WO2015010537A1 - 一种加密通信方法和加密通信系统 - Google Patents
一种加密通信方法和加密通信系统 Download PDFInfo
- Publication number
- WO2015010537A1 WO2015010537A1 PCT/CN2014/081835 CN2014081835W WO2015010537A1 WO 2015010537 A1 WO2015010537 A1 WO 2015010537A1 CN 2014081835 W CN2014081835 W CN 2014081835W WO 2015010537 A1 WO2015010537 A1 WO 2015010537A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- application server
- key
- client host
- mobile terminal
- client
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Definitions
- the present invention relates to the field of Internet technologies, local area network technologies, mobile communication technologies, and information security technologies, and more particularly to an encrypted communication method and an encrypted communication system.
- the process of generating a session key by encrypted communication (for example, a key exchange process based on an asymmetric encryption algorithm applied to the PKI of the Internet, a key agreement process based on a symmetric encryption algorithm applied to the WPA-PSK/WPA2-PSK of the WLAN) cannot be performed. Avoid the risk of an exhaustive attack. With the development of parallel computing technology and distributed computing technology, this problem has become increasingly prominent.
- the present invention is directed to the above-described network security problem, and proposes an encrypted communication method and an encrypted communication system. Summary of the invention
- the technical problem to be solved by the present invention is to provide an encrypted communication method and an encrypted communication system for enabling a client host and an application server to transmit an IP address, a random number and a key by using a mobile terminal, and perform IP address filtering, mutual authentication, and Encrypted network communication is established by key negotiation to improve the security of network applications.
- An encryption communication method before using the encrypted communication method, the user registers with the application server, and submits the user information to the application server, where the user information includes: the user biometric, the mobile user's integrated service digital network number MSISDN (Mobile) Subscriber Integrated Services Digital Network Number The International Mobile Subscriber Identity (IMSI) of the mobile terminal, the International Mobile Equipment Identity (IMEI) of the mobile terminal, and the IC card ID (ICCID) of the mobile terminal SIM card ( Integrated Circuit Card Identity ), bank account (debit card, credit card or passbook) account ID and ID, expiration date or address; application server generates symmetric key Ka/Ka', Kc/Kc', MemPa/ MemPa', MemKa/MemKa', MemPc/MemPc' and MemKc/MemKc', and write Ka, Kc, MemPa, MemKa, MemPc and MemKc to the mobile terminal, so that the mobile terminal can perform mutual authentication with the application
- Step B The client host starts, and reads and runs the client system software and the client network application software of the read-only memory storage;
- Step C The client host and the application server respectively obtain the IP addresses of the other party, and respectively set IP address filtering rules
- Step D The application server generates a random number and a key, and sends the same to the client host through the mobile terminal;
- Step E The client host and the application server perform IP address filtering, mutual authentication, and key negotiation to establish an encrypted network communication.
- the beneficial effect of using the above method is to ensure the end-to-end security of the network application.
- the encrypted communication method can also be improved as follows: Further, the step A includes:
- Step A1 The mobile terminal and the application server perform mutual authentication based on the symmetric authentication key Ka/Ka', and establish an encrypted mobile communication based on the symmetric communication key Kc/Kc', and there is no between Ka/Ka' and Kc/Kc' Calculus relationship
- Step A12 the application server generates random numbers R1, R2, R3, and R4, and derives a new authentication key Ka', and the process of deriving Ka' includes:
- the application server derives a new communication key Kc' and there is no computational relationship between the process of deriving Kc' and the process of deriving Ka'.
- the process of deriving Kc' includes:
- the application server stores Ka', Kc', MemPa ⁇ MemKa', MemPc', MemKc' for the next two-way authentication, encrypted communication and key derivation;
- Step A13 The application server sends the random number R1, R2, R3, and R4 to the mobile terminal.
- Step A14: The mobile terminal derives a new authentication key Ka, and the process of deriving Ka includes: the mobile terminal calculates MemPa f based on the stored MemPa. (R1, MemPa), where R1 is a random number and MemPa is a key;
- the mobile terminal derives a new communication key Kc, and there is no calculation relationship between the process of deriving Kc and the process of deriving Ka.
- the process of deriving Kc includes:
- the mobile terminal stores Ka, Kc, MemPa, MemKa, MemPc, MemKc for the next two-way authentication, encrypted communication, and key derivation.
- f is an encryption function and f includes a one-way hash function and a symmetric encryption function and consists of these two functions
- the function calculates the authentication key Ka/Ka' based on the recursive operation MemPa/MemPa' and MemKa/MemKa' as parameters and keys, and uses MemPc/MemPc' and MemKc/MemKc' based on the recursive operation as parameters
- the key calculates the communication key Kc/Kc' instead of calculating the authentication key and the communication key based on the root key, and there is no calculation relationship between the process of deriving Kc/Kc' and the process of deriving Ka/Ka'.
- step B includes:
- Step B1 1 the client host starts
- Step B12 the client host reads and runs the client system software of the read-only memory storage; In step B13, the client host disables the hard disk of the local machine by using the client system software.
- Step 14 The client host reads and runs the client network application software stored in the read-only memory.
- the advantage of using the above further solution is that the client host uses the software stored in the read-only memory and disables the hard disk of the client host, preventing the computer virus stored on the client host hard disk from harming the network application.
- step C includes:
- Step C1 The client host obtains the IP address IPAc of the local machine from the Internet;
- Step C12 The client host reads the IP address IPAs of the application server stored in the read-only memory; or the client host enables the user to obtain the IP address IPAs of the application server from the application server by using the mobile terminal, and allows the user to input the IPAs to the client.
- Step C13 The client host sets an IP address filtering rule, and allows the local device to receive an IP data packet whose IP source address is an IPAs.
- Step C14 the client host prompts the user to send the IPAc to the application server by using the mobile terminal;
- Step C15 input IPAc to the mobile terminal;
- Step C16 the mobile terminal sends the IPAc to the application server, and the application server receives the IPAc and simultaneously obtains the mobile subscriber integrated service digital network number MSISDN of the mobile terminal;
- Step C17 The application server sets an IP address filtering rule, and allows the local device to receive an IP data packet whose IP source address is IPAc.
- the beneficial effect of adopting the above further solution is that the client host directly uses the IPAs to access the application server without using the DNS, which prevents the DNS hijacking from harming the network application; the client host enables the user to send the IPAc to the application server through the mobile terminal.
- the IP address filtering rule can be set by letting the application server know the IP address of the client host to be visited.
- step D includes:
- Step D1 The application server generates a random number rand1 rand2 to generate a symmetric key K1/K1 ' K2/K2' K3/K3', and there is no calculation relationship between any two of the ⁇ 1 ⁇ 2 ⁇ 3;
- Step D12 application The server sends ranch rand2 K1 ⁇ 2 ⁇ 3 to the mobile terminal;
- Step D13 the mobile terminal prompts the user to input rand1 rand2 K1 ⁇ 2 ⁇ 3 to the client host;
- step D14 enter rand1 rand2 K1 ⁇ 2 ⁇ 3 to the client host.
- the beneficial effect of using the above further solution is that the application server sends the random number and the key to the client host through the mobile terminal, thereby ensuring that the network communication is once dense.
- steps include:
- Step E12 The client host sends the res1 to the application server through the IP packet IP1, and the IP source address of the IP1 is IPAc.
- Step E13 The application server performs IP address filtering, receives IP1 according to the IP address filtering rule, and allows the client host to connect to the local machine;
- step E15 the application server compares resl ' with resl , and if it is the same, then moves to step E16, otherwise the entire process ends;
- the source address is IPAs;
- Step E18 The client host performs IP address filtering, receives IP2 according to the IP address filtering rule, and allows the application server to connect to the local machine;
- step E20 the client host compares res2 with res2'. If the same, the process goes to step E21, otherwise the process ends.
- Step E21 the client host prompts the user to input the MSISDN to the client host;
- Step E22 input the MSISDN to the client host;
- Step E23 the client host and the application server negotiate the session key Ks based on rand3_p/rand3, MSISDN, K3/K3', and establish an encrypted network communication based on Ks; or, the application server randomly selects one of the user information retained when the user opens the account.
- Parameter C and prompting the user with the name of the parameter C through the mobile terminal or the client host and letting the user input the parameter C to the client host, the client host and the application server are based on the parameters C, rand3_p/rand3, MSISDN, K3/K3'
- the session key Ks is negotiated and encrypted network communication is established based on Ks.
- the application server performs IP address filtering and authenticates the client host, and the DDoS attack is prevented from harming the application server;
- the client host performs IP address filtering and authenticates the application server, thereby preventing phishing from harming the client host;
- no random number is transmitted between the client host and the application server, but only the ring is transmitted.
- Resl and res2' and there is no calculation relationship between resl and res2', which prevents the authentication key K1 and K2 from being attacked based on the network-passed authentication information; there is no calculation between resl and K3, res2' and K3
- the relationship prevents the attacking session key Ks from being exhausted based on the network-passed authentication information; based on the undelivered MSISDN (the mobile communication network does not rely on the MSISDN, and identifies the mobile according to the Temporary Mobile Subscriber Identity (TMSI) and the IMSI)
- TMSI Temporary Mobile Subscriber Identity
- the terminal the mobile communication network sends the MSISDN and user service corresponding to the TMSI/IMSI to the application server), the randomly selected and undelivered parameter C, the K3 transmitted by the mobile communication network, and the rand3 negotiation session key Ks transmitted by the Internet encryption, The security of key negotiation.
- the user information retained when the user opens the account in the step E23 includes the user biometric, the international mobile subscriber identity IMSI, the international mobile device identifier 1MB, the integrated circuit card identifier ICCID, the account of the bank account, and the ID of the ID card. , the validity period of the ID card or the address of the ID card.
- the beneficial effect of adopting the above further solution is that a parameter C is randomly selected in the user information for negotiating the session key Ks, and the parameter C is not transmitted, thereby improving the security of the key agreement.
- the symmetric keys K1 and K2 are replaced with the asymmetric keys K1 a and K2a, and there is no calculation relationship between any two of K1 a, K2a and the symmetric key K3, and
- the encryption function f is replaced by an asymmetric encryption/decryption function.
- the client host is based on the K1a private key and the K2a public key.
- the application server is based on the K2a private key and the K1 a public key.
- the two parties do not pass the random number and do not exchange the public key.
- Two-way authentication is performed by passing the response, and there is no calculation relationship between the responses.
- the encrypted communication method can perform two-way authentication by using an asymmetric encryption algorithm; when the two-way authentication is performed, only the response is transmitted without transmitting the random number and the public key is not exchanged, and there is no calculation relationship between the responses, thereby preventing Based on the authentication information transmitted by the network, the authentication keys K1 a and K2a are exhaustively attacked; there is no calculation relationship between K1a and K3 and between K2a and K3, which prevents the attack key from attacking the session key Ks based on the network-passed authentication information. .
- the two-way authentication only transmits a response without transmitting a random number, and when the asymmetric encryption algorithm is used, the public key is not exchanged, and there is no calculation relationship between the responses, and there is no response between the response and the session key. Calculus relationship.
- the beneficial effect of using the above further solution is that only the response is transmitted and there is no calculation relationship between the responses, and the authentication key is prevented from being exhaustively attacked based on the authentication information; there is no calculation relationship between the response and the session key, and the authentication information is prevented. And exhaustively attack the session key.
- all functions of the client host can be completed by the mobile terminal in each execution step of the encrypted communication method.
- the technical solution of the present invention further includes an encrypted communication system, including a read only memory, a client host, a mobile terminal, and an application server; Read-only memory for providing the client host with the client system software and the client network application software and the IP address of the application server;
- a client host connected to the application server through a data communication network, configured to read and run the client system software and the client network application software of the read-only memory storage after startup, and read the application server of the read-only memory storage
- An IP address configured to send the IP address to the application server by the mobile terminal, to receive the random number and the key from the application server by using the mobile terminal, to perform IP address filtering based on the IP address of the application server, and execute with the application server Establishing encrypted network communication by mutual authentication and key agreement;
- a mobile terminal which is connected to the application server through a mobile communication network, for performing two-way authentication with the application server and establishing an encrypted mobile communication; and for transmitting a random number and a key and an IP address to the client host and the application server;
- An application server configured to perform mutual authentication with the mobile terminal and establish an encrypted mobile communication; to receive an IP address of the client host through the mobile terminal; to generate a random number and a key, and send the same to the client host through the mobile terminal Used to perform IP address filtering based on the IP address of the client host, and establish encrypted network communication by performing mutual authentication and key agreement with the client host.
- the beneficial effects of using the above system are: ensuring end-to-end security of the network application.
- the encrypted communication system can also be improved as follows: Further, the read-only memory is CD-R ⁇ M, DVD-ROM, MASK ROM, PROM, EPR ⁇ M, OTP ROM, EEPROM or Flash. Any of the ROMs.
- the read only memory is connected to the client host through a wired communication interface or a wireless communication interface, or the read only memory is designed as a hardware of the client host.
- the mobile terminal is any one of a mobile phone, a PDA, a tablet or a notebook.
- the data communication network includes a wide area network, a metropolitan area network, and a local area network; and the mobile terminal communicates with the application server by means of voice, short message or data.
- 1 is a schematic structural diagram of the encrypted communication system according to an embodiment of the present invention.
- step B of the encrypted communication method in the embodiment of the present invention is a flowchart of step B of the encrypted communication method in the embodiment of the present invention.
- step C of the encrypted communication method in the embodiment of the present invention is a flowchart of step C of the encrypted communication method in the embodiment of the present invention.
- FIG. 5 is a flowchart of step D of the encrypted communication method according to an embodiment of the present invention
- 6 is a flowchart of step E of the encrypted communication method according to the second embodiment of the present invention
- FIG. 7 is a flowchart of a method for establishing encrypted WLAN communication according to Embodiment 3 of the present invention
- FIG. 8 is a flowchart of Embodiment 4 of the present invention
- FIG. 9 is a flowchart of step A of the encrypted communication method according to Embodiment 2 of the present invention.
- Embodiment 1 provides an encrypted communication system, which includes a read-only memory 101, a client host 102, a mobile terminal 103, and an application server 104;
- the read-only memory 101 is configured to provide the client host 102 with the client system software and the client network application software and the IP address of the application server 104, the client network application software including a browser, security software, instant messaging software and games. Entertainment software, etc.
- the client host 102 is connected to the application server 104 through a data communication network for reading and running the client system software and the client network application software stored in the read-only memory 101 after startup, and reading the read-only memory 101 for storage.
- IP address of the application server 104 for transmitting its IP address to the application server 104 through the mobile terminal 103; for receiving a random number and a key from the application server 104 through the mobile terminal 103; for the IP address based on the application server 104 Performing IP address filtering, and performing mutual authentication and key agreement with the application server 104 to establish an encrypted network communication;
- Mobile terminal 103 which is connected to application server 104 via a mobile communication network for performing mutual authentication with application server 104 and establishing encrypted mobile communication; for transmitting random numbers and keys and IP addresses for client host 102 and application server 104 ;
- the application server 104 is configured to perform mutual authentication with the mobile terminal 103 and establish encrypted mobile communication; for receiving the IP address of the client host 102 through the mobile terminal 103; for generating a random number and a key, and passing the mobile terminal 103 Sent to the client host 102; for performing IP address filtering based on the IP address of the client host 102, and establishing encrypted network communication with the client host 102 performing two-way authentication and key agreement.
- the data communication network includes a wide area network, a metropolitan area network, and a local area network; the mobile terminal 103 communicates with the application server 104 by means of voice, short message or data; the read only memory 101 is a CD-R ⁇ M, a DVD- ROM, MASK ROM, PROM, EPR ⁇ M, OTP ROM, EEPROM or Flash ROM; mobile terminal 103 is a mobile phone, PDA, Any of a tablet or a laptop and can perform all functions of the client host 102.
- the second embodiment provides an encryption communication method, including the following steps: Step A: The mobile terminal performs mutual authentication with the application server and establishes an encrypted mobile communication, and then performs key derivation;
- Step B The client host starts, and reads and runs the client system software and the client network application software of the read-only memory storage;
- Step C The client host and the application server respectively obtain the IP addresses of the other party, and respectively set IP address filtering rules
- Step D The application server generates a random number and a key, and sends the same to the client host through the mobile terminal;
- Step E The client host and the application server perform IP address filtering, mutual authentication, and key negotiation to establish an encrypted network communication.
- All the functions of the client host can be completed by the mobile terminal in each of the above execution steps.
- step A described in the second embodiment further includes:
- Step A1 The mobile terminal and the application server perform mutual authentication based on the symmetric authentication key Ka/Ka', and establish an encrypted mobile communication based on the symmetric communication key Kc/Kc', and there is no between Ka/Ka' and Kc/Kc' Calculus relationship
- Step A12 the application server generates random numbers R1, R2, R3, and R4, and derives a new authentication key Ka', and the process of deriving Ka' includes:
- the application server derives a new communication key Kc' and there is no computational relationship between the process of deriving Kc' and the process of deriving Ka'.
- the process of deriving Kc' includes:
- the application server stores Ka', Kc', MemPa ⁇ MemKa', MemPc', MemKc', For the next two-way authentication, encrypted communication and key derivation;
- Step A13 The application server sends the random number R1, R2, R3, and R4 to the mobile terminal.
- Step A14: The mobile terminal derives a new authentication key Ka, and the process of deriving Ka includes: the mobile terminal calculates MemPa f based on the stored MemPa. (R1, MemPa), where R1 is a random number and MemPa is a key;
- the mobile terminal derives a new communication key Kc, and there is no calculation relationship between the process of deriving Kc and the process of deriving Ka.
- the process of deriving Kc includes:
- the mobile terminal stores Ka, Kc, MemPa, MemKa, MemPc, MemKc for the next two-way authentication, encrypted communication, and key derivation.
- step B described in the second embodiment further includes:
- Step B1 1 the client host starts
- Step B12 The client host reads and runs the client system software stored in the read-only memory; Step B13, the client host disables the hard disk of the machine by using the client system software;
- Step B14 the client host reads and runs the client network application software of the read-only memory storage.
- step C described in the second embodiment further includes:
- Step C1 The client host obtains the IP address IPAc of the local machine from the Internet;
- Step C12 the client host reads the IP address of the application server stored in the read-only memory.
- the client host allows the user to obtain the application server from the application server using the mobile terminal
- IP address IPAs and let the user input the IPAs to the client host
- Step C13 The client host sets an IP address filtering rule, and allows the local device to receive an IP data packet whose IP source address is an IPAs.
- Step C14 the client host prompts the user to send the IPAc to the application server by using the mobile terminal;
- Step C15 input IPAc to the mobile terminal;
- Step C16 the mobile terminal sends the IPAc to the application server, and the application server receives the IPAc.
- the mobile subscriber integrated service digital network number MSISDN of the mobile terminal is obtained;
- Step C17 the application server sets an IP address filtering rule, and allows the local machine to receive the IP data packet whose IP source address is IPAc.
- step D described in the second embodiment further includes:
- Step D1 The application server generates a random number rand1 rand2 to generate a symmetric key K1/K1 ' K2/K2' K3/K3', and there is no calculation relationship between any two of the ⁇ 1 ⁇ 2 ⁇ 3;
- Step D12 the application server sends ranch rand2 K1 ⁇ 2 ⁇ 3 to the mobile terminal;
- Step D13 the mobile terminal prompts the user to input rand1 rand2 K1 ⁇ 2 ⁇ 3 to the client host;
- step D14 enter rand1 rand2 K1 ⁇ 2 ⁇ 3 to the client host.
- the steps described in the second embodiment further include:
- Step E12 The client host sends the res1 to the application server through the IP packet IP1, and the IP source address of the IP1 is IPAc.
- Step E13 The application server performs IP address filtering, receives IP1 according to the IP address filtering rule, and allows the client host to connect to the local machine;
- step E15 the application server compares resl' with resl, and if it is the same, proceeds to step E16, otherwise the entire process ends;
- the source address is IPAs;
- Step E18 The client host performs IP address filtering, receives IP2 according to the IP address filtering rule, and allows the application server to connect to the local machine;
- step E20 the client host compares res2 with res2'. If the same, the process proceeds to step E21. Then the entire process ends;
- Step E21 the client host prompts the user to input the MSISDN to the client host;
- Step E22 input the MSISDN to the client host;
- Step E23 the client host and the application server negotiate the session key Ks based on rand3_p/rand3, MSISDN, K3/K3', and establish an encrypted network communication based on Ks; or, the application server randomly selects one of the user information retained when the user opens the account.
- Parameter C and prompting the user with the name of the parameter C through the mobile terminal or the client host and letting the user input the parameter C to the client host, the client host and the application server are based on the parameters C, rand3_p/rand3, MSISDN, K3/K3'
- the session key Ks is negotiated and encrypted network communication is established based on Ks.
- the user information includes a user biometric, an international mobile subscriber identity code IMSU international mobile device identifier 1MB, an integrated circuit card identifier ICCID, a bank account account number, an ID card ID, an ID card validity period, or The address of the ID card.
- the third embodiment provides a method for establishing an encrypted WLAN communication between a mobile terminal and an application server, where the method includes the following steps:
- the mobile terminal reads and runs the mobile terminal system software stored in its factory Flash ROM; the mobile terminal sends the WLAN encrypted communication request to the application server through the mobile communication network; the application server generates the random number Collins, Rand2 and the pre-shared key PSK, and the Collins There is no calculation relationship between Rand2, Collins and PSK, Rand2 and PSK, and the application server sends the Collins, Rand2, PSK to the mobile terminal through the mobile communication network;
- the mobile terminal sends the Collins to the application server through the WLAN;
- the mobile terminal and the application server establish an encrypted WLAN communication based on the PSK.
- the software stored in the ROM is used to prevent the computer virus from harming the mobile terminal; there is no calculation relationship between the Collins and the PSK, and Rand2 and the PSK, and the authentication information based on the WLAN is prevented from being poor. Attack the WLAN pre-shared key PSK.
- Embodiment 4 provides a method for implementing mobile banking by using a USBKey, a mobile phone, and an online banking server, wherein the USBKey is connected to the mobile phone through an OTG (On-The-Go) connection cable, and the USBKey is read-only for the mobile phone.
- the user registers with the online banking server, and the online banking server writes the IP address of the mobile phone system software, the mobile banking software and the online banking server to the USBKey, and the online banking server generates and stores the user digital certificate and writes the user digital certificate to the USBKey.
- the online banking server generates a symmetric key K1/K1 ', stores K1 ' and writes K1 to the USBKey, and there is no calculation relationship between K1 and the user digital certificate, and between K1 and the online banking server digital certificate.
- the method includes the following steps:
- the mobile phone reads the IP address of the online banking server stored by the USBKey, sets an IP address filtering rule according to the IP address, and allows the online banking server to connect to the local machine;
- the mobile phone reads the user digital certificate stored by the USBKey
- the mobile phone and the online banking server perform two-way authentication based on the user digital certificate and the online banking server digital certificate, and establish an SSL link;
- the online banking server sends the ranch to the mobile phone through the SSL link
- the phone sends the ranch to the USBKey
- USBKey sends Kc to the phone
- the mobile phone and the online banking server establish an encrypted communication connection based on the communication key Kc/Kc' on the SSL link, and the mobile banking software communicates with the online banking server through the encrypted communication connection on the SSL link.
- the software that uses the read-only USBKey storage after the mobile phone is started prevents the computer virus from harming the mobile banking application; the mobile phone uses the IP address of the online banking server stored by the read-only USBKey instead of using the DNS, thereby preventing the DNS hijacking from harming the mobile banking.
- mobile phone performs IP address filtering to prevent phishing from harming the mobile phone
- mobile phone and online banking server perform mutual authentication based on digital certificate and USBKey and online banking server negotiate communication key Kc/Kc' based on K1/K1 ', authentication information and communication confidentiality
- Kc/Kc' based on K1/K1 ', authentication information and communication confidentiality
- the ranch is transmitted through the SSL link and the random is used to negotiate the communication key Kc, which improves the security of the key agreement
- the establishment of an encrypted communication connection improves the security of the mobile banking.
- the online banking server stores the user digital certificate and the mobile phone SIM card ICCID or the user ID card, and writes the online banking server digital certificate to the USBKey; the mobile phone and the online banking server perform two-way based on the user digital certificate and the online banking server digital certificate.
- the mobile phone reads the digital certificate of the online banking server stored by the USBKey, and the mobile phone sends the SIM card ICCID of the mobile phone or the ID card input to the mobile phone to the online banking server, and the online banking server reads the user corresponding to the ICCID or the ID card stored.
- the mobile phone and the online banking server can perform mutual authentication without exchanging digital certificates.
- the mobile phone adopts the online banking server digital certificate stored by the read-only USB Key, and the online banking server uses the stored user digital certificate corresponding to the user information ICCID or the ID card ID, and the mobile phone and the online banking server perform the mutual authentication without exchanging the public key, thereby improving the security.
- the SDKey, Micor SD card, SIM card or mobile phone factory Flash ROM can be used to complete all functions of the USBKey, and the above memory is read-only for the mobile phone.
- Embodiment 5 provides a simplified method of Embodiment 2 of the present invention, wherein the mobile terminal is connected to the client host through USB, and the method includes the following steps:
- Step ⁇ ' the mobile terminal starts, and reads and runs the mobile terminal system software and the mobile terminal network application software stored by the mobile terminal in a read-only form, and establishes mobile communication with the application server;
- step ⁇ ' the client host starts, and Reading and running client system software and client network application software stored in a read-only form by the mobile terminal;
- Step C' the client host obtains the IP address of the application server from the application server through the mobile terminal, sets an IP address filtering rule, and allows the application server to connect to the client host, and the application server obtains the client host from the client host through the mobile terminal. IP address, and set IP address filtering rules, and allow client hosts to connect to the application server;
- Step D' the application server generates a session key and sends it to the client host through the mobile terminal;
- Step E' the client host and the application server perform IP address filtering, and establish encrypted network communication based on the session key.
- the client host and the application server directly establish an encrypted network communication based on the session key transmitted by the mobile terminal without using mutual authentication and key agreement, thereby preventing the attack session key from being exhausted based on the network-passed authentication information.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/907,280 US9848320B2 (en) | 2013-07-24 | 2014-07-08 | Encrypted communications method and encrypted communications system |
JP2016528326A JP6181303B2 (ja) | 2013-07-24 | 2014-07-08 | 暗号化通信方法、及び、暗号化通信システム |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310314997.3 | 2013-07-24 | ||
CN2013103149973A CN103415008A (zh) | 2013-07-24 | 2013-07-24 | 一种加密通信方法和加密通信系统 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015010537A1 true WO2015010537A1 (zh) | 2015-01-29 |
Family
ID=49607983
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2014/081835 WO2015010537A1 (zh) | 2013-07-24 | 2014-07-08 | 一种加密通信方法和加密通信系统 |
Country Status (4)
Country | Link |
---|---|
US (1) | US9848320B2 (zh) |
JP (1) | JP6181303B2 (zh) |
CN (2) | CN103415008A (zh) |
WO (1) | WO2015010537A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114255530A (zh) * | 2021-12-06 | 2022-03-29 | 深圳供电局有限公司 | 一种用于供电设备的智能锁具的通信安全保障方法及系统 |
Families Citing this family (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103415008A (zh) | 2013-07-24 | 2013-11-27 | 牟大同 | 一种加密通信方法和加密通信系统 |
US9585014B2 (en) * | 2013-12-23 | 2017-02-28 | Marvell International Ltd. | Fast recovery from ciphering key mismatch |
CN103780620B (zh) * | 2014-01-22 | 2017-05-24 | 牟大同 | 一种网络安全方法和网络安全系统 |
CN104917741B (zh) * | 2014-07-19 | 2018-10-02 | 国家电网公司 | 一种基于usbkey的明文文档公网安全传输系统 |
WO2016033716A1 (zh) * | 2014-09-01 | 2016-03-10 | 华为技术有限公司 | 一种通信方法、移动网络设备、终端、应用服务器及系统 |
CN104506534B (zh) * | 2014-12-25 | 2017-11-21 | 青岛微智慧信息有限公司 | 安全通信密钥协商交互方案 |
CN106507331B (zh) * | 2015-09-07 | 2019-08-20 | 中国移动通信集团公司 | 一种卡应用数据的安全迁移方法、装置及系统 |
CN105554759A (zh) * | 2016-02-24 | 2016-05-04 | 中国联合网络通信集团有限公司 | 一种鉴权方法和鉴权系统 |
CA3031407A1 (en) * | 2016-08-12 | 2018-05-17 | 7Tunnels, Inc. | Systems and methods for secure communication using random cipher pad cryptography |
CN106250556B (zh) * | 2016-08-17 | 2019-06-18 | 贵州数据宝网络科技有限公司 | 用于大数据分析的数据挖掘方法 |
CN106533669B (zh) * | 2016-11-15 | 2018-07-13 | 百度在线网络技术(北京)有限公司 | 设备识别的方法、装置和系统 |
US10575179B2 (en) | 2016-11-30 | 2020-02-25 | Mastercard International Incorporated | System and method for device fraud prevention |
CN106998359A (zh) * | 2017-03-24 | 2017-08-01 | 百度在线网络技术(北京)有限公司 | 基于人工智能的语音识别服务的网络接入方法以及装置 |
JP7148947B2 (ja) * | 2017-06-07 | 2022-10-06 | コネクトフリー株式会社 | ネットワークシステムおよび情報処理装置 |
CN107612691A (zh) * | 2017-11-07 | 2018-01-19 | 世纪龙信息网络有限责任公司 | 认证信息传输方法和装置以及用户信息认证系统 |
WO2019140554A1 (zh) * | 2018-01-16 | 2019-07-25 | Oppo广东移动通信有限公司 | 一种数据验证方法、网络设备、ue及计算机存储介质 |
CN108848107A (zh) * | 2018-07-04 | 2018-11-20 | 成都立鑫新技术科技有限公司 | 一种安全传输网络信息的方法 |
US11188685B2 (en) * | 2019-02-22 | 2021-11-30 | Google Llc | Secure transient buffer management |
GB2582169B (en) * | 2019-03-13 | 2021-08-11 | Trustonic Ltd | Authentication method |
CN110768795B (zh) * | 2019-10-30 | 2022-09-13 | 迈普通信技术股份有限公司 | 一种会话建立方法及装置 |
CN111431586B (zh) * | 2020-04-17 | 2021-09-21 | 中国电子科技集团公司第三十八研究所 | 一种卫星网络安全通信方法 |
CN113204760B (zh) * | 2021-05-20 | 2022-04-15 | 郑州信大捷安信息技术股份有限公司 | 用于软件密码模块的安全通道建立方法及系统 |
US11522958B1 (en) | 2021-12-12 | 2022-12-06 | Intrado Life & Safety, Inc. | Safety network of things |
CN114760138B (zh) * | 2022-04-20 | 2024-02-13 | 深圳市昊洋智能有限公司 | 基于云架构下的视频会议系统安全方法及装置 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080123856A1 (en) * | 2006-11-24 | 2008-05-29 | Korea Information Security Agency | Method of Managing a Mobile Multicast Key Using a Foreign Group Key |
CN102737311A (zh) * | 2012-05-11 | 2012-10-17 | 福建联迪商用设备有限公司 | 网络银行安全认证方法和系统 |
CN103001976A (zh) * | 2012-12-28 | 2013-03-27 | 中国科学院计算机网络信息中心 | 一种安全的网络信息传输方法 |
CN103415008A (zh) * | 2013-07-24 | 2013-11-27 | 牟大同 | 一种加密通信方法和加密通信系统 |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0575598A (ja) * | 1991-09-18 | 1993-03-26 | Matsushita Electric Ind Co Ltd | 鍵データ共有装置 |
JP3662080B2 (ja) * | 1996-08-29 | 2005-06-22 | Kddi株式会社 | ファイアウォール動的制御方法 |
JP2000010927A (ja) * | 1998-06-25 | 2000-01-14 | Nec Yonezawa Ltd | 認証システム及び認証装置 |
US6901429B2 (en) * | 2000-10-27 | 2005-05-31 | Eric Morgan Dowling | Negotiated wireless peripheral security systems |
JP3944118B2 (ja) * | 2003-05-20 | 2007-07-11 | 株式会社東芝 | サーバ装置、携帯端末装置及び情報利用装置 |
JP2006217275A (ja) * | 2005-02-03 | 2006-08-17 | Neo Techno:Kk | Vpn通信装置及び通信システム |
JP4813133B2 (ja) * | 2005-09-20 | 2011-11-09 | 富士通株式会社 | 生体認証方法及び生体認証システム |
JPWO2007099609A1 (ja) * | 2006-02-28 | 2009-07-16 | パナソニック株式会社 | 機器認証システム、移動端末、情報機器、機器認証サーバ及び機器認証方法 |
WO2012073340A1 (ja) * | 2010-11-30 | 2012-06-07 | 富士通株式会社 | 鍵更新方法、ノード、ゲートウェイ、サーバ、およびネットワークシステム |
-
2013
- 2013-07-24 CN CN2013103149973A patent/CN103415008A/zh active Pending
-
2014
- 2014-06-17 CN CN201410270594.8A patent/CN104092663A/zh active Pending
- 2014-07-08 US US14/907,280 patent/US9848320B2/en not_active Expired - Fee Related
- 2014-07-08 WO PCT/CN2014/081835 patent/WO2015010537A1/zh active Application Filing
- 2014-07-08 JP JP2016528326A patent/JP6181303B2/ja not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080123856A1 (en) * | 2006-11-24 | 2008-05-29 | Korea Information Security Agency | Method of Managing a Mobile Multicast Key Using a Foreign Group Key |
CN102737311A (zh) * | 2012-05-11 | 2012-10-17 | 福建联迪商用设备有限公司 | 网络银行安全认证方法和系统 |
CN103001976A (zh) * | 2012-12-28 | 2013-03-27 | 中国科学院计算机网络信息中心 | 一种安全的网络信息传输方法 |
CN103415008A (zh) * | 2013-07-24 | 2013-11-27 | 牟大同 | 一种加密通信方法和加密通信系统 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114255530A (zh) * | 2021-12-06 | 2022-03-29 | 深圳供电局有限公司 | 一种用于供电设备的智能锁具的通信安全保障方法及系统 |
CN114255530B (zh) * | 2021-12-06 | 2024-01-16 | 深圳供电局有限公司 | 一种用于供电设备的智能锁具的通信安全保障方法及系统 |
Also Published As
Publication number | Publication date |
---|---|
US9848320B2 (en) | 2017-12-19 |
JP2016525838A (ja) | 2016-08-25 |
US20160165435A1 (en) | 2016-06-09 |
CN104092663A (zh) | 2014-10-08 |
CN103415008A (zh) | 2013-11-27 |
JP6181303B2 (ja) | 2017-08-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6181303B2 (ja) | 暗号化通信方法、及び、暗号化通信システム | |
CN105850073B (zh) | 信息系统访问认证方法及装置 | |
JP6896940B2 (ja) | 第1のアプリケーションと第2のアプリケーションとの間の対称型相互認証方法 | |
JP5579872B2 (ja) | 安全な複数uim認証および鍵交換 | |
CN109729523B (zh) | 一种终端联网认证的方法和装置 | |
WO2017201809A1 (zh) | 终端通信方法及系统 | |
CN111615105B (zh) | 信息提供、获取方法、装置及终端 | |
ES2687238T3 (es) | Método de arquitectura de arranque de seguro basado en autenticación de resumen basada en contraseña | |
KR20170032374A (ko) | 데이터 처리 방법 및 장치 | |
WO2014107977A1 (zh) | 密钥保护方法和系统 | |
JP2012530311A5 (zh) | ||
JP2021524944A (ja) | マルチパーティ計算(mpc)による物のインターネット・セキュリティ | |
Lounis et al. | Bad-token: denial of service attacks on WPA3 | |
WO2009089764A1 (fr) | Système et procédé d'authentification de réseau sécurisé | |
US20160381011A1 (en) | Network security method and network security system | |
CN112311543B (zh) | Gba的密钥生成方法、终端和naf网元 | |
TWI568234B (zh) | 全球移動通訊網路的匿名認證方法 | |
CN113507372A (zh) | 一种接口请求的双向认证方法 | |
CN105591748B (zh) | 一种认证方法和装置 | |
US9876774B2 (en) | Communication security system and method | |
TWI728212B (zh) | 基於密文的身份驗證方法 | |
JP4499575B2 (ja) | ネットワークセキュリティ方法およびネットワークセキュリティシステム | |
WO2012000313A1 (zh) | 一种家庭网关认证方法和系统 | |
Moon et al. | An AAA scheme using ID-based ticket with anonymity in future mobile communication | |
Park | An authentication protocol offering service anonymity of mobile device in ubiquitous environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14829048 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2016528326 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 14907280 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 08/06/2016) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 14829048 Country of ref document: EP Kind code of ref document: A1 |