: the Man Machine Interface of computer system, provide I to the user, can be the functional module of client computer or client software or software or other equipment that user's input-output means is provided for system etc., for example: input and output dialogue frame, multimedia terminal, web browser, set-top box and the remote controller of computer software, mobile phone, telephone set, POS machine, ATM etc.
System server S: the Service Process Server of computer system, the input and output of reception and process user, can be functional module of computer server or server software or software etc., for example: the service processing function module of software, domain controller, Website server, enterprise management system server, telephone contact center (Call Center), phone entrusting system server, video on-demand system (VOD) server, banking system server, securities system server, network game server etc.
Delivering path P: can be communication between computer network or telecommunication system or the computer software or the data passes between the software function module etc., for example: the GPRS of the internet communication of the input and output dialogue frame of software and the data passes of service processing function module, website visiting, the telephone wire of telephone contact center, mobile phone communicates by letter, the signal transmission system of video request program etc.
Computer system accesses environment ENV: constitute by interconnective system client C, system server S, delivering path P, can be a software or a large computer system that comprises the computer of a plurality of softwares or comprise a plurality of computers, various device and related software that comprises a plurality of functional modules, for example: this machine of Windows or territory login system, enterprise management system, phone entrusting system, video on-demand system, website visiting environment etc.
Illegal earwig E: illegal steal information person, can be on the system client C computer virus, screen analyzer, keyboard wooden horse, peep device etc., the perhaps telephone tap among the delivering path P, Technology of Network Sniffer, fishing website etc.
Technological core content of the present invention comprises information dynamic converter IDC in user U client one side exactly, this information dynamic converter IDC is positioned at outside the computer system accesses environment ENV, server one side comprises a corresponding server end information dynamic converter IDS, shown in Fig. 7,8.
When needs are input to computer system with text message I, user U is input to information dynamic converter IDC to text message I by means such as keyboard or handwriting inputs earlier, information dynamic converter IDC is transformed into text message ciphertext CI to text message I, and exports to user U by means such as lcd screen or indicator screens; User U is input to system client C to text message ciphertext CI again, enters delivering path P again; After text message ciphertext CI leaves delivering path P, be converted to text message I through server end information dynamic converter IDS earlier, text message I arrives system server S at last, and is shown in Figure 7.
Accordingly, when computer system was exported to user U with text message I, the back of coming out from text message I from system server S was converted to text message ciphertext CI through server end information dynamic converter IDS earlier; Text message ciphertext CI enters delivering path P again, arrives system client C then; System client C exports to user U to text message ciphertext CI; User U is input to information dynamic converter IDC to text message ciphertext CI by means such as keyboard or handwriting inputs, information dynamic converter IDC is transformed into text message I to text message ciphertext CI, and export to user U by means such as lcd screen or indicator screens, as shown in Figure 8.
In the present invention, information dynamic converter IDC: the software module that can be function and data acquisition system in a software or the software, this software or software module may operate on the computer on the mobile phone or PDA goes up or calculator on, and other can be operating software, that the text input interface is provided, electronic equipment that the text display interface is arranged, for example: the software on cell phone software, PDA software, the USB card etc.
Server end information dynamic converter IDS: the software module that can be function and data acquisition system in a software or the software, the operation of this software or software module on computers and other can operating software equipment, for example: the software function module of the software function module of Website server, phone entrusting system, server info dynamic converter software etc. independently.
Dynamic mapping: introduce a dynamic factor T in transforming function transformation function, it is not identical always making the text message ciphertext CI that obtains after the identical text message I input process transforming function transformation function conversion.
Dynamic factor T: the purpose that dynamic factor T uses is that the text message ciphertext CI that the text message I of identical content is obtained by information dynamic converter IDC conversion for many times is not identical always.Dynamic factor T can be time factor (for example: the current time) or the incident factor (for example: touch potential, number of run etc.) or random factor (can be that a certain side produces among system client C and the system server S, and inform the opposing party, for example: server is presented at the random number on the interface etc.) or their combination etc.
When being applied to user input text information and giving the situation of computer system, the design example of information dynamic converter IDC and server client information dynamic converter IDS is as follows:
The dynamic mapping function of the information dynamic converter IDC of client:
CI=FC(I,T,SEED_C)
Wherein:
I: be text message
CI: text message ciphertext
T: dynamic factor can be the time factor or the incident factor or random factor or their combination etc.
SEED_C: the characterization factor set of information dynamic converter IDC, be used to distinguish different information dynamic converter IDC, if just different users uses information dynamic converter IDC separately, the text message I of identical content may be different through the text message ciphertext CI after obtaining after the different information dynamic converter IDC conversion so.
FC: the dynamic mapping computing function of information dynamic converter IDC.
The dynamic mapping function of server end information dynamic converter IDS is corresponding with the dynamic mapping function of the information dynamic converter IDC of client:
I=FS(CI,T,SEED_S)
Wherein:
I: be text message
CI: text message ciphertext
T: dynamic factor can be the time factor or the incident factor or random factor or their combination etc.That T in the dynamic mapping function of the information dynamic converter IDC of this T and client is corresponding mutually, and this corresponding relation can be simply to equate corresponding relation, also can be the complex mathematical corresponding relation.
SEED_S: the characterization factor set of server end information dynamic converter IDS is used to distinguish different server end information dynamic converter IDS.SEED_C among this SEED_S and the corresponding client client information dynamic converter IDC is corresponding mutually, and this corresponding relation can be simply to equate corresponding relation, also can be the complex mathematical corresponding relation.In system server S, can there be a plurality of server end information dynamic converter IDS, with a plurality of client-side information dynamic converter of correspondence IDC.
FS: the dynamic mapping computing function of server end information dynamic converter IDS.
Below by way of example the dynamic mapping computing function of information dynamic converter IDS is described.
Example 1: dynamic factor T uses the integer value of the moment correspondence of information dynamic converter IDC computing dynamic mapping function, and SEED_C uses identical two integer I1, I2 with SEED_S, and text message I also is an integer.Dynamic mapping computing function FC is: CI=(I1+T+I) XOR I2.Dynamic mapping computing function FS is: I=(CI XOR I2)-I1-T.For example: I=123456, I1=19730624, I2=19770310, T=20070616233520 (carrying out dynamic mapping in 23: 35: 20 on the 16th June in 2007), CI=20070618088182 so.
Example 2: dynamic factor T uses the random text information that produces at system server S and show at system client C, and text message I is a character string, and SEED_C and SEED_S are respectively private key and the PKIs in the RSA asymmetric key algorithm.Dynamic mapping computing function FC is: CI=RSA_ENC (strcat (I, T), SEED_C), dynamic mapping computing function FS is: and I=strcut (RSA_DEC (CI, SEED_S), T), wherein RSA_ENC is the encryption function of RSA, RSA_DEC is the decryption function of RSA, and strcat is the character string contiguous function, and strcut is that character string is sheared function.
Example 3: dynamic factor T uses information dynamic converter IDC to carry out the number of times (also claiming the incident factor) of dynamic mapping, and SEED_C uses 1024 identical bits binary data with SEED_S.Dynamic mapping computing function FC uses identical function: CI=RAND with FS T(SEED_C) XORI, I=RAND T(SEED_S) XOR CI, wherein RAND TRepresent operation pseudo-random function RAND the T time, obtain T random number in the random number sequence that the RAND pseudo-random function produces in other words, SEED_C or SEED_S are as the coefficient of RAND pseudo-random function.
Below concrete example by website visiting and phone entrusting system the present invention will be described.
One, website visiting: system client C is the client computer of runs web browser, system server S is a Website server, delivering path P is the Internet network, text message I is the information of importing and showing on the webpage, and illegal earwig E is hacker software, the screen analyzer on the computer and the keyboard wooden horse in the Internet network.The server end information dynamic converter IDS of Website server one side is a software function module or a stand alone software that operates on the Website server.The information dynamic converter IDC of client one side is a software that operates on mobile phone or the equipment such as PDA or USB card, is to be positioned at outside the computer system accesses environment ENV that client computer, Website server and relevant Internet network path constitute.
(1), user input text information is given computer system: when client computer is submitted to when sending text message to Website server, user U manually is input to mobile phone to text message I earlier, or PDA, or obtain text message ciphertext CI on the information dynamic converter IDC software on the equipment such as USB card, user U is input to text message ciphertext CI to submit on the webpage again and sends, Website server receives that the server end information dynamic converter IDS software function module that calls self behind the text message ciphertext CI obtains text message I, even being arranged like this, keyboard wooden horse and screen analyzer also can only steal text message ciphertext CI, and can't steal text message I, the hacker software on the Internet network also can't be stolen text message I.
(2), computer system output text message is given the user: when Website server when client computer sends text message, the server end information dynamic converter IDS software function module that calls self earlier obtains text message ciphertext CI, by webpage text message ciphertext CI is presented on the client computer again, user U manually is input to mobile phone to text message ciphertext CI then, or PDA, or obtain text message I on the information dynamic converter IDC software on the equipment such as USB card, even being arranged like this, keyboard wooden horse and screen analyzer also can only steal text message ciphertext CI, and can't steal text message I, the hacker software on the Internet network also can't be stolen text message I.
Two, phone entrusting system: system client C is an ordinary telephone set, system server S is that the CallCenter of telephone contact center system (handles phone commission business, for example security phone trust, telephone bank etc.), delivering path P is telephone wire, telecommunication switching system and computer network etc., text message I is the voice suggestion of telephone key-press and system, and illegal earwig E is the hacker software, the tapping device on the telephone wire, the dialing historical record on the telephone set in the network etc.The server end information dynamic converter IDS of telephone contact center system one side is a software function module or a stand alone software that operates on the telephone contact center system server.The information dynamic converter IDC of client one side is a software that operates on the equipment such as mobile phone or PDA, is to be positioned at outside the mechanical, electrical words call center system of client telephone server and the computer system accesses environment ENV that relevant transmission path (telephone wire, telecommunication switching system and computer network etc.) constitutes.
(1), user input text information is given computer system: when user U submits to when sending text message to the telephone contact center system server by telephone key, user U manually is input to mobile phone to text message I earlier, or obtain text message ciphertext CI on the information dynamic converter IDC software on the equipment such as PDA, user U is input to text message ciphertext CI to submit on the telephone set by button again and sends, Website server receives that the server end information dynamic converter IDS software function module that calls self behind the text message ciphertext CI obtains text message I, even being arranged like this, the dialing historical record on the telephone set also can only steal text message ciphertext CI, and can't steal text message I, the tapping device on the telephone wire also can't be stolen text message I.
(2), computer system output text message is given the user: when the telephone contact center system server is pointed out when user U sends text message by call voice, the server end information dynamic converter IDS software function module that calls self earlier obtains text message ciphertext CI, tell the user U text message ciphertext CI by the call voice prompting again, user U manually is input to mobile phone to text message ciphertext CI then, or obtain text message I on the information dynamic converter IDC software on the equipment such as PDA, even have the tapping device on the telephone wire also can only steal text message ciphertext CI like this, and can't steal text message I.
In the present invention, information dynamic converter IDC is positioned at outside the computer system accesses environment ENV, does not have automatic text message I exchange to be connected with computer system accesses environment ENV, must adopt manual mode to carry out the exchange of text message I.The text message ciphertext CI that conversion obtains through information dynamic converter IDC manually is input to system client C by user U.The text message ciphertext CI of system client C output also manually is input to information dynamic converter IDC by user U.But text message I needn't manually be input to information dynamic converter IDC by user U again when each access computer systems, if repeatedly use identical text message I to visit computer system, then can only import one time text message I, then text message I is kept among the information dynamic converter IDC for future use or reuse.
Among the present invention, information dynamic converter IDC is to use dynamic mapping mechanism, that is to say that the text message ciphertext CI that the text message I of identical content obtains by information dynamic converter IDC conversion for many times is not identical always.
Embodiment 1
The input of bank cipher is maintained secrecy
A dynamic scrambler client software of bank cipher (being information dynamic converter IDC) is installed on the mobile phone of bank-user, the dynamic scrambler server software of bank cipher (being server end information dynamic converter IDS) is installed on the application server of bank, and is imported the corresponding data (mainly comprise SEED S: the characterization factor of server end information dynamic converter IDS is gathered) of the dynamic scrambler client software of user's bank cipher to the dynamic scrambler server software of this bank cipher.
Bank's application system is including but not limited to Web bank, telephone bank, ATM, POS etc.
(1), Web bank
The user no longer resembles and direct traditional system bank cipher (being text message I) is input in the log-on webpage when the logging in to online banks system.But earlier bank cipher being input to the dynamic scrambler client software of bank cipher on the user mobile phone, the dynamic scrambler client software of bank cipher carries out obtaining after the dynamic mapping the dynamic security code (being text message ciphertext CI) of bank cipher.The user is input to the dynamic security code of bank cipher in the log-on webpage again.The server of bank system of web obtains the dynamic security code that the user is input to the bank cipher in the log-on webpage, call the inner dynamic scrambler server software of bank cipher conversion and go out user's bank cipher, call traditional registering service module then and carry out authenticating user identification.
(2), telephone bank
The user is in login during telephone bank system, no longer resembles directly bank cipher (being text message I) to be input to the system that replies on the telephone set according to prompting traditional system.But earlier bank cipher being input to the dynamic scrambler client software of bank cipher on the user mobile phone, the dynamic scrambler client software of bank cipher carries out obtaining after the dynamic mapping the dynamic security code (being text message ciphertext CI) of bank cipher.The user is input to the system that replies on the telephone set to the dynamic security code of bank cipher again.The server of telephone bank system obtains the dynamic security code that the user is input to the bank cipher on the telephone set, call the inner dynamic scrambler server software of bank cipher conversion and go out user's bank cipher, call traditional registering service module then and carry out authenticating user identification.
Embodiment 2
The input of securities trading password is maintained secrecy secret similar with the input of bank cipher, and the technology operation instruction is as follows:
A dynamic scrambler client software of securities trading password (being information dynamic converter IDC) is installed on securities trading user's mobile phone, the dynamic scrambler server software of securities trading password (being server end information dynamic converter IDS) is installed on the application server of securities trading, and is imported the corresponding data (mainly comprise SEED_S: the characterization factor of server end information dynamic converter IDS is gathered) of the dynamic scrambler client software of user's security trading password to the dynamic scrambler server software of this securities trading password.
The securities trading application system is including but not limited to online secorities trading system, securities trading phone entrusting system, self-service securities trading sales counter etc.
(1), online secorities trading system for example
The user no longer resembles and direct traditional system securities trading password (being text message I) is input in the securities trading webpage when login online secorities trading system.But earlier the securities trading password being input to the dynamic scrambler client software of securities trading password on the user mobile phone, the dynamic scrambler client software of securities trading password carries out obtaining after the dynamic mapping the dynamic security code (being text message ciphertext CI) of securities trading password.The user is input to the dynamic security code of securities trading password in the securities trading webpage again.The server of online secorities trading system obtains the dynamic security code that the user is input to the securities trading password in the securities trading webpage, call the inner dynamic scrambler server software of securities trading password conversion and go out user's securities trading password, call traditional authentication business module then and carry out authenticating user identification.
(2), securities trading phone entrusting system for example
The user no longer resembles and directly securities trading password (being text message I) is input to the system that replies on the telephone set according to prompting traditional system when login securities trading phone entrusting system.But earlier the securities trading password being input to the dynamic scrambler client software of securities trading password on the user mobile phone, the dynamic scrambler client software of securities trading password carries out obtaining after the dynamic mapping the dynamic security code (being text message ciphertext CI) of securities trading password.The user is input to the system that replies on the telephone set to the dynamic security code of securities trading password again.The server of securities trading phone entrusting system obtains the dynamic security code that the user is input to the securities trading password on the telephone set, call the inner dynamic scrambler server software of securities trading password conversion and go out user's securities trading password, call traditional authentication business module then and carry out authenticating user identification.

Claims (7)

1. the dynamic secret method of text message input, output and transmission, it is characterized in that: user U comprises information dynamic converter IDC in client one side, this information dynamic converter IDC is positioned at outside the computer system accesses environment ENV, and server one side comprises a corresponding server end information dynamic converter IDS.
2. the dynamic secret method of text message according to claim 1 input, output and transmission is characterized in that: when being applied to user input text information and giving the situation of computer system,
User U is input to information dynamic converter IDC to text message I by means such as keyboard or handwriting inputs earlier, and information dynamic converter IDC is transformed into text message ciphertext CI to text message I, and exports to user U by means such as lcd screen or indicator screens;
User U is input to system client C to text message ciphertext CI again, enters delivering path P again;
After text message ciphertext CI leaves delivering path P, be converted to text message I through server end information dynamic converter IDS earlier, text message I arrives system server S at last.
3. the dynamic secret method of text message according to claim 1 input, output and transmission is characterized in that: when being applied to computer system output text message and giving user's situation,
After coming out from system server S, text message I is converted to text message ciphertext CI through server end information dynamic converter IDS earlier;
Text message ciphertext CI enters delivering path P again, arrives system client C then;
System client C exports to user U to text message ciphertext CI;
User U is input to information dynamic converter IDC to text message ciphertext CI by means such as keyboard or handwriting inputs, information dynamic converter IDC is transformed into text message I to text message ciphertext CI, and exports to user U by means such as lcd screen or indicator screens.
4. the dynamic secret method of text message input according to claim 1 and 2, output and transmission is characterized in that:
The information dynamic converter IDC of client satisfies following dynamic mapping function:
CI=FC(I,T,SEED_C)
Wherein: I is a text message, and CI is the text message ciphertext, and T is a dynamic factor, and SEED_C is the characterization factor set of information dynamic converter IDC, and FC is the dynamic mapping computing function of information dynamic converter IDC.
5. according to the dynamic secret method of claim 1 or the input of 2 or 4 described text messages, output and transmission, it is characterized in that: the dynamic mapping function of server end information dynamic converter IDS is corresponding with the dynamic mapping function of the information dynamic converter IDC of client, and satisfies following dynamic mapping function:
I=FS(CI,T,SEED_S)
Wherein: I is a text message, and CI is the text message ciphertext, and T is a dynamic factor, and SEED_S is the characterization factor set of server end information dynamic converter IDS, and FS is the dynamic mapping computing function of server end information dynamic converter IDS.
6. according to the dynamic secret method of claim 4 and 5 described text message inputs, output and transmission, it is characterized in that: described dynamic factor T is time factor or the incident factor or random factor or their combination.
7. the dynamic secret method of text message input according to claim 1, output and transmission, it is characterized in that: information dynamic converter IDC is the function in a software or the software and the software module of data acquisition system, this software or software module operation on computers or on the mobile phone PDA goes up or calculator on, other can be operating software, that the text input interface is provided, electronic equipment that the text display interface is arranged;
Server end information dynamic converter IDS is the function in a software or the software and the software module of data acquisition system, this software or software module operation on computers and other can operating software equipment.
CNA2007101353744A 2007-11-07 2007-11-07 Dynamic secret method of text information input, output and transmission Pending CN101159547A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2007101353744A CN101159547A (en) 2007-11-07 2007-11-07 Dynamic secret method of text information input, output and transmission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2007101353744A CN101159547A (en) 2007-11-07 2007-11-07 Dynamic secret method of text information input, output and transmission

Publications (1)

Publication Number Publication Date
CN101159547A true CN101159547A (en) 2008-04-09

Family

ID=39307483

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2007101353744A Pending CN101159547A (en) 2007-11-07 2007-11-07 Dynamic secret method of text information input, output and transmission

Country Status (1)

Country Link
CN (1) CN101159547A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102693114A (en) * 2011-02-04 2012-09-26 索尼公司 Information processing device, information processing method, information processing program, and information processing system
CN104363232A (en) * 2014-11-03 2015-02-18 叶春林 Anti-disclosure structure mode in daily communication
CN109286487A (en) * 2017-07-19 2019-01-29 杭州海康威视数字技术股份有限公司 The remote control method and system of a kind of electronic equipment
CN109858226A (en) * 2019-01-31 2019-06-07 叶春林 The safeguards system of networking storage safety

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102693114A (en) * 2011-02-04 2012-09-26 索尼公司 Information processing device, information processing method, information processing program, and information processing system
CN104363232A (en) * 2014-11-03 2015-02-18 叶春林 Anti-disclosure structure mode in daily communication
CN104363232B (en) * 2014-11-03 2017-12-01 叶春林 Anti-disclosure system in periodic traffic
CN109286487A (en) * 2017-07-19 2019-01-29 杭州海康威视数字技术股份有限公司 The remote control method and system of a kind of electronic equipment
CN109858226A (en) * 2019-01-31 2019-06-07 叶春林 The safeguards system of networking storage safety

Similar Documents

Publication Publication Date Title
US8407463B2 (en) Method of authentication of users in data processing systems
CN102752115B (en) Challenge code generating method and device, dynamic password authentication method and system
CN101252439B (en) System and method for increasing information safety equipment security
EP2999189A1 (en) Network authentication method for secure electronic transactions
CN108769027B (en) Secure communication method, device, mobile terminal and storage medium
US20080263672A1 (en) Protecting sensitive data intended for a remote application
JP6430544B2 (en) O2O secure settlement method and O2O secure settlement system
CN104541475A (en) Abstracted and randomized one-time passwords for transactional authentication
US20080284565A1 (en) Apparatus, System and Methods for Supporting an Authentication Process
US20100313028A1 (en) Electronic Signature Method and Electronic Signature Tool
CN101334884A (en) Method and system for enhancing bank transfer safety
CN101808077B (en) Information security input processing system and method and smart card
CN101155028B (en) Method and system for safe login of website
CN103414727A (en) Encryption protection system for input password input box and using method thereof
CN101924734A (en) Identity authentication method and authentication device based on Web form
CN102611702A (en) System and method for ensuring safety of network payment
CN105741116A (en) Fast payment method, apparatus and system
CN105323063A (en) Identity verification method of mobile terminal and fixed intelligent terminal based on two-dimensional code
CN101159547A (en) Dynamic secret method of text information input, output and transmission
CN101212301A (en) Authentication device and method
CN104103132A (en) Mobile uKey [USB (universal serial bus) Key] and card-less cash withdrawal System and mobile uKey and card-less cash withdrawal method
GB2449240A (en) Conducting secure online transactions using CAPTCHA
KR100877593B1 (en) The Security Method for Authentication which using of Random Password
KR101152610B1 (en) The Method of Virtual Keyboard
WO2011060739A1 (en) Security system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20080409