CN106330862A - Secure transmission method and system for dynamic password - Google Patents

Secure transmission method and system for dynamic password Download PDF

Info

Publication number
CN106330862A
CN106330862A CN201610649358.6A CN201610649358A CN106330862A CN 106330862 A CN106330862 A CN 106330862A CN 201610649358 A CN201610649358 A CN 201610649358A CN 106330862 A CN106330862 A CN 106330862A
Authority
CN
China
Prior art keywords
mobile terminal
ciphertext
server end
dynamic password
note
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610649358.6A
Other languages
Chinese (zh)
Inventor
崔黎帆
张庆勇
胡进
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WUHAN ARGUSEC TECHNOLOGY CO LTD
Original Assignee
WUHAN ARGUSEC TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WUHAN ARGUSEC TECHNOLOGY CO LTD filed Critical WUHAN ARGUSEC TECHNOLOGY CO LTD
Priority to CN201610649358.6A priority Critical patent/CN106330862A/en
Publication of CN106330862A publication Critical patent/CN106330862A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]

Abstract

The invention discloses a secure transmission method for a dynamic password. The method comprises the steps: a mobile terminal obtains user information from a third party application, uses the asymmetric key algorithm to generate a key pair according to the user information, and stores the generated key pair in the mobile terminal; the mobile terminal obtains its own unique identification information and sends the user information, the public key of the generated key pair, and the unique identification information of the mobile terminal to a server; the server establishes a mapping relationship table among the user information, the public key of the generated key pair, and the unique identification information of the mobile terminal that all pass the validity check, and sends a notice of success of mapping relationship establishment to the mobile terminal; and the mobile terminal receives the notice of success of mapping relationship establishment and continues to monitor all the short messages. The method and the system can overcome the technical problems that the dynamic password is easily intercepted, acquired, received or eavesdropped by the third party in the existing dynamic password encryption transmission process.

Description

The safe transmission method of a kind of dynamic password and system
Technical field
The invention belongs to field of information security technology, more particularly, to a kind of dynamic password safe transmission method and System.
Background technology
Along with the development of dynamic-password technique, at present, whether it is traded in ecommerce, or needs at other Carry out in authentication or the checking of authority and the system authorized, all at substantial amounts of use dynamic-password technique, along with shifting The rapid growth of dynamic the Internet, dynamic password is combined the dynamic password short message verification code (letter below formed with mobile interchange terminal Claim short message verification code) extensively and more and more used, it is well known that, the closeest in short message verification code The transmission of code, to transmit, receive be all to carry out when in plain text, the sender of short message verification code, transmission intermediary, Yi Jijie Debit cannot ensure that dynamic password will not be intercepted by third party, obtain, receive or eavesdrop, thus result in some illegal point Son can get dynamic password by some any special measures, causes the adverse consequences such as leakage of personal information, property loss.
Summary of the invention
For disadvantages described above or the Improvement requirement of prior art, the invention provides the safe transmission side of a kind of dynamic password Method and system, it is intended that during solving existing dynamic password encrypted transmission due to dynamic password transmission, transmit, connect Receiving is all to carry out caused dynamic password when in plain text easily to be intercepted by third party, obtain, receive or eavesdrop, and Further result in some lawless persons and can cause the adverse consequences such as leakage of personal information, property loss by obtaining dynamic password Technical problem.
For achieving the above object, according to one aspect of the present invention, it is provided that the safe transmission side of a kind of dynamic password Method, comprises the steps:
(1) mobile terminal obtains user profile from third-party application, and uses asymmetric key algorithm according to this user profile Generate double secret key, and the double secret key of generation is stored in mobile terminal;
(2) mobile terminal obtains the unique identification information of self, and the cipher key pair that will generate in user profile, step (1) PKI and the unique identification information of mobile terminal be sent collectively to server end;
(3) server end is set up by the user profile of validity checking, the PKI of cipher key pair and mobile terminal only Mapping relations table between one identification information three, and notice mapping relations being successfully established is sent to mobile terminal;
(4) mobile terminal is persistently monitored after receiving the notice that the mapping relations coming from server end transmission are successfully established All notes;
(5) received server-side comes from the CIPHERING REQUEST of third-party platform, according to the user profile in this CIPHERING REQUEST Inquiring about the PKI of correspondence in mapping relations table, the dynamic password using this PKI inquired to associate CIPHERING REQUEST adds Close, to generate ciphertext, and the ciphertext generated is passed through short message sending to mobile terminal;
(6) mobile terminal judges that whether number corresponding to the note that receives be the number that this server end sends note, as Fruit is to enter step (7), otherwise abandons this note, and persistently monitors next note;
(7) private key of the cipher key pair that mobile terminal use step (1) generates is to from the ciphertext in the note of server end It is decrypted, to generate original text, and original text is shown to user.
Preferably, the mode generating double secret key in step (1) can also be, after obtaining user profile, and stochastic generation one Random factor, and use asymmetric key algorithm to generate key according to user profile and this random factor.
Preferably, the following steps after described method further includes at step (2), before step (3):
(the 2 ') server end unique mark to user profile, the PKI of cipher key pair and the mobile terminal from mobile terminal Knowledge information carries out validity checking.
Preferably, the following steps after described method further includes at step (2) or (2 '), before step (3):
(2 ") server end is by the conjunction to the user profile from mobile terminal of the third-party platform at third-party application place Method checks.
Preferably, the dynamic password in step (5) associated CIPHERING REQUEST is encrypted and by the ciphertext of generation with note Form be sent to the process of mobile terminal and include following sub-step:
(5-1) this PKI inquired is used dynamic password to be encrypted, to obtain dynamic password ciphertext;
(5-2) the encrypted indicia symbol using server end and mobile terminal to make an appointment is combined with dynamic password ciphertext, To obtain combining ciphertext;
(5-3) the short message prompt content that this combination ciphertext and server end and mobile terminal are made an appointment is combined, with Obtaining complete note, this note includes ciphertext, and by this short message sending to mobile terminal.
Preferably, the mode generating ciphertext in step (5) can also be to come from third-party platform at received server-side CIPHERING REQUEST after, according to the user profile in this CIPHERING REQUEST inquire about in mapping relations table correspondence PKI, randomly generate One random factor, the dynamic password using this random factor and associating CIPHERING REQUEST with this PKI inquired is encrypted, To generate ciphertext.
Preferably, show user in step (7) can also be dynamic password, and it is to use step by mobile terminal (5) private key of the cipher key pair that the random factor produced and step (1) generate is decrypted life to the ciphertext from server end Become.
Preferably, the ciphertext from server end is decrypted, includes following sub-step generating the process of dynamic password Rapid:
(7-1) short message prompt content server end in note and mobile terminal made an appointment is deleted, to obtain ciphertext group Bag;
(7-2) the encrypted indicia symbol made an appointment in server end and mobile terminal in ciphertext group bag is deleted, to be encrypted The dynamic password ciphertext of request association;
(7-3) use the private key of the cipher key pair generated in step (1) that the dynamic password ciphertext obtained is decrypted, with Obtain dynamic password original text.
It is another aspect of this invention to provide that provide the secure transmission system of a kind of dynamic password, including:
First module, it is arranged at mobile terminal, for obtaining user profile from third-party application, and according to this user profile Use asymmetric key algorithm to generate double secret key, and the double secret key of generation is stored in mobile terminal;
Second module, it is arranged at mobile terminal, for obtaining the unique identification information of self, and by user profile, first The PKI of cipher key pair and the unique identification information of mobile terminal that generate in module are sent collectively to server end;
Three module, it is arranged at server end, for setting up by the user profile of validity checking, cipher key pair Mapping relations table between the unique identification information three of PKI and mobile terminal, and the notice that mapping relations are successfully established It is sent to mobile terminal;
4th module, it is arranged at mobile terminal, for receiving the mapping relations foundation coming from server end transmission Successfully persistently monitor all notes after notice;
5th module, it is arranged at server end, for receiving the CIPHERING REQUEST coming from third-party platform, adds according to this User profile in close request inquires about the PKI of correspondence in mapping relations table, uses this PKI inquired to close CIPHERING REQUEST The dynamic password of connection is encrypted, and to generate ciphertext, and the ciphertext generated is passed through short message sending to mobile terminal;
6th module, whether it is arranged at mobile terminal, be this server for judging number corresponding to the note received End sends the number of note, if yes then enter the 7th module, otherwise abandons this note, and persistently monitors next note;
7th module, it is arranged at mobile terminal, for using the private key of the cipher key pair of the first module generation to from clothes Ciphertext in the note of business device end is decrypted, and to generate original text, and original text is shown to user.
It is another aspect of this invention to provide that provide the safe transmission method of a kind of dynamic password, comprise the steps:
(1) mobile terminal obtains user profile from third-party application;
(2) mobile terminal obtains the unique identification information of self, and by the unique identification information one of user profile and mobile terminal Rise and be sent to server end;
(3) server end stochastic generation random number is as dispersion factor, sets up by the user profile of validity checking, divides Dissipate the mapping relations table between the factor and the unique identification information three of mobile terminal, and mapping relations are successfully established logical Know and be sent to mobile terminal;
(4) mobile terminal receive come from the notice that is successfully established of mapping relations and step (3) that server end sends raw The dispersion factor become, storage dispersion factor also persistently monitors all notes;
(5) received server-side comes from the CIPHERING REQUEST of third-party platform, according to the user profile in this CIPHERING REQUEST Inquiring about the dispersion factor of correspondence in mapping relations table, it is the closeest that CIPHERING REQUEST is associated by this dispersion factor that use inquires Code is encrypted, and to generate ciphertext, and the ciphertext generated is passed through short message sending to mobile terminal;
(6) mobile terminal judges that whether number corresponding to the note that receives be the number that this server end sends note, as Fruit is to enter step (7), otherwise abandons this note, and persistently monitors next note;
(7) dispersion factor that mobile terminal uses step (4) to store generates key, and uses this double secret key from server end Note in ciphertext be decrypted, to generate original text, and original text is shown to user.
In general, by the contemplated above technical scheme of the present invention compared with prior art, it is possible to show under acquirement Benefit effect:
1, owing to present invention uses rivest, shamir, adelman or symmetric encipherment algorithm encryption dynamic password so that after encryption Dynamic password be difficult to be obtained by lawless person or crack, therefore, it is possible to during solving existing dynamic password encrypted transmission due to The transmission of dynamic password, to transmit, receive be all to carry out caused dynamic password when in plain text easily to be blocked by third party Cut, obtain, receive or eavesdrop, and further result in some lawless persons can by obtain dynamic password, cause personal information The technical problem of the adverse consequencess such as leakage, property loss;
2, present invention can apply to various mobile terminal and server end, applied widely;
3, the dynamic password of the present invention is all to carry out with encrypted test mode in time sending, transmit, receive, and is only shown to mobile Just understand the when of end subscriber with clear-text way, it is achieved thereby that from the protection producing the whole link of checking of dynamic password, and Safe transmission for dynamic password provides strong guarantee.
Accompanying drawing explanation
Fig. 1 is the flow chart of the safe transmission method of the dynamic password according to first embodiment of the invention.
Fig. 2 is the flow chart of the safe transmission method of the dynamic password according to second embodiment of the invention.
Detailed description of the invention
In order to make the purpose of the present invention, technical scheme and advantage clearer, below in conjunction with drawings and Examples, right The present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, and It is not used in the restriction present invention.If additionally, technical characteristic involved in each embodiment of invention described below The conflict of not constituting each other just can be mutually combined.
As it is shown in figure 1, comprise the steps: according to the safe transmission method of the dynamic password of first embodiment of the invention
(1) mobile terminal obtains user profile from third-party application, and uses asymmetric key algorithm according to this user profile Generate double secret key, and the double secret key of generation is stored in mobile terminal;
In the present embodiment, mobile terminal can be any mobile device carrying out network service or main process equipment, all Such as PC (Personal Computer is called for short PC), mobile phone, panel computer, personal digital assistants (Personal Digital Assistant, is called for short PDA) etc..
Specifically, third-party application can be various transaction system, including, but not limited to bank transaction system, security Transaction system, government bodies' official document system etc., it can provide user profile, and this user profile is including, but not limited to user's Account, title, telephone number etc.;
In the present embodiment, asymmetric key algorithm is including, but not limited to RSA Algorithm (Rivest-Shamir- Adleman algorithm), Elliptic Curve Cryptography algorithm (Elliptic curve cryptography, be called for short ECC), SM2 algorithm Deng;
Alternatively, this step can also be, mobile terminal obtains user profile from third-party application, and stochastic generation one is random The factor, and use asymmetric key algorithm to generate double secret key according to user profile and this random factor, thus further enhance life The safety of the double secret key become;
(2) mobile terminal obtains the unique identification information of self, and the cipher key pair that will generate in user profile, step (1) PKI and the unique identification information of mobile terminal be sent collectively to server end;This unique identification information is for mobile phone Being its IMEI number or IMSI number, be its serial number that dispatches from the factory for PDA and computer, this unique identification information can also be mobile The hardware number of certain parts (such as CPU, network interface card etc.) in end;
As it is further preferred that this method may additionally include the following steps after step (2):
(the 2 ') server end unique mark to user profile, the PKI of cipher key pair and the mobile terminal from mobile terminal Knowledge information carries out validity checking;
Specifically, user profile is carried out validity checking and is whether the length checking user profile is in a threshold value In the range of, if be in this threshold range, then proving that this user profile is legal, otherwise representing that user profile is illegal; The lower limit of this threshold value is 0, and higher limit is the message length that in third-party application, user profile length is maximum.
It is to check whether this PKI length uses equal in step (1) that the PKI of cipher key pair carries out validity checking The PKI length of the code requirement corresponding to asymmetric key algorithm, if equal to represent that this PKI is legal, otherwise represents This PKI is illegal.
The unique identification information of mobile terminal is carried out validity checking specifically check the IMEI number of mobile phone or IMSI number, In dispatch from the factory serial number and the mobile terminal of PDA or computer, whether the hardware number of certain parts (such as CPU, network interface card etc.) meets Specific length (such as IMEI is 15, and computer serial number is 11 etc.), if met, then identifies this unique identification information It is legal, otherwise represents it is illegal.
As it is further preferred that after the method for the present invention may additionally include above-mentioned steps (2) or step (2 ') Following steps:
(2 ") server end is by the conjunction to the user profile from mobile terminal of the third-party platform at third-party application place Method checks;
(3) server end is set up by the user profile of validity checking, the PKI of cipher key pair and mobile terminal only Mapping relations table (i.e. achieving the binding between three) between one identification information three, and mapping relations are successfully established Notice is sent to mobile terminal;
(4) mobile terminal is persistently monitored after receiving the notice that the mapping relations coming from server end transmission are successfully established All notes;
(5) received server-side comes from the CIPHERING REQUEST of third-party platform, according to the user profile in this CIPHERING REQUEST Inquiring about the PKI of correspondence in mapping relations table, the dynamic password using this PKI inquired to associate CIPHERING REQUEST adds Close, to generate ciphertext, and the ciphertext generated is passed through short message sending to mobile terminal;
Specifically, dynamic password can be the information carried in CIPHERING REQUEST, it is also possible to be treating of specifying of CIPHERING REQUEST The information of stochastic generation, dynamic password can be specifically numeral, Chinese character, Chinese and English character etc..
The AES used in this step is identical with the AES used in above-mentioned steps (1).
Alternatively, this step can also be, received server-side comes from the CIPHERING REQUEST of third-party platform, according to this User profile in CIPHERING REQUEST inquires about the PKI of correspondence in mapping relations table, randomly generates a random factor, and using should The dynamic password that CIPHERING REQUEST is associated by random factor with this PKI inquired is encrypted, and to generate ciphertext, and will generate Ciphertext be sent to mobile terminal with the form of note;
In detail, the dynamic password of CIPHERING REQUEST association is encrypted and the ciphertext of generation is sent out with the form of note Deliver to the process of mobile terminal and include following sub-step:
(5-1) this PKI inquired is used dynamic password to be encrypted, to obtain dynamic password ciphertext Cifer;
(5-2) (it can be letter, numeral, character to the encrypted indicia symbol that make an appointment in use server end and mobile terminal Or its combination in any) and dynamic password ciphertext Cifer be combined, with obtain combine ciphertext;Such as, that makes an appointment adds secret mark Note symbol is FF or 00, and dynamic password ciphertext is Cifer, then combination ciphertext | | Cifer or 00 | | the Cifer that is FF.
(5-3) short message prompt content (such as, this note this combination ciphertext and server end and mobile terminal made an appointment Suggestion content is " identifying code of this transaction is: ") it is combined, to obtain complete note, this note includes ciphertext, and By this short message sending to mobile terminal.
(6) mobile terminal judges that whether number corresponding to the note that receives be the number that this server end sends note, as Fruit is to enter step (7), otherwise abandons this note, and persistently monitors next note;Such as, if a certain moment mobile terminal Receiving a note, the number of its correspondence is 106922222, and mobile terminal judges that this number is not that server end transmission is short The number 106900000 of letter, then this note is abandoned in mobile terminal, continues to monitor next note;
(7) private key of the cipher key pair that mobile terminal use step (1) generates is to from the ciphertext in the note of server end It is decrypted, to generate original text, and original text is shown to user.
Alternatively, when generating random factor in step (5), this step is: mobile terminal uses step (5) to produce Ciphertext from server end is decrypted by the private key of the cipher key pair that random factor and step (1) generate, to generate dynamically Password, and dynamic password is shown to user.
Specifically, the algorithm that deciphering is used is the most corresponding with the AES used in above-mentioned steps (1).
Above-mentioned the ciphertext from server end is decrypted, includes following sub-step generating the process of dynamic password:
(7-1) short message prompt content server end in note and mobile terminal made an appointment is deleted, to obtain ciphertext group Bag;
(7-2) the encrypted indicia symbol made an appointment in server end and mobile terminal in ciphertext group bag is deleted, to be encrypted The dynamic password ciphertext of request association;
(7-3) use the private key of the cipher key pair generated in step (1) that the dynamic password ciphertext obtained is decrypted, with Obtain dynamic password original text.
The safe transmission method of the dynamic password according to second embodiment of the invention comprises the steps:
(1) mobile terminal obtains user profile from third-party application;
Specifically, third-party application can be various transaction system, including, but not limited to bank transaction system, security Transaction system, government bodies' official document system etc., it can provide user profile, and this user profile is including, but not limited to user's Account, title, telephone number etc.;
(2) mobile terminal obtains the unique identification information of self, and by the unique identification information one of user profile and mobile terminal Rise and be sent to server end;This unique identification information is its IMEI number or IMSI number for mobile phone, for PDA and computer Speech is its serial number that dispatches from the factory, and this unique identification information can also be the hardware of certain parts in mobile terminal (such as CPU, network interface card etc.) Number;
As it is further preferred that this method may additionally include the following steps after step (2):
(2 ') server end carries out legitimacy to from the user profile of mobile terminal and the unique identification information of mobile terminal Check;
Specifically, user profile is carried out validity checking and is whether the length checking user profile is in a threshold value In the range of, if be in this threshold range, then proving that this user profile is legal, otherwise representing that user profile is illegal; The lower limit of this threshold value is 0, and higher limit is the message length that in third-party application, user profile length is maximum.
The unique identification information of mobile terminal is carried out validity checking specifically check the IMEI number of mobile phone or IMSI number, In dispatch from the factory serial number and the mobile terminal of PDA or computer, whether the hardware number of certain parts (such as CPU, network interface card etc.) meets Specific length (such as IMEI is 15, and computer serial number is 11 etc.), if met, then identifies this unique identification information It is legal, otherwise represents it is illegal.
As it is further preferred that after the method for the present invention may additionally include above-mentioned steps (2) or step (2 ') Following steps:
(2 ") server end is by the conjunction to the user profile from mobile terminal of the third-party platform at third-party application place Method checks;
(3) server end stochastic generation random number is as dispersion factor, sets up by the user profile of validity checking, divides Dissipate the mapping relations table (i.e. achieving the binding between three) between the factor and the unique identification information three of mobile terminal, And notice mapping relations being successfully established is sent to mobile terminal;
(4) mobile terminal receive come from the notice that is successfully established of mapping relations and step (3) that server end sends raw The dispersion factor become, storage dispersion factor also persistently monitors all notes;
(5) received server-side comes from the CIPHERING REQUEST of third-party platform, according to the user profile in this CIPHERING REQUEST Inquiring about the dispersion factor of correspondence in mapping relations table, it is the closeest that CIPHERING REQUEST is associated by this dispersion factor that use inquires Code is encrypted, and to generate ciphertext, and the ciphertext generated is passed through short message sending to mobile terminal;
Specifically, dynamic password can be the information carried in CIPHERING REQUEST, it is also possible to be treating of specifying of CIPHERING REQUEST The information of stochastic generation, dynamic password can be specifically numeral, Chinese character, Chinese and English character etc..
Alternatively, this step can also be, received server-side comes from the CIPHERING REQUEST of third-party platform, according to this User profile in CIPHERING REQUEST inquires about the dispersion factor of correspondence in mapping relations table, randomly generates a random factor, makes The dynamic password associated CIPHERING REQUEST with this dispersion factor inquired with this random factor is encrypted, to generate ciphertext, And the ciphertext of generation is sent to mobile terminal with the form of note;
In detail, the dynamic password of CIPHERING REQUEST association is encrypted and the ciphertext of generation is sent out with the form of note Deliver to the process of mobile terminal and include following sub-step:
(5-1) use hash algorithm that dispersion factor is carried out Hash operation, to obtain cryptographic Hash, and utilize cut position algorithm pair This cryptographic Hash carries out cut position, to obtain encryption key, uses this encryption key to be encrypted dynamic password, the closeest to generate Code ciphertext;
Specifically, first cryptographic Hash is carried out cut position computing, to obtain the encryption identical with dynamic password original text length Key, then uses this encryption key that dynamic password original text carries out step-by-step XOR, thus generates dynamic password ciphertext;
(5-2) (it can be letter, numeral, character to the encrypted indicia symbol that make an appointment in use server end and mobile terminal Or its combination in any) and dynamic password ciphertext be combined, with obtain combine ciphertext;Such as, the encrypted indicia symbol made an appointment Being FF or 00, dynamic password ciphertext is Cifer, then combination ciphertext | | dynamic password ciphertext or 00 | | the dynamic password ciphertext that is FF.
(5-3) short message prompt content (such as, this note this combination ciphertext and server end and mobile terminal made an appointment Suggestion content is " identifying code of this transaction is: ") it is combined, to obtain complete note, this note includes ciphertext, and By this short message sending to mobile terminal.
(6) mobile terminal judges that whether number corresponding to the note that receives be the number that this server end sends note, as Fruit is to enter step (7), otherwise abandons this note, and persistently monitors next note;Such as, if a certain moment mobile terminal Receiving a note, the number of its correspondence is 106922222, and mobile terminal judges that this number is not that server end transmission is short The number 106900000 of letter, then this note is abandoned in mobile terminal, continues to monitor next note;
(7) dispersion factor that mobile terminal uses step (4) to store generates key, and uses this double secret key from server end Note in ciphertext be decrypted, to generate original text, and original text is shown to user.
Alternatively, when generating random factor in step (5), this step is: mobile terminal uses step (5) to produce Dispersion factor and random factor generate double secret key and are decrypted from the ciphertext of server end, to generate dynamic password, and will be dynamic State password is shown to user.
Specifically, the algorithm that deciphering is used is the most corresponding with the AES used in above-mentioned steps (5).
Above-mentioned the ciphertext from server end is decrypted, includes following sub-step generating the process of dynamic password:
(7-1) short message prompt content server end in note and mobile terminal made an appointment is deleted, to obtain ciphertext group Bag;
(7-2) the encrypted indicia symbol made an appointment in server end and mobile terminal in ciphertext group bag is deleted, to be encrypted The dynamic password ciphertext of request association;
(7-3) use hash algorithm that dispersion factor is carried out Hash operation, to obtain cryptographic Hash, and utilize cut position algorithm pair Cryptographic Hash carries out cut position, to obtain decruption key, and uses this decruption key to be decrypted dynamic password, the closeest to generate Code is in plain text;
Specifically, first cryptographic Hash is carried out cut position computing, to obtain the deciphering identical with dynamic password ciphertext length Key, then uses this decruption key that dynamic password ciphertext carries out step-by-step XOR, generates dynamic password in plain text.
Present invention also offers the secure transmission system of a kind of dynamic password, including:
First module, it is arranged at mobile terminal, for obtaining user profile from third-party application, and according to this user profile Use asymmetric key algorithm to generate double secret key, and the double secret key of generation is stored in mobile terminal;
Second module, it is arranged at mobile terminal, for obtaining the unique identification information of self, and by user profile, first The PKI of cipher key pair and the unique identification information of mobile terminal that generate in module are sent collectively to server end;
Three module, it is arranged at server end, for setting up by the user profile of validity checking, cipher key pair Mapping relations table between the unique identification information three of PKI and mobile terminal, and the notice that mapping relations are successfully established It is sent to mobile terminal;
4th module, it is arranged at mobile terminal, for receiving the mapping relations foundation coming from server end transmission Successfully persistently monitor all notes after notice;
5th module, it is arranged at server end, for receiving the CIPHERING REQUEST coming from third-party platform, adds according to this User profile in close request inquires about the PKI of correspondence in mapping relations table, uses this PKI inquired to close CIPHERING REQUEST The dynamic password of connection is encrypted, and to generate ciphertext, and the ciphertext generated is passed through short message sending to mobile terminal;
6th module, whether it is arranged at mobile terminal, be this server for judging number corresponding to the note received End sends the number of note, if yes then enter the 7th module, otherwise abandons this note, and persistently monitors next note;
7th module, it is arranged at mobile terminal, for using the private key of the cipher key pair of the first module generation to from clothes Ciphertext in the note of business device end is decrypted, and to generate original text, and original text is shown to user.
The present invention still further provides the secure transmission system of a kind of dynamic password, including:
First module, it is arranged at mobile terminal, for obtaining user profile from third-party application;
Second module, it is arranged at mobile terminal, for obtaining the unique identification information of self, and by user profile and movement The unique identification information of end is sent collectively to server end;
Three module, it is arranged at server end, for stochastic generation random number as dispersion factor, sets up by legal Property the unique identification information three of user profile, dispersion factor and mobile terminal that checks between mapping relations table, and will reflect The notice that the relation of penetrating is successfully established is sent to mobile terminal;
4th module, it is arranged at mobile terminal, is successfully established for receiving the mapping relations coming from server end transmission Notice and step (3) in the dispersion factor that generates, storage dispersion factor also persistently monitors all notes;
5th module, it is arranged at server end, for receiving the CIPHERING REQUEST coming from third-party platform, adds according to this User profile in close request inquires about the dispersion factor of correspondence in mapping relations table, uses this dispersion factor inquired to adding The dynamic password of close request association is encrypted, and to generate ciphertext, and the ciphertext generated is passed through short message sending to mobile terminal;
6th module, whether it is arranged at mobile terminal, be this server for judging number corresponding to the note received End sends the number of note, if yes then enter the 7th module, otherwise abandons this note, and persistently monitors next note;
7th module, it is arranged at mobile terminal, for using the dispersion factor of the 4th module stores to generate key, and uses This double secret key is decrypted from the ciphertext in the note of server end, to generate original text, and original text is shown to user.
As it will be easily appreciated by one skilled in the art that and the foregoing is only presently preferred embodiments of the present invention, not in order to Limit the present invention, all any amendment, equivalent and improvement etc. made within the spirit and principles in the present invention, all should comprise Within protection scope of the present invention.

Claims (10)

1. the safe transmission method of a dynamic password, it is characterised in that comprise the steps:
(1) mobile terminal obtains user profile from third-party application, and uses asymmetric key algorithm to generate according to this user profile Double secret key, and the double secret key of generation is stored in mobile terminal;
(2) mobile terminal obtains the unique identification information of self, and by the public affairs of the cipher key pair of generation in user profile, step (1) The unique identification information of key and mobile terminal is sent collectively to server end;
(3) server end sets up the unique mark by the user profile of validity checking, the PKI of cipher key pair and mobile terminal Mapping relations table between knowledge information three, and notice mapping relations being successfully established is sent to mobile terminal;
(4) mobile terminal is persistently monitored all after receiving the notice that the mapping relations coming from server end transmission are successfully established Note;
(5) received server-side comes from the CIPHERING REQUEST of third-party platform, is reflecting according to the user profile in this CIPHERING REQUEST Penetrating the PKI inquiring about correspondence in relation table, the dynamic password using this PKI inquired to associate CIPHERING REQUEST is encrypted, To generate ciphertext, and the ciphertext generated is passed through short message sending to mobile terminal;
(6) mobile terminal judges that whether number corresponding to the note that receives be the number that this server end sends note, if Then enter step (7), otherwise abandon this note, and persistently monitor next note;
(7) private key of the cipher key pair that mobile terminal use step (1) generates is carried out from the ciphertext in the note of server end Deciphering, to generate original text, and is shown to user by original text.
Safe transmission method the most according to claim 1, it is characterised in that generate the mode of double secret key in step (1) also Can be, after obtaining user profile, stochastic generation one random factor, and non-right according to user profile and the use of this random factor Key algorithm is claimed to generate key.
Safe transmission method the most according to claim 1, it is characterised in that after further including at step (2), step (3) following steps before:
(2 ') server end uniquely identifies letter to user profile, the PKI of cipher key pair and the mobile terminal from mobile terminal Breath carries out validity checking.
4. according to the safe transmission method described in claim 1 or 3, it is characterised in that further include at step (2) or (2 ') Afterwards, the following steps before step (3):
(2 ") server end is by the third-party platform at the third-party application place legitimacy to the user profile from mobile terminal Check.
Safe transmission method the most according to claim 1, it is characterised in that CIPHERING REQUEST association is moved in (5) by step State password is encrypted and with the form of note, the ciphertext of generation is sent to the process of mobile terminal and includes following sub-step:
(5-1) this PKI inquired is used dynamic password to be encrypted, to obtain dynamic password ciphertext;
(5-2) the encrypted indicia symbol using server end and mobile terminal to make an appointment is combined with dynamic password ciphertext, with To combination ciphertext;
(5-3) the short message prompt content that this combination ciphertext and server end and mobile terminal are made an appointment is combined, to obtain Complete note, this note includes ciphertext, and by this short message sending to mobile terminal.
Safe transmission method the most according to claim 1, it is characterised in that the mode generating ciphertext in step (5) also may be used Think, after received server-side comes from the CIPHERING REQUEST of third-party platform, exist according to the user profile in this CIPHERING REQUEST Mapping relations table is inquired about the PKI of correspondence, randomly generates a random factor, use this random factor and these public affairs inquired The dynamic password that CIPHERING REQUEST is associated by key is encrypted, to generate ciphertext.
Safe transmission method the most according to claim 6, it is characterised in that show user in step (7) can also Being dynamic password, it is the private of the cipher key pair using step (5) random factor that produces and step (1) to generate by mobile terminal Key is decrypted generation to the ciphertext from server end.
Safe transmission method the most according to claim 7, it is characterised in that the ciphertext from server end is solved Close, include following sub-step generating the process of dynamic password:
(7-1) short message prompt content server end in note and mobile terminal made an appointment is deleted, to obtain ciphertext group bag;
(7-2) the encrypted indicia symbol made an appointment in server end and mobile terminal in ciphertext group bag is deleted, to obtain CIPHERING REQUEST The dynamic password ciphertext of association;
(7-3) private key of the cipher key pair generated in step (1) is used the dynamic password ciphertext obtained to be decrypted, to obtain Dynamic password original text.
9. the secure transmission system of a dynamic password, it is characterised in that including:
First module, it is arranged at mobile terminal, for obtaining user profile from third-party application, and uses according to this user profile Asymmetric key algorithm generates double secret key, and is stored in mobile terminal by the double secret key of generation;
Second module, it is arranged at mobile terminal, for obtaining the unique identification information of self, and by user profile, the first module The PKI of the cipher key pair of middle generation and the unique identification information of mobile terminal are sent collectively to server end;
Three module, it is arranged at server end, for setting up by the user profile of validity checking, the public affairs of cipher key pair Mapping relations table between the unique identification information three of key and mobile terminal, and notice mapping relations being successfully established sends out Deliver to mobile terminal;
4th module, it is arranged at mobile terminal, for coming from the mapping relations that server end sends and be successfully established receiving Notice after persistently monitor all notes;
5th module, it is arranged at server end, for receiving the CIPHERING REQUEST coming from third-party platform, please according to this encryption The user profile asked inquires about the PKI of correspondence in mapping relations table, uses this PKI inquired to associate CIPHERING REQUEST Dynamic password is encrypted, and to generate ciphertext, and the ciphertext generated is passed through short message sending to mobile terminal;
6th module, whether it is arranged at mobile terminal, be that this server end is sent out for judging number corresponding to the note received Send the number of note, if yes then enter the 7th module, otherwise abandon this note, and persistently monitor next note;
7th module, it is arranged at mobile terminal, for using the private key of the cipher key pair of the first module generation to from server Ciphertext in the note of end is decrypted, and to generate original text, and original text is shown to user.
10. the safe transmission method of a dynamic password, it is characterised in that comprise the steps:
(1) mobile terminal obtains user profile from third-party application;
(2) mobile terminal obtains the unique identification information of self, and is risen by the unique identification information one of user profile and mobile terminal Deliver to server end;
(3) server end stochastic generation random number is as dispersion factor, set up by the user profile of validity checking, dispersion because of Mapping relations table between son and the unique identification information three of mobile terminal, and notice mapping relations being successfully established sends out Deliver to mobile terminal;
(4) mobile terminal receives to come from and generates in the notice that is successfully established of mapping relations and step (3) that server end sends Dispersion factor, storage dispersion factor also persistently monitors all notes;
(5) received server-side comes from the CIPHERING REQUEST of third-party platform, is reflecting according to the user profile in this CIPHERING REQUEST Penetrating the dispersion factor inquiring about correspondence in relation table, the dynamic password using this dispersion factor inquired to associate CIPHERING REQUEST enters Row encryption, to generate ciphertext, and passes through short message sending to mobile terminal by the ciphertext generated;
(6) mobile terminal judges that whether number corresponding to the note that receives be the number that this server end sends note, if Then enter step (7), otherwise abandon this note, and persistently monitor next note;
(7) mobile terminal uses step (4) dispersion factor that stores to generate key, and uses short from server end of this double secret key Ciphertext in letter is decrypted, and to generate original text, and original text is shown to user.
CN201610649358.6A 2016-08-10 2016-08-10 Secure transmission method and system for dynamic password Pending CN106330862A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610649358.6A CN106330862A (en) 2016-08-10 2016-08-10 Secure transmission method and system for dynamic password

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610649358.6A CN106330862A (en) 2016-08-10 2016-08-10 Secure transmission method and system for dynamic password

Publications (1)

Publication Number Publication Date
CN106330862A true CN106330862A (en) 2017-01-11

Family

ID=57739719

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610649358.6A Pending CN106330862A (en) 2016-08-10 2016-08-10 Secure transmission method and system for dynamic password

Country Status (1)

Country Link
CN (1) CN106330862A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108513272A (en) * 2018-07-04 2018-09-07 北京奇安信科技有限公司 Method for processing short messages and device
CN108694333A (en) * 2017-04-07 2018-10-23 华为技术有限公司 User information processing method and processing device
CN109120612A (en) * 2018-08-06 2019-01-01 浙江衣拿智能科技有限公司 A kind of packet filtering method, system and application program
CN109587683A (en) * 2019-01-04 2019-04-05 中国联合网络通信集团有限公司 Method and system, application program and the terminal information database of the anti-monitoring of short message
CN110234082A (en) * 2019-05-30 2019-09-13 深圳市梦网科技发展有限公司 A kind of addressing method of mobile terminal, device, storage medium and server
WO2020048289A1 (en) * 2018-09-05 2020-03-12 深圳市红砖坊技术有限公司 System and method for processing user information
CN112257094A (en) * 2020-11-11 2021-01-22 恩亿科(北京)数据科技有限公司 Data processing method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101188496A (en) * 2007-12-10 2008-05-28 中兴通讯股份有限公司 A SMS encryption transport method
CN101262349A (en) * 2008-04-17 2008-09-10 华为技术有限公司 SMS-based identity authentication method and device
CN101917710A (en) * 2010-08-27 2010-12-15 中兴通讯股份有限公司 Method, system and related device for mobile internet encryption communication
CN104079581A (en) * 2014-07-16 2014-10-01 金红宇 Identity authentication method and device
CN105282738A (en) * 2015-11-24 2016-01-27 苏州铭冠软件科技有限公司 Security authentication method for mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101188496A (en) * 2007-12-10 2008-05-28 中兴通讯股份有限公司 A SMS encryption transport method
CN101262349A (en) * 2008-04-17 2008-09-10 华为技术有限公司 SMS-based identity authentication method and device
CN101917710A (en) * 2010-08-27 2010-12-15 中兴通讯股份有限公司 Method, system and related device for mobile internet encryption communication
CN104079581A (en) * 2014-07-16 2014-10-01 金红宇 Identity authentication method and device
CN105282738A (en) * 2015-11-24 2016-01-27 苏州铭冠软件科技有限公司 Security authentication method for mobile terminal

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108694333A (en) * 2017-04-07 2018-10-23 华为技术有限公司 User information processing method and processing device
CN108513272A (en) * 2018-07-04 2018-09-07 北京奇安信科技有限公司 Method for processing short messages and device
CN108513272B (en) * 2018-07-04 2021-10-01 奇安信科技集团股份有限公司 Short message processing method and device
CN109120612A (en) * 2018-08-06 2019-01-01 浙江衣拿智能科技有限公司 A kind of packet filtering method, system and application program
CN109120612B (en) * 2018-08-06 2021-04-30 浙江衣拿智能科技股份有限公司 Data packet filtering method, system and application program
WO2020048289A1 (en) * 2018-09-05 2020-03-12 深圳市红砖坊技术有限公司 System and method for processing user information
CN109587683A (en) * 2019-01-04 2019-04-05 中国联合网络通信集团有限公司 Method and system, application program and the terminal information database of the anti-monitoring of short message
CN110234082A (en) * 2019-05-30 2019-09-13 深圳市梦网科技发展有限公司 A kind of addressing method of mobile terminal, device, storage medium and server
CN110234082B (en) * 2019-05-30 2021-10-22 深圳市梦网科技发展有限公司 Addressing method and device of mobile terminal, storage medium and server
CN112257094A (en) * 2020-11-11 2021-01-22 恩亿科(北京)数据科技有限公司 Data processing method and device
CN112257094B (en) * 2020-11-11 2024-03-29 恩亿科(北京)数据科技有限公司 Data processing method and device

Similar Documents

Publication Publication Date Title
CN106330862A (en) Secure transmission method and system for dynamic password
CN103812871B (en) Development method and system based on mobile terminal application program security application
US8433066B2 (en) Method for generating an encryption/decryption key
CN100574511C (en) The method and system of opposite end identity validation in a kind of mobile terminal communication
CN102547688B (en) Virtual-dedicated-channel-based establishment method for high-credibility mobile security communication channel
US9166957B2 (en) Digital file authentication using biometrics
CN104243494B (en) A kind of data processing method
CN101931536B (en) Method for encrypting and authenticating efficient data without authentication center
CN108924147A (en) Method, server and the communication terminal that communication terminal digital certificate is signed and issued
CN107094108A (en) The method for being connected to the part of data/address bus and encryption function being realized in the part
CN113067823B (en) Mail user identity authentication and key distribution method, system, device and medium
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
JP6041864B2 (en) Method, computer program, and apparatus for data encryption
CN103297230B (en) Information encipher-decipher method, Apparatus and system
CN107222501A (en) A kind of information interaction security transmission method and system based on the non-electromagnetic signal of message identification code
CN114095181B (en) Threshold ring signature method and system based on cryptographic algorithm
CN109040060A (en) Terminal-Matching and system, computer equipment
CN107483429A (en) A kind of data ciphering method and device
CN112564906A (en) Block chain-based data security interaction method and system
Nurhaida et al. Digital signature & encryption implementation for increasing authentication, integrity, security and data non-repudiation
CN103986724A (en) Real-name authentication method and system for e-mail
Chauhan et al. Digital signature with message security process
Murdoch Insecure by design: Protocols for encrypted phone calls
CN101174945A (en) Method for validating PUSH message and identity of its transmission part
CN114186998A (en) Privacy communication method based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170111