CN102404107A - Method, device, transmitting end and receiving end all capable of guaranteeing safety of inputted content - Google Patents
Method, device, transmitting end and receiving end all capable of guaranteeing safety of inputted content Download PDFInfo
- Publication number
- CN102404107A CN102404107A CN2010102817466A CN201010281746A CN102404107A CN 102404107 A CN102404107 A CN 102404107A CN 2010102817466 A CN2010102817466 A CN 2010102817466A CN 201010281746 A CN201010281746 A CN 201010281746A CN 102404107 A CN102404107 A CN 102404107A
- Authority
- CN
- China
- Prior art keywords
- input content
- input
- content
- deciphering
- transmitting terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- User Interface Of Digital Computer (AREA)
- Storage Device Security (AREA)
Abstract
A method capable of guaranteeing safety of inputted content comprises steps of capturing inputted content when calling in an input method; utilizing opposite user identification to calculate to obtain a corresponding public key of the opposite identification, encrypting the inputted content by the opposite identification, and utilizing private keys of local users to encrypt the inputted content; encrypting and decrypting abstract of the inputted content according to the public key corresponding to the private keys of the local users to achieve the abstract of the inputted content, using the private keys corresponding to the opposite user identification to encrypt and decrypt the inputted content, and converting decrypted inputted content into decrypted inputted content abstract; and displaying decrypted inputted content. The invention further discloses a device capable of guaranteeing the safety of the inputted content, a transmitting end capable of guaranteeing the safety of the inputted content and a receiving end capable of guaranteeing the safety of the inputted content. By means of an embodiment of the method, the device, the transmitting end and the receiving end, transmitting object identification is utilized to encrypting the inputted content so as to guarantee the safety of the inputted content.
Description
Technical field
The present invention relates to networking technology area, more specifically, relate to a kind of method, device, transmitting terminal and receiving terminal that ensures the input content safety.
Background technology
Network has become and the corresponding virtual platform of actual life now.Increasing information is in transmission through network and issue, and confidential information and individual privacy information are no exception.Network security receives increasing concern.
At present, the network user does not form the custom to authentification of message when transmitting input information each other.The lawless person is easy to utilize related software to intercept and capture the mutual information transmitted of the network user.For example, exchange through chat tool between the user, wooden horse is installed in user's computer just can be obtained the input information between the user smoothly.Same problem also exist with Email in.The hacker can utilize related software, intercepts and captures the mail that the user sends or receives, thereby obtains the content in the mail.
To sum up, the safety problem that has the input content in the prior art.
Summary of the invention
The embodiment of the invention proposes a kind of method that ensures the input content safety, guarantees the safety of input content.
The embodiment of the invention also proposes a kind of device that ensures the input content safety, guarantees the safety of input content.
The embodiment of the invention also proposes a kind of transmitting terminal that ensures the input content safety, guarantees the safety of input content.
The embodiment of the invention also proposes a kind of receiving terminal that ensures the input content, guarantees the safety of input content.
A kind of method that ensures the input content safety, this method comprises:
When calling in input method, intercept and capture the input content;
Utilize the other user to identify and calculate the said PKI corresponding square mark; Identify the corresponding said input content of public key encryption by said the other user; Utilize the summary of local user's the said input content of encrypted private key, local user's sign, the said input content of the summary of encrypting the said input content in back and encryption back are sent to the other user;
Calculate said local user by said local user sign and identify corresponding PKI, identify the summary of said input content behind the corresponding PKI enabling decryption of encrypted, obtain the summary of said input content according to said local user;
Identify the said input content behind the corresponding private key enabling decryption of encrypted by said the other user, obtain deciphering back input content, generate the summary of deciphering back input content by deciphering back input content;
If the summary of said input content is identical with the summary of said deciphering back input content, then show said deciphering back input content; Otherwise, show the deciphering failure.
The said input content of when calling in input method, intercepting and capturing comprises, when calling in input method, intercepts and captures said input content through the input method hook.
The said the other user's of utilization mark encryption calculates said PKI to the square mark correspondence and comprises, is identified at the PKI matrix computations according to said the other side and obtains the said PKI corresponding to square mark.
Saidly calculate said local user by said local user sign and identify corresponding PKI and comprise, be identified at the PKI matrix computations according to said local user and obtain said local user and identify corresponding PKI.
Said private key is to obtain at the private key matrix according to ID.
When having input methods, the said input method of calling in is included in input methods identical operations system interface place and calls in said input method.
Said input content further comprises the text that the user selects.
The text that said user selects comprises that the user utilizes mouse to draw the selected text of speech.
Saidly utilize mouse to draw speech to comprise, utilize the mouse information hook to obtain mouse information and draw speech.
A kind of device that ensures the input content safety is characterized in that this device comprises, transmitting terminal and receiving terminal,
Said transmitting terminal is used for when calling in input method, intercepts and captures the input content; Utilize the receiving terminal sign to calculate the corresponding PKI of receiving terminal sign; By the corresponding said input content of public key encryption of receiving terminal sign; Utilize the summary of the said input content of encrypted private key of transmitting terminal, transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back are sent to receiving terminal;
Said receiving terminal is used for transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back that receiving end/sending end sends; Calculate the corresponding PKI of transmitting terminal sign by the transmitting terminal sign,, obtain the summary of said input content according to the summary of said input content behind the corresponding PKI enabling decryption of encrypted of transmitting terminal sign; By the said input content behind the private key enabling decryption of encrypted of receiving terminal sign correspondence, obtain deciphering back input content, import the summary that content generates deciphering back input content by the deciphering back; Whether the summary of judging said input content is identical with the summary of said deciphering back input content; When the summary of said input content is identical with the summary of said deciphering back input content, be used to show that said deciphering afterwards imports content.
Said transmitting terminal comprises,
Control module is used for when calling in input method, intercepts and captures the input content;
Encrypting module; Be used to utilize the receiving terminal sign to calculate the corresponding PKI of receiving terminal sign; By the corresponding said input content of public key encryption of receiving terminal; Utilize the summary of the said input content of encrypted private key of transmitting terminal, transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back are sent to the other user.
Said receiving terminal comprises,
Deciphering module is used for the other user's sign, the said input content of the summary of encrypting the said input content in back and encryption back that receiving end/sending end sends; Calculate the corresponding PKI of transmitting terminal sign by the transmitting terminal sign,, obtain the summary of said input content according to the summary of said input content behind the corresponding PKI enabling decryption of encrypted of transmitting terminal sign; By the said input content behind the private key enabling decryption of encrypted of receiving terminal sign correspondence, obtain deciphering back input content, import the summary that content generates deciphering back input content by the deciphering back;
Judge module is used to judge whether the summary of said input content is identical with the summary of said deciphering back input content;
Display module when the summary of said input content is identical with the summary of said deciphering back input content, is used to show that said deciphering afterwards imports content.
Said control module is further used for, and when calling in input method, intercepts and captures said input content through the input method hook.
Said encrypting module comprises computing unit and ciphering unit,
Said computing unit is used for being identified at the PKI matrix computations according to receiving terminal and obtains the corresponding PKI of receiving terminal sign;
Said ciphering unit; Be used to utilize the corresponding said input content of public key encryption of receiving terminal sign; Utilize the summary of the said input content of encrypted private key of transmitting terminal, transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back are sent to receiving terminal.
Said deciphering module comprises computing unit and decryption unit,
Said computing unit is used for being identified at the PKI matrix computations by transmitting terminal and obtains the corresponding PKI of transmitting terminal sign;
Said decryption unit is used for transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back that receiving end/sending end sends; According to the summary of said input content behind the corresponding PKI enabling decryption of encrypted of transmitting terminal sign, obtain the summary of said input content; By the said input content behind the private key enabling decryption of encrypted of receiving terminal sign correspondence, obtain deciphering back input content, import the summary that content generates deciphering back input content by the deciphering back.
Further comprise the selection module, said selection module is used to utilize mouse information hook intercepting and capturing mouse information to draw the text that speech obtains user's selection.
A kind of transmitting terminal that ensures the input content safety comprises
Control module is used for when calling in input method, intercepts and captures the input content;
Encrypting module; Be used to utilize the receiving terminal sign to calculate the corresponding PKI of receiving terminal sign; By the corresponding said input content of public key encryption of receiving terminal; Utilize the summary of the said input content of encrypted private key of transmitting terminal, transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back are sent to the other user.
Said control module is further used for, and when calling in input method, intercepts and captures said input content through the input method hook.
Said encrypting module comprises computing unit and ciphering unit,
Said computing unit is used for being identified at the PKI matrix computations according to receiving terminal and obtains the corresponding PKI of receiving terminal sign;
Said ciphering unit; Be used to utilize the corresponding said input content of public key encryption of receiving terminal sign; Utilize the summary of the said input content of encrypted private key of transmitting terminal, transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back are sent to receiving terminal.
Further comprise the selection module, said selection module is used to utilize mouse information hook intercepting and capturing mouse information to draw the text that speech obtains user's selection.
A kind of receiving terminal that ensures the input content safety comprises
Deciphering module is used for the other user's sign, the said input content of the summary of encrypting the said input content in back and encryption back that receiving end/sending end sends; Calculate the corresponding PKI of transmitting terminal sign by the transmitting terminal sign,, obtain the summary of said input content according to the summary of said input content behind the corresponding PKI enabling decryption of encrypted of transmitting terminal sign; By the said input content behind the private key enabling decryption of encrypted of receiving terminal sign correspondence, obtain deciphering back input content, import the summary that content generates deciphering back input content by the deciphering back;
Judge module is used to judge whether the summary of said input content is identical with the summary of said deciphering back input content;
Display module when the summary of said input content is identical with the summary of said deciphering back input content, is used to show that said deciphering afterwards imports content.
Said deciphering module comprises computing unit and decryption unit,
Said computing unit is used for being identified at the PKI matrix computations by transmitting terminal and obtains the corresponding PKI of transmitting terminal sign;
Said decryption unit is used for transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back that receiving end/sending end sends; According to the summary of said input content behind the corresponding PKI enabling decryption of encrypted of transmitting terminal sign, obtain the summary of said input content; By the said input content behind the private key enabling decryption of encrypted of receiving terminal sign correspondence, obtain deciphering back input content, import the summary that content generates deciphering back input content by the deciphering back.
Further comprise the selection module, said selection module is used to utilize mouse information hook intercepting and capturing mouse information to draw the text that speech obtains user's selection.
From technique scheme, can find out, in embodiments of the present invention, when calling in input method, intercept and capture the input content, the content-encrypt of user's input; Utilize the other user to identify and calculate the said PKI corresponding square mark; By the said public key encryption said input content corresponding to square mark; Utilize the summary of local user's the said input content of encrypted private key, local user's sign, the said input content of the summary of encrypting the said input content in back and encryption back are sent to the other user; Calculate said local user by said local user sign and identify corresponding PKI, identify the summary of said input content behind the corresponding PKI enabling decryption of encrypted, obtain the summary of said input content based on said local user; Identify the said input content behind the corresponding private key enabling decryption of encrypted by said the other user, obtain deciphering back input content, generate deciphering back input synopsis by deciphering back input content; If the summary of said input content is identical with said deciphering back input synopsis, then show said deciphering back input content; Otherwise, show the deciphering failure.Make full use of the relation one to one of the corresponding private key of corresponding PKI of ID and ID, when calling input method, encrypt the input content, thereby guarantee the safety of input content.
Description of drawings
Fig. 1 is the method flow sketch map of embodiment of the invention guarantee input content safety;
Fig. 2 is the apparatus structure sketch map of embodiment of the invention guarantee input content safety;
Fig. 3 is the sending end structure sketch map of embodiment of the invention guarantee input content safety;
Fig. 4 is the receiving terminal structural representation of embodiment of the invention guarantee input content safety;
Fig. 5 is the Organization Chart of the embodiment of the invention in plug-in unit;
Fig. 6 is that the private key of the embodiment of the invention generates sketch map;
Fig. 7 embodiment of the invention is obtained the sketch map of object ID;
The sketch map of Fig. 8 embodiment of the invention deciphering text;
Fig. 9 embodiment of the invention is applicable to the sketch map of input methods.
Embodiment
For making the object of the invention, technical scheme and advantage express clearlyer, the present invention is remake further detailed explanation below in conjunction with accompanying drawing and specific embodiment.
In embodiments of the present invention, when calling in input method, intercept and capture the input content, with the summary of input content and input content respectively by behind the other user's PKI and local user's the encrypted private key and the local user identify and be sent to the other user; Utilize the local user to identify the summary of corresponding PKI deciphering input content, utilize the other user's private key deciphering input content, and generate the summary of deciphering back content by the input content.The summary of deciphering back content is identical with the input synopsis, and then successful decryption shows the input content.Thus can, through the corresponding relation between customer ID private key and the customer ID PKI, guaranteed the safety of input content.In addition, in operating system, there is input methods, can under the situation of using different input methods, have further guaranteed the safety of input content through calling input methods identical operations system interface.
Referring to accompanying drawing 1 is the method flow sketch map that ensures the input content safety, specifically may further comprise the steps:
Monitor the message of input hardware such as keyboard, mouse constantly.When operating system is called in input method, obtain the input content of keyboard through the input method hook.The input content also can be the text that the user selects in movable window, shear plate.Specifically utilize the mouse information hook can know that the user utilizes mouse to draw the selected text of speech.As, user can be in the WORD document, in the TXT document or in other document, utilize MouseAcross to cross the mode of drawing speech and select text to encrypt or decipher.
The interface that different input methods offers operating system is different.There is input methods in the operating system, makes full use of input methods and be connected the identical operations system interface with operating system.Input method is called at the place at input methods identical operations system interface, thereby can in different input methods, realize technical scheme of the present invention.
The local user imports the input content to the other user to be sent.Operating system utilizes being identified at of the other user to calculate the PKI corresponding to square mark in the PKI matrix.By the corresponding public key encryption input content to the other user to be sent of square mark being obtained encrypting back input content.
In the private key matrix, calculate definite private key based on ID among the present invention, calculate in the PKI matrix based on ID and confirm PKI.The private key matrix is to utilize on the finite field of having chosen and the elliptic curve parameter, and generating any certificate less than n at random is private key, selects 32*32 private key to constitute a private key matrix altogether.The PKI matrix is to utilize the private key matrix that has generated, calculates the corresponding PKI of private key of corresponding ranks coordinate.Pairing private key of ID and PKI are to concern one to one.Promptly a pairing private key of ID and the pairing PKI of same sign are to concern one to one.Utilize the content of ID private key deciphering by the ID public key encryption; Or utilize the ID PKI to decipher content by the ID encrypted private key.Private key matrix, PKI matrix, confirm that PKI and definite private key all are defineds in the CPK standard, this paper repeats no more.The private key matrix, the PKI matrix that make full use of in the present invention in the CPK standard are confirmed private key and the PKI that it is corresponding according to ID, have fully guaranteed the safety of input content.ID can be identifying user identity ID such as QQ number, email address.
The summary of step 103, encryption input content.
Utilize the summary of local user's encrypted private key input content to obtain encrypting the summary of back input content.Input content after the encryption that obtains in local user's sign, the summary of encrypting back input content and the step 102 is sent to the other user.The purpose that local user's sign is sent to the other user is; The other user can be identified to calculate in the PKI matrix and obtain the PKI that the local user identifies correspondence according to the local user, utilizes the corresponding PKI of local sign can decipher the summary by the input content of local user's encrypted private key.
The other user receives local user's sign, the summary of encrypting back input content and the encryption back input content that the local user sends.Utilize the local user to be identified in the PKI matrix to calculate to obtain the local user and identify corresponding PKI, identify the summary of input content behind the corresponding PKI enabling decryption of encrypted, obtain the summary of input content by the local user.
The summary of step 105, deciphering input content.
Based on the input content behind the private key enabling decryption of encrypted of the other user's sign, obtain deciphering back input content.Generate the summary of encrypting back input content by deciphering back input content.
Whether the summary of step 106, judgement deciphering back input content equals to import the summary of content.
The summary of deciphering back input content equals the summary of input content in the step 104 in the determining step 105, and then steps performed 107; Otherwise execution in step 108.How to realize that specifically this deterministic process is a prior art, this paper repeats no more.
Input content in the step display 105.
The local user is sent to the other user's input contents decryption failure.
Referring to accompanying drawing 2 are the apparatus structure sketch mapes that ensure the input content safety, specifically comprise transmitting terminal and receiving terminal:
Transmitting terminal comprises control module 201, encrypting module 202 and selection module 206,
Encrypting module 202 comprises computing unit 2021 and ciphering unit 2022.
Computing unit 2021 is used for being identified at the PKI matrix computations according to the other side and obtains the said PKI corresponding to square mark.
Receiving terminal comprises deciphering module 203, judge module 204, display module 205 and selects module 206.
Deciphering module 203 comprises computing unit 2031 and decryption unit 2032.
Referring to accompanying drawing 3 are the structural representations that ensure the transmitting terminal of input content safety, comprise
Control module 301 is used for when calling in input method, obtains said input content through the input method hook.
Encrypting module 302, encrypting module 302 comprise computing unit 3021 and ciphering unit 3022,
Computing unit 3021 is used for being identified at the PKI matrix computations according to receiving terminal and obtains the corresponding PKI of receiving terminal sign;
Ciphering unit 3022; Be used to utilize the corresponding said input content of public key encryption of receiving terminal sign; Utilize the summary of the said input content of encrypted private key of transmitting terminal, transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back are sent to receiving terminal.
Select module 303, said selection module is used to utilize mouse information hook intercepting and capturing mouse information to draw the text that speech obtains user's selection.
Referring to accompanying drawing 4 are the structural representations that ensure the receiving terminal of input content safety, comprise
Deciphering module 401, deciphering module 401 comprise computing unit 4011 and decryption unit 4012,
In order to specify technical scheme of the present invention, be elaborated in operating system, to use plug-in unit of the present invention below.
Accompanying drawing 5 is embodiment of the invention Organization Charts in plug-in unit, has in the software of ID at Office Outlook, Outlook Express, Foxmail, Web mailbox, QQ etc., can utilize overall hook to intercept and capture the input message in above-mentioned software.
Referring to accompanying drawing 6, in CPK key Core Generator, obtain the corresponding private key of self ID, the summary of input content is encrypted.Profit also can be obtained its corresponding PKI according to ID in the same way.Referring to accompanying drawing 7, ID is drawn to target window with receiving terminal, through in CPK key Core Generator, obtaining the corresponding PKI of the other side ID, the input content is encrypted.
Receiving terminal obtains the corresponding PKI of transmitting terminal ID by the ID of transmitting terminal in CPK key Core Generator; ID by receiving terminal obtains the corresponding private key of receiving terminal ID; The background process program utilizes the corresponding PKI of transmitting terminal ID that the summary of input content is deciphered, and utilizes the corresponding private key of receiving terminal ID that the input content is deciphered; Referring to accompanying drawing 8,, then show the input content at receiving terminal if the summary behind the enabling decryption of encrypted is identical with the summary of input content.
In addition,, in operating system, there is input methods,, can under the situation of using different input methods, further guarantees the safety of input content through calling input methods identical operations system interface referring to accompanying drawing 9.Like the QQ input method in the accompanying drawing 3, Google input method, search dog input method etc.
In addition, can also draw speech through mouse and decipher verification.Such operation meeting is more convenient.
The above is merely preferred embodiment of the present invention, is not to be used to limit protection scope of the present invention.All within spirit of the present invention and principle, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (23)
1. one kind ensures the method for importing content safety, it is characterized in that this method comprises:
When calling in input method, intercept and capture the input content;
Utilize the other user to identify and calculate the said PKI corresponding square mark; Identify the corresponding said input content of public key encryption by said the other user; Utilize the summary of local user's the said input content of encrypted private key, local user's sign, the said input content of the summary of encrypting the said input content in back and encryption back are sent to the other user;
Calculate said local user by said local user sign and identify corresponding PKI, identify the summary of said input content behind the corresponding PKI enabling decryption of encrypted, obtain the summary of said input content according to said local user;
Identify the said input content behind the corresponding private key enabling decryption of encrypted by said the other user, obtain deciphering back input content, generate the summary of deciphering back input content by deciphering back input content;
If the summary of said input content is identical with the summary of said deciphering back input content, then show said deciphering back input content; Otherwise, show the deciphering failure.
2. according to the method for the said guarantee input of claim 1 content safety, it is characterized in that the said input content of when calling in input method, intercepting and capturing comprises, when calling in input method, intercepts and captures said input content through the input method hook.
3. according to the method for the said guarantee of claim 1 input content safety; It is characterized in that; The said the other user's of utilization mark encryption calculates said PKI to the square mark correspondence and comprises, is identified at the PKI matrix computations according to said the other side and obtains the said PKI corresponding to square mark.
4. according to the method for the said guarantee of claim 1 input content safety; It is characterized in that; Saidly calculate said local user by said local user sign and identify corresponding PKI and comprise, be identified at the PKI matrix computations according to said local user and obtain said local user and identify corresponding PKI.
5. according to the method for the said guarantee input of claim 1 content safety, it is characterized in that said private key is to obtain at the private key matrix according to ID.
6. according to the method for the said guarantee of claim 1 input content safety, it is characterized in that when having input methods, the said input method of calling in is included in input methods identical operations system interface place and calls in said input method.
7. according to the method for the said guarantee input of claim 1 content safety, it is characterized in that said input content further comprises the text that the user selects.
8. according to the method for the said guarantee input of claim 7 content safety, it is characterized in that the text that said user selects comprises that the user utilizes mouse to draw the selected text of speech.
9. the method for said according to Claim 8 guarantee input content safety is characterized in that, saidly utilizes mouse to draw speech to comprise, utilize the mouse information hook to obtain mouse information and draw speech.
10. a device that ensures the input content safety is characterized in that this device comprises, transmitting terminal and receiving terminal,
Said transmitting terminal is used for when calling in input method, intercepts and captures the input content; Utilize the receiving terminal sign to calculate the corresponding PKI of receiving terminal sign; By the corresponding said input content of public key encryption of receiving terminal sign; Utilize the summary of the said input content of encrypted private key of transmitting terminal, transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back are sent to receiving terminal;
Said receiving terminal is used for transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back that receiving end/sending end sends; Calculate the corresponding PKI of transmitting terminal sign by the transmitting terminal sign,, obtain the summary of said input content according to the summary of said input content behind the corresponding PKI enabling decryption of encrypted of transmitting terminal sign; By the said input content behind the private key enabling decryption of encrypted of receiving terminal sign correspondence, obtain deciphering back input content, import the summary that content generates deciphering back input content by the deciphering back; Whether the summary of judging said input content is identical with the summary of said deciphering back input content; When the summary of said input content is identical with the summary of said deciphering back input content, be used to show that said deciphering afterwards imports content.
11. the device according to the said guarantee of claim 10 input content safety is characterized in that, said transmitting terminal comprises,
Control module is used for when calling in input method, intercepts and captures the input content;
Encrypting module; Be used to utilize the receiving terminal sign to calculate the corresponding PKI of receiving terminal sign; By the corresponding said input content of public key encryption of receiving terminal; Utilize the summary of the said input content of encrypted private key of transmitting terminal, transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back are sent to the other user.
12. the device according to the said guarantee of claim 10 input content safety is characterized in that, said receiving terminal comprises,
Deciphering module is used for the other user's sign, the said input content of the summary of encrypting the said input content in back and encryption back that receiving end/sending end sends; Calculate the corresponding PKI of transmitting terminal sign by the transmitting terminal sign,, obtain the summary of said input content according to the summary of said input content behind the corresponding PKI enabling decryption of encrypted of transmitting terminal sign; By the said input content behind the private key enabling decryption of encrypted of receiving terminal sign correspondence, obtain deciphering back input content, import the summary that content generates deciphering back input content by the deciphering back;
Judge module is used to judge whether the summary of said input content is identical with the summary of said deciphering back input content;
Display module when the summary of said input content is identical with the summary of said deciphering back input content, is used to show that said deciphering afterwards imports content.
13. the device according to the said guarantee input of claim 11 content safety is characterized in that said control module is further used for, and when calling in input method, intercepts and captures said input content through the input method hook.
14. the device according to the said guarantee input of claim 11 content safety is characterized in that said encrypting module comprises computing unit and ciphering unit,
Said computing unit is used for being identified at the PKI matrix computations according to receiving terminal and obtains the corresponding PKI of receiving terminal sign;
Said ciphering unit; Be used to utilize the corresponding said input content of public key encryption of receiving terminal sign; Utilize the summary of the said input content of encrypted private key of transmitting terminal, transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back are sent to receiving terminal.
15. the device according to the said guarantee input of claim 12 content safety is characterized in that said deciphering module comprises computing unit and decryption unit,
Said computing unit is used for being identified at the PKI matrix computations by transmitting terminal and obtains the corresponding PKI of transmitting terminal sign;
Said decryption unit is used for transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back that receiving end/sending end sends; According to the summary of said input content behind the corresponding PKI enabling decryption of encrypted of transmitting terminal sign, obtain the summary of said input content; By the said input content behind the private key enabling decryption of encrypted of receiving terminal sign correspondence, obtain deciphering back input content, import the summary that content generates deciphering back input content by the deciphering back.
16. the device according to claim 11 or 12 said guarantee input content safeties is characterized in that, further comprises the selection module, said selection module is used to utilize mouse information hook intercepting and capturing mouse information to draw the text that speech obtains user's selection.
17. a transmitting terminal that ensures the input content safety is characterized in that, comprises
Control module is used for when calling in input method, intercepts and captures the input content;
Encrypting module; Be used to utilize the receiving terminal sign to calculate the corresponding PKI of receiving terminal sign; By the corresponding said input content of public key encryption of receiving terminal; Utilize the summary of the said input content of encrypted private key of transmitting terminal, transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back are sent to the other user.
18. the device according to the said guarantee input of claim 17 content safety is characterized in that said control module is further used for, and when calling in input method, intercepts and captures said input content through the input method hook.
19. the device according to the said guarantee input of claim 17 content safety is characterized in that said encrypting module comprises computing unit and ciphering unit,
Said computing unit is used for being identified at the PKI matrix computations according to receiving terminal and obtains the corresponding PKI of receiving terminal sign;
Said ciphering unit; Be used to utilize the corresponding said input content of public key encryption of receiving terminal sign; Utilize the summary of the said input content of encrypted private key of transmitting terminal, transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back are sent to receiving terminal.
20. the device according to the said guarantee input of claim 17 content safety is characterized in that, further comprises the selection module, said selection module is used to utilize mouse information hook intercepting and capturing mouse information to draw the text that speech obtains user's selection.
21. a receiving terminal that ensures the input content safety is characterized in that, comprises
Deciphering module is used for the other user's sign, the said input content of the summary of encrypting the said input content in back and encryption back that receiving end/sending end sends; Calculate the corresponding PKI of transmitting terminal sign by the transmitting terminal sign,, obtain the summary of said input content according to the summary of said input content behind the corresponding PKI enabling decryption of encrypted of transmitting terminal sign; By the said input content behind the private key enabling decryption of encrypted of receiving terminal sign correspondence, obtain deciphering back input content, import the summary that content generates deciphering back input content by the deciphering back;
Judge module is used to judge whether the summary of said input content is identical with the summary of said deciphering back input content;
Display module when the summary of said input content is identical with the summary of said deciphering back input content, is used to show that said deciphering afterwards imports content.
22. the device according to the said guarantee input of claim 21 content safety is characterized in that said deciphering module comprises computing unit and decryption unit,
Said computing unit is used for being identified at the PKI matrix computations by transmitting terminal and obtains the corresponding PKI of transmitting terminal sign;
Said decryption unit is used for transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back that receiving end/sending end sends; According to the summary of said input content behind the corresponding PKI enabling decryption of encrypted of transmitting terminal sign, obtain the summary of said input content; By the said input content behind the private key enabling decryption of encrypted of receiving terminal sign correspondence, obtain deciphering back input content, import the summary that content generates deciphering back input content by the deciphering back.
23. the device according to the said guarantee input of claim 21 content safety is characterized in that, further comprises the selection module, said selection module is used to utilize mouse information hook intercepting and capturing mouse information to draw the text that speech obtains user's selection.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010281746.6A CN102404107B (en) | 2010-09-13 | 2010-09-13 | A kind of ensure the method for input content safety, device, transmitting terminal and receiving terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010281746.6A CN102404107B (en) | 2010-09-13 | 2010-09-13 | A kind of ensure the method for input content safety, device, transmitting terminal and receiving terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102404107A true CN102404107A (en) | 2012-04-04 |
CN102404107B CN102404107B (en) | 2016-06-01 |
Family
ID=45885928
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201010281746.6A Active CN102404107B (en) | 2010-09-13 | 2010-09-13 | A kind of ensure the method for input content safety, device, transmitting terminal and receiving terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102404107B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105430022A (en) * | 2015-12-31 | 2016-03-23 | 宇龙计算机通信科技(深圳)有限公司 | Data input control method and terminal equipment |
CN106790009A (en) * | 2016-12-13 | 2017-05-31 | 北京奇虎科技有限公司 | Information processing method, device and mobile terminal |
CN107066409A (en) * | 2017-03-31 | 2017-08-18 | 福建升腾资讯有限公司 | Port based on operation system redirects the method with communication data after-treatment |
CN109995781A (en) * | 2019-03-29 | 2019-07-09 | 腾讯科技(深圳)有限公司 | Transmission method, device, medium and the equipment of data |
CN110460448A (en) * | 2019-08-20 | 2019-11-15 | 丹东瑞银科技有限公司 | A kind of CPK file encrypting method, encryption equipment, cryptographic communication system and storage medium |
CN111158924A (en) * | 2019-12-02 | 2020-05-15 | 百度在线网络技术(北京)有限公司 | Content sharing method and device, electronic equipment and readable storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101247605A (en) * | 2008-03-25 | 2008-08-20 | 中兴通讯股份有限公司 | Short information enciphering and endorsement method, mobile terminal and short information ciphering system |
CN101334774A (en) * | 2007-06-29 | 2008-12-31 | 北京搜狗科技发展有限公司 | Character input method and input method system |
CN101447980A (en) * | 2008-12-25 | 2009-06-03 | 中国电子科技集团公司第五十四研究所 | Collision-resistance method for mapping public-private key pairs by utilizing uniform user identification |
CN101471776A (en) * | 2007-12-29 | 2009-07-01 | 航天信息股份有限公司 | Method for preventing PKG forgery signature based on user identification |
-
2010
- 2010-09-13 CN CN201010281746.6A patent/CN102404107B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101334774A (en) * | 2007-06-29 | 2008-12-31 | 北京搜狗科技发展有限公司 | Character input method and input method system |
CN101471776A (en) * | 2007-12-29 | 2009-07-01 | 航天信息股份有限公司 | Method for preventing PKG forgery signature based on user identification |
CN101247605A (en) * | 2008-03-25 | 2008-08-20 | 中兴通讯股份有限公司 | Short information enciphering and endorsement method, mobile terminal and short information ciphering system |
CN101447980A (en) * | 2008-12-25 | 2009-06-03 | 中国电子科技集团公司第五十四研究所 | Collision-resistance method for mapping public-private key pairs by utilizing uniform user identification |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105430022A (en) * | 2015-12-31 | 2016-03-23 | 宇龙计算机通信科技(深圳)有限公司 | Data input control method and terminal equipment |
CN106790009A (en) * | 2016-12-13 | 2017-05-31 | 北京奇虎科技有限公司 | Information processing method, device and mobile terminal |
CN106790009B (en) * | 2016-12-13 | 2020-01-14 | 北京安云世纪科技有限公司 | Information processing method and device and mobile terminal |
CN107066409A (en) * | 2017-03-31 | 2017-08-18 | 福建升腾资讯有限公司 | Port based on operation system redirects the method with communication data after-treatment |
CN109995781A (en) * | 2019-03-29 | 2019-07-09 | 腾讯科技(深圳)有限公司 | Transmission method, device, medium and the equipment of data |
CN109995781B (en) * | 2019-03-29 | 2021-06-22 | 腾讯科技(深圳)有限公司 | Data transmission method, device, medium and equipment |
CN110460448A (en) * | 2019-08-20 | 2019-11-15 | 丹东瑞银科技有限公司 | A kind of CPK file encrypting method, encryption equipment, cryptographic communication system and storage medium |
CN111158924A (en) * | 2019-12-02 | 2020-05-15 | 百度在线网络技术(北京)有限公司 | Content sharing method and device, electronic equipment and readable storage medium |
CN111158924B (en) * | 2019-12-02 | 2023-09-22 | 百度在线网络技术(北京)有限公司 | Content sharing method and device, electronic equipment and readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN102404107B (en) | 2016-06-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106656476B (en) | Password protection method and device and computer readable storage medium | |
CN102170357B (en) | Combined secret key dynamic security management system | |
CN101510888B (en) | Method, device and system for improving data security for SaaS application | |
CN101720071B (en) | Short message two-stage encryption transmission and secure storage method based on safety SIM card | |
CN110100422B (en) | Data writing method and device based on block chain intelligent contract and storage medium | |
WO2016045469A1 (en) | Information encryption method and mobile terminal | |
CN107465689A (en) | The key management system and method for virtual credible platform module under cloud environment | |
CN102833244B (en) | Communication method for authentication by fingerprint information | |
JP2015130633A (en) | authentication system | |
CN103546421A (en) | Network work communication security and secrecy system on basis of PKI (public key infrastructure) technology and method for implementing network work communication security and secrecy system | |
CN102664898A (en) | Fingerprint identification-based encrypted transmission method, fingerprint identification-based encrypted transmission device and fingerprint identification-based encrypted transmission system | |
CN104253694A (en) | Encrypting method for network data transmission | |
CN102404107B (en) | A kind of ensure the method for input content safety, device, transmitting terminal and receiving terminal | |
CN109412812A (en) | Data safe processing system, method, apparatus and storage medium | |
CA3178180A1 (en) | Constructing a distributed ledger transaction on a cold hardware wallet | |
CN102055685B (en) | Method for encrypting webmail information | |
CN104202163A (en) | Password system based on mobile terminal | |
CN103701596A (en) | Document access method, system and equipment and document access request response method, system and equipment | |
CN102271333A (en) | Safe receiving and dispatching method for 3G (3rd Generation) message on basis of trusted chain transmission | |
CN103905188A (en) | Method for generating dynamic password through intelligent secret key device, and intelligent secret key device | |
CN103580868A (en) | Secure transmission method of electronic official document secure transmission system | |
CN104486087A (en) | Digital signature method based on remote hardware security modules | |
CN106605419A (en) | Method and system for secure SMS communications | |
CN109005027A (en) | A kind of random data encryption and decryption method, apparatus and system | |
CN102404337A (en) | Data encryption method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |