CN109617701A - Method for using the certification safety in electronic communication - Google Patents

Method for using the certification safety in electronic communication Download PDF

Info

Publication number
CN109617701A
CN109617701A CN201910062102.9A CN201910062102A CN109617701A CN 109617701 A CN109617701 A CN 109617701A CN 201910062102 A CN201910062102 A CN 201910062102A CN 109617701 A CN109617701 A CN 109617701A
Authority
CN
China
Prior art keywords
room
communication
communication equipment
code
certification safety
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910062102.9A
Other languages
Chinese (zh)
Inventor
嵇建波
李赛菊
邓莉
杨娟
杨双
熊川
杨冰
王鹏举
赵素文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guilin University of Aerospace Technology
Original Assignee
Guilin University of Aerospace Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guilin University of Aerospace Technology filed Critical Guilin University of Aerospace Technology
Priority to CN201910062102.9A priority Critical patent/CN109617701A/en
Publication of CN109617701A publication Critical patent/CN109617701A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention relates to electronic communication security technology areas, it is particularly used for the method using the certification safety in electronic communication, the method and step of certification safety is as follows: the first communication equipment creates electronic communication room, automatically generates room number, and room verification information is then arranged;Second communication equipment input room number enters room, inputs static code key, and verified;After being verified;After identity information validation problem is answered correctly, it is connected into room;Then the second communication equipment sends speech verification application;First communication equipment receives speech verification application, judges voice messaging;Second communication equipment receives pair verification code, and generates pairing application code;Two groups of communication equipment input pairing application codes complete pairing, communication connection is established, the present invention is able to solve during existing more people's electronic communications, lacks safe identity identifying method, lead to the problem of uncorrelated personnel can enter in communication, in turn result in information leakage in communication process.

Description

Method for using the certification safety in electronic communication
Technical field
The present invention relates to electronic communication security technology areas, and in particular to for using the certification safety in electronic communication Method.
Background technique
Communication is exactly the transmitting of information, refer to from one to carry out anotherly the transmission of information with exchange, the purpose is to pass Defeated message.Communication is the information interchange and transmitting carried out between men by certain media, in a broad sense, no matter what uses Kind method, as long as information is transmitted to anotherly from one, can be described as communicating using which kind of medium.
With the development of society, communication timeliness increasingly chased after by masses it is high.More and more electronics are logical thus Letter equipment, which is continuously created, to be come, and realizes instant messaging by using these electronic communication equipments, makes interpersonal communication Become increasingly simpler, quick.And along with the development of network communication, more and more electronic communications are all based on the premise of network Lower progress, and the electronic communication by multiple compositions of personnel can be established in network communication according to a Man's Demands.But by more Identity identifying method of the electronic communication of people's composition due to lacking safety, enables uncorrelated personnel arbitrarily to enter communication In, this will lead to that the communication information is caused to be revealed.To security risk occur.For this purpose, we have proposed one kind for using electricity Safe method is authenticated in son communication to solve above-mentioned these problems.
Summary of the invention
In view of the deficiencies of the prior art, the invention discloses the method for using the certification safety in electronic communication, energy During enough solving existing more people's electronic communications, lack safe identity identifying method, causes uncorrelated in communication process The problem of personnel can enter in communication, in turn result in information leakage.
The present invention is achieved by the following technical programs: the method for using the certification safety in electronic communication, should The method and step for authenticating safety is as follows:
S1, the first communication equipment create electronic communication room, automatically generate room number, and room verification information is then arranged;
S2, the second communication equipment input room number enter room, input static code key, and verified;After being verified, Answer identity information validation problem;
After S3, identity information validation problem are answered correctly, it is connected into room;Then the second communication equipment sends speech verification Shen Please;
S4, the first communication equipment receive speech verification application, judge voice messaging;Judgement passes through, and issues pair verification code;
S5, the second communication equipment receive pair verification code, input pair verification code, complete authentication, and generate pairing Application code;
S6, two groups of communication equipment input pairing application codes complete pairing, establish communication connection.
Preferably, the step S1 specifically: the first communication equipment creates room and generates room number and at most communication is arranged Number;Then setting enters the static code key in room, while identity information validation problem is arranged.
Preferably, in the step S2, when static code key input error, then the second communication equipment automatically exits from room; When the identity information validation problem mistake of answer, then the second communication equipment re-enters static password, does not pass through three times, then certainly It is dynamic to exit room.
Preferably, the identity information validation problem of the first communication equipment setting is three groups, and room is sent out at random every time Two groups of identity information validation problems are sent to be verified to the second communication equipment.
Preferably, the step S4 specifically: the first communication equipment receives speech verification application, judges, when meeting The voice messaging of Communication Personnel is needed, then sends pair verification code;When judgement does not meet the voice messaging of Communication Personnel, then will Second communication equipment kicks out of room.
Preferably, the step S5 specifically: after authentication passes through, room generates pairing application code at random, and will Pairing application code is sent respectively to the first communication equipment and the second communication equipment;When authentication does not pass through, then language is re-started Sound verifying application, back and forth three times.
The invention has the benefit that
The present invention is by being arranged static code key, identity information validation problem, speech verification application, pair verification code and pairing Application code, so that can carry out authentication before carrying out electronic communication by multiple applications, pacify electronic communication process more Entirely, uncorrelated personnel is avoided to be connected into communication;And the present invention is made it possible to logical first by the verification method of speech verification application Under the subjective judgement for believing equipment user, identity judgement is carried out to the second communication equipment user, and then by intelligent authentication and people Work judgement combines, and further makes the certification of electronic communication more safe and accurate.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is the structural schematic diagram of invention;
Fig. 2 is the idiographic flow schematic diagram of safety certifying method in invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
Referring to Fig. 1-2: the method for using the certification safety in electronic communication, the method and step of certification safety is such as Under:
S1, the first communication equipment create electronic communication room, automatically generate room number, and room verification information is then arranged;
S2, the second communication equipment input room number enter room, input static code key, and verified;After being verified, Answer identity information validation problem;
After S3, identity information validation problem are answered correctly, it is connected into room;Then the second communication equipment sends speech verification Shen Please;
S4, the first communication equipment receive speech verification application, judge voice messaging;Judgement passes through, and issues pair verification code;
S5, the second communication equipment receive pair verification code, input pair verification code, complete authentication, and generate pairing Application code;
S6, two groups of communication equipment input pairing application codes complete pairing, establish communication connection.
Specifically, step S1 specifically: the first communication equipment creates room and generates room number and at most communication number is arranged; Then setting enters the static code key in room, while identity information validation problem is arranged, and is arranged in this way so that room creator Verification information can be set according to itself, and then other electronic equipments is made to need just be connected into the communication room by multiple-authentication Between.
Specifically, when static code key input error, then the second communication equipment automatically exits from room in step S2;When return When the identity information validation problem mistake answered, then the second communication equipment re-enters static password, does not pass through three times, then moves back automatically Room out, in this way setting test identity so that the personnel cannot be re-introduced into room when static code key input error Card is more rapidly;And there is chance three times when question answering mistake, avoid the occurrence of erroneous judgement.
Specifically, the identity information validation problem of the first communication equipment setting is three groups, and room sends two at random every time Group identity information validation problem is verified to the second communication equipment, be arranged in this way the problem of making it possible to by sending at random come Make to be connected into personnel and answer, avoids repetition.
Specifically, step S4 specifically: the first communication equipment receives speech verification application, judges, when suiting the requirements The voice messaging of Communication Personnel then sends pair verification code;When judgement does not meet the voice messaging of Communication Personnel, then by second Communication equipment kicks out of room, and setting in this way makes it possible under the subjective judgement of the first communication equipment user of service, and identification is connected into The identity of personnel keeps safety certification more humanized, and certification is more accurate.
Specifically, step S5 specifically: after authentication passes through, room generates pairing application code at random, and will pairing Application code is sent respectively to the first communication equipment and the second communication equipment;When authentication does not pass through, then re-starts voice and test Card application, back and forth three times, setting has chance progress authentication three times so that being connected into personnel in this way, avoids since input is matched There is mistake and is directly kicked out of room in application code.
The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to the foregoing embodiments Invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each implementation Technical solution documented by example is modified or equivalent replacement of some of the technical features;And these modification or Replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.

Claims (6)

1. for the method using the certification safety in electronic communication, it is characterised in that: the method and step of certification safety is as follows:
S1, the first communication equipment create electronic communication room, automatically generate room number, and room verification information is then arranged;
S2, the second communication equipment input room number enter room, input static code key, and verified;After being verified, answer Identity information validation problem;
After S3, identity information validation problem are answered correctly, it is connected into room;Then the second communication equipment sends speech verification application;
S4, the first communication equipment receive speech verification application, judge voice messaging;Judgement passes through, and issues pair verification code;
S5, the second communication equipment receive pair verification code, input pair verification code, complete authentication, and generate pairing application Code;
S6, two groups of communication equipment input pairing application codes complete pairing, establish communication connection.
2. the method according to claim 1 for using the certification safety in electronic communication, it is characterised in that: the step Rapid S1 specifically: the first communication equipment creates room and generates room number and at most communication number is arranged;Then setting enters room Static code key, while identity information validation problem is set.
3. the method according to claim 1 for using the certification safety in electronic communication, it is characterised in that: the step In rapid S2, when static code key input error, then the second communication equipment automatically exits from room;When the identity information verifying of answer is asked When topic mistake, then the second communication equipment re-enters static password, does not pass through three times, then automatically exits from room.
4. the method according to claim 3 for using the certification safety in electronic communication, it is characterised in that: described the The identity information validation problem of one communication equipment setting is three groups, and room sends two groups of identity information validation problems at random every time It is verified to the second communication equipment.
5. the method according to claim 1 for using the certification safety in electronic communication, it is characterised in that: the step Rapid S4 specifically: the first communication equipment receives speech verification application, judges, when the voice for the Communication Personnel that suits the requirements is believed Breath, then send pair verification code;When judgement does not meet the voice messaging of Communication Personnel, then the second communication equipment is kicked out of into room Between.
6. the method according to claim 1 for using the certification safety in electronic communication, it is characterised in that: the step Rapid S5 specifically: after authentication passes through, room generates pairing application code at random, and pairing application code is sent respectively to the One communication equipment and the second communication equipment;When authentication does not pass through, then speech verification application is re-started, back and forth three times.
CN201910062102.9A 2019-01-23 2019-01-23 Method for using the certification safety in electronic communication Pending CN109617701A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910062102.9A CN109617701A (en) 2019-01-23 2019-01-23 Method for using the certification safety in electronic communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910062102.9A CN109617701A (en) 2019-01-23 2019-01-23 Method for using the certification safety in electronic communication

Publications (1)

Publication Number Publication Date
CN109617701A true CN109617701A (en) 2019-04-12

Family

ID=66020404

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910062102.9A Pending CN109617701A (en) 2019-01-23 2019-01-23 Method for using the certification safety in electronic communication

Country Status (1)

Country Link
CN (1) CN109617701A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110022320A (en) * 2019-04-08 2019-07-16 北京深思数盾科技股份有限公司 A kind of communication partner method and communication device
CN110517381A (en) * 2019-08-20 2019-11-29 一石数字技术成都有限公司 A kind of visitor management system and method based on face registration mechanism

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1375785A (en) * 2001-03-16 2002-10-23 周宪忠 Interactive network chatting room system and method
CN101193072A (en) * 2007-03-29 2008-06-04 腾讯科技(深圳)有限公司 A multi-platform chat room system and its realization method
US20090193092A1 (en) * 2006-09-22 2009-07-30 Tencent Technology (Shenzhen) Company Limited Method And System For Intercommunicating Chat Information Between Instant Messaging Group And Chat Room As Well As Intercommunication System
WO2010148699A1 (en) * 2009-11-25 2010-12-29 中兴通讯股份有限公司 Method for chatting in chat room, corresponding chat room system and chat room server
CN102088594A (en) * 2009-12-03 2011-06-08 康佳集团股份有限公司 Third generation (3G) network video conference device
CN102185800A (en) * 2011-05-16 2011-09-14 宋健 Convenient video chat method and system realized based on social network
CN103856389A (en) * 2012-12-03 2014-06-11 腾讯科技(深圳)有限公司 Method for creating instant messaging discussion group, system, clients and server
CN104378579A (en) * 2014-11-30 2015-02-25 伍丽萍 Invite mechanism of video conference system
CN105357223A (en) * 2015-12-07 2016-02-24 山东山大华天软件有限公司 Three dimensional cooperation conference system based on instant messaging protocol and realization method thereof
CN106572049A (en) * 2015-10-09 2017-04-19 腾讯科技(深圳)有限公司 Identity verifying apparatus and method
CN107864144A (en) * 2017-11-20 2018-03-30 珠海市魅族科技有限公司 Obtain method and device, computer installation and the storage medium of dynamic password

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1375785A (en) * 2001-03-16 2002-10-23 周宪忠 Interactive network chatting room system and method
US20090193092A1 (en) * 2006-09-22 2009-07-30 Tencent Technology (Shenzhen) Company Limited Method And System For Intercommunicating Chat Information Between Instant Messaging Group And Chat Room As Well As Intercommunication System
CN101193072A (en) * 2007-03-29 2008-06-04 腾讯科技(深圳)有限公司 A multi-platform chat room system and its realization method
WO2010148699A1 (en) * 2009-11-25 2010-12-29 中兴通讯股份有限公司 Method for chatting in chat room, corresponding chat room system and chat room server
CN102088594A (en) * 2009-12-03 2011-06-08 康佳集团股份有限公司 Third generation (3G) network video conference device
CN102185800A (en) * 2011-05-16 2011-09-14 宋健 Convenient video chat method and system realized based on social network
CN103856389A (en) * 2012-12-03 2014-06-11 腾讯科技(深圳)有限公司 Method for creating instant messaging discussion group, system, clients and server
CN104378579A (en) * 2014-11-30 2015-02-25 伍丽萍 Invite mechanism of video conference system
CN106572049A (en) * 2015-10-09 2017-04-19 腾讯科技(深圳)有限公司 Identity verifying apparatus and method
CN105357223A (en) * 2015-12-07 2016-02-24 山东山大华天软件有限公司 Three dimensional cooperation conference system based on instant messaging protocol and realization method thereof
CN107864144A (en) * 2017-11-20 2018-03-30 珠海市魅族科技有限公司 Obtain method and device, computer installation and the storage medium of dynamic password

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
JK: ""群聊[IM开发文档]"", 《HTTP://DOCS-IM.EASEMOB.COM/START/490INTEGRATIONCASES/20GROUPCHATCASE#》 *
MOHD, KAMIR, YUSOF: ""A Secure and Reliable Chat Room Application via Embedded Chaotic Encryption"", 《JOURNAL OF THE SMART COMPUTING REVIEW》 *
于涛: ""基于数字证书的安全聊天室的设计与实现"", 《中国优秀博硕士学位论文全文数据库 (硕士) 信息科技辑》 *
网易云信: ""抓住语音社交风口,1天快速搭建语音聊天室"", 《HTTP://YUNXIN.163.COM/BLOG/PROD6-0910/》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110022320A (en) * 2019-04-08 2019-07-16 北京深思数盾科技股份有限公司 A kind of communication partner method and communication device
CN110517381A (en) * 2019-08-20 2019-11-29 一石数字技术成都有限公司 A kind of visitor management system and method based on face registration mechanism

Similar Documents

Publication Publication Date Title
CN109347635A (en) A kind of Internet of Things security certification system and authentication method based on national secret algorithm
RU2458481C2 (en) Method and system for trusted third party-based two-way object identification
CN109327477A (en) Authentication method, device and storage medium
CN104967597B (en) A kind of third-party application message authentication method and system based on safe channel
CN108881310A (en) A kind of Accreditation System and its working method
CN106470190A (en) A kind of Web real-time communication platform authentication cut-in method and device
CN107483398B (en) A kind of silence verification method and device, electronic equipment
CN104883402A (en) Information processing method and cloud-end service platform
CN109617701A (en) Method for using the certification safety in electronic communication
CN112150284A (en) Block chain heterogeneous chain cross-chain transaction method
CN108964901A (en) Information Authentication method, system, device
CN106209835A (en) Peer-to-peer network communication system and method
Jarecki et al. Two-factor password-authenticated key exchange with end-to-end security
CN105100093B (en) A kind of identity authentication method and server
CN104796408A (en) Single-point live login method and device
CN107659935A (en) A kind of authentication method, certificate server, network management system and Verification System
CN103139179A (en) Multi-channel active type network identity verification system and network identity verification device
CN106815734A (en) A kind of information transferring method and device
CN113067767A (en) Guest invitation method of network conference
CN104539577A (en) Information push system and information push method
CN107026814A (en) A kind of login validation method and device through point attendant application
CN106612252A (en) Account protection method and device
CN111131641A (en) Conference cascading method, device, server and readable storage medium
CN105915356A (en) Attending and withdrawing method for conference members of fragmented asynchronous conference system
CN109560928A (en) A kind of encryption method based on state's net cryptographic protocol

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190412

RJ01 Rejection of invention patent application after publication