CN102404107A - Method, device, transmitting end and receiving end all capable of guaranteeing safety of inputted content - Google Patents

Method, device, transmitting end and receiving end all capable of guaranteeing safety of inputted content Download PDF

Info

Publication number
CN102404107A
CN102404107A CN2010102817466A CN201010281746A CN102404107A CN 102404107 A CN102404107 A CN 102404107A CN 2010102817466 A CN2010102817466 A CN 2010102817466A CN 201010281746 A CN201010281746 A CN 201010281746A CN 102404107 A CN102404107 A CN 102404107A
Authority
CN
China
Prior art keywords
input content
input
content
deciphering
transmitting terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2010102817466A
Other languages
Chinese (zh)
Other versions
CN102404107B (en
Inventor
陈欢
黄格仕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201010281746.6A priority Critical patent/CN102404107B/en
Publication of CN102404107A publication Critical patent/CN102404107A/en
Application granted granted Critical
Publication of CN102404107B publication Critical patent/CN102404107B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • User Interface Of Digital Computer (AREA)
  • Storage Device Security (AREA)

Abstract

A method capable of guaranteeing safety of inputted content comprises steps of capturing inputted content when calling in an input method; utilizing opposite user identification to calculate to obtain a corresponding public key of the opposite identification, encrypting the inputted content by the opposite identification, and utilizing private keys of local users to encrypt the inputted content; encrypting and decrypting abstract of the inputted content according to the public key corresponding to the private keys of the local users to achieve the abstract of the inputted content, using the private keys corresponding to the opposite user identification to encrypt and decrypt the inputted content, and converting decrypted inputted content into decrypted inputted content abstract; and displaying decrypted inputted content. The invention further discloses a device capable of guaranteeing the safety of the inputted content, a transmitting end capable of guaranteeing the safety of the inputted content and a receiving end capable of guaranteeing the safety of the inputted content. By means of an embodiment of the method, the device, the transmitting end and the receiving end, transmitting object identification is utilized to encrypting the inputted content so as to guarantee the safety of the inputted content.

Description

A kind of method, device, transmitting terminal and receiving terminal that ensures the input content safety
Technical field
The present invention relates to networking technology area, more specifically, relate to a kind of method, device, transmitting terminal and receiving terminal that ensures the input content safety.
Background technology
Network has become and the corresponding virtual platform of actual life now.Increasing information is in transmission through network and issue, and confidential information and individual privacy information are no exception.Network security receives increasing concern.
At present, the network user does not form the custom to authentification of message when transmitting input information each other.The lawless person is easy to utilize related software to intercept and capture the mutual information transmitted of the network user.For example, exchange through chat tool between the user, wooden horse is installed in user's computer just can be obtained the input information between the user smoothly.Same problem also exist with Email in.The hacker can utilize related software, intercepts and captures the mail that the user sends or receives, thereby obtains the content in the mail.
To sum up, the safety problem that has the input content in the prior art.
Summary of the invention
The embodiment of the invention proposes a kind of method that ensures the input content safety, guarantees the safety of input content.
The embodiment of the invention also proposes a kind of device that ensures the input content safety, guarantees the safety of input content.
The embodiment of the invention also proposes a kind of transmitting terminal that ensures the input content safety, guarantees the safety of input content.
The embodiment of the invention also proposes a kind of receiving terminal that ensures the input content, guarantees the safety of input content.
A kind of method that ensures the input content safety, this method comprises:
When calling in input method, intercept and capture the input content;
Utilize the other user to identify and calculate the said PKI corresponding square mark; Identify the corresponding said input content of public key encryption by said the other user; Utilize the summary of local user's the said input content of encrypted private key, local user's sign, the said input content of the summary of encrypting the said input content in back and encryption back are sent to the other user;
Calculate said local user by said local user sign and identify corresponding PKI, identify the summary of said input content behind the corresponding PKI enabling decryption of encrypted, obtain the summary of said input content according to said local user;
Identify the said input content behind the corresponding private key enabling decryption of encrypted by said the other user, obtain deciphering back input content, generate the summary of deciphering back input content by deciphering back input content;
If the summary of said input content is identical with the summary of said deciphering back input content, then show said deciphering back input content; Otherwise, show the deciphering failure.
The said input content of when calling in input method, intercepting and capturing comprises, when calling in input method, intercepts and captures said input content through the input method hook.
The said the other user's of utilization mark encryption calculates said PKI to the square mark correspondence and comprises, is identified at the PKI matrix computations according to said the other side and obtains the said PKI corresponding to square mark.
Saidly calculate said local user by said local user sign and identify corresponding PKI and comprise, be identified at the PKI matrix computations according to said local user and obtain said local user and identify corresponding PKI.
Said private key is to obtain at the private key matrix according to ID.
When having input methods, the said input method of calling in is included in input methods identical operations system interface place and calls in said input method.
Said input content further comprises the text that the user selects.
The text that said user selects comprises that the user utilizes mouse to draw the selected text of speech.
Saidly utilize mouse to draw speech to comprise, utilize the mouse information hook to obtain mouse information and draw speech.
A kind of device that ensures the input content safety is characterized in that this device comprises, transmitting terminal and receiving terminal,
Said transmitting terminal is used for when calling in input method, intercepts and captures the input content; Utilize the receiving terminal sign to calculate the corresponding PKI of receiving terminal sign; By the corresponding said input content of public key encryption of receiving terminal sign; Utilize the summary of the said input content of encrypted private key of transmitting terminal, transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back are sent to receiving terminal;
Said receiving terminal is used for transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back that receiving end/sending end sends; Calculate the corresponding PKI of transmitting terminal sign by the transmitting terminal sign,, obtain the summary of said input content according to the summary of said input content behind the corresponding PKI enabling decryption of encrypted of transmitting terminal sign; By the said input content behind the private key enabling decryption of encrypted of receiving terminal sign correspondence, obtain deciphering back input content, import the summary that content generates deciphering back input content by the deciphering back; Whether the summary of judging said input content is identical with the summary of said deciphering back input content; When the summary of said input content is identical with the summary of said deciphering back input content, be used to show that said deciphering afterwards imports content.
Said transmitting terminal comprises,
Control module is used for when calling in input method, intercepts and captures the input content;
Encrypting module; Be used to utilize the receiving terminal sign to calculate the corresponding PKI of receiving terminal sign; By the corresponding said input content of public key encryption of receiving terminal; Utilize the summary of the said input content of encrypted private key of transmitting terminal, transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back are sent to the other user.
Said receiving terminal comprises,
Deciphering module is used for the other user's sign, the said input content of the summary of encrypting the said input content in back and encryption back that receiving end/sending end sends; Calculate the corresponding PKI of transmitting terminal sign by the transmitting terminal sign,, obtain the summary of said input content according to the summary of said input content behind the corresponding PKI enabling decryption of encrypted of transmitting terminal sign; By the said input content behind the private key enabling decryption of encrypted of receiving terminal sign correspondence, obtain deciphering back input content, import the summary that content generates deciphering back input content by the deciphering back;
Judge module is used to judge whether the summary of said input content is identical with the summary of said deciphering back input content;
Display module when the summary of said input content is identical with the summary of said deciphering back input content, is used to show that said deciphering afterwards imports content.
Said control module is further used for, and when calling in input method, intercepts and captures said input content through the input method hook.
Said encrypting module comprises computing unit and ciphering unit,
Said computing unit is used for being identified at the PKI matrix computations according to receiving terminal and obtains the corresponding PKI of receiving terminal sign;
Said ciphering unit; Be used to utilize the corresponding said input content of public key encryption of receiving terminal sign; Utilize the summary of the said input content of encrypted private key of transmitting terminal, transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back are sent to receiving terminal.
Said deciphering module comprises computing unit and decryption unit,
Said computing unit is used for being identified at the PKI matrix computations by transmitting terminal and obtains the corresponding PKI of transmitting terminal sign;
Said decryption unit is used for transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back that receiving end/sending end sends; According to the summary of said input content behind the corresponding PKI enabling decryption of encrypted of transmitting terminal sign, obtain the summary of said input content; By the said input content behind the private key enabling decryption of encrypted of receiving terminal sign correspondence, obtain deciphering back input content, import the summary that content generates deciphering back input content by the deciphering back.
Further comprise the selection module, said selection module is used to utilize mouse information hook intercepting and capturing mouse information to draw the text that speech obtains user's selection.
A kind of transmitting terminal that ensures the input content safety comprises
Control module is used for when calling in input method, intercepts and captures the input content;
Encrypting module; Be used to utilize the receiving terminal sign to calculate the corresponding PKI of receiving terminal sign; By the corresponding said input content of public key encryption of receiving terminal; Utilize the summary of the said input content of encrypted private key of transmitting terminal, transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back are sent to the other user.
Said control module is further used for, and when calling in input method, intercepts and captures said input content through the input method hook.
Said encrypting module comprises computing unit and ciphering unit,
Said computing unit is used for being identified at the PKI matrix computations according to receiving terminal and obtains the corresponding PKI of receiving terminal sign;
Said ciphering unit; Be used to utilize the corresponding said input content of public key encryption of receiving terminal sign; Utilize the summary of the said input content of encrypted private key of transmitting terminal, transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back are sent to receiving terminal.
Further comprise the selection module, said selection module is used to utilize mouse information hook intercepting and capturing mouse information to draw the text that speech obtains user's selection.
A kind of receiving terminal that ensures the input content safety comprises
Deciphering module is used for the other user's sign, the said input content of the summary of encrypting the said input content in back and encryption back that receiving end/sending end sends; Calculate the corresponding PKI of transmitting terminal sign by the transmitting terminal sign,, obtain the summary of said input content according to the summary of said input content behind the corresponding PKI enabling decryption of encrypted of transmitting terminal sign; By the said input content behind the private key enabling decryption of encrypted of receiving terminal sign correspondence, obtain deciphering back input content, import the summary that content generates deciphering back input content by the deciphering back;
Judge module is used to judge whether the summary of said input content is identical with the summary of said deciphering back input content;
Display module when the summary of said input content is identical with the summary of said deciphering back input content, is used to show that said deciphering afterwards imports content.
Said deciphering module comprises computing unit and decryption unit,
Said computing unit is used for being identified at the PKI matrix computations by transmitting terminal and obtains the corresponding PKI of transmitting terminal sign;
Said decryption unit is used for transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back that receiving end/sending end sends; According to the summary of said input content behind the corresponding PKI enabling decryption of encrypted of transmitting terminal sign, obtain the summary of said input content; By the said input content behind the private key enabling decryption of encrypted of receiving terminal sign correspondence, obtain deciphering back input content, import the summary that content generates deciphering back input content by the deciphering back.
Further comprise the selection module, said selection module is used to utilize mouse information hook intercepting and capturing mouse information to draw the text that speech obtains user's selection.
From technique scheme, can find out, in embodiments of the present invention, when calling in input method, intercept and capture the input content, the content-encrypt of user's input; Utilize the other user to identify and calculate the said PKI corresponding square mark; By the said public key encryption said input content corresponding to square mark; Utilize the summary of local user's the said input content of encrypted private key, local user's sign, the said input content of the summary of encrypting the said input content in back and encryption back are sent to the other user; Calculate said local user by said local user sign and identify corresponding PKI, identify the summary of said input content behind the corresponding PKI enabling decryption of encrypted, obtain the summary of said input content based on said local user; Identify the said input content behind the corresponding private key enabling decryption of encrypted by said the other user, obtain deciphering back input content, generate deciphering back input synopsis by deciphering back input content; If the summary of said input content is identical with said deciphering back input synopsis, then show said deciphering back input content; Otherwise, show the deciphering failure.Make full use of the relation one to one of the corresponding private key of corresponding PKI of ID and ID, when calling input method, encrypt the input content, thereby guarantee the safety of input content.
Description of drawings
Fig. 1 is the method flow sketch map of embodiment of the invention guarantee input content safety;
Fig. 2 is the apparatus structure sketch map of embodiment of the invention guarantee input content safety;
Fig. 3 is the sending end structure sketch map of embodiment of the invention guarantee input content safety;
Fig. 4 is the receiving terminal structural representation of embodiment of the invention guarantee input content safety;
Fig. 5 is the Organization Chart of the embodiment of the invention in plug-in unit;
Fig. 6 is that the private key of the embodiment of the invention generates sketch map;
Fig. 7 embodiment of the invention is obtained the sketch map of object ID;
The sketch map of Fig. 8 embodiment of the invention deciphering text;
Fig. 9 embodiment of the invention is applicable to the sketch map of input methods.
Embodiment
For making the object of the invention, technical scheme and advantage express clearlyer, the present invention is remake further detailed explanation below in conjunction with accompanying drawing and specific embodiment.
In embodiments of the present invention, when calling in input method, intercept and capture the input content, with the summary of input content and input content respectively by behind the other user's PKI and local user's the encrypted private key and the local user identify and be sent to the other user; Utilize the local user to identify the summary of corresponding PKI deciphering input content, utilize the other user's private key deciphering input content, and generate the summary of deciphering back content by the input content.The summary of deciphering back content is identical with the input synopsis, and then successful decryption shows the input content.Thus can, through the corresponding relation between customer ID private key and the customer ID PKI, guaranteed the safety of input content.In addition, in operating system, there is input methods, can under the situation of using different input methods, have further guaranteed the safety of input content through calling input methods identical operations system interface.
Referring to accompanying drawing 1 is the method flow sketch map that ensures the input content safety, specifically may further comprise the steps:
Step 101, intercepting and capturing input content.
Monitor the message of input hardware such as keyboard, mouse constantly.When operating system is called in input method, obtain the input content of keyboard through the input method hook.The input content also can be the text that the user selects in movable window, shear plate.Specifically utilize the mouse information hook can know that the user utilizes mouse to draw the selected text of speech.As, user can be in the WORD document, in the TXT document or in other document, utilize MouseAcross to cross the mode of drawing speech and select text to encrypt or decipher.
The interface that different input methods offers operating system is different.There is input methods in the operating system, makes full use of input methods and be connected the identical operations system interface with operating system.Input method is called at the place at input methods identical operations system interface, thereby can in different input methods, realize technical scheme of the present invention.
Step 102, encryption input content.
The local user imports the input content to the other user to be sent.Operating system utilizes being identified at of the other user to calculate the PKI corresponding to square mark in the PKI matrix.By the corresponding public key encryption input content to the other user to be sent of square mark being obtained encrypting back input content.
In the private key matrix, calculate definite private key based on ID among the present invention, calculate in the PKI matrix based on ID and confirm PKI.The private key matrix is to utilize on the finite field of having chosen and the elliptic curve parameter, and generating any certificate less than n at random is private key, selects 32*32 private key to constitute a private key matrix altogether.The PKI matrix is to utilize the private key matrix that has generated, calculates the corresponding PKI of private key of corresponding ranks coordinate.Pairing private key of ID and PKI are to concern one to one.Promptly a pairing private key of ID and the pairing PKI of same sign are to concern one to one.Utilize the content of ID private key deciphering by the ID public key encryption; Or utilize the ID PKI to decipher content by the ID encrypted private key.Private key matrix, PKI matrix, confirm that PKI and definite private key all are defineds in the CPK standard, this paper repeats no more.The private key matrix, the PKI matrix that make full use of in the present invention in the CPK standard are confirmed private key and the PKI that it is corresponding according to ID, have fully guaranteed the safety of input content.ID can be identifying user identity ID such as QQ number, email address.
The summary of step 103, encryption input content.
Utilize the summary of local user's encrypted private key input content to obtain encrypting the summary of back input content.Input content after the encryption that obtains in local user's sign, the summary of encrypting back input content and the step 102 is sent to the other user.The purpose that local user's sign is sent to the other user is; The other user can be identified to calculate in the PKI matrix and obtain the PKI that the local user identifies correspondence according to the local user, utilizes the corresponding PKI of local sign can decipher the summary by the input content of local user's encrypted private key.
Step 104, deciphering input content obtain deciphering the summary of back input content.
The other user receives local user's sign, the summary of encrypting back input content and the encryption back input content that the local user sends.Utilize the local user to be identified in the PKI matrix to calculate to obtain the local user and identify corresponding PKI, identify the summary of input content behind the corresponding PKI enabling decryption of encrypted, obtain the summary of input content by the local user.
The summary of step 105, deciphering input content.
Based on the input content behind the private key enabling decryption of encrypted of the other user's sign, obtain deciphering back input content.Generate the summary of encrypting back input content by deciphering back input content.
Whether the summary of step 106, judgement deciphering back input content equals to import the summary of content.
The summary of deciphering back input content equals the summary of input content in the step 104 in the determining step 105, and then steps performed 107; Otherwise execution in step 108.How to realize that specifically this deterministic process is a prior art, this paper repeats no more.
Step 107, demonstration input content.
Input content in the step display 105.
Step 108, deciphering failure.
The local user is sent to the other user's input contents decryption failure.
Referring to accompanying drawing 2 are the apparatus structure sketch mapes that ensure the input content safety, specifically comprise transmitting terminal and receiving terminal:
Transmitting terminal comprises control module 201, encrypting module 202 and selection module 206,
Control module 201 is used for when calling in input method, intercepts and captures said input content through the input method hook.
Encrypting module 202 comprises computing unit 2021 and ciphering unit 2022.
Computing unit 2021 is used for being identified at the PKI matrix computations according to the other side and obtains the said PKI corresponding to square mark.
Ciphering unit 2022 is used to utilize the public key encryption input content corresponding to square mark, utilizes the summary of local user's encrypted private key input content, with local user's sign, encrypt the summary of back input content and encrypt back input content and be sent to the other user.
Select module 206, utilize the mouse information hook to obtain mouse information and draw the text that user's selection intercepted and captured in speech.
Receiving terminal comprises deciphering module 203, judge module 204, display module 205 and selects module 206.
Deciphering module 203 comprises computing unit 2031 and decryption unit 2032.
Computing unit 2031 is used for being identified at the PKI matrix computations by the other user and obtains the PKI that the other user identifies correspondence;
Decrypting device 2032 is used to receive the other user's sign of the other user's transmission, the summary of encrypting back input content and encryption back input content; Identify the summary of input content behind the corresponding PKI enabling decryption of encrypted based on the other user, obtain the summary of said input content; Identify the input content behind the corresponding private key enabling decryption of encrypted by the local user, obtain deciphering back input content, generate deciphering back input synopsis by deciphering back input content.
Judge module 204 is used to judge whether the summary of said input content is identical with the summary of said deciphering back input content.
Display module 205 when the summary of said input content is identical with the summary of said deciphering back input content, is used to show that said deciphering afterwards imports content.
Select module 206, utilize the mouse information hook to obtain mouse information and draw the text that speech obtains user's selection.
Referring to accompanying drawing 3 are the structural representations that ensure the transmitting terminal of input content safety, comprise
Control module 301 is used for when calling in input method, obtains said input content through the input method hook.
Encrypting module 302, encrypting module 302 comprise computing unit 3021 and ciphering unit 3022,
Computing unit 3021 is used for being identified at the PKI matrix computations according to receiving terminal and obtains the corresponding PKI of receiving terminal sign;
Ciphering unit 3022; Be used to utilize the corresponding said input content of public key encryption of receiving terminal sign; Utilize the summary of the said input content of encrypted private key of transmitting terminal, transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back are sent to receiving terminal.
Select module 303, said selection module is used to utilize mouse information hook intercepting and capturing mouse information to draw the text that speech obtains user's selection.
Referring to accompanying drawing 4 are the structural representations that ensure the receiving terminal of input content safety, comprise
Deciphering module 401, deciphering module 401 comprise computing unit 4011 and decryption unit 4012,
Computing unit 4011 is used for being identified at the PKI matrix computations by transmitting terminal and obtains the corresponding PKI of transmitting terminal sign;
Decryption unit 4012 is used for transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back that receiving end/sending end sends; According to the summary of said input content behind the corresponding PKI enabling decryption of encrypted of transmitting terminal sign, obtain the summary of said input content; By the said input content behind the private key enabling decryption of encrypted of receiving terminal sign correspondence, obtain deciphering back input content, import the summary that content generates deciphering back input content by the deciphering back.
Judge module 402 is used to judge whether the summary of said input content is identical with the summary of said deciphering back input content.
Display module 403 when the summary of said input content is identical with the summary of said deciphering back input content, is used to show that said deciphering afterwards imports content.
Select module 404, said selection module is used to utilize mouse information hook intercepting and capturing mouse information to draw the text that speech obtains user's selection.
In order to specify technical scheme of the present invention, be elaborated in operating system, to use plug-in unit of the present invention below.
Accompanying drawing 5 is embodiment of the invention Organization Charts in plug-in unit, has in the software of ID at Office Outlook, Outlook Express, Foxmail, Web mailbox, QQ etc., can utilize overall hook to intercept and capture the input message in above-mentioned software.
Referring to accompanying drawing 6, in CPK key Core Generator, obtain the corresponding private key of self ID, the summary of input content is encrypted.Profit also can be obtained its corresponding PKI according to ID in the same way.Referring to accompanying drawing 7, ID is drawn to target window with receiving terminal, through in CPK key Core Generator, obtaining the corresponding PKI of the other side ID, the input content is encrypted.
Receiving terminal obtains the corresponding PKI of transmitting terminal ID by the ID of transmitting terminal in CPK key Core Generator; ID by receiving terminal obtains the corresponding private key of receiving terminal ID; The background process program utilizes the corresponding PKI of transmitting terminal ID that the summary of input content is deciphered, and utilizes the corresponding private key of receiving terminal ID that the input content is deciphered; Referring to accompanying drawing 8,, then show the input content at receiving terminal if the summary behind the enabling decryption of encrypted is identical with the summary of input content.
In addition,, in operating system, there is input methods,, can under the situation of using different input methods, further guarantees the safety of input content through calling input methods identical operations system interface referring to accompanying drawing 9.Like the QQ input method in the accompanying drawing 3, Google input method, search dog input method etc.
In addition, can also draw speech through mouse and decipher verification.Such operation meeting is more convenient.
The above is merely preferred embodiment of the present invention, is not to be used to limit protection scope of the present invention.All within spirit of the present invention and principle, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (23)

1. one kind ensures the method for importing content safety, it is characterized in that this method comprises:
When calling in input method, intercept and capture the input content;
Utilize the other user to identify and calculate the said PKI corresponding square mark; Identify the corresponding said input content of public key encryption by said the other user; Utilize the summary of local user's the said input content of encrypted private key, local user's sign, the said input content of the summary of encrypting the said input content in back and encryption back are sent to the other user;
Calculate said local user by said local user sign and identify corresponding PKI, identify the summary of said input content behind the corresponding PKI enabling decryption of encrypted, obtain the summary of said input content according to said local user;
Identify the said input content behind the corresponding private key enabling decryption of encrypted by said the other user, obtain deciphering back input content, generate the summary of deciphering back input content by deciphering back input content;
If the summary of said input content is identical with the summary of said deciphering back input content, then show said deciphering back input content; Otherwise, show the deciphering failure.
2. according to the method for the said guarantee input of claim 1 content safety, it is characterized in that the said input content of when calling in input method, intercepting and capturing comprises, when calling in input method, intercepts and captures said input content through the input method hook.
3. according to the method for the said guarantee of claim 1 input content safety; It is characterized in that; The said the other user's of utilization mark encryption calculates said PKI to the square mark correspondence and comprises, is identified at the PKI matrix computations according to said the other side and obtains the said PKI corresponding to square mark.
4. according to the method for the said guarantee of claim 1 input content safety; It is characterized in that; Saidly calculate said local user by said local user sign and identify corresponding PKI and comprise, be identified at the PKI matrix computations according to said local user and obtain said local user and identify corresponding PKI.
5. according to the method for the said guarantee input of claim 1 content safety, it is characterized in that said private key is to obtain at the private key matrix according to ID.
6. according to the method for the said guarantee of claim 1 input content safety, it is characterized in that when having input methods, the said input method of calling in is included in input methods identical operations system interface place and calls in said input method.
7. according to the method for the said guarantee input of claim 1 content safety, it is characterized in that said input content further comprises the text that the user selects.
8. according to the method for the said guarantee input of claim 7 content safety, it is characterized in that the text that said user selects comprises that the user utilizes mouse to draw the selected text of speech.
9. the method for said according to Claim 8 guarantee input content safety is characterized in that, saidly utilizes mouse to draw speech to comprise, utilize the mouse information hook to obtain mouse information and draw speech.
10. a device that ensures the input content safety is characterized in that this device comprises, transmitting terminal and receiving terminal,
Said transmitting terminal is used for when calling in input method, intercepts and captures the input content; Utilize the receiving terminal sign to calculate the corresponding PKI of receiving terminal sign; By the corresponding said input content of public key encryption of receiving terminal sign; Utilize the summary of the said input content of encrypted private key of transmitting terminal, transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back are sent to receiving terminal;
Said receiving terminal is used for transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back that receiving end/sending end sends; Calculate the corresponding PKI of transmitting terminal sign by the transmitting terminal sign,, obtain the summary of said input content according to the summary of said input content behind the corresponding PKI enabling decryption of encrypted of transmitting terminal sign; By the said input content behind the private key enabling decryption of encrypted of receiving terminal sign correspondence, obtain deciphering back input content, import the summary that content generates deciphering back input content by the deciphering back; Whether the summary of judging said input content is identical with the summary of said deciphering back input content; When the summary of said input content is identical with the summary of said deciphering back input content, be used to show that said deciphering afterwards imports content.
11. the device according to the said guarantee of claim 10 input content safety is characterized in that, said transmitting terminal comprises,
Control module is used for when calling in input method, intercepts and captures the input content;
Encrypting module; Be used to utilize the receiving terminal sign to calculate the corresponding PKI of receiving terminal sign; By the corresponding said input content of public key encryption of receiving terminal; Utilize the summary of the said input content of encrypted private key of transmitting terminal, transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back are sent to the other user.
12. the device according to the said guarantee of claim 10 input content safety is characterized in that, said receiving terminal comprises,
Deciphering module is used for the other user's sign, the said input content of the summary of encrypting the said input content in back and encryption back that receiving end/sending end sends; Calculate the corresponding PKI of transmitting terminal sign by the transmitting terminal sign,, obtain the summary of said input content according to the summary of said input content behind the corresponding PKI enabling decryption of encrypted of transmitting terminal sign; By the said input content behind the private key enabling decryption of encrypted of receiving terminal sign correspondence, obtain deciphering back input content, import the summary that content generates deciphering back input content by the deciphering back;
Judge module is used to judge whether the summary of said input content is identical with the summary of said deciphering back input content;
Display module when the summary of said input content is identical with the summary of said deciphering back input content, is used to show that said deciphering afterwards imports content.
13. the device according to the said guarantee input of claim 11 content safety is characterized in that said control module is further used for, and when calling in input method, intercepts and captures said input content through the input method hook.
14. the device according to the said guarantee input of claim 11 content safety is characterized in that said encrypting module comprises computing unit and ciphering unit,
Said computing unit is used for being identified at the PKI matrix computations according to receiving terminal and obtains the corresponding PKI of receiving terminal sign;
Said ciphering unit; Be used to utilize the corresponding said input content of public key encryption of receiving terminal sign; Utilize the summary of the said input content of encrypted private key of transmitting terminal, transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back are sent to receiving terminal.
15. the device according to the said guarantee input of claim 12 content safety is characterized in that said deciphering module comprises computing unit and decryption unit,
Said computing unit is used for being identified at the PKI matrix computations by transmitting terminal and obtains the corresponding PKI of transmitting terminal sign;
Said decryption unit is used for transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back that receiving end/sending end sends; According to the summary of said input content behind the corresponding PKI enabling decryption of encrypted of transmitting terminal sign, obtain the summary of said input content; By the said input content behind the private key enabling decryption of encrypted of receiving terminal sign correspondence, obtain deciphering back input content, import the summary that content generates deciphering back input content by the deciphering back.
16. the device according to claim 11 or 12 said guarantee input content safeties is characterized in that, further comprises the selection module, said selection module is used to utilize mouse information hook intercepting and capturing mouse information to draw the text that speech obtains user's selection.
17. a transmitting terminal that ensures the input content safety is characterized in that, comprises
Control module is used for when calling in input method, intercepts and captures the input content;
Encrypting module; Be used to utilize the receiving terminal sign to calculate the corresponding PKI of receiving terminal sign; By the corresponding said input content of public key encryption of receiving terminal; Utilize the summary of the said input content of encrypted private key of transmitting terminal, transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back are sent to the other user.
18. the device according to the said guarantee input of claim 17 content safety is characterized in that said control module is further used for, and when calling in input method, intercepts and captures said input content through the input method hook.
19. the device according to the said guarantee input of claim 17 content safety is characterized in that said encrypting module comprises computing unit and ciphering unit,
Said computing unit is used for being identified at the PKI matrix computations according to receiving terminal and obtains the corresponding PKI of receiving terminal sign;
Said ciphering unit; Be used to utilize the corresponding said input content of public key encryption of receiving terminal sign; Utilize the summary of the said input content of encrypted private key of transmitting terminal, transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back are sent to receiving terminal.
20. the device according to the said guarantee input of claim 17 content safety is characterized in that, further comprises the selection module, said selection module is used to utilize mouse information hook intercepting and capturing mouse information to draw the text that speech obtains user's selection.
21. a receiving terminal that ensures the input content safety is characterized in that, comprises
Deciphering module is used for the other user's sign, the said input content of the summary of encrypting the said input content in back and encryption back that receiving end/sending end sends; Calculate the corresponding PKI of transmitting terminal sign by the transmitting terminal sign,, obtain the summary of said input content according to the summary of said input content behind the corresponding PKI enabling decryption of encrypted of transmitting terminal sign; By the said input content behind the private key enabling decryption of encrypted of receiving terminal sign correspondence, obtain deciphering back input content, import the summary that content generates deciphering back input content by the deciphering back;
Judge module is used to judge whether the summary of said input content is identical with the summary of said deciphering back input content;
Display module when the summary of said input content is identical with the summary of said deciphering back input content, is used to show that said deciphering afterwards imports content.
22. the device according to the said guarantee input of claim 21 content safety is characterized in that said deciphering module comprises computing unit and decryption unit,
Said computing unit is used for being identified at the PKI matrix computations by transmitting terminal and obtains the corresponding PKI of transmitting terminal sign;
Said decryption unit is used for transmitting terminal sign, the said input content of the summary of encrypting the said input content in back and encryption back that receiving end/sending end sends; According to the summary of said input content behind the corresponding PKI enabling decryption of encrypted of transmitting terminal sign, obtain the summary of said input content; By the said input content behind the private key enabling decryption of encrypted of receiving terminal sign correspondence, obtain deciphering back input content, import the summary that content generates deciphering back input content by the deciphering back.
23. the device according to the said guarantee input of claim 21 content safety is characterized in that, further comprises the selection module, said selection module is used to utilize mouse information hook intercepting and capturing mouse information to draw the text that speech obtains user's selection.
CN201010281746.6A 2010-09-13 2010-09-13 A kind of ensure the method for input content safety, device, transmitting terminal and receiving terminal Active CN102404107B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010281746.6A CN102404107B (en) 2010-09-13 2010-09-13 A kind of ensure the method for input content safety, device, transmitting terminal and receiving terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010281746.6A CN102404107B (en) 2010-09-13 2010-09-13 A kind of ensure the method for input content safety, device, transmitting terminal and receiving terminal

Publications (2)

Publication Number Publication Date
CN102404107A true CN102404107A (en) 2012-04-04
CN102404107B CN102404107B (en) 2016-06-01

Family

ID=45885928

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010281746.6A Active CN102404107B (en) 2010-09-13 2010-09-13 A kind of ensure the method for input content safety, device, transmitting terminal and receiving terminal

Country Status (1)

Country Link
CN (1) CN102404107B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105430022A (en) * 2015-12-31 2016-03-23 宇龙计算机通信科技(深圳)有限公司 Data input control method and terminal equipment
CN106790009A (en) * 2016-12-13 2017-05-31 北京奇虎科技有限公司 Information processing method, device and mobile terminal
CN107066409A (en) * 2017-03-31 2017-08-18 福建升腾资讯有限公司 Port based on operation system redirects the method with communication data after-treatment
CN109995781A (en) * 2019-03-29 2019-07-09 腾讯科技(深圳)有限公司 Transmission method, device, medium and the equipment of data
CN110460448A (en) * 2019-08-20 2019-11-15 丹东瑞银科技有限公司 A kind of CPK file encrypting method, encryption equipment, cryptographic communication system and storage medium
CN111158924A (en) * 2019-12-02 2020-05-15 百度在线网络技术(北京)有限公司 Content sharing method and device, electronic equipment and readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101247605A (en) * 2008-03-25 2008-08-20 中兴通讯股份有限公司 Short information enciphering and endorsement method, mobile terminal and short information ciphering system
CN101334774A (en) * 2007-06-29 2008-12-31 北京搜狗科技发展有限公司 Character input method and input method system
CN101447980A (en) * 2008-12-25 2009-06-03 中国电子科技集团公司第五十四研究所 Collision-resistance method for mapping public-private key pairs by utilizing uniform user identification
CN101471776A (en) * 2007-12-29 2009-07-01 航天信息股份有限公司 Method for preventing PKG forgery signature based on user identification

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101334774A (en) * 2007-06-29 2008-12-31 北京搜狗科技发展有限公司 Character input method and input method system
CN101471776A (en) * 2007-12-29 2009-07-01 航天信息股份有限公司 Method for preventing PKG forgery signature based on user identification
CN101247605A (en) * 2008-03-25 2008-08-20 中兴通讯股份有限公司 Short information enciphering and endorsement method, mobile terminal and short information ciphering system
CN101447980A (en) * 2008-12-25 2009-06-03 中国电子科技集团公司第五十四研究所 Collision-resistance method for mapping public-private key pairs by utilizing uniform user identification

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105430022A (en) * 2015-12-31 2016-03-23 宇龙计算机通信科技(深圳)有限公司 Data input control method and terminal equipment
CN106790009A (en) * 2016-12-13 2017-05-31 北京奇虎科技有限公司 Information processing method, device and mobile terminal
CN106790009B (en) * 2016-12-13 2020-01-14 北京安云世纪科技有限公司 Information processing method and device and mobile terminal
CN107066409A (en) * 2017-03-31 2017-08-18 福建升腾资讯有限公司 Port based on operation system redirects the method with communication data after-treatment
CN109995781A (en) * 2019-03-29 2019-07-09 腾讯科技(深圳)有限公司 Transmission method, device, medium and the equipment of data
CN109995781B (en) * 2019-03-29 2021-06-22 腾讯科技(深圳)有限公司 Data transmission method, device, medium and equipment
CN110460448A (en) * 2019-08-20 2019-11-15 丹东瑞银科技有限公司 A kind of CPK file encrypting method, encryption equipment, cryptographic communication system and storage medium
CN111158924A (en) * 2019-12-02 2020-05-15 百度在线网络技术(北京)有限公司 Content sharing method and device, electronic equipment and readable storage medium
CN111158924B (en) * 2019-12-02 2023-09-22 百度在线网络技术(北京)有限公司 Content sharing method and device, electronic equipment and readable storage medium

Also Published As

Publication number Publication date
CN102404107B (en) 2016-06-01

Similar Documents

Publication Publication Date Title
CN106656476B (en) Password protection method and device and computer readable storage medium
CN102170357B (en) Combined secret key dynamic security management system
CN101510888B (en) Method, device and system for improving data security for SaaS application
CN101720071B (en) Short message two-stage encryption transmission and secure storage method based on safety SIM card
CN110100422B (en) Data writing method and device based on block chain intelligent contract and storage medium
WO2016045469A1 (en) Information encryption method and mobile terminal
CN107465689A (en) The key management system and method for virtual credible platform module under cloud environment
CN102833244B (en) Communication method for authentication by fingerprint information
JP2015130633A (en) authentication system
CN103546421A (en) Network work communication security and secrecy system on basis of PKI (public key infrastructure) technology and method for implementing network work communication security and secrecy system
CN102664898A (en) Fingerprint identification-based encrypted transmission method, fingerprint identification-based encrypted transmission device and fingerprint identification-based encrypted transmission system
CN104253694A (en) Encrypting method for network data transmission
CN102404107B (en) A kind of ensure the method for input content safety, device, transmitting terminal and receiving terminal
CN109412812A (en) Data safe processing system, method, apparatus and storage medium
CA3178180A1 (en) Constructing a distributed ledger transaction on a cold hardware wallet
CN102055685B (en) Method for encrypting webmail information
CN104202163A (en) Password system based on mobile terminal
CN103701596A (en) Document access method, system and equipment and document access request response method, system and equipment
CN102271333A (en) Safe receiving and dispatching method for 3G (3rd Generation) message on basis of trusted chain transmission
CN103905188A (en) Method for generating dynamic password through intelligent secret key device, and intelligent secret key device
CN103580868A (en) Secure transmission method of electronic official document secure transmission system
CN104486087A (en) Digital signature method based on remote hardware security modules
CN106605419A (en) Method and system for secure SMS communications
CN109005027A (en) A kind of random data encryption and decryption method, apparatus and system
CN102404337A (en) Data encryption method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant