CN109617701A - Method for using the certification safety in electronic communication - Google Patents
Method for using the certification safety in electronic communication Download PDFInfo
- Publication number
- CN109617701A CN109617701A CN201910062102.9A CN201910062102A CN109617701A CN 109617701 A CN109617701 A CN 109617701A CN 201910062102 A CN201910062102 A CN 201910062102A CN 109617701 A CN109617701 A CN 109617701A
- Authority
- CN
- China
- Prior art keywords
- room
- communication
- communication equipment
- code
- certification safety
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/141—Setup of application sessions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Telephonic Communication Services (AREA)
Abstract
The present invention relates to electronic communication security technology areas, it is particularly used for the method using the certification safety in electronic communication, the method and step of certification safety is as follows: the first communication equipment creates electronic communication room, automatically generates room number, and room verification information is then arranged;Second communication equipment input room number enters room, inputs static code key, and verified;After being verified;After identity information validation problem is answered correctly, it is connected into room;Then the second communication equipment sends speech verification application;First communication equipment receives speech verification application, judges voice messaging;Second communication equipment receives pair verification code, and generates pairing application code;Two groups of communication equipment input pairing application codes complete pairing, communication connection is established, the present invention is able to solve during existing more people's electronic communications, lacks safe identity identifying method, lead to the problem of uncorrelated personnel can enter in communication, in turn result in information leakage in communication process.
Description
Technical field
The present invention relates to electronic communication security technology areas, and in particular to for using the certification safety in electronic communication
Method.
Background technique
Communication is exactly the transmitting of information, refer to from one to carry out anotherly the transmission of information with exchange, the purpose is to pass
Defeated message.Communication is the information interchange and transmitting carried out between men by certain media, in a broad sense, no matter what uses
Kind method, as long as information is transmitted to anotherly from one, can be described as communicating using which kind of medium.
With the development of society, communication timeliness increasingly chased after by masses it is high.More and more electronics are logical thus
Letter equipment, which is continuously created, to be come, and realizes instant messaging by using these electronic communication equipments, makes interpersonal communication
Become increasingly simpler, quick.And along with the development of network communication, more and more electronic communications are all based on the premise of network
Lower progress, and the electronic communication by multiple compositions of personnel can be established in network communication according to a Man's Demands.But by more
Identity identifying method of the electronic communication of people's composition due to lacking safety, enables uncorrelated personnel arbitrarily to enter communication
In, this will lead to that the communication information is caused to be revealed.To security risk occur.For this purpose, we have proposed one kind for using electricity
Safe method is authenticated in son communication to solve above-mentioned these problems.
Summary of the invention
In view of the deficiencies of the prior art, the invention discloses the method for using the certification safety in electronic communication, energy
During enough solving existing more people's electronic communications, lack safe identity identifying method, causes uncorrelated in communication process
The problem of personnel can enter in communication, in turn result in information leakage.
The present invention is achieved by the following technical programs: the method for using the certification safety in electronic communication, should
The method and step for authenticating safety is as follows:
S1, the first communication equipment create electronic communication room, automatically generate room number, and room verification information is then arranged;
S2, the second communication equipment input room number enter room, input static code key, and verified;After being verified,
Answer identity information validation problem;
After S3, identity information validation problem are answered correctly, it is connected into room;Then the second communication equipment sends speech verification Shen
Please;
S4, the first communication equipment receive speech verification application, judge voice messaging;Judgement passes through, and issues pair verification code;
S5, the second communication equipment receive pair verification code, input pair verification code, complete authentication, and generate pairing
Application code;
S6, two groups of communication equipment input pairing application codes complete pairing, establish communication connection.
Preferably, the step S1 specifically: the first communication equipment creates room and generates room number and at most communication is arranged
Number;Then setting enters the static code key in room, while identity information validation problem is arranged.
Preferably, in the step S2, when static code key input error, then the second communication equipment automatically exits from room;
When the identity information validation problem mistake of answer, then the second communication equipment re-enters static password, does not pass through three times, then certainly
It is dynamic to exit room.
Preferably, the identity information validation problem of the first communication equipment setting is three groups, and room is sent out at random every time
Two groups of identity information validation problems are sent to be verified to the second communication equipment.
Preferably, the step S4 specifically: the first communication equipment receives speech verification application, judges, when meeting
The voice messaging of Communication Personnel is needed, then sends pair verification code;When judgement does not meet the voice messaging of Communication Personnel, then will
Second communication equipment kicks out of room.
Preferably, the step S5 specifically: after authentication passes through, room generates pairing application code at random, and will
Pairing application code is sent respectively to the first communication equipment and the second communication equipment;When authentication does not pass through, then language is re-started
Sound verifying application, back and forth three times.
The invention has the benefit that
The present invention is by being arranged static code key, identity information validation problem, speech verification application, pair verification code and pairing
Application code, so that can carry out authentication before carrying out electronic communication by multiple applications, pacify electronic communication process more
Entirely, uncorrelated personnel is avoided to be connected into communication;And the present invention is made it possible to logical first by the verification method of speech verification application
Under the subjective judgement for believing equipment user, identity judgement is carried out to the second communication equipment user, and then by intelligent authentication and people
Work judgement combines, and further makes the certification of electronic communication more safe and accurate.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 is the structural schematic diagram of invention;
Fig. 2 is the idiographic flow schematic diagram of safety certifying method in invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
Referring to Fig. 1-2: the method for using the certification safety in electronic communication, the method and step of certification safety is such as
Under:
S1, the first communication equipment create electronic communication room, automatically generate room number, and room verification information is then arranged;
S2, the second communication equipment input room number enter room, input static code key, and verified;After being verified,
Answer identity information validation problem;
After S3, identity information validation problem are answered correctly, it is connected into room;Then the second communication equipment sends speech verification Shen
Please;
S4, the first communication equipment receive speech verification application, judge voice messaging;Judgement passes through, and issues pair verification code;
S5, the second communication equipment receive pair verification code, input pair verification code, complete authentication, and generate pairing
Application code;
S6, two groups of communication equipment input pairing application codes complete pairing, establish communication connection.
Specifically, step S1 specifically: the first communication equipment creates room and generates room number and at most communication number is arranged;
Then setting enters the static code key in room, while identity information validation problem is arranged, and is arranged in this way so that room creator
Verification information can be set according to itself, and then other electronic equipments is made to need just be connected into the communication room by multiple-authentication
Between.
Specifically, when static code key input error, then the second communication equipment automatically exits from room in step S2;When return
When the identity information validation problem mistake answered, then the second communication equipment re-enters static password, does not pass through three times, then moves back automatically
Room out, in this way setting test identity so that the personnel cannot be re-introduced into room when static code key input error
Card is more rapidly;And there is chance three times when question answering mistake, avoid the occurrence of erroneous judgement.
Specifically, the identity information validation problem of the first communication equipment setting is three groups, and room sends two at random every time
Group identity information validation problem is verified to the second communication equipment, be arranged in this way the problem of making it possible to by sending at random come
Make to be connected into personnel and answer, avoids repetition.
Specifically, step S4 specifically: the first communication equipment receives speech verification application, judges, when suiting the requirements
The voice messaging of Communication Personnel then sends pair verification code;When judgement does not meet the voice messaging of Communication Personnel, then by second
Communication equipment kicks out of room, and setting in this way makes it possible under the subjective judgement of the first communication equipment user of service, and identification is connected into
The identity of personnel keeps safety certification more humanized, and certification is more accurate.
Specifically, step S5 specifically: after authentication passes through, room generates pairing application code at random, and will pairing
Application code is sent respectively to the first communication equipment and the second communication equipment;When authentication does not pass through, then re-starts voice and test
Card application, back and forth three times, setting has chance progress authentication three times so that being connected into personnel in this way, avoids since input is matched
There is mistake and is directly kicked out of room in application code.
The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to the foregoing embodiments
Invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each implementation
Technical solution documented by example is modified or equivalent replacement of some of the technical features;And these modification or
Replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.
Claims (6)
1. for the method using the certification safety in electronic communication, it is characterised in that: the method and step of certification safety is as follows:
S1, the first communication equipment create electronic communication room, automatically generate room number, and room verification information is then arranged;
S2, the second communication equipment input room number enter room, input static code key, and verified;After being verified, answer
Identity information validation problem;
After S3, identity information validation problem are answered correctly, it is connected into room;Then the second communication equipment sends speech verification application;
S4, the first communication equipment receive speech verification application, judge voice messaging;Judgement passes through, and issues pair verification code;
S5, the second communication equipment receive pair verification code, input pair verification code, complete authentication, and generate pairing application
Code;
S6, two groups of communication equipment input pairing application codes complete pairing, establish communication connection.
2. the method according to claim 1 for using the certification safety in electronic communication, it is characterised in that: the step
Rapid S1 specifically: the first communication equipment creates room and generates room number and at most communication number is arranged;Then setting enters room
Static code key, while identity information validation problem is set.
3. the method according to claim 1 for using the certification safety in electronic communication, it is characterised in that: the step
In rapid S2, when static code key input error, then the second communication equipment automatically exits from room;When the identity information verifying of answer is asked
When topic mistake, then the second communication equipment re-enters static password, does not pass through three times, then automatically exits from room.
4. the method according to claim 3 for using the certification safety in electronic communication, it is characterised in that: described the
The identity information validation problem of one communication equipment setting is three groups, and room sends two groups of identity information validation problems at random every time
It is verified to the second communication equipment.
5. the method according to claim 1 for using the certification safety in electronic communication, it is characterised in that: the step
Rapid S4 specifically: the first communication equipment receives speech verification application, judges, when the voice for the Communication Personnel that suits the requirements is believed
Breath, then send pair verification code;When judgement does not meet the voice messaging of Communication Personnel, then the second communication equipment is kicked out of into room
Between.
6. the method according to claim 1 for using the certification safety in electronic communication, it is characterised in that: the step
Rapid S5 specifically: after authentication passes through, room generates pairing application code at random, and pairing application code is sent respectively to the
One communication equipment and the second communication equipment;When authentication does not pass through, then speech verification application is re-started, back and forth three times.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910062102.9A CN109617701A (en) | 2019-01-23 | 2019-01-23 | Method for using the certification safety in electronic communication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910062102.9A CN109617701A (en) | 2019-01-23 | 2019-01-23 | Method for using the certification safety in electronic communication |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109617701A true CN109617701A (en) | 2019-04-12 |
Family
ID=66020404
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910062102.9A Pending CN109617701A (en) | 2019-01-23 | 2019-01-23 | Method for using the certification safety in electronic communication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109617701A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110022320A (en) * | 2019-04-08 | 2019-07-16 | 北京深思数盾科技股份有限公司 | A kind of communication partner method and communication device |
CN110517381A (en) * | 2019-08-20 | 2019-11-29 | 一石数字技术成都有限公司 | A kind of visitor management system and method based on face registration mechanism |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1375785A (en) * | 2001-03-16 | 2002-10-23 | 周宪忠 | Interactive network chatting room system and method |
CN101193072A (en) * | 2007-03-29 | 2008-06-04 | 腾讯科技(深圳)有限公司 | A multi-platform chat room system and its realization method |
US20090193092A1 (en) * | 2006-09-22 | 2009-07-30 | Tencent Technology (Shenzhen) Company Limited | Method And System For Intercommunicating Chat Information Between Instant Messaging Group And Chat Room As Well As Intercommunication System |
WO2010148699A1 (en) * | 2009-11-25 | 2010-12-29 | 中兴通讯股份有限公司 | Method for chatting in chat room, corresponding chat room system and chat room server |
CN102088594A (en) * | 2009-12-03 | 2011-06-08 | 康佳集团股份有限公司 | Third generation (3G) network video conference device |
CN102185800A (en) * | 2011-05-16 | 2011-09-14 | 宋健 | Convenient video chat method and system realized based on social network |
CN103856389A (en) * | 2012-12-03 | 2014-06-11 | 腾讯科技(深圳)有限公司 | Method for creating instant messaging discussion group, system, clients and server |
CN104378579A (en) * | 2014-11-30 | 2015-02-25 | 伍丽萍 | Invite mechanism of video conference system |
CN105357223A (en) * | 2015-12-07 | 2016-02-24 | 山东山大华天软件有限公司 | Three dimensional cooperation conference system based on instant messaging protocol and realization method thereof |
CN106572049A (en) * | 2015-10-09 | 2017-04-19 | 腾讯科技(深圳)有限公司 | Identity verifying apparatus and method |
CN107864144A (en) * | 2017-11-20 | 2018-03-30 | 珠海市魅族科技有限公司 | Obtain method and device, computer installation and the storage medium of dynamic password |
-
2019
- 2019-01-23 CN CN201910062102.9A patent/CN109617701A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1375785A (en) * | 2001-03-16 | 2002-10-23 | 周宪忠 | Interactive network chatting room system and method |
US20090193092A1 (en) * | 2006-09-22 | 2009-07-30 | Tencent Technology (Shenzhen) Company Limited | Method And System For Intercommunicating Chat Information Between Instant Messaging Group And Chat Room As Well As Intercommunication System |
CN101193072A (en) * | 2007-03-29 | 2008-06-04 | 腾讯科技(深圳)有限公司 | A multi-platform chat room system and its realization method |
WO2010148699A1 (en) * | 2009-11-25 | 2010-12-29 | 中兴通讯股份有限公司 | Method for chatting in chat room, corresponding chat room system and chat room server |
CN102088594A (en) * | 2009-12-03 | 2011-06-08 | 康佳集团股份有限公司 | Third generation (3G) network video conference device |
CN102185800A (en) * | 2011-05-16 | 2011-09-14 | 宋健 | Convenient video chat method and system realized based on social network |
CN103856389A (en) * | 2012-12-03 | 2014-06-11 | 腾讯科技(深圳)有限公司 | Method for creating instant messaging discussion group, system, clients and server |
CN104378579A (en) * | 2014-11-30 | 2015-02-25 | 伍丽萍 | Invite mechanism of video conference system |
CN106572049A (en) * | 2015-10-09 | 2017-04-19 | 腾讯科技(深圳)有限公司 | Identity verifying apparatus and method |
CN105357223A (en) * | 2015-12-07 | 2016-02-24 | 山东山大华天软件有限公司 | Three dimensional cooperation conference system based on instant messaging protocol and realization method thereof |
CN107864144A (en) * | 2017-11-20 | 2018-03-30 | 珠海市魅族科技有限公司 | Obtain method and device, computer installation and the storage medium of dynamic password |
Non-Patent Citations (4)
Title |
---|
JK: ""群聊[IM开发文档]"", 《HTTP://DOCS-IM.EASEMOB.COM/START/490INTEGRATIONCASES/20GROUPCHATCASE#》 * |
MOHD, KAMIR, YUSOF: ""A Secure and Reliable Chat Room Application via Embedded Chaotic Encryption"", 《JOURNAL OF THE SMART COMPUTING REVIEW》 * |
于涛: ""基于数字证书的安全聊天室的设计与实现"", 《中国优秀博硕士学位论文全文数据库 (硕士) 信息科技辑》 * |
网易云信: ""抓住语音社交风口,1天快速搭建语音聊天室"", 《HTTP://YUNXIN.163.COM/BLOG/PROD6-0910/》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110022320A (en) * | 2019-04-08 | 2019-07-16 | 北京深思数盾科技股份有限公司 | A kind of communication partner method and communication device |
CN110517381A (en) * | 2019-08-20 | 2019-11-29 | 一石数字技术成都有限公司 | A kind of visitor management system and method based on face registration mechanism |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109347635A (en) | A kind of Internet of Things security certification system and authentication method based on national secret algorithm | |
RU2458481C2 (en) | Method and system for trusted third party-based two-way object identification | |
CN109327477A (en) | Authentication method, device and storage medium | |
CN104967597B (en) | A kind of third-party application message authentication method and system based on safe channel | |
CN108881310A (en) | A kind of Accreditation System and its working method | |
CN106470190A (en) | A kind of Web real-time communication platform authentication cut-in method and device | |
CN107483398B (en) | A kind of silence verification method and device, electronic equipment | |
CN104883402A (en) | Information processing method and cloud-end service platform | |
CN109617701A (en) | Method for using the certification safety in electronic communication | |
CN112150284A (en) | Block chain heterogeneous chain cross-chain transaction method | |
CN108964901A (en) | Information Authentication method, system, device | |
CN106209835A (en) | Peer-to-peer network communication system and method | |
Jarecki et al. | Two-factor password-authenticated key exchange with end-to-end security | |
CN105100093B (en) | A kind of identity authentication method and server | |
CN104796408A (en) | Single-point live login method and device | |
CN107659935A (en) | A kind of authentication method, certificate server, network management system and Verification System | |
CN103139179A (en) | Multi-channel active type network identity verification system and network identity verification device | |
CN106815734A (en) | A kind of information transferring method and device | |
CN113067767A (en) | Guest invitation method of network conference | |
CN104539577A (en) | Information push system and information push method | |
CN107026814A (en) | A kind of login validation method and device through point attendant application | |
CN106612252A (en) | Account protection method and device | |
CN111131641A (en) | Conference cascading method, device, server and readable storage medium | |
CN105915356A (en) | Attending and withdrawing method for conference members of fragmented asynchronous conference system | |
CN109560928A (en) | A kind of encryption method based on state's net cryptographic protocol |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190412 |
|
RJ01 | Rejection of invention patent application after publication |