CN103997730A - Method for decrypting, copying and pasting encrypted data - Google Patents

Method for decrypting, copying and pasting encrypted data Download PDF

Info

Publication number
CN103997730A
CN103997730A CN201410170004.4A CN201410170004A CN103997730A CN 103997730 A CN103997730 A CN 103997730A CN 201410170004 A CN201410170004 A CN 201410170004A CN 103997730 A CN103997730 A CN 103997730A
Authority
CN
China
Prior art keywords
customer end
service customer
service
deciphering
identifying code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410170004.4A
Other languages
Chinese (zh)
Inventor
邹海涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changsha Meng Ma Softcom Ltd
Original Assignee
Changsha Meng Ma Softcom Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changsha Meng Ma Softcom Ltd filed Critical Changsha Meng Ma Softcom Ltd
Priority to CN201410170004.4A priority Critical patent/CN103997730A/en
Publication of CN103997730A publication Critical patent/CN103997730A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses a method for decrypting, copying and pasting encrypted data. The method comprises the following steps: a service client is entered; the service client requests a service system to issue an encrypted authentication code; the service system issues a cipher text authentication code; the service client monitors and acquires the cipher text authentication code; the service client calls an SE decrypted cipher text; an SE returns plaintext information to the service client; and the service client pastes the plaintext information. According to the method of the invention, the safety element or other external equipment is adopted to perform authentication code decryption and automatic copying and pasting, which brings convenience to operation by users and improves the safety and convenience of transaction authentication.

Description

A kind of deciphering of enciphered data copies method of attaching
Technical field
The present invention relates to field of communication security, particularly a kind of deciphering of enciphered data copies method of attaching.
Background technology
Patent of invention (application number 201110378650.6) provides a kind of cloud to copy method of attaching, comprise cloud clone method and cloud method of attaching, described cloud clone method, comprise the following steps: client is obtained user ID and reproducting content, and described user ID and reproducting content are sent to server; Described server receives described user ID and reproducting content, by described user ID and reproducting content corresponding stored.Described cloud method of attaching, comprises the following steps: client is obtained user ID and paste operation; Described client sends the stickup request that comprises described user ID to server according to described paste operation; Described server is according to the described stickup acquisition request reproducting content corresponding with described user ID, and described reproducting content is handed down to described client.Above-mentioned cloud copies with cloud method of attaching and has avoided frequent input validation code, has improved the convenience of user's operation.But provide convenience to illegitimate client, in the unwitting situation of user, server can be intercepted and captured short message content, and unauthorized theft user's fund or sensitivity have valency information.
Summary of the invention
Technical problem to be solved by this invention is, for prior art deficiency, provides a kind of deciphering of enciphered data to copy method of attaching, when user's operation ease is provided, improves the fail safe of short message content.
For solving the problems of the technologies described above, the technical solution adopted in the present invention is: a kind of deciphering of enciphered data copies method of attaching, and the main implementation procedure of the method is as follows: encrypt data is monitored and obtained to service customer end; Service customer end calls SE decrypting ciphertext; SE decrypting ciphertext; SE returns to cleartext information to service customer end; Service customer end is pasted cleartext information.
Service customer end proceeds as follows: enter service customer end before monitoring and obtaining encrypt data; Service customer end requested service system issues the identifying code of encryption; Operation system issues ciphertext identifying code.
Service customer end is pasted after cleartext information, automatically performs follow-up business.
The present invention also provides a kind of deciphering of enciphered data to copy affixing system, comprising:
Service customer end: issue the identifying code of encryption for requested service system, monitor and obtain encrypt data, call SE decrypting ciphertext, and paste the cleartext information after SE deciphering;
SE: for decrypting ciphertext; For returning to cleartext information to service customer end.
Operation system: for issuing the identifying code of encryption.
Compared with prior art, the beneficial effect that the present invention has is: the present invention uses safety element SE or other external equipment, carry out the deciphering of short message content and automatically copy stickup, when user's operation ease is provided, improved the fail safe of short message content.
SE is the safety chip with hard encryption and decryption functions, may reside in recipient's identification module (SIM card), also may reside in SD card, also may reside in mobile phone terminal inside.
Brief description of the drawings
Fig. 1 is one embodiment of the invention method flow diagram;
Fig. 2 is the system configuration of one embodiment of the invention;
Fig. 3 is the flow chart that the inventive method is used at application scenarios.
Embodiment
As shown in Figure 1, symmetry or unsymmetrical key are set between operation system of the present invention and SE, for the encryption and decryption operation of cipher-text information, idiographic flow is as follows:
1. user enters service customer end and carries out related service operation;
2. if any short-message verification business, service customer end requested service system issues the short-message verification code of encryption;
3. operation system issues ciphertext short-message verification code;
4. mobile phone receives note and puts into note case;
5. ciphertext note is monitored and obtained to service customer end;
6. service customer end calls SE decrypting ciphertext;
7. SE returns expressly to service customer end;
8. service customer end is pasted cleartext information in frame to be entered;
9. service customer end carries out subsequent operation automatically.
As shown in Figure 2, service customer end must increase a module---SE communication module to the system configuration of one embodiment of the invention, in SE, must increase a module---decrypted program.Service customer end sends identifying code decoding request to the decrypted program of SE, decrypted program extracts decruption key, by the algorithm consulting with operation system, identifying code is decrypted, then return to decrypted result to background communication module and UI module to SE communication module, decrypted result is sent to operation system verification by background communication module, and UI module shows the plaintext after deciphering.
With the Fetion client on SE, mobile phone on mobile phone log on as example describe application scenarios, the flow chart of scene as shown in Figure 3:
1. user enters mobile phone Fetion client;
2. user clicks login " button ";
3. client is to Fetion operation system request short-message verification code (can be also the identifying code of client side HTTP mode, lower same) herein;
4. Fetion operation system generates short-message verification code, and is encrypted with 3DES algorithm (also can use other symmetric key algorithm at this, as aes algorithm);
5. Fetion operation system issues ciphertext short-message verification code;
6. mobile phone receives note and puts into note case; Ciphertext note is monitored and obtained to Fetion client simultaneously;
7. Fetion client is initiated request by the API of SE to SE, with decrypting ciphertext;
8. SE is decrypted ciphertext with 3DES algorithm (also can use other symmetric key algorithm at this, as aes algorithm, corresponding with cryptographic algorithm);
9. SE returns expressly to Fetion client;
10. Fetion client pastes cleartext information in frame to be entered;
11. Fetion clients send logging request from trend operation system at demonstration cleartext information in a flash, carry this identifying code in this request;
12. these identifying codes of operation system verification;
13. operation systems are returned to login response (after verification succeeds, normally login) to client.
Note:
In a, SE, must increase by an application program, to realize the deciphering of identifying code, and deposit decruption key;
B, implement process in, need user on cell-phone customer terminal, from operation system, to download key to SE so that operation system is carried out the encryption of identifying code with this key, and SE carries out the deciphering of identifying code with this key.

Claims (5)

1. the deciphering of enciphered data copies a method of attaching, it is characterized in that, the main implementation procedure of the method is as follows: encrypt data is monitored and obtained to service customer end; Service customer end calls SE decrypting ciphertext; SE decrypting ciphertext; SE returns to cleartext information to service customer end; Service customer end is pasted cleartext information.
2. the deciphering of enciphered data according to claim 1 copies method of attaching, it is characterized in that, service customer end proceeds as follows: enter service customer end before monitoring and obtaining encrypt data; Service customer end requested service system issues the identifying code of encryption.
3. the deciphering of enciphered data according to claim 2 copies method of attaching, it is characterized in that, service customer end is after requested service system issues the identifying code of encryption, and operation system issues ciphertext identifying code.
4. the deciphering of enciphered data according to claim 1 copies method of attaching, it is characterized in that, service customer end is pasted after cleartext information, automatically performs follow-up business.
5. the deciphering of enciphered data copies an affixing system, it is characterized in that, comprising:
Service customer end: issue the identifying code of encryption for requested service system, monitor and obtain encrypt data, call SE decrypting ciphertext, and paste the cleartext information after SE deciphering;
SE: for decrypting ciphertext; For returning to cleartext information to service customer end;
Operation system: for issuing the identifying code of encryption.
CN201410170004.4A 2014-04-25 2014-04-25 Method for decrypting, copying and pasting encrypted data Pending CN103997730A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410170004.4A CN103997730A (en) 2014-04-25 2014-04-25 Method for decrypting, copying and pasting encrypted data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410170004.4A CN103997730A (en) 2014-04-25 2014-04-25 Method for decrypting, copying and pasting encrypted data

Publications (1)

Publication Number Publication Date
CN103997730A true CN103997730A (en) 2014-08-20

Family

ID=51311707

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410170004.4A Pending CN103997730A (en) 2014-04-25 2014-04-25 Method for decrypting, copying and pasting encrypted data

Country Status (1)

Country Link
CN (1) CN103997730A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105227556A (en) * 2015-10-10 2016-01-06 罗子聪 Server and terminal anti-counterfeit authentication method, system
CN108599944A (en) * 2018-05-04 2018-09-28 贵州大学 A kind of identifying code short message transparent encryption method based on handset identities
CN109343980A (en) * 2018-09-29 2019-02-15 广州视源电子科技股份有限公司 Cloud copy/paste method, apparatus, system and equipment and storage medium
CN109547398A (en) * 2017-09-22 2019-03-29 中国联合网络通信集团有限公司 Authentication method and device based on smart card and terminal applies

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105227556A (en) * 2015-10-10 2016-01-06 罗子聪 Server and terminal anti-counterfeit authentication method, system
CN109547398A (en) * 2017-09-22 2019-03-29 中国联合网络通信集团有限公司 Authentication method and device based on smart card and terminal applies
CN108599944A (en) * 2018-05-04 2018-09-28 贵州大学 A kind of identifying code short message transparent encryption method based on handset identities
CN109343980A (en) * 2018-09-29 2019-02-15 广州视源电子科技股份有限公司 Cloud copy/paste method, apparatus, system and equipment and storage medium
CN109343980B (en) * 2018-09-29 2020-12-22 广州视源电子科技股份有限公司 Cloud copying and cloud pasting method, device, system, equipment and storage medium

Similar Documents

Publication Publication Date Title
KR102364874B1 (en) Method and apparatus for facilitating electronic payments using a wearable device
US20220327528A1 (en) Facilitating a fund transfer between user accounts
US9137223B2 (en) Apparatus and method for transmitting data, and recording medium storing program for executing method of the same in computer
CA2861221C (en) Secure peer discovery and authentication using a shared secret
EP4287151A2 (en) Contactless card personal identification system
US20110159848A1 (en) Methods and apparatus for provisioning devices with secrets
EP2657871A2 (en) Secure configuration of mobile application
CN105634737B (en) Data transmission method, terminal and system
CN102761870B (en) Terminal authentication and service authentication method, system and terminal
CN104065621A (en) Identify verification method for third-party service, client and system
US9686251B2 (en) Devices and techniques for controlling disclosure of sensitive information
CN112823503B (en) Data access method, data access device and mobile terminal
WO2017063517A1 (en) Near field communication establishing method and device
WO2015109949A1 (en) Network security method and network security system
CN111178884A (en) Information processing method, device, equipment and readable storage medium
CN111131416A (en) Business service providing method and device, storage medium and electronic device
CN114450990A (en) Multi-factor authentication for providing credentials for secure messages via contactless cards
CN106685897B (en) Safe input method, device and system
CN103997730A (en) Method for decrypting, copying and pasting encrypted data
KR20190111006A (en) Authentication server, authentication system and method
WO2017080355A1 (en) Method for confirming on-line transaction security by means of mobile phone and system thereof
CN103916834A (en) Short message encryption method and system allowing user to have exclusive secret key
CN108701200B (en) Improved memory system
CN105678542B (en) payment service interaction method, payment terminal and payment cloud terminal
CN108513272B (en) Short message processing method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20140820

RJ01 Rejection of invention patent application after publication