CN106034122A - Information processing method, electronic equipment and server - Google Patents

Information processing method, electronic equipment and server Download PDF

Info

Publication number
CN106034122A
CN106034122A CN201510115313.6A CN201510115313A CN106034122A CN 106034122 A CN106034122 A CN 106034122A CN 201510115313 A CN201510115313 A CN 201510115313A CN 106034122 A CN106034122 A CN 106034122A
Authority
CN
China
Prior art keywords
random number
server
eigenvalue
pki
electronic equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510115313.6A
Other languages
Chinese (zh)
Inventor
杨峰
武帅
杨禹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201510115313.6A priority Critical patent/CN106034122A/en
Publication of CN106034122A publication Critical patent/CN106034122A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses an information processing method, electronic equipment and a server. The method comprises the following steps of when a condition that a program according with a predetermined condition is operated is detected, acquiring user identification information input by a user; generating a characteristic value; based on the user identification information and the characteristic value, generating a secret key pair, wherein the secret key pair includes a public key and a private key; and sending the user identification information, the characteristic value and the public key to the server, wherein the server takes the user identification information, the characteristic value and the public key as registration data of the user and stores in the server after receiving the user identification information, the characteristic value and the public key.

Description

A kind of information processing method, electronic equipment and server
Technical field
The present invention relates to electronic technology field, particularly to a kind of information processing method, electronic equipment and service Device.
Background technology
Along with developing rapidly of electronic technology, also emerge in an endless stream in website that is various abundant and that be convenient for people to live, The websites such as similar chat, shopping, mailbox have become as a lot of people and lie fallow every day, make friends, do shopping that musted can not Few instrument.When using these websites, user manages user data for convenience, can be obtained by registration Username and password, and then these internet sites are logged in and personal information management, and preserve user Some data, including friend information, photograph album, even bank card information.
But, inventor is in realizing the embodiment of the present application during inventive technique scheme, in discovery in application At least there is following technical problem in technology of stating:
In prior art, username and password is saved in the server end of website, when user logs in, Yong Hutong Cross checking username and password and carry out website logins, owing to Website server is vulnerable to attack, if by user Name and password are saved in server end, and user profile can be caused to reveal, and cause the user is lost.Visible, existing Having in technology and exist, the safety being preserved username and password by web site server end is low, easily causes use The technical problem of family information leakage.
Summary of the invention
The embodiment of the present invention provides a kind of information processing method, electronic equipment and server, is used for solving existing Present in technology, the safety being preserved username and password by web site server end is low, easily causes use The technical problem of family information leakage.
On the one hand, the embodiment of the present application provides a kind of information processing method, is applied in electronic equipment, described Method includes:
Detect when the program conformed to a predetermined condition is run, obtain the user totem information of user's input;
Generate an eigenvalue;
Based on described user totem information and described eigenvalue, generate secret key pair, wherein, described secret key pair bag Include PKI and private key;
Described user totem information, described eigenvalue and described PKI are sent to server, wherein, described Described user, after receiving described user totem information, described eigenvalue and described PKI, is marked by server Knowledge information, described eigenvalue and described PKI are saved in described server as the log-on data of described user In.
Optionally, by described user totem information, described eigenvalue and described PKI send to server it After, described method also includes:
Sending a certification request to described server, described certification request includes described user totem information;
Receiving the first random number that described server returns, described first random number is that described server is according to institute State PKI and the second random number is encrypted the random number of acquisition;
According to described private key, described first random number is decrypted, it is thus achieved that the 3rd random number;
Sending described 3rd random number to described server, wherein, described server receives the described 3rd After random number, if described 3rd random number is identical with described second random number, then testing by described server Card.
Optionally, described, described user totem information, described eigenvalue and described PKI are sent to service After device, described method also includes:
Delete the private key in described eigenvalue and described unsymmetrical key.
Optionally, described according to described private key, described first random number is decrypted, it is thus achieved that the 3rd random number, Specifically include:
Generate method according to described user totem information, described eigenvalue and the first key, regenerate described Secret key pair, wherein, it is that described electronic equipment uses in the registration process of website that described first key generates method Secret key pair generate method;
According to the private key in described secret key pair, described first random number is decrypted, it is thus achieved that described 3rd random Number.
Optionally, being sent after described server by described 3rd random number described, described method is also wrapped Include:
Receive the certification request results that described server returns;
When described certification request results shows described user by the checking of described server, generate the 4th with Machine number, is encrypted described 4th random number according to described private key, it is thus achieved that the 5th random number;By described Five randoms number send to described server;
Receive the 6th random number that described server returns, if described 4th random number and described 6th random number Identical, then be verified, wherein, described 6th random number be described server according to described PKI to described 5th random number is decrypted the random number of acquisition.
On the other hand, the embodiment of the present application also provides for a kind of information processing method, is applied in server, institute The method of stating includes:
Receive one electronic equipment send user totem information, the PKI in eigenvalue and secret key pair, wherein, Described user totem information is user's identification information in a website register interface input, and described eigenvalue is institute Stating one group of random number that electronic equipment generates, described secret key pair is that described electronic equipment is based on described ID The key that information and described eigenvalue generate;
Using described user totem information, described eigenvalue and described PKI as the log-on data of described user, And described log-on data is saved in described server.
Optionally, described using described user totem information, described eigenvalue and described PKI as described use The log-on data at family, and after described log-on data being saved in described server, described method also includes:
Receiving the certification request that described electronic equipment sends, described certification request includes that described ID is believed Breath;
Generate the first random number, according to described PKI, described first random number be encrypted, it is thus achieved that second with Machine number, sends described second random number to described electronic equipment;
Receiving the 3rd random number that described electronic equipment returns, described 3rd random number is described electronic equipment root According to the private key in described secret key pair, described second random number is decrypted the random number of acquisition;
If described 3rd random number is identical with described first random number, then by the checking of described server.
On the other hand, also a kind of electronic equipment of the embodiment of the present application, described electronic equipment includes:
User totem information acquiring unit, during for detecting that the program conformed to a predetermined condition is run, obtains and uses The user totem information of family input;
Eigenvalue signal generating unit, for generating an eigenvalue;
Secret key pair signal generating unit, for based on described user totem information and described eigenvalue, generates secret key pair, Wherein, described secret key pair includes PKI and private key;
Log-on data transmitting element, for sending out described user totem information, described eigenvalue and described PKI Delivering to server, wherein, described server is receiving described user totem information, described eigenvalue and institute After stating PKI, using described user totem information, described eigenvalue and described PKI as the registration of described user Data are saved in described server.
Optionally, described electronic equipment also includes:
Certification request transmitting unit, for by described user totem information, described eigenvalue and described PKI Sending after server, send a certification request to described server, described certification request includes described User totem information;
First random number receives unit, for receiving the first random number that described server returns, and described first Random number is the random number that described server is encrypted acquisition according to described PKI to the second random number;
First random nnrber decryption unit, for being decrypted described first random number according to described private key, obtains Obtain the 3rd random number;
3rd random number transmitting element, for described 3rd random number is sent to described server, wherein, After described server receives described 3rd random number, if described 3rd random number and described second random number phase With, then by the checking of described server.
Optionally, described electronic equipment also includes:
Delete unit, for described user totem information, described eigenvalue and described PKI being sent described After server, delete the private key in described eigenvalue and described unsymmetrical key.
Optionally, described first random nnrber decryption unit specifically includes:
Secret key pair generates subelement, for according to described user totem information, described eigenvalue and the first key Generation method, regenerates described secret key pair, and wherein, it is that described electronics sets that described first key generates method The standby secret key pair used in the registration process of website generates method;
First random nnrber decryption subelement, is used for according to the private key in described secret key pair described first random number It is decrypted, it is thus achieved that described 3rd random number.
Optionally, described electronic equipment also includes:
Certification request results receives unit, for sending described 3rd random number to described server described Afterwards, the certification request results that described server returns is received;
In described certification request results, 4th random number process unit, for showing that described user is by described clothes Business device checking time, generate the 4th random number, according to described private key, described 4th random number is encrypted, Obtain the 5th random number;Described 5th random number is sent to described server;
6th random number process unit, for receiving the 6th random number that described server returns, if described the Four randoms number are identical with described 6th random number, then be verified, and wherein, described 6th random number is described Server is decrypted the random number of acquisition according to described PKI to described 5th random number.
On the other hand, the embodiment of the present application also provides for a kind of server, and described server includes:
Log-on data receive unit, for receive one electronic equipment send user totem information, eigenvalue and PKI in secret key pair, wherein, described user totem information is user's mark in a website register interface input Knowledge information, described eigenvalue is one group of random number that described electronic equipment generates, and described secret key pair is described electricity The key that subset generates based on described user totem information and described eigenvalue;
Log-on data memory element, for making described user totem information, described eigenvalue and described PKI For the log-on data of described user, and described log-on data is saved in described server.
Optionally, described server also includes:
Certification request reception unit, for described by described user totem information, described eigenvalue and described PKI is as the log-on data of described user, and after described log-on data is saved in described server, Receiving the certification request that described electronic equipment sends, described certification request includes described user totem information;
First random number process unit, for generate the first random number, according to described PKI to described first with Machine number is encrypted, it is thus achieved that the second random number, sends described second random number to described electronic equipment;
3rd random number process unit, for receiving the 3rd random number that described electronic equipment returns, described the Three randoms number are that described second random number is solved by described electronic equipment according to the private key in described secret key pair The random number of close acquisition;
Authentication ' unit, if identical with described first random number for described 3rd random number, then by described clothes The checking of business device.
Said one in the embodiment of the present application or multiple technical scheme, at least have one or more skills following Art effect:
1, in the scheme of the embodiment of the present application, during by registering in website, based on user totem information and spy Value indicative generates secret key pair, then, using user totem information, eigenvalue and PKI as the log-on data of user Send to server and preserve, it is to avoid prior art uses the username and password to enter as log-on data Row preserves, even if user totem information, eigenvalue and PKI are lost, the information of user also will not be revealed, enter And alleviate present in prior art, the safety of username and password is preserved by web site server end Low, easily cause the technical problem that user profile is revealed, improve the safety of user profile.
2, in the scheme of the embodiment of the present application, user is when logging in website, and website is by utilizing public key encryption Random number user is verified, only website could be conducted interviews log in by the user of checking, enter And ensure the safety of user profile.
3, in the scheme of the embodiment of the present application, user when logging in website, can by private key encrypt with After website is verified by machine number, and only website is by checking, user just can log in visit to website Ask, user is by verifying the current website logged in, it is to avoid user logs in some fake sites, makes Become loss.
Accompanying drawing explanation
Fig. 1 is the flow chart of information processing method in the embodiment of the present application one;
Fig. 2 is the information interaction figure of client enrollment method in the embodiment of the present application one;
Fig. 3 is the information interaction figure that in the embodiment of the present application one, server and client carry out bi-directional verification;
Fig. 4 is the information interaction figure of another verification method in the embodiment of the present application one;
Fig. 5 is the block diagram of electronic equipment in the embodiment of the present application two;
Fig. 6 is the block diagram of server in the embodiment of the present application two.
Detailed description of the invention
In the technical scheme that the embodiment of the present application provides, carry out bi-directional verification by client and website, and, Server end the most directly preserves the password of user, and then avoids website under attack, causes user profile to be revealed Situation, meanwhile, client is before logging in, and the current website logged in is verified by client,;Enter And prevent user from logging in fake site.
The terms "and/or", a kind of incidence relation describing affiliated partner, expression can be deposited In three kinds of relations, such as, A and/or B, can represent: individualism A, there is A and B simultaneously, single Solely there is B these three situation.It addition, character "/" herein, typically represent forward-backward correlation to as if one The relation of "or".
Below in conjunction with the accompanying drawings the embodiment of the present application technical scheme main is realized principle, detailed description of the invention and The beneficial effect that should be able to reach is explained in detail by it.
Embodiment one
The embodiment of the present application provides a kind of information processing method, is applied in electronic equipment, and electronic equipment is permissible For the subscriber equipment such as smart mobile phone, panel computer, as it is shown in figure 1, described method includes:
S10: detect when the program conformed to a predetermined condition is run, obtain the user totem information of user's input.
Wherein, detect that the program conformed to a predetermined condition is run specifically, open a Internet on electronic equipment The login link of website, now, electronic equipment obtains the user totem information of user's input, and ID is believed Breath sets for user, can be name, mailbox or phone etc..
It follows that electronic equipment performs S20: generate an eigenvalue.
In specific implementation process, eigenvalue is can be a string random number, and eigenvalue can also enter for user The system time of client during row registration operation.
For random number, generate secret key pair required for random number should defeated from authorized randomizer Go out to obtain, i.e. the output of authorized randomizer can be used for obtaining one and generates unsymmetrical key pair Required random number.
It follows that electronic equipment carries out step S30: based on described user totem information and described eigenvalue, Generating secret key pair, wherein, described secret key pair includes PKI and private key.
In specific implementation process, common rivest, shamir, adelman has RSA cryptographic algorithms, ECC (Elliptic Curves Cryptography, elliptic curve cipher coding theory) AES etc..Rising of its key schedule Initial point can regard a bigger numeral as, such as: ECC uses the big number of 256Bit, and RSA makes With the big number of 2048Bit.In the embodiment of the present application, by using user name and eigenvalue to generate at key Big number required in generating algorithm.
Such as: as a example by RSA 1024, eigenvalue N can use user to carry out client during registration operation System time, user name M can be set by the user, and counts greatly BigNum=SHA512 (N+M);Wherein Symbol "+" represent the implication that character string connects.Now, BigNum is the big number of a 512bit, root Use of numerals prime number screening method generates two 512ibt prime P, Q accordingly, and then just can generate RSA's PKI and private key.
It follows that electronic equipment enters step S40: by described user totem information, described eigenvalue and institute Stating PKI to send to server, wherein, described server is receiving described user totem information, described spy After value indicative and described PKI, using described user totem information, described eigenvalue and described PKI as described use The log-on data at family is saved in described server.
In the embodiment of the present application, user name, eigenvalue and PKI are sent by electronic equipment as log-on data To server, and in prior art, username and password is sent to service by electronic equipment as log-on data Device preserves, and once username and password is lost, and just very likely results in user profile and reveals, and this Shen Please be in embodiment, even if user name, eigenvalue and PKI are lost, owing to registering the client of use except user Outward, other client cannot obtain the private key used when user registers, and private key just cannot be used to verify And log in website, and then ensure that the safety of user profile.
It follows that the user registering method based on asymmetric encryption techniques in the embodiment of the present application is entered One step explanation, as in figure 2 it is shown, comprise the following steps.
S201, client sends a registration request.
S202, server end, after receiving the registration request that client sends, returns enrollment page.
S203, obtains user and inputs user name according to the prompting of enrollment page, i.e. use in the embodiment of the present application Family identification information.
S204, generates eigenvalue N.
S205, generates secret key pair, including PKI D and private key K according to user name and eigenvalue N.
S206, sends user name, eigenvalue N and PKI D to server.
S207, server preserves user name, eigenvalue N and PKI D.
S208, server returns the information that succeeds in registration.
S209, client preserves user name and website URL.
So far, client completes the registration of this website.
In the above-mentioned methods, private key K can be preserved in the client after having registered by website, and user Use when again logging in website, but in being embodied as, in order to improve safety further, in step S209 Afterwards, described method also includes step S210, and client deletes eigenvalue N and private key K.
It follows that by Fig. 3 to bi-directional verification side between client and server end in the embodiment of the present application Method illustrates.
First, client is authenticated by server, comprises the following steps.
S301, user end to server sends a certification request, and described certification request includes that described user marks Knowledge information.
S302, server, after receiving the certification request that client sends, generates a random number S.
S303, random number S is encrypted by server by utilizing PKI D, obtains S '.
S304, S ' is sent to client by server.
S305, utilizes private key K to be decrypted S ', it is thus achieved that S.
S306, S is sent to server by client.
S307, S is verified by server, if S is verified, then client testing by server Card.
S308, return authentication successful information.
It follows that website is verified by client, comprise the following steps.
S309, generates random number M, utilizes private key K to be encrypted M, it is thus achieved that M '.
S310, M ' is sent to server by client;
M ' is decrypted by S311, server by utilizing PKI D, it is thus achieved that M.
S312, M is sent to client by server.
S313, M is verified by client, if M is verified, then server is by checking.
S314, client returns and is proved to be successful information.
S315, server returns and logs in successfully interface.
So far, client and server completes bi-directional verification by asymmetric key.
Visible, in the embodiment of the present application, by using rivest, shamir, adelman, carry out client and website Bi-directional verification, and, server end need not directly preserve the password of user, and then avoids website under attack, Causing the situation that user profile is revealed, meanwhile, the current website logged in, before logging in, is carried out by client Checking, prevents user from logging in fake site.
In the embodiment of the present application, in order to improve the safety that user logs in further, if client is in registration Eigenvalue N and private key K is deleted, then when client is verified by server, such as Fig. 4 after completing Shown in, may include steps of.
S401, user end to server sends a certification request, and described certification request includes that described user marks Knowledge information.
S402, server, after receiving the certification request that client sends, generates a random number S.
S403, random number S is encrypted according to PKI D, obtains S ' by server.
S404, eigenvalue N and S ' is sent to client by server.
S405, client regenerates private key K according to user name and eigenvalue N.
S406, S ' is decrypted by client according to private key K, it is thus achieved that S.
S407, S is sent to server by client.
S408, S is verified by server, if S is verified, then client testing by server Card.
S409, return authentication successful information.
In the embodiment of the present application, private key K can be deleted after succeeding in registration, and when needs use, weight Newly-generated private key K.Common rivest, shamir, adelman has RSA cryptographic algorithms, ECC (Elliptic Curves Cryptography, elliptic curve cipher coding theory) AES etc..The starting point of its key schedule is all A bigger numeral can be regarded as, such as: ECC uses the big number of 256Bit, and RSA uses 2048Bit Big number.In the embodiment of the present application, by using user name and eigenvalue to generate in key schedule Required big number.Owing to, in specific implementation process, meeting RSA, ECC key schedule at big number Condition, the rule that key generates has multiple, and by Client Design multiple key generating mode, The verification method in the embodiment of the present application can be made safer.
Such as: as a example by RSA 1024, eigenvalue N can use user to carry out client during registration operation System time, user name M can be set by the user, and counts greatly BigNum=SHA512 (N+M);Wherein Symbol "+" represent the implication that character string connects.Here, it is possible to use SHA1, SHA256 etc. its His hash algorithm, and, N with M can be more than simply being connected, and can be (N+M+N^M+N+M) other modes such as.
Although it should be noted that generate key mode have a variety of, but as long as according to identical user name, Eigenvalue N and key generating mode, client just can generate identical with registration process in landfall process Private key, and then allow users to log in.
Embodiment two
Based on same inventive concept, the embodiment of the present application also provides for a kind of electronic equipment, as it is shown in figure 5, institute State electronic equipment to include:
User totem information acquiring unit 50, during for detecting that the program conformed to a predetermined condition is run, obtains The user totem information of user's input;
Eigenvalue signal generating unit 51, for generating an eigenvalue;
Secret key pair signal generating unit 52, for based on described user totem information and described eigenvalue, generates key Right, wherein, described secret key pair includes PKI and private key;
Log-on data transmitting element 53, for by described user totem information, described eigenvalue and described PKI Send to server, wherein, described server receive described user totem information, described eigenvalue and After described PKI, using described user totem information, described eigenvalue and described PKI as the note of described user Volumes is according to being saved in described server.
Optionally, described electronic equipment also includes:
Certification request transmitting unit, for by described user totem information, described eigenvalue and described PKI Sending after server, send a certification request to described server, described certification request includes described User totem information;
First random number receives unit, for receiving the first random number that described server returns, and described first Random number is the random number that described server is encrypted acquisition according to described PKI to the second random number;
First random nnrber decryption unit, for being decrypted described first random number according to described private key, obtains Obtain the 3rd random number;
3rd random number transmitting element, for described 3rd random number is sent to described server, wherein, After described server receives described 3rd random number, if described 3rd random number and described second random number phase With, then by the checking of described server.
Optionally, described electronic equipment also includes:
Delete unit, for described user totem information, described eigenvalue and described PKI being sent described After server, delete the private key in described eigenvalue and described unsymmetrical key.
Optionally, described first random nnrber decryption unit specifically includes:
Secret key pair generates subelement, for according to described user totem information, described eigenvalue and the first key Generation method, regenerates described secret key pair, and wherein, it is that described electronics sets that described first key generates method The standby secret key pair used in the registration process of website generates method;
First random nnrber decryption subelement, is used for according to the private key in described secret key pair described first random number It is decrypted, it is thus achieved that described 3rd random number.
Optionally, described electronic equipment also includes:
Certification request results receives unit, for sending described 3rd random number to described server described Afterwards, the certification request results that described server returns is received;
In described certification request results, 4th random number process unit, for showing that described user is by described clothes Business device checking time, generate the 4th random number, according to described private key, described 4th random number is encrypted, Obtain the 5th random number;Described 5th random number is sent to described server;
6th random number process unit, for receiving the 6th random number that described server returns, if described the Four randoms number are identical with described 6th random number, then be verified, and wherein, described 6th random number is described Server is decrypted the random number of acquisition according to described PKI to described 5th random number.
Based on same inventive concept, the embodiment of the present application also provides for a kind of server, as shown in Figure 6, described Server includes:
Log-on data receives unit 60, for receiving the user totem information that an electronic equipment sends, eigenvalue With the PKI in secret key pair, wherein, described user totem information is that user is in a website register interface input Identification information, described eigenvalue is one group of random number that described electronic equipment generates, and described secret key pair is described The key that electronic equipment generates based on described user totem information and described eigenvalue;
Log-on data memory element 61, for by described user totem information, described eigenvalue and described PKI As the log-on data of described user, and described log-on data is saved in described server.
Optionally, described server also includes:
Certification request reception unit, for described by described user totem information, described eigenvalue and described PKI is as the log-on data of described user, and after described log-on data is saved in described server, Receiving the certification request that described electronic equipment sends, described certification request includes described user totem information;
First random number process unit, for generate the first random number, according to described PKI to described first with Machine number is encrypted, it is thus achieved that the second random number, sends described second random number to described electronic equipment;
3rd random number process unit, for receiving the 3rd random number that described electronic equipment returns, described the Three randoms number are that described second random number is solved by described electronic equipment according to the private key in described secret key pair The random number of close acquisition;
Authentication ' unit, if identical with described first random number for described 3rd random number, then by described clothes The checking of business device.
By the one or more technical schemes in the embodiment of the present application, it is possible to achieve following one or more skills Art effect:
1, in the scheme of the embodiment of the present application, during by registering in website, based on user totem information and spy Value indicative generates secret key pair, then, using user totem information, eigenvalue and PKI as the log-on data of user Send to server and preserve, it is to avoid prior art uses the username and password to enter as log-on data Row preserves, even if user totem information, eigenvalue and PKI are lost, the information of user also will not be revealed, enter And alleviate present in prior art, the safety of username and password is preserved by web site server end Low, easily cause the technical problem that user profile is revealed, improve the safety of user profile.
2, in the scheme of the embodiment of the present application, user is when logging in website, and website is by utilizing public key encryption Random number user is verified, only website could be conducted interviews log in by the user of checking, enter And ensure the safety of user profile.
3, in the scheme of the embodiment of the present application, user when logging in website, can by private key encrypt with After website is verified by machine number, and only website is by checking, user just can log in visit to website Ask, user is by verifying the current website logged in, it is to avoid user logs in some fake sites, makes Become loss.
Those skilled in the art are it should be appreciated that embodiments of the invention can be provided as method, system or meter Calculation machine program product.Therefore, the present invention can use complete hardware embodiment, complete software implementation or knot The form of the embodiment in terms of conjunction software and hardware.And, the present invention can use and wherein wrap one or more Computer-usable storage medium containing computer usable program code (include but not limited to disk memory, CD-ROM, optical memory etc.) form of the upper computer program implemented.
The present invention is with reference to method, equipment (system) and computer program product according to embodiments of the present invention The flow chart of product and/or block diagram describe.It should be understood that can by computer program instructions flowchart and / or block diagram in each flow process and/or flow process in square frame and flow chart and/or block diagram and/ Or the combination of square frame.These computer program instructions can be provided to general purpose computer, special-purpose computer, embedding The processor of formula datatron or other programmable data processing device is to produce a machine so that by calculating The instruction that the processor of machine or other programmable data processing device performs produces for realizing at flow chart one The device of the function specified in individual flow process or multiple flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions may be alternatively stored in and computer or the process of other programmable datas can be guided to set In the standby computer-readable memory worked in a specific way so that be stored in this computer-readable memory Instruction produce and include the manufacture of command device, this command device realizes in one flow process or multiple of flow chart The function specified in flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions also can be loaded in computer or other programmable data processing device, makes Sequence of operations step must be performed to produce computer implemented place on computer or other programmable devices Reason, thus the instruction performed on computer or other programmable devices provides for realizing flow chart one The step of the function specified in flow process or multiple flow process and/or one square frame of block diagram or multiple square frame.
Specifically, the computer program instructions that the information processing method in the embodiment of the present application is corresponding can be by It is stored in CD, hard disk, on the storage medium such as USB flash disk, corresponding with information processing method when in storage medium Computer program instructions read or when being performed by an electronic equipment, comprise the steps:
Detect when the program conformed to a predetermined condition is run, obtain the user totem information of user's input;
Generate an eigenvalue;
Based on described user totem information and described eigenvalue, generate secret key pair, wherein, described secret key pair bag Include PKI and private key;
Described user totem information, described eigenvalue and described PKI are sent to server, wherein, described Described user, after receiving described user totem information, described eigenvalue and described PKI, is marked by server Knowledge information, described eigenvalue and described PKI are saved in described server as the log-on data of described user In.
Optionally, in described storage medium, also storage has other computer instruction, these computer instructions With step: described user totem information, described eigenvalue and described PKI are sent to server, corresponding Computer instruction be performed after, be performed, comprise the steps: when executed
Sending a certification request to described server, described certification request includes described user totem information;
Receiving the first random number that described server returns, described first random number is that described server is according to institute State PKI and the second random number is encrypted the random number of acquisition;
According to described private key, described first random number is decrypted, it is thus achieved that the 3rd random number;
Sending described 3rd random number to described server, wherein, described server receives the described 3rd After random number, if described 3rd random number is identical with described second random number, then testing by described server Card.
Optionally, in described storage medium, also storage has other computer instruction, these computer instructions With step: described user totem information, described eigenvalue and described PKI are sent to server, corresponding Computer instruction be performed after, be performed, comprise the steps: when executed
Delete the private key in described eigenvalue and described unsymmetrical key.
Optionally, in described storage medium storage and step: according to described private key to described first random number Being decrypted, it is thus achieved that the 3rd random number, corresponding computer instruction, during being specifically performed, specifically wraps Include following steps:
Generate method according to described user totem information, described eigenvalue and the first key, regenerate described Secret key pair, wherein, it is that described electronic equipment uses in the registration process of website that described first key generates method Secret key pair generate method;
According to the private key in described secret key pair, described first random number is decrypted, it is thus achieved that described 3rd random Number.
Optionally, in described storage medium, also storage has other computer instruction, these computer instructions With step: sending described 3rd random number to described server, corresponding computer instruction is performed it After, it is performed, comprises the steps: when executed
Receive the certification request results that described server returns;
When described certification request results shows described user by the checking of described server, generate the 4th with Machine number, is encrypted described 4th random number according to described private key, it is thus achieved that the 5th random number;By described Five randoms number send to described server;
Receive the 6th random number that described server returns, if described 4th random number and described 6th random number Identical, then be verified, wherein, described 6th random number be described server according to described PKI to described 5th random number is decrypted the random number of acquisition.
Optionally, in described storage medium, also storage has other computer instruction, these computer instructions Comprise the steps: when executed
Receive one electronic equipment send user totem information, the PKI in eigenvalue and secret key pair, wherein, Described user totem information is user's identification information in a website register interface input, and described eigenvalue is institute Stating one group of random number that electronic equipment generates, described secret key pair is that described electronic equipment is based on described ID The key that information and described eigenvalue generate;
Using described user totem information, described eigenvalue and described PKI as the log-on data of described user, And described log-on data is saved in described server.
Optionally, in described storage medium, also storage has other computer instruction, these computer instructions With step: using described user totem information, described eigenvalue and described PKI as the registration of described user Data, and described log-on data is saved in described server, after corresponding computer instruction is performed, It is performed, comprises the steps: when executed
Receiving the certification request that described electronic equipment sends, described certification request includes that described ID is believed Breath;
Generate the first random number, according to described PKI, described first random number be encrypted, it is thus achieved that second with Machine number, sends described second random number to described electronic equipment;
Receiving the 3rd random number that described electronic equipment returns, described 3rd random number is described electronic equipment root According to the private key in described secret key pair, described second random number is decrypted the random number of acquisition;
If described 3rd random number is identical with described first random number, then by the checking of described server.
Although preferred embodiments of the present invention have been described, but those skilled in the art once know base This creativeness concept, then can make other change and amendment to these embodiments.So, appended right is wanted Ask and be intended to be construed to include preferred embodiment and fall into all changes and the amendment of the scope of the invention.
Obviously, those skilled in the art can carry out various change and modification without deviating from this to the present invention Bright spirit and scope.So, if the present invention these amendment and modification belong to the claims in the present invention and Within the scope of its equivalent technologies, then the present invention is also intended to comprise these change and modification.

Claims (14)

1. an information processing method, is applied in electronic equipment, and described method includes:
Detect when the program conformed to a predetermined condition is run, obtain the user totem information of user's input;
Generate an eigenvalue;
Based on described user totem information and described eigenvalue, generate secret key pair, wherein, described secret key pair bag Include PKI and private key;
Described user totem information, described eigenvalue and described PKI are sent to server, wherein, described Described user, after receiving described user totem information, described eigenvalue and described PKI, is marked by server Knowledge information, described eigenvalue and described PKI are saved in described server as the log-on data of described user In.
2. the method for claim 1, it is characterised in that by described user totem information, institute Stating eigenvalue and described PKI sends after server, described method also includes:
Sending a certification request to described server, described certification request includes described user totem information;
Receiving the first random number that described server returns, described first random number is that described server is according to institute State PKI and the second random number is encrypted the random number of acquisition;
According to described private key, described first random number is decrypted, it is thus achieved that the 3rd random number;
Sending described 3rd random number to described server, wherein, described server receives the described 3rd After random number, if described 3rd random number is identical with described second random number, then testing by described server Card.
3. method as claimed in claim 2, it is characterised in that described by described user totem information, Described eigenvalue and described PKI send after server, and described method also includes:
Delete the private key in described eigenvalue and described unsymmetrical key.
4. method as claimed in claim 3, it is characterised in that described according to described private key to described the One random number is decrypted, it is thus achieved that the 3rd random number, specifically includes:
Generate method according to described user totem information, described eigenvalue and the first key, regenerate described Secret key pair, wherein, it is that described electronic equipment uses in the registration process of website that described first key generates method Secret key pair generate method;
According to the private key in described secret key pair, described first random number is decrypted, it is thus achieved that described 3rd random Number.
5. the method as described in claim 2 or 4, it is characterised in that described by described 3rd random Number sends after described server, and described method also includes:
Receive the certification request results that described server returns;
When described certification request results shows described user by the checking of described server, generate the 4th with Machine number, is encrypted described 4th random number according to described private key, it is thus achieved that the 5th random number;By described Five randoms number send to described server;
Receive the 6th random number that described server returns, if described 4th random number and described 6th random number Identical, then be verified, wherein, described 6th random number be described server according to described PKI to described 5th random number is decrypted the random number of acquisition.
6. an information processing method, is applied in server, and described method includes:
Receive one electronic equipment send user totem information, the PKI in eigenvalue and secret key pair, wherein, Described user totem information is user's identification information in a website register interface input, and described eigenvalue is institute Stating one group of random number that electronic equipment generates, described secret key pair is that described electronic equipment is based on described ID The key that information and described eigenvalue generate;
Using described user totem information, described eigenvalue and described PKI as the log-on data of described user, And described log-on data is saved in described server.
7. method as claimed in claim 6, it is characterised in that described by described user totem information, Described eigenvalue and described PKI are as the log-on data of described user, and described log-on data is saved in institute After stating in server, described method also includes:
Receiving the certification request that described electronic equipment sends, described certification request includes that described ID is believed Breath;
Generate the first random number, according to described PKI, described first random number be encrypted, it is thus achieved that second with Machine number, sends described second random number to described electronic equipment;
Receiving the 3rd random number that described electronic equipment returns, described 3rd random number is described electronic equipment root According to the private key in described secret key pair, described second random number is decrypted the random number of acquisition;
If described 3rd random number is identical with described first random number, then by the checking of described server.
8. an electronic equipment, described electronic equipment includes:
User totem information acquiring unit, during for detecting that the program conformed to a predetermined condition is run, obtains and uses The user totem information of family input;
Eigenvalue signal generating unit, for generating an eigenvalue;
Secret key pair signal generating unit, for based on described user totem information and described eigenvalue, generates secret key pair, Wherein, described secret key pair includes PKI and private key;
Log-on data transmitting element, for sending out described user totem information, described eigenvalue and described PKI Delivering to server, wherein, described server is receiving described user totem information, described eigenvalue and institute After stating PKI, using described user totem information, described eigenvalue and described PKI as the registration of described user Data are saved in described server.
9. electronic equipment as claimed in claim 8, it is characterised in that described electronic equipment also includes:
Certification request transmitting unit, for by described user totem information, described eigenvalue and described PKI Sending after server, send a certification request to described server, described certification request includes described User totem information;
First random number receives unit, for receiving the first random number that described server returns, and described first Random number is the random number that described server is encrypted acquisition according to described PKI to the second random number;
First random nnrber decryption unit, for being decrypted described first random number according to described private key, obtains Obtain the 3rd random number;
3rd random number transmitting element, for described 3rd random number is sent to described server, wherein, After described server receives described 3rd random number, if described 3rd random number and described second random number phase With, then by the checking of described server.
10. electronic equipment as claimed in claim 9, it is characterised in that described electronic equipment also includes:
Delete unit, for described user totem information, described eigenvalue and described PKI being sent described After server, delete the private key in described eigenvalue and described unsymmetrical key.
11. electronic equipments as claimed in claim 10, it is characterised in that described first random nnrber decryption Unit specifically includes:
Secret key pair generates subelement, for according to described user totem information, described eigenvalue and the first key Generation method, regenerates described secret key pair, and wherein, it is that described electronics sets that described first key generates method The standby secret key pair used in the registration process of website generates method;
First random nnrber decryption subelement, is used for according to the private key in described secret key pair described first random number It is decrypted, it is thus achieved that described 3rd random number.
12. electronic equipments as described in claim 9 or 11, it is characterised in that described electronic equipment is also Including:
Certification request results receives unit, for sending described 3rd random number to described server described Afterwards, the certification request results that described server returns is received;
In described certification request results, 4th random number process unit, for showing that described user is by described clothes Business device checking time, generate the 4th random number, according to described private key, described 4th random number is encrypted, Obtain the 5th random number;Described 5th random number is sent to described server;
6th random number process unit, for receiving the 6th random number that described server returns, if described the Four randoms number are identical with described 6th random number, then be verified, and wherein, described 6th random number is described Server is decrypted the random number of acquisition according to described PKI to described 5th random number.
13. 1 kinds of servers, described server includes:
Log-on data receive unit, for receive one electronic equipment send user totem information, eigenvalue and PKI in secret key pair, wherein, described user totem information is user's mark in a website register interface input Knowledge information, described eigenvalue is one group of random number that described electronic equipment generates, and described secret key pair is described electricity The key that subset generates based on described user totem information and described eigenvalue;
Log-on data memory element, for making described user totem information, described eigenvalue and described PKI For the log-on data of described user, and described log-on data is saved in described server.
14. servers as claimed in claim 13, it is characterised in that described server also includes:
Certification request reception unit, for described by described user totem information, described eigenvalue and described PKI is as the log-on data of described user, and after described log-on data is saved in described server, Receiving the certification request that described electronic equipment sends, described certification request includes described user totem information;
First random number process unit, for generate the first random number, according to described PKI to described first with Machine number is encrypted, it is thus achieved that the second random number, sends described second random number to described electronic equipment;
3rd random number process unit, for receiving the 3rd random number that described electronic equipment returns, described the Three randoms number are that described second random number is solved by described electronic equipment according to the private key in described secret key pair The random number of close acquisition;
Authentication ' unit, if identical with described first random number for described 3rd random number, then by described clothes The checking of business device.
CN201510115313.6A 2015-03-16 2015-03-16 Information processing method, electronic equipment and server Pending CN106034122A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510115313.6A CN106034122A (en) 2015-03-16 2015-03-16 Information processing method, electronic equipment and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510115313.6A CN106034122A (en) 2015-03-16 2015-03-16 Information processing method, electronic equipment and server

Publications (1)

Publication Number Publication Date
CN106034122A true CN106034122A (en) 2016-10-19

Family

ID=57150861

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510115313.6A Pending CN106034122A (en) 2015-03-16 2015-03-16 Information processing method, electronic equipment and server

Country Status (1)

Country Link
CN (1) CN106034122A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107196966A (en) * 2017-07-05 2017-09-22 北京信任度科技有限公司 The identity identifying method and system of multi-party trust based on block chain
CN108306728A (en) * 2018-01-19 2018-07-20 四川斐讯信息技术有限公司 A kind of method, server and system obtaining mobile terminal identification
CN109362074A (en) * 2018-09-05 2019-02-19 福建福诺移动通信技术有限公司 The method of h5 and server-side safety communication in a kind of mixed mode APP
CN110474864A (en) * 2018-05-10 2019-11-19 华为技术有限公司 A kind of method and electronic equipment registered, log in mobile applications
CN110545543A (en) * 2019-09-03 2019-12-06 南瑞集团有限公司 authentication method, device and system of wireless equipment
WO2020238537A1 (en) * 2019-05-24 2020-12-03 魏文科 Method for establishing and verifying input value using asymmetric encryption algorithm, and application thereof

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101145913A (en) * 2007-10-25 2008-03-19 东软集团有限公司 A method and system for network security communication
CN101827106A (en) * 2010-04-29 2010-09-08 华为技术有限公司 DHCP safety communication method, device and system
CN102868687A (en) * 2012-09-05 2013-01-09 四川长虹电器股份有限公司 Method for improving security of intelligent street lamp control system
CN103684766A (en) * 2012-08-30 2014-03-26 卓望数码技术(深圳)有限公司 Private key protection method and system for terminal user
CN104333576A (en) * 2014-10-21 2015-02-04 普华基础软件股份有限公司 ECU (Electronic Control Unit) upgrading device and method
CN104580264A (en) * 2015-02-13 2015-04-29 人民网股份有限公司 Login method, registration method and login device as well as login and refrigeration system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101145913A (en) * 2007-10-25 2008-03-19 东软集团有限公司 A method and system for network security communication
CN101827106A (en) * 2010-04-29 2010-09-08 华为技术有限公司 DHCP safety communication method, device and system
CN103684766A (en) * 2012-08-30 2014-03-26 卓望数码技术(深圳)有限公司 Private key protection method and system for terminal user
CN102868687A (en) * 2012-09-05 2013-01-09 四川长虹电器股份有限公司 Method for improving security of intelligent street lamp control system
CN104333576A (en) * 2014-10-21 2015-02-04 普华基础软件股份有限公司 ECU (Electronic Control Unit) upgrading device and method
CN104580264A (en) * 2015-02-13 2015-04-29 人民网股份有限公司 Login method, registration method and login device as well as login and refrigeration system

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107196966A (en) * 2017-07-05 2017-09-22 北京信任度科技有限公司 The identity identifying method and system of multi-party trust based on block chain
CN108306728A (en) * 2018-01-19 2018-07-20 四川斐讯信息技术有限公司 A kind of method, server and system obtaining mobile terminal identification
CN110474864A (en) * 2018-05-10 2019-11-19 华为技术有限公司 A kind of method and electronic equipment registered, log in mobile applications
CN110474864B (en) * 2018-05-10 2021-05-07 华为技术有限公司 Method for registering and logging in mobile application program and electronic equipment
CN109362074A (en) * 2018-09-05 2019-02-19 福建福诺移动通信技术有限公司 The method of h5 and server-side safety communication in a kind of mixed mode APP
CN109362074B (en) * 2018-09-05 2022-12-06 福建福诺移动通信技术有限公司 Method for h5 and server side safety communication in mixed mode APP
WO2020238537A1 (en) * 2019-05-24 2020-12-03 魏文科 Method for establishing and verifying input value using asymmetric encryption algorithm, and application thereof
CN110545543A (en) * 2019-09-03 2019-12-06 南瑞集团有限公司 authentication method, device and system of wireless equipment

Similar Documents

Publication Publication Date Title
US10592651B2 (en) Visual image authentication
Lee et al. Three‐factor control protocol based on elliptic curve cryptosystem for universal serial bus mass storage devices
US20190050554A1 (en) Logo image and advertising authentication
Kim et al. Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme
CN109086615A (en) A kind of support multiple key search public key encryption method of anti-keyword guessing attack
CN106034122A (en) Information processing method, electronic equipment and server
CN106161350B (en) Method and device for managing application identifier
CN106612180A (en) Method and device for realizing session identifier synchronization
Bai et al. Elliptic curve cryptography based security framework for Internet of Things (IoT) enabled smart card
CN104363097B (en) The RFID inter-authentication methods of lightweight on elliptic curve
US11128453B2 (en) Visual image authentication
CN105635075A (en) Method of registering cloud terminal, cloud terminal, cloud server and cloud system
Wang et al. Amnesia: A bilateral generative password manager
Odelu et al. A secure and efficient ECC‐based user anonymity preserving single sign‐on scheme for distributed computer networks
Das A secure and robust password-based remote user authentication scheme using smart cards for the integrated epr information system
CN108390866A (en) Trusted remote method of proof based on the two-way anonymous authentication of dual-proxy
US8954728B1 (en) Generation of exfiltration-resilient cryptographic keys
Hajny et al. Attribute‐based credentials with cryptographic collusion prevention
Schwab et al. Entity authentication in a mobile-cloud environment
CN101510875B (en) Identification authentication method based on N-dimension sphere
Mehraj et al. Contemplation of effective security measures in access management from adoptability perspective
JP7250960B2 (en) User authentication and signature device using user biometrics, and method thereof
Leea et al. An S/Key-like one-time password authentication scheme using smart cards for smart meter
Chen et al. Anti-synchronization and robust authentication for noisy PUF-based smart card
CN107277054A (en) A kind of method and system of data integrity validation

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20161019

RJ01 Rejection of invention patent application after publication