CN106034122A - Information processing method, electronic equipment and server - Google Patents
Information processing method, electronic equipment and server Download PDFInfo
- Publication number
- CN106034122A CN106034122A CN201510115313.6A CN201510115313A CN106034122A CN 106034122 A CN106034122 A CN 106034122A CN 201510115313 A CN201510115313 A CN 201510115313A CN 106034122 A CN106034122 A CN 106034122A
- Authority
- CN
- China
- Prior art keywords
- random number
- server
- eigenvalue
- pki
- electronic equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses an information processing method, electronic equipment and a server. The method comprises the following steps of when a condition that a program according with a predetermined condition is operated is detected, acquiring user identification information input by a user; generating a characteristic value; based on the user identification information and the characteristic value, generating a secret key pair, wherein the secret key pair includes a public key and a private key; and sending the user identification information, the characteristic value and the public key to the server, wherein the server takes the user identification information, the characteristic value and the public key as registration data of the user and stores in the server after receiving the user identification information, the characteristic value and the public key.
Description
Technical field
The present invention relates to electronic technology field, particularly to a kind of information processing method, electronic equipment and service
Device.
Background technology
Along with developing rapidly of electronic technology, also emerge in an endless stream in website that is various abundant and that be convenient for people to live,
The websites such as similar chat, shopping, mailbox have become as a lot of people and lie fallow every day, make friends, do shopping that musted can not
Few instrument.When using these websites, user manages user data for convenience, can be obtained by registration
Username and password, and then these internet sites are logged in and personal information management, and preserve user
Some data, including friend information, photograph album, even bank card information.
But, inventor is in realizing the embodiment of the present application during inventive technique scheme, in discovery in application
At least there is following technical problem in technology of stating:
In prior art, username and password is saved in the server end of website, when user logs in, Yong Hutong
Cross checking username and password and carry out website logins, owing to Website server is vulnerable to attack, if by user
Name and password are saved in server end, and user profile can be caused to reveal, and cause the user is lost.Visible, existing
Having in technology and exist, the safety being preserved username and password by web site server end is low, easily causes use
The technical problem of family information leakage.
Summary of the invention
The embodiment of the present invention provides a kind of information processing method, electronic equipment and server, is used for solving existing
Present in technology, the safety being preserved username and password by web site server end is low, easily causes use
The technical problem of family information leakage.
On the one hand, the embodiment of the present application provides a kind of information processing method, is applied in electronic equipment, described
Method includes:
Detect when the program conformed to a predetermined condition is run, obtain the user totem information of user's input;
Generate an eigenvalue;
Based on described user totem information and described eigenvalue, generate secret key pair, wherein, described secret key pair bag
Include PKI and private key;
Described user totem information, described eigenvalue and described PKI are sent to server, wherein, described
Described user, after receiving described user totem information, described eigenvalue and described PKI, is marked by server
Knowledge information, described eigenvalue and described PKI are saved in described server as the log-on data of described user
In.
Optionally, by described user totem information, described eigenvalue and described PKI send to server it
After, described method also includes:
Sending a certification request to described server, described certification request includes described user totem information;
Receiving the first random number that described server returns, described first random number is that described server is according to institute
State PKI and the second random number is encrypted the random number of acquisition;
According to described private key, described first random number is decrypted, it is thus achieved that the 3rd random number;
Sending described 3rd random number to described server, wherein, described server receives the described 3rd
After random number, if described 3rd random number is identical with described second random number, then testing by described server
Card.
Optionally, described, described user totem information, described eigenvalue and described PKI are sent to service
After device, described method also includes:
Delete the private key in described eigenvalue and described unsymmetrical key.
Optionally, described according to described private key, described first random number is decrypted, it is thus achieved that the 3rd random number,
Specifically include:
Generate method according to described user totem information, described eigenvalue and the first key, regenerate described
Secret key pair, wherein, it is that described electronic equipment uses in the registration process of website that described first key generates method
Secret key pair generate method;
According to the private key in described secret key pair, described first random number is decrypted, it is thus achieved that described 3rd random
Number.
Optionally, being sent after described server by described 3rd random number described, described method is also wrapped
Include:
Receive the certification request results that described server returns;
When described certification request results shows described user by the checking of described server, generate the 4th with
Machine number, is encrypted described 4th random number according to described private key, it is thus achieved that the 5th random number;By described
Five randoms number send to described server;
Receive the 6th random number that described server returns, if described 4th random number and described 6th random number
Identical, then be verified, wherein, described 6th random number be described server according to described PKI to described
5th random number is decrypted the random number of acquisition.
On the other hand, the embodiment of the present application also provides for a kind of information processing method, is applied in server, institute
The method of stating includes:
Receive one electronic equipment send user totem information, the PKI in eigenvalue and secret key pair, wherein,
Described user totem information is user's identification information in a website register interface input, and described eigenvalue is institute
Stating one group of random number that electronic equipment generates, described secret key pair is that described electronic equipment is based on described ID
The key that information and described eigenvalue generate;
Using described user totem information, described eigenvalue and described PKI as the log-on data of described user,
And described log-on data is saved in described server.
Optionally, described using described user totem information, described eigenvalue and described PKI as described use
The log-on data at family, and after described log-on data being saved in described server, described method also includes:
Receiving the certification request that described electronic equipment sends, described certification request includes that described ID is believed
Breath;
Generate the first random number, according to described PKI, described first random number be encrypted, it is thus achieved that second with
Machine number, sends described second random number to described electronic equipment;
Receiving the 3rd random number that described electronic equipment returns, described 3rd random number is described electronic equipment root
According to the private key in described secret key pair, described second random number is decrypted the random number of acquisition;
If described 3rd random number is identical with described first random number, then by the checking of described server.
On the other hand, also a kind of electronic equipment of the embodiment of the present application, described electronic equipment includes:
User totem information acquiring unit, during for detecting that the program conformed to a predetermined condition is run, obtains and uses
The user totem information of family input;
Eigenvalue signal generating unit, for generating an eigenvalue;
Secret key pair signal generating unit, for based on described user totem information and described eigenvalue, generates secret key pair,
Wherein, described secret key pair includes PKI and private key;
Log-on data transmitting element, for sending out described user totem information, described eigenvalue and described PKI
Delivering to server, wherein, described server is receiving described user totem information, described eigenvalue and institute
After stating PKI, using described user totem information, described eigenvalue and described PKI as the registration of described user
Data are saved in described server.
Optionally, described electronic equipment also includes:
Certification request transmitting unit, for by described user totem information, described eigenvalue and described PKI
Sending after server, send a certification request to described server, described certification request includes described
User totem information;
First random number receives unit, for receiving the first random number that described server returns, and described first
Random number is the random number that described server is encrypted acquisition according to described PKI to the second random number;
First random nnrber decryption unit, for being decrypted described first random number according to described private key, obtains
Obtain the 3rd random number;
3rd random number transmitting element, for described 3rd random number is sent to described server, wherein,
After described server receives described 3rd random number, if described 3rd random number and described second random number phase
With, then by the checking of described server.
Optionally, described electronic equipment also includes:
Delete unit, for described user totem information, described eigenvalue and described PKI being sent described
After server, delete the private key in described eigenvalue and described unsymmetrical key.
Optionally, described first random nnrber decryption unit specifically includes:
Secret key pair generates subelement, for according to described user totem information, described eigenvalue and the first key
Generation method, regenerates described secret key pair, and wherein, it is that described electronics sets that described first key generates method
The standby secret key pair used in the registration process of website generates method;
First random nnrber decryption subelement, is used for according to the private key in described secret key pair described first random number
It is decrypted, it is thus achieved that described 3rd random number.
Optionally, described electronic equipment also includes:
Certification request results receives unit, for sending described 3rd random number to described server described
Afterwards, the certification request results that described server returns is received;
In described certification request results, 4th random number process unit, for showing that described user is by described clothes
Business device checking time, generate the 4th random number, according to described private key, described 4th random number is encrypted,
Obtain the 5th random number;Described 5th random number is sent to described server;
6th random number process unit, for receiving the 6th random number that described server returns, if described the
Four randoms number are identical with described 6th random number, then be verified, and wherein, described 6th random number is described
Server is decrypted the random number of acquisition according to described PKI to described 5th random number.
On the other hand, the embodiment of the present application also provides for a kind of server, and described server includes:
Log-on data receive unit, for receive one electronic equipment send user totem information, eigenvalue and
PKI in secret key pair, wherein, described user totem information is user's mark in a website register interface input
Knowledge information, described eigenvalue is one group of random number that described electronic equipment generates, and described secret key pair is described electricity
The key that subset generates based on described user totem information and described eigenvalue;
Log-on data memory element, for making described user totem information, described eigenvalue and described PKI
For the log-on data of described user, and described log-on data is saved in described server.
Optionally, described server also includes:
Certification request reception unit, for described by described user totem information, described eigenvalue and described
PKI is as the log-on data of described user, and after described log-on data is saved in described server,
Receiving the certification request that described electronic equipment sends, described certification request includes described user totem information;
First random number process unit, for generate the first random number, according to described PKI to described first with
Machine number is encrypted, it is thus achieved that the second random number, sends described second random number to described electronic equipment;
3rd random number process unit, for receiving the 3rd random number that described electronic equipment returns, described the
Three randoms number are that described second random number is solved by described electronic equipment according to the private key in described secret key pair
The random number of close acquisition;
Authentication ' unit, if identical with described first random number for described 3rd random number, then by described clothes
The checking of business device.
Said one in the embodiment of the present application or multiple technical scheme, at least have one or more skills following
Art effect:
1, in the scheme of the embodiment of the present application, during by registering in website, based on user totem information and spy
Value indicative generates secret key pair, then, using user totem information, eigenvalue and PKI as the log-on data of user
Send to server and preserve, it is to avoid prior art uses the username and password to enter as log-on data
Row preserves, even if user totem information, eigenvalue and PKI are lost, the information of user also will not be revealed, enter
And alleviate present in prior art, the safety of username and password is preserved by web site server end
Low, easily cause the technical problem that user profile is revealed, improve the safety of user profile.
2, in the scheme of the embodiment of the present application, user is when logging in website, and website is by utilizing public key encryption
Random number user is verified, only website could be conducted interviews log in by the user of checking, enter
And ensure the safety of user profile.
3, in the scheme of the embodiment of the present application, user when logging in website, can by private key encrypt with
After website is verified by machine number, and only website is by checking, user just can log in visit to website
Ask, user is by verifying the current website logged in, it is to avoid user logs in some fake sites, makes
Become loss.
Accompanying drawing explanation
Fig. 1 is the flow chart of information processing method in the embodiment of the present application one;
Fig. 2 is the information interaction figure of client enrollment method in the embodiment of the present application one;
Fig. 3 is the information interaction figure that in the embodiment of the present application one, server and client carry out bi-directional verification;
Fig. 4 is the information interaction figure of another verification method in the embodiment of the present application one;
Fig. 5 is the block diagram of electronic equipment in the embodiment of the present application two;
Fig. 6 is the block diagram of server in the embodiment of the present application two.
Detailed description of the invention
In the technical scheme that the embodiment of the present application provides, carry out bi-directional verification by client and website, and,
Server end the most directly preserves the password of user, and then avoids website under attack, causes user profile to be revealed
Situation, meanwhile, client is before logging in, and the current website logged in is verified by client,;Enter
And prevent user from logging in fake site.
The terms "and/or", a kind of incidence relation describing affiliated partner, expression can be deposited
In three kinds of relations, such as, A and/or B, can represent: individualism A, there is A and B simultaneously, single
Solely there is B these three situation.It addition, character "/" herein, typically represent forward-backward correlation to as if one
The relation of "or".
Below in conjunction with the accompanying drawings the embodiment of the present application technical scheme main is realized principle, detailed description of the invention and
The beneficial effect that should be able to reach is explained in detail by it.
Embodiment one
The embodiment of the present application provides a kind of information processing method, is applied in electronic equipment, and electronic equipment is permissible
For the subscriber equipment such as smart mobile phone, panel computer, as it is shown in figure 1, described method includes:
S10: detect when the program conformed to a predetermined condition is run, obtain the user totem information of user's input.
Wherein, detect that the program conformed to a predetermined condition is run specifically, open a Internet on electronic equipment
The login link of website, now, electronic equipment obtains the user totem information of user's input, and ID is believed
Breath sets for user, can be name, mailbox or phone etc..
It follows that electronic equipment performs S20: generate an eigenvalue.
In specific implementation process, eigenvalue is can be a string random number, and eigenvalue can also enter for user
The system time of client during row registration operation.
For random number, generate secret key pair required for random number should defeated from authorized randomizer
Go out to obtain, i.e. the output of authorized randomizer can be used for obtaining one and generates unsymmetrical key pair
Required random number.
It follows that electronic equipment carries out step S30: based on described user totem information and described eigenvalue,
Generating secret key pair, wherein, described secret key pair includes PKI and private key.
In specific implementation process, common rivest, shamir, adelman has RSA cryptographic algorithms, ECC (Elliptic
Curves Cryptography, elliptic curve cipher coding theory) AES etc..Rising of its key schedule
Initial point can regard a bigger numeral as, such as: ECC uses the big number of 256Bit, and RSA makes
With the big number of 2048Bit.In the embodiment of the present application, by using user name and eigenvalue to generate at key
Big number required in generating algorithm.
Such as: as a example by RSA 1024, eigenvalue N can use user to carry out client during registration operation
System time, user name M can be set by the user, and counts greatly BigNum=SHA512 (N+M);Wherein
Symbol "+" represent the implication that character string connects.Now, BigNum is the big number of a 512bit, root
Use of numerals prime number screening method generates two 512ibt prime P, Q accordingly, and then just can generate RSA's
PKI and private key.
It follows that electronic equipment enters step S40: by described user totem information, described eigenvalue and institute
Stating PKI to send to server, wherein, described server is receiving described user totem information, described spy
After value indicative and described PKI, using described user totem information, described eigenvalue and described PKI as described use
The log-on data at family is saved in described server.
In the embodiment of the present application, user name, eigenvalue and PKI are sent by electronic equipment as log-on data
To server, and in prior art, username and password is sent to service by electronic equipment as log-on data
Device preserves, and once username and password is lost, and just very likely results in user profile and reveals, and this Shen
Please be in embodiment, even if user name, eigenvalue and PKI are lost, owing to registering the client of use except user
Outward, other client cannot obtain the private key used when user registers, and private key just cannot be used to verify
And log in website, and then ensure that the safety of user profile.
It follows that the user registering method based on asymmetric encryption techniques in the embodiment of the present application is entered
One step explanation, as in figure 2 it is shown, comprise the following steps.
S201, client sends a registration request.
S202, server end, after receiving the registration request that client sends, returns enrollment page.
S203, obtains user and inputs user name according to the prompting of enrollment page, i.e. use in the embodiment of the present application
Family identification information.
S204, generates eigenvalue N.
S205, generates secret key pair, including PKI D and private key K according to user name and eigenvalue N.
S206, sends user name, eigenvalue N and PKI D to server.
S207, server preserves user name, eigenvalue N and PKI D.
S208, server returns the information that succeeds in registration.
S209, client preserves user name and website URL.
So far, client completes the registration of this website.
In the above-mentioned methods, private key K can be preserved in the client after having registered by website, and user
Use when again logging in website, but in being embodied as, in order to improve safety further, in step S209
Afterwards, described method also includes step S210, and client deletes eigenvalue N and private key K.
It follows that by Fig. 3 to bi-directional verification side between client and server end in the embodiment of the present application
Method illustrates.
First, client is authenticated by server, comprises the following steps.
S301, user end to server sends a certification request, and described certification request includes that described user marks
Knowledge information.
S302, server, after receiving the certification request that client sends, generates a random number S.
S303, random number S is encrypted by server by utilizing PKI D, obtains S '.
S304, S ' is sent to client by server.
S305, utilizes private key K to be decrypted S ', it is thus achieved that S.
S306, S is sent to server by client.
S307, S is verified by server, if S is verified, then client testing by server
Card.
S308, return authentication successful information.
It follows that website is verified by client, comprise the following steps.
S309, generates random number M, utilizes private key K to be encrypted M, it is thus achieved that M '.
S310, M ' is sent to server by client;
M ' is decrypted by S311, server by utilizing PKI D, it is thus achieved that M.
S312, M is sent to client by server.
S313, M is verified by client, if M is verified, then server is by checking.
S314, client returns and is proved to be successful information.
S315, server returns and logs in successfully interface.
So far, client and server completes bi-directional verification by asymmetric key.
Visible, in the embodiment of the present application, by using rivest, shamir, adelman, carry out client and website
Bi-directional verification, and, server end need not directly preserve the password of user, and then avoids website under attack,
Causing the situation that user profile is revealed, meanwhile, the current website logged in, before logging in, is carried out by client
Checking, prevents user from logging in fake site.
In the embodiment of the present application, in order to improve the safety that user logs in further, if client is in registration
Eigenvalue N and private key K is deleted, then when client is verified by server, such as Fig. 4 after completing
Shown in, may include steps of.
S401, user end to server sends a certification request, and described certification request includes that described user marks
Knowledge information.
S402, server, after receiving the certification request that client sends, generates a random number S.
S403, random number S is encrypted according to PKI D, obtains S ' by server.
S404, eigenvalue N and S ' is sent to client by server.
S405, client regenerates private key K according to user name and eigenvalue N.
S406, S ' is decrypted by client according to private key K, it is thus achieved that S.
S407, S is sent to server by client.
S408, S is verified by server, if S is verified, then client testing by server
Card.
S409, return authentication successful information.
In the embodiment of the present application, private key K can be deleted after succeeding in registration, and when needs use, weight
Newly-generated private key K.Common rivest, shamir, adelman has RSA cryptographic algorithms, ECC (Elliptic Curves
Cryptography, elliptic curve cipher coding theory) AES etc..The starting point of its key schedule is all
A bigger numeral can be regarded as, such as: ECC uses the big number of 256Bit, and RSA uses 2048Bit
Big number.In the embodiment of the present application, by using user name and eigenvalue to generate in key schedule
Required big number.Owing to, in specific implementation process, meeting RSA, ECC key schedule at big number
Condition, the rule that key generates has multiple, and by Client Design multiple key generating mode,
The verification method in the embodiment of the present application can be made safer.
Such as: as a example by RSA 1024, eigenvalue N can use user to carry out client during registration operation
System time, user name M can be set by the user, and counts greatly BigNum=SHA512 (N+M);Wherein
Symbol "+" represent the implication that character string connects.Here, it is possible to use SHA1, SHA256 etc. its
His hash algorithm, and, N with M can be more than simply being connected, and can be
(N+M+N^M+N+M) other modes such as.
Although it should be noted that generate key mode have a variety of, but as long as according to identical user name,
Eigenvalue N and key generating mode, client just can generate identical with registration process in landfall process
Private key, and then allow users to log in.
Embodiment two
Based on same inventive concept, the embodiment of the present application also provides for a kind of electronic equipment, as it is shown in figure 5, institute
State electronic equipment to include:
User totem information acquiring unit 50, during for detecting that the program conformed to a predetermined condition is run, obtains
The user totem information of user's input;
Eigenvalue signal generating unit 51, for generating an eigenvalue;
Secret key pair signal generating unit 52, for based on described user totem information and described eigenvalue, generates key
Right, wherein, described secret key pair includes PKI and private key;
Log-on data transmitting element 53, for by described user totem information, described eigenvalue and described PKI
Send to server, wherein, described server receive described user totem information, described eigenvalue and
After described PKI, using described user totem information, described eigenvalue and described PKI as the note of described user
Volumes is according to being saved in described server.
Optionally, described electronic equipment also includes:
Certification request transmitting unit, for by described user totem information, described eigenvalue and described PKI
Sending after server, send a certification request to described server, described certification request includes described
User totem information;
First random number receives unit, for receiving the first random number that described server returns, and described first
Random number is the random number that described server is encrypted acquisition according to described PKI to the second random number;
First random nnrber decryption unit, for being decrypted described first random number according to described private key, obtains
Obtain the 3rd random number;
3rd random number transmitting element, for described 3rd random number is sent to described server, wherein,
After described server receives described 3rd random number, if described 3rd random number and described second random number phase
With, then by the checking of described server.
Optionally, described electronic equipment also includes:
Delete unit, for described user totem information, described eigenvalue and described PKI being sent described
After server, delete the private key in described eigenvalue and described unsymmetrical key.
Optionally, described first random nnrber decryption unit specifically includes:
Secret key pair generates subelement, for according to described user totem information, described eigenvalue and the first key
Generation method, regenerates described secret key pair, and wherein, it is that described electronics sets that described first key generates method
The standby secret key pair used in the registration process of website generates method;
First random nnrber decryption subelement, is used for according to the private key in described secret key pair described first random number
It is decrypted, it is thus achieved that described 3rd random number.
Optionally, described electronic equipment also includes:
Certification request results receives unit, for sending described 3rd random number to described server described
Afterwards, the certification request results that described server returns is received;
In described certification request results, 4th random number process unit, for showing that described user is by described clothes
Business device checking time, generate the 4th random number, according to described private key, described 4th random number is encrypted,
Obtain the 5th random number;Described 5th random number is sent to described server;
6th random number process unit, for receiving the 6th random number that described server returns, if described the
Four randoms number are identical with described 6th random number, then be verified, and wherein, described 6th random number is described
Server is decrypted the random number of acquisition according to described PKI to described 5th random number.
Based on same inventive concept, the embodiment of the present application also provides for a kind of server, as shown in Figure 6, described
Server includes:
Log-on data receives unit 60, for receiving the user totem information that an electronic equipment sends, eigenvalue
With the PKI in secret key pair, wherein, described user totem information is that user is in a website register interface input
Identification information, described eigenvalue is one group of random number that described electronic equipment generates, and described secret key pair is described
The key that electronic equipment generates based on described user totem information and described eigenvalue;
Log-on data memory element 61, for by described user totem information, described eigenvalue and described PKI
As the log-on data of described user, and described log-on data is saved in described server.
Optionally, described server also includes:
Certification request reception unit, for described by described user totem information, described eigenvalue and described
PKI is as the log-on data of described user, and after described log-on data is saved in described server,
Receiving the certification request that described electronic equipment sends, described certification request includes described user totem information;
First random number process unit, for generate the first random number, according to described PKI to described first with
Machine number is encrypted, it is thus achieved that the second random number, sends described second random number to described electronic equipment;
3rd random number process unit, for receiving the 3rd random number that described electronic equipment returns, described the
Three randoms number are that described second random number is solved by described electronic equipment according to the private key in described secret key pair
The random number of close acquisition;
Authentication ' unit, if identical with described first random number for described 3rd random number, then by described clothes
The checking of business device.
By the one or more technical schemes in the embodiment of the present application, it is possible to achieve following one or more skills
Art effect:
1, in the scheme of the embodiment of the present application, during by registering in website, based on user totem information and spy
Value indicative generates secret key pair, then, using user totem information, eigenvalue and PKI as the log-on data of user
Send to server and preserve, it is to avoid prior art uses the username and password to enter as log-on data
Row preserves, even if user totem information, eigenvalue and PKI are lost, the information of user also will not be revealed, enter
And alleviate present in prior art, the safety of username and password is preserved by web site server end
Low, easily cause the technical problem that user profile is revealed, improve the safety of user profile.
2, in the scheme of the embodiment of the present application, user is when logging in website, and website is by utilizing public key encryption
Random number user is verified, only website could be conducted interviews log in by the user of checking, enter
And ensure the safety of user profile.
3, in the scheme of the embodiment of the present application, user when logging in website, can by private key encrypt with
After website is verified by machine number, and only website is by checking, user just can log in visit to website
Ask, user is by verifying the current website logged in, it is to avoid user logs in some fake sites, makes
Become loss.
Those skilled in the art are it should be appreciated that embodiments of the invention can be provided as method, system or meter
Calculation machine program product.Therefore, the present invention can use complete hardware embodiment, complete software implementation or knot
The form of the embodiment in terms of conjunction software and hardware.And, the present invention can use and wherein wrap one or more
Computer-usable storage medium containing computer usable program code (include but not limited to disk memory,
CD-ROM, optical memory etc.) form of the upper computer program implemented.
The present invention is with reference to method, equipment (system) and computer program product according to embodiments of the present invention
The flow chart of product and/or block diagram describe.It should be understood that can by computer program instructions flowchart and
/ or block diagram in each flow process and/or flow process in square frame and flow chart and/or block diagram and/
Or the combination of square frame.These computer program instructions can be provided to general purpose computer, special-purpose computer, embedding
The processor of formula datatron or other programmable data processing device is to produce a machine so that by calculating
The instruction that the processor of machine or other programmable data processing device performs produces for realizing at flow chart one
The device of the function specified in individual flow process or multiple flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions may be alternatively stored in and computer or the process of other programmable datas can be guided to set
In the standby computer-readable memory worked in a specific way so that be stored in this computer-readable memory
Instruction produce and include the manufacture of command device, this command device realizes in one flow process or multiple of flow chart
The function specified in flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions also can be loaded in computer or other programmable data processing device, makes
Sequence of operations step must be performed to produce computer implemented place on computer or other programmable devices
Reason, thus the instruction performed on computer or other programmable devices provides for realizing flow chart one
The step of the function specified in flow process or multiple flow process and/or one square frame of block diagram or multiple square frame.
Specifically, the computer program instructions that the information processing method in the embodiment of the present application is corresponding can be by
It is stored in CD, hard disk, on the storage medium such as USB flash disk, corresponding with information processing method when in storage medium
Computer program instructions read or when being performed by an electronic equipment, comprise the steps:
Detect when the program conformed to a predetermined condition is run, obtain the user totem information of user's input;
Generate an eigenvalue;
Based on described user totem information and described eigenvalue, generate secret key pair, wherein, described secret key pair bag
Include PKI and private key;
Described user totem information, described eigenvalue and described PKI are sent to server, wherein, described
Described user, after receiving described user totem information, described eigenvalue and described PKI, is marked by server
Knowledge information, described eigenvalue and described PKI are saved in described server as the log-on data of described user
In.
Optionally, in described storage medium, also storage has other computer instruction, these computer instructions
With step: described user totem information, described eigenvalue and described PKI are sent to server, corresponding
Computer instruction be performed after, be performed, comprise the steps: when executed
Sending a certification request to described server, described certification request includes described user totem information;
Receiving the first random number that described server returns, described first random number is that described server is according to institute
State PKI and the second random number is encrypted the random number of acquisition;
According to described private key, described first random number is decrypted, it is thus achieved that the 3rd random number;
Sending described 3rd random number to described server, wherein, described server receives the described 3rd
After random number, if described 3rd random number is identical with described second random number, then testing by described server
Card.
Optionally, in described storage medium, also storage has other computer instruction, these computer instructions
With step: described user totem information, described eigenvalue and described PKI are sent to server, corresponding
Computer instruction be performed after, be performed, comprise the steps: when executed
Delete the private key in described eigenvalue and described unsymmetrical key.
Optionally, in described storage medium storage and step: according to described private key to described first random number
Being decrypted, it is thus achieved that the 3rd random number, corresponding computer instruction, during being specifically performed, specifically wraps
Include following steps:
Generate method according to described user totem information, described eigenvalue and the first key, regenerate described
Secret key pair, wherein, it is that described electronic equipment uses in the registration process of website that described first key generates method
Secret key pair generate method;
According to the private key in described secret key pair, described first random number is decrypted, it is thus achieved that described 3rd random
Number.
Optionally, in described storage medium, also storage has other computer instruction, these computer instructions
With step: sending described 3rd random number to described server, corresponding computer instruction is performed it
After, it is performed, comprises the steps: when executed
Receive the certification request results that described server returns;
When described certification request results shows described user by the checking of described server, generate the 4th with
Machine number, is encrypted described 4th random number according to described private key, it is thus achieved that the 5th random number;By described
Five randoms number send to described server;
Receive the 6th random number that described server returns, if described 4th random number and described 6th random number
Identical, then be verified, wherein, described 6th random number be described server according to described PKI to described
5th random number is decrypted the random number of acquisition.
Optionally, in described storage medium, also storage has other computer instruction, these computer instructions
Comprise the steps: when executed
Receive one electronic equipment send user totem information, the PKI in eigenvalue and secret key pair, wherein,
Described user totem information is user's identification information in a website register interface input, and described eigenvalue is institute
Stating one group of random number that electronic equipment generates, described secret key pair is that described electronic equipment is based on described ID
The key that information and described eigenvalue generate;
Using described user totem information, described eigenvalue and described PKI as the log-on data of described user,
And described log-on data is saved in described server.
Optionally, in described storage medium, also storage has other computer instruction, these computer instructions
With step: using described user totem information, described eigenvalue and described PKI as the registration of described user
Data, and described log-on data is saved in described server, after corresponding computer instruction is performed,
It is performed, comprises the steps: when executed
Receiving the certification request that described electronic equipment sends, described certification request includes that described ID is believed
Breath;
Generate the first random number, according to described PKI, described first random number be encrypted, it is thus achieved that second with
Machine number, sends described second random number to described electronic equipment;
Receiving the 3rd random number that described electronic equipment returns, described 3rd random number is described electronic equipment root
According to the private key in described secret key pair, described second random number is decrypted the random number of acquisition;
If described 3rd random number is identical with described first random number, then by the checking of described server.
Although preferred embodiments of the present invention have been described, but those skilled in the art once know base
This creativeness concept, then can make other change and amendment to these embodiments.So, appended right is wanted
Ask and be intended to be construed to include preferred embodiment and fall into all changes and the amendment of the scope of the invention.
Obviously, those skilled in the art can carry out various change and modification without deviating from this to the present invention
Bright spirit and scope.So, if the present invention these amendment and modification belong to the claims in the present invention and
Within the scope of its equivalent technologies, then the present invention is also intended to comprise these change and modification.
Claims (14)
1. an information processing method, is applied in electronic equipment, and described method includes:
Detect when the program conformed to a predetermined condition is run, obtain the user totem information of user's input;
Generate an eigenvalue;
Based on described user totem information and described eigenvalue, generate secret key pair, wherein, described secret key pair bag
Include PKI and private key;
Described user totem information, described eigenvalue and described PKI are sent to server, wherein, described
Described user, after receiving described user totem information, described eigenvalue and described PKI, is marked by server
Knowledge information, described eigenvalue and described PKI are saved in described server as the log-on data of described user
In.
2. the method for claim 1, it is characterised in that by described user totem information, institute
Stating eigenvalue and described PKI sends after server, described method also includes:
Sending a certification request to described server, described certification request includes described user totem information;
Receiving the first random number that described server returns, described first random number is that described server is according to institute
State PKI and the second random number is encrypted the random number of acquisition;
According to described private key, described first random number is decrypted, it is thus achieved that the 3rd random number;
Sending described 3rd random number to described server, wherein, described server receives the described 3rd
After random number, if described 3rd random number is identical with described second random number, then testing by described server
Card.
3. method as claimed in claim 2, it is characterised in that described by described user totem information,
Described eigenvalue and described PKI send after server, and described method also includes:
Delete the private key in described eigenvalue and described unsymmetrical key.
4. method as claimed in claim 3, it is characterised in that described according to described private key to described the
One random number is decrypted, it is thus achieved that the 3rd random number, specifically includes:
Generate method according to described user totem information, described eigenvalue and the first key, regenerate described
Secret key pair, wherein, it is that described electronic equipment uses in the registration process of website that described first key generates method
Secret key pair generate method;
According to the private key in described secret key pair, described first random number is decrypted, it is thus achieved that described 3rd random
Number.
5. the method as described in claim 2 or 4, it is characterised in that described by described 3rd random
Number sends after described server, and described method also includes:
Receive the certification request results that described server returns;
When described certification request results shows described user by the checking of described server, generate the 4th with
Machine number, is encrypted described 4th random number according to described private key, it is thus achieved that the 5th random number;By described
Five randoms number send to described server;
Receive the 6th random number that described server returns, if described 4th random number and described 6th random number
Identical, then be verified, wherein, described 6th random number be described server according to described PKI to described
5th random number is decrypted the random number of acquisition.
6. an information processing method, is applied in server, and described method includes:
Receive one electronic equipment send user totem information, the PKI in eigenvalue and secret key pair, wherein,
Described user totem information is user's identification information in a website register interface input, and described eigenvalue is institute
Stating one group of random number that electronic equipment generates, described secret key pair is that described electronic equipment is based on described ID
The key that information and described eigenvalue generate;
Using described user totem information, described eigenvalue and described PKI as the log-on data of described user,
And described log-on data is saved in described server.
7. method as claimed in claim 6, it is characterised in that described by described user totem information,
Described eigenvalue and described PKI are as the log-on data of described user, and described log-on data is saved in institute
After stating in server, described method also includes:
Receiving the certification request that described electronic equipment sends, described certification request includes that described ID is believed
Breath;
Generate the first random number, according to described PKI, described first random number be encrypted, it is thus achieved that second with
Machine number, sends described second random number to described electronic equipment;
Receiving the 3rd random number that described electronic equipment returns, described 3rd random number is described electronic equipment root
According to the private key in described secret key pair, described second random number is decrypted the random number of acquisition;
If described 3rd random number is identical with described first random number, then by the checking of described server.
8. an electronic equipment, described electronic equipment includes:
User totem information acquiring unit, during for detecting that the program conformed to a predetermined condition is run, obtains and uses
The user totem information of family input;
Eigenvalue signal generating unit, for generating an eigenvalue;
Secret key pair signal generating unit, for based on described user totem information and described eigenvalue, generates secret key pair,
Wherein, described secret key pair includes PKI and private key;
Log-on data transmitting element, for sending out described user totem information, described eigenvalue and described PKI
Delivering to server, wherein, described server is receiving described user totem information, described eigenvalue and institute
After stating PKI, using described user totem information, described eigenvalue and described PKI as the registration of described user
Data are saved in described server.
9. electronic equipment as claimed in claim 8, it is characterised in that described electronic equipment also includes:
Certification request transmitting unit, for by described user totem information, described eigenvalue and described PKI
Sending after server, send a certification request to described server, described certification request includes described
User totem information;
First random number receives unit, for receiving the first random number that described server returns, and described first
Random number is the random number that described server is encrypted acquisition according to described PKI to the second random number;
First random nnrber decryption unit, for being decrypted described first random number according to described private key, obtains
Obtain the 3rd random number;
3rd random number transmitting element, for described 3rd random number is sent to described server, wherein,
After described server receives described 3rd random number, if described 3rd random number and described second random number phase
With, then by the checking of described server.
10. electronic equipment as claimed in claim 9, it is characterised in that described electronic equipment also includes:
Delete unit, for described user totem information, described eigenvalue and described PKI being sent described
After server, delete the private key in described eigenvalue and described unsymmetrical key.
11. electronic equipments as claimed in claim 10, it is characterised in that described first random nnrber decryption
Unit specifically includes:
Secret key pair generates subelement, for according to described user totem information, described eigenvalue and the first key
Generation method, regenerates described secret key pair, and wherein, it is that described electronics sets that described first key generates method
The standby secret key pair used in the registration process of website generates method;
First random nnrber decryption subelement, is used for according to the private key in described secret key pair described first random number
It is decrypted, it is thus achieved that described 3rd random number.
12. electronic equipments as described in claim 9 or 11, it is characterised in that described electronic equipment is also
Including:
Certification request results receives unit, for sending described 3rd random number to described server described
Afterwards, the certification request results that described server returns is received;
In described certification request results, 4th random number process unit, for showing that described user is by described clothes
Business device checking time, generate the 4th random number, according to described private key, described 4th random number is encrypted,
Obtain the 5th random number;Described 5th random number is sent to described server;
6th random number process unit, for receiving the 6th random number that described server returns, if described the
Four randoms number are identical with described 6th random number, then be verified, and wherein, described 6th random number is described
Server is decrypted the random number of acquisition according to described PKI to described 5th random number.
13. 1 kinds of servers, described server includes:
Log-on data receive unit, for receive one electronic equipment send user totem information, eigenvalue and
PKI in secret key pair, wherein, described user totem information is user's mark in a website register interface input
Knowledge information, described eigenvalue is one group of random number that described electronic equipment generates, and described secret key pair is described electricity
The key that subset generates based on described user totem information and described eigenvalue;
Log-on data memory element, for making described user totem information, described eigenvalue and described PKI
For the log-on data of described user, and described log-on data is saved in described server.
14. servers as claimed in claim 13, it is characterised in that described server also includes:
Certification request reception unit, for described by described user totem information, described eigenvalue and described
PKI is as the log-on data of described user, and after described log-on data is saved in described server,
Receiving the certification request that described electronic equipment sends, described certification request includes described user totem information;
First random number process unit, for generate the first random number, according to described PKI to described first with
Machine number is encrypted, it is thus achieved that the second random number, sends described second random number to described electronic equipment;
3rd random number process unit, for receiving the 3rd random number that described electronic equipment returns, described the
Three randoms number are that described second random number is solved by described electronic equipment according to the private key in described secret key pair
The random number of close acquisition;
Authentication ' unit, if identical with described first random number for described 3rd random number, then by described clothes
The checking of business device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510115313.6A CN106034122A (en) | 2015-03-16 | 2015-03-16 | Information processing method, electronic equipment and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510115313.6A CN106034122A (en) | 2015-03-16 | 2015-03-16 | Information processing method, electronic equipment and server |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106034122A true CN106034122A (en) | 2016-10-19 |
Family
ID=57150861
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510115313.6A Pending CN106034122A (en) | 2015-03-16 | 2015-03-16 | Information processing method, electronic equipment and server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106034122A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107196966A (en) * | 2017-07-05 | 2017-09-22 | 北京信任度科技有限公司 | The identity identifying method and system of multi-party trust based on block chain |
CN108306728A (en) * | 2018-01-19 | 2018-07-20 | 四川斐讯信息技术有限公司 | A kind of method, server and system obtaining mobile terminal identification |
CN109362074A (en) * | 2018-09-05 | 2019-02-19 | 福建福诺移动通信技术有限公司 | The method of h5 and server-side safety communication in a kind of mixed mode APP |
CN110474864A (en) * | 2018-05-10 | 2019-11-19 | 华为技术有限公司 | A kind of method and electronic equipment registered, log in mobile applications |
CN110545543A (en) * | 2019-09-03 | 2019-12-06 | 南瑞集团有限公司 | authentication method, device and system of wireless equipment |
WO2020238537A1 (en) * | 2019-05-24 | 2020-12-03 | 魏文科 | Method for establishing and verifying input value using asymmetric encryption algorithm, and application thereof |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101145913A (en) * | 2007-10-25 | 2008-03-19 | 东软集团有限公司 | A method and system for network security communication |
CN101827106A (en) * | 2010-04-29 | 2010-09-08 | 华为技术有限公司 | DHCP safety communication method, device and system |
CN102868687A (en) * | 2012-09-05 | 2013-01-09 | 四川长虹电器股份有限公司 | Method for improving security of intelligent street lamp control system |
CN103684766A (en) * | 2012-08-30 | 2014-03-26 | 卓望数码技术(深圳)有限公司 | Private key protection method and system for terminal user |
CN104333576A (en) * | 2014-10-21 | 2015-02-04 | 普华基础软件股份有限公司 | ECU (Electronic Control Unit) upgrading device and method |
CN104580264A (en) * | 2015-02-13 | 2015-04-29 | 人民网股份有限公司 | Login method, registration method and login device as well as login and refrigeration system |
-
2015
- 2015-03-16 CN CN201510115313.6A patent/CN106034122A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101145913A (en) * | 2007-10-25 | 2008-03-19 | 东软集团有限公司 | A method and system for network security communication |
CN101827106A (en) * | 2010-04-29 | 2010-09-08 | 华为技术有限公司 | DHCP safety communication method, device and system |
CN103684766A (en) * | 2012-08-30 | 2014-03-26 | 卓望数码技术(深圳)有限公司 | Private key protection method and system for terminal user |
CN102868687A (en) * | 2012-09-05 | 2013-01-09 | 四川长虹电器股份有限公司 | Method for improving security of intelligent street lamp control system |
CN104333576A (en) * | 2014-10-21 | 2015-02-04 | 普华基础软件股份有限公司 | ECU (Electronic Control Unit) upgrading device and method |
CN104580264A (en) * | 2015-02-13 | 2015-04-29 | 人民网股份有限公司 | Login method, registration method and login device as well as login and refrigeration system |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107196966A (en) * | 2017-07-05 | 2017-09-22 | 北京信任度科技有限公司 | The identity identifying method and system of multi-party trust based on block chain |
CN108306728A (en) * | 2018-01-19 | 2018-07-20 | 四川斐讯信息技术有限公司 | A kind of method, server and system obtaining mobile terminal identification |
CN110474864A (en) * | 2018-05-10 | 2019-11-19 | 华为技术有限公司 | A kind of method and electronic equipment registered, log in mobile applications |
CN110474864B (en) * | 2018-05-10 | 2021-05-07 | 华为技术有限公司 | Method for registering and logging in mobile application program and electronic equipment |
CN109362074A (en) * | 2018-09-05 | 2019-02-19 | 福建福诺移动通信技术有限公司 | The method of h5 and server-side safety communication in a kind of mixed mode APP |
CN109362074B (en) * | 2018-09-05 | 2022-12-06 | 福建福诺移动通信技术有限公司 | Method for h5 and server side safety communication in mixed mode APP |
WO2020238537A1 (en) * | 2019-05-24 | 2020-12-03 | 魏文科 | Method for establishing and verifying input value using asymmetric encryption algorithm, and application thereof |
CN110545543A (en) * | 2019-09-03 | 2019-12-06 | 南瑞集团有限公司 | authentication method, device and system of wireless equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10592651B2 (en) | Visual image authentication | |
Lee et al. | Three‐factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices | |
US20190050554A1 (en) | Logo image and advertising authentication | |
Kim et al. | Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme | |
CN109086615A (en) | A kind of support multiple key search public key encryption method of anti-keyword guessing attack | |
CN106034122A (en) | Information processing method, electronic equipment and server | |
CN106161350B (en) | Method and device for managing application identifier | |
CN106612180A (en) | Method and device for realizing session identifier synchronization | |
Bai et al. | Elliptic curve cryptography based security framework for Internet of Things (IoT) enabled smart card | |
CN104363097B (en) | The RFID inter-authentication methods of lightweight on elliptic curve | |
US11128453B2 (en) | Visual image authentication | |
CN105635075A (en) | Method of registering cloud terminal, cloud terminal, cloud server and cloud system | |
Wang et al. | Amnesia: A bilateral generative password manager | |
Odelu et al. | A secure and efficient ECC‐based user anonymity preserving single sign‐on scheme for distributed computer networks | |
Das | A secure and robust password-based remote user authentication scheme using smart cards for the integrated epr information system | |
CN108390866A (en) | Trusted remote method of proof based on the two-way anonymous authentication of dual-proxy | |
US8954728B1 (en) | Generation of exfiltration-resilient cryptographic keys | |
Hajny et al. | Attribute‐based credentials with cryptographic collusion prevention | |
Schwab et al. | Entity authentication in a mobile-cloud environment | |
CN101510875B (en) | Identification authentication method based on N-dimension sphere | |
Mehraj et al. | Contemplation of effective security measures in access management from adoptability perspective | |
JP7250960B2 (en) | User authentication and signature device using user biometrics, and method thereof | |
Leea et al. | An S/Key-like one-time password authentication scheme using smart cards for smart meter | |
Chen et al. | Anti-synchronization and robust authentication for noisy PUF-based smart card | |
CN107277054A (en) | A kind of method and system of data integrity validation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161019 |
|
RJ01 | Rejection of invention patent application after publication |