WO2015188411A1 - 一种基于用户使用特征而自动选择安全通道的方法和系统 - Google Patents

一种基于用户使用特征而自动选择安全通道的方法和系统 Download PDF

Info

Publication number
WO2015188411A1
WO2015188411A1 PCT/CN2014/081362 CN2014081362W WO2015188411A1 WO 2015188411 A1 WO2015188411 A1 WO 2015188411A1 CN 2014081362 W CN2014081362 W CN 2014081362W WO 2015188411 A1 WO2015188411 A1 WO 2015188411A1
Authority
WO
WIPO (PCT)
Prior art keywords
party
calling party
communication
responder
responding
Prior art date
Application number
PCT/CN2014/081362
Other languages
English (en)
French (fr)
Inventor
王艺
Original Assignee
快车科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 快车科技有限公司 filed Critical 快车科技有限公司
Publication of WO2015188411A1 publication Critical patent/WO2015188411A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Definitions

  • Embodiments of the present invention relate to the field of communication security, and in particular, to a method and system for automatically selecting a secure channel based on user usage characteristics.
  • Information encryption and secure communication are critical to both parties to the communication. At the same time, how the initiation of the security mechanism becomes intelligent and automated, so that the security mechanism does not affect the main purpose of the user's communication (ie, communication, not encryption). Communication information), while at the same time ensuring that information or privacy will not be revealed (in case the communication is misappropriated by criminals) becomes even more important.
  • All current security systems and encryption systems require the user to explicitly use or enable the encryption mechanism. That is, the security mechanism is activated at the time of communication, so that the communication parties need to initiate a key exchange, or through a trusted third party, so as to ensure that the communication content is encrypted, so that the communication parties can encrypt and decrypt the communication content, and other third parties The content cannot be decrypted because there is no corresponding key; or there is no security protection at all. Actively enabling the security mechanism has the greatest impact on the communication users, which hinders the natural communication between the two parties. Because of an active or pre-set security boot and related key exchange release steps, the user must explicitly choose the initiative.
  • Embodiments of the present invention provide a method and system for automatically selecting a secure channel based on a user's use characteristics, and automatically communicating to a communication that may need to be kept secret according to a user's usage habits or characteristics. Encryption can solve the contradiction between ease of use and content protection.
  • the communication party includes at least one calling party and at least one responder;
  • step Sl before the calling party initiates a communication request, determining whether the responding party is in the security list of the calling party, if step S2 is performed, otherwise step S5 is performed;
  • the responder receives a communication request initiated by the calling party
  • the responder determines whether the calling party is in the security list of the responder, if step S4 is performed, otherwise step S5 is performed;
  • the calling party and the responding party communicate according to a preset secure channel
  • the calling party and the responding party implement trusted communication by using a third-party relay security mechanism.
  • the step S4 includes:
  • the calling party communicates with the responder via an IBE mechanism.
  • the communication party includes at least one calling party and at least one responder;
  • the calling party includes a first determining module
  • the first determining module is configured to determine, before the calling party initiates a communication request, whether the responding party is in a security list of the calling party;
  • the responder includes a receiving module and a second determining module
  • the receiving module is configured to receive, by the responder, a communication request initiated by the calling party, where the second determining module is configured to determine, by the responding party, whether the calling party is in a security list of the responding party;
  • a secure communication module configured to: the calling party and the responder communicate according to a preset secure channel
  • a third party communication module configured to enable the caller and the responder to implement trusted communication through a third-party relay security mechanism.
  • a method for automatically selecting a secure channel based on user usage characteristics provided by an embodiment of the present invention, Includes:
  • the communication party includes at least one calling party and at least one responder;
  • step ⁇ 2 before the calling party initiates a communication request, it is determined whether the responding party is in the security list of the calling party, if the step ⁇ 2 is performed, otherwise step ⁇ 5 is performed;
  • the responder receives a communication request initiated by the calling party
  • the responder determines whether the calling party is in the security list of the responding party, if the execution step ⁇ 4, otherwise step ⁇ 5;
  • the calling party and the responding party communicate according to a preset safety channel
  • step ⁇ 5 determining whether the caller and the responder need to perform secure communication, if the step ⁇ 6 is performed, otherwise step K10 is performed;
  • the calling party negotiates with the responder to establish a trusted communication mechanism, if the negotiation is successful, the step ⁇ 7 is performed, otherwise the step ⁇ 9 is performed;
  • step ⁇ 7 the trusted communication mechanism between the calling party and the responder is started, if the startup is successful, step ⁇ 8 is performed, otherwise step ⁇ 9 is performed;
  • ⁇ 8. Communicate according to the safe channel after startup and add the safety channel to the safety list as a preset start;
  • the calling party communicates with the responder in clear text.
  • the step ⁇ 5 includes:
  • step ⁇ 6 Checking the data of the calling party and/or the responding party from the network, and if the data is confirmed to be secure, sending a secure communication suggestion to the responding party and/or the calling party, and at the responding party and/or When the calling party accepts the secure communication suggestion, step ⁇ 6 is performed, otherwise step ⁇ 10 is performed.
  • the step ⁇ 5 includes:
  • the step K5 includes:
  • step ⁇ 10 Checking the communication content of the calling party and the responding party and determining whether confidentiality is required, if the security communication proposal is sent to the responding party and/or the calling party, and at the responding party and/or the Step K6 is performed when the calling party accepts the secure communication proposal, otherwise step ⁇ 10 is performed.
  • the calling party includes a mobile phone number, an email address, or an account of a social tool
  • the responder includes a mobile phone number, an email address, or an account of a social tool.
  • the step ⁇ 5 includes:
  • the calling party communicates with the responder via a UI mechanism.
  • the communication party includes at least one calling party and at least one responder;
  • the calling party includes a first determining module
  • the first determining module is configured to determine, before the calling party initiates a communication request, whether the responding party is in a security list of the calling party;
  • the responder includes a receiving module and a second determining module
  • the receiving module is configured to receive a communication request initiated by the calling party
  • the second determining module is configured to determine whether the calling party is in the security list of the responding party;
  • the secure channel communication module is configured to communicate with the responding party according to a preset secure channel;
  • a third determining module configured to determine whether a secure communication is required between the calling party and the responding party
  • a negotiation establishing module configured to: the calling party negotiates with the responding party to establish a trusted communication mechanism; and the starting module is configured to start a trusted communication mechanism between the calling party and the responding party; Communicate according to the secure channel after startup and add the security channel to the security list as a preset start;
  • a third-party communication module configured to communicate between the calling party and the responding party through a third-party relay Letter
  • the plaintext communication module is configured to perform clear text communication between the calling party and the responding party.
  • the calling party includes a mobile phone number, an email address, or an account of a social tool
  • the responder includes a mobile phone number, an email address, or an account of a social tool.
  • the communication party includes at least one calling party and at least one responder; K1. Before the calling party initiates the communication request, it is determined whether the responding party is in the security list of the calling party, and if the step ⁇ 2 is performed, Otherwise, step ⁇ 5 is performed; ⁇ 2, the responder receives the communication request initiated by the calling party; ⁇ 3, the responder determines whether the calling party is in the security list of the responding party, if step ⁇ 4 is performed, otherwise steps are performed ⁇ 5; ⁇ 4, the calling party and the responding party communicate according to a preset secure channel; ⁇ 5, determining whether secure communication is required between the calling party and the responding party, if step ⁇ 4 is performed, otherwise steps are performed ⁇ 6; ⁇ 6, the calling party and the responding party perform clear text communication.
  • the method and system for automatically selecting a secure channel based on user usage characteristics can solve the contradiction between use convenience and content protection by automatically encrypting communication content that may need to be kept secret according to the user's usage habits or characteristics. .
  • FIG. 1 is a flow chart of a first embodiment of a method for automatically selecting a secure channel based on user usage characteristics
  • FIG. 2 is a schematic structural view of a first embodiment of a system for automatically selecting a secure channel based on user usage characteristics
  • FIG. 3 is a flow chart of a second embodiment of a method for automatically selecting a secure channel based on user usage characteristics according to the present invention
  • FIG. 4 is a flow chart of a third embodiment of a method for automatically selecting a secure channel based on user usage characteristics according to the present invention
  • FIG. 5 is a schematic structural view of a second embodiment of a system for automatically selecting a secure channel based on user usage characteristics.
  • Embodiments of the present invention provide a method and system for automatically selecting a secure channel based on a user's use characteristics, and automatically communicating to a communication that may need to be kept secret according to a user's usage habits or characteristics. Encryption can solve the contradiction between ease of use and content protection.
  • IBE Identity Based Encryption
  • Encryption and decryption use two different sets of keys.
  • Each person's public key is his identity, such as E-mail address, phone number, etc.
  • the private key is controlled by the user in the form of data.
  • the key management is quite simple, and the data information can be easily encrypted and decrypted.
  • a first embodiment of a method for automatically selecting a secure channel based on a user using a feature in the embodiment of the present invention includes:
  • the communication party includes at least one calling party and at least one responder;
  • step S2 Before the calling party initiates the communication request, it is determined whether the responding party is in the security list of the calling party, if yes, step S2 is performed, otherwise step S5 is performed;
  • the foregoing security list may be generated by the calling party. Before the calling party initiates the communication request, it is determined whether the responding party is in the calling party's security list. If the step S2 is performed, otherwise step S5 is performed.
  • the responder receives the communication request initiated by the calling party
  • the responder receives the communication request initiated by the calling party.
  • step S3 the responder determines whether the calling party is in the security list of the responding party, if the step S4 is performed, otherwise step S5 is performed;
  • the responder After receiving the communication request initiated by the calling party, the responder determines whether the calling party is in the security list of the responding party. If yes, it proves that the calling party belongs to the relying party of the responding party, and step S4 may be performed; otherwise, step S5 is performed.
  • the calling party and the answering party communicate according to a preset secure channel
  • the caller and the responder can communicate according to the preset secure channel.
  • the above-mentioned preset security channel is a secure channel pre-agreed by the calling party and the responding party or a secure channel determined according to the condition.
  • the calling party and the responding party can communicate through the IBE mechanism, which may not be limited herein.
  • the calling party and the responding party implement trusted communication through a third-party relay security mechanism. It is proved that there is no trust relationship between the calling party and the responding party. At this time, the calling party and the responding party can implement trusted communication through the third-party relay security mechanism.
  • the method of the embodiment of the present invention can solve the contradiction between the convenience of use and the protection of content by automatically encrypting the communication content that may be required to be kept secret according to the usage habit or characteristics of the user.
  • a first embodiment of a system for automatically selecting a secure channel based on user usage characteristics in an embodiment includes:
  • the communicating party includes at least one calling party 21 and at least one responder 22;
  • the calling party 21 includes a first determining module 211;
  • the first determining module 211 is configured to determine, before the calling party 21 initiates the communication request, whether the responding party 22 is on the security list of the calling party 21;
  • the responder 22 includes a receiving module 221 and a second determining module 222;
  • the receiving module 221 is configured to receive, by the answering party 22, a communication request initiated by the calling party 21;
  • the second determining module 222 is configured to determine, by the responding party 22, whether the calling party 21 is on the security list of the responding party 22;
  • the secure communication module 23 is configured to be used by the calling party 21 and the answering party 22 to communicate according to a preset secure channel;
  • the third party communication module 24 is used for the caller 21 and the responder 22 to implement trusted communication through a third-party relay security mechanism.
  • the first embodiment of the system of the present invention is a system embodiment corresponding to the first embodiment of the method of the present invention. Therefore, the specific operation process of each module of the system of the present invention is referred to the first embodiment of the method, and details are not described herein again. Furthermore, the first embodiment of the system of the present invention should also have the effect of the first embodiment of the method of the present invention, i.e., the contradiction between ease of use and content protection can be solved.
  • a second embodiment of a method for automatically selecting a secure channel based on a user usage feature includes:
  • the communication party includes at least one calling party and at least one responder;
  • the caller determines whether the responder is in the caller's security list before initiating the communication request, if the step ⁇ 2 is performed, otherwise step ⁇ 5;
  • the above-mentioned security list can be generated by the calling party. Before the calling party initiates the communication request, it is determined whether the responding party is in the calling party's security list. If the step ⁇ 2 is performed, otherwise step ⁇ 5 is performed. K2. The responder receives the communication request initiated by the calling party;
  • the responder receives the communication request initiated by the calling party.
  • the responder determines whether the calling party is in the security list of the responding party, if it is step ⁇ 4, otherwise step ⁇ 5;
  • the responder After receiving the communication request initiated by the calling party, the responder determines whether the calling party is in the security list of the responding party. If yes, it proves that the calling party belongs to the relying party's trusted party, and can perform step ⁇ 4, otherwise step ⁇ 5.
  • the calling party and the answering party communicate according to a preset secure channel
  • the caller and the responder can communicate according to the preset secure channel.
  • the above-mentioned preset security channel is a secure channel pre-agreed by the calling party and the responding party or a secure channel determined according to the condition.
  • the calling party and the responding party can communicate through the ⁇ mechanism, which may not be limited herein.
  • step ⁇ 5. Determine whether there is a need for secure communication between the calling party and the responding party. If step 6.5 is performed, otherwise step K10 is performed; it is proved that there is no trust relationship between the calling party and the responding party, and it can be determined between the calling party and the responding party. Whether it is necessary to perform secure communication, if step ⁇ 6 is performed, otherwise step ⁇ 10 is performed.
  • step ⁇ 6 The calling party negotiates with the responder to establish a trusted communication mechanism. If the negotiation is successful, step ⁇ 7 is performed, otherwise step ⁇ 9 is performed;
  • the caller and the responder can be negotiated to establish a trusted communication mechanism. If the negotiation is successful, go to Step 7. If the negotiation fails, go to Step 9.
  • Step 7 Initiate the trusted communication mechanism between the calling party and the responder. If the startup is successful, go to Step 8. Otherwise, go to Step 9.
  • step ⁇ 8 After determining that the trusted caller and the responder establish a trusted communication mechanism successfully, the trusted communication mechanism between the caller and the responder is started. If the startup is successful, step ⁇ 8 is performed. Otherwise, step ⁇ 9 is performed.
  • ⁇ 8. Communicate according to the safe channel after startup and add the safety channel to the safety list as the preset to start;
  • the preset security channel After determining that the trusted communication mechanism between the calling party and the responding party is successfully started, press the preset security channel to enter. Line communication and adding a secure channel to the security list is initiated as a preset. Since the caller and the responder have successfully negotiated, the secure channel can be added to the security list as a preset, which can speed up the response and simplify the communication process.
  • the caller and the responder After determining that the negotiated caller and the responder establish a trusted communication mechanism, or the trusted communication mechanism between the caller and the responder fails to start, since the caller and the responder need to communicate securely, the caller and the responder can pass The third party relays the communication.
  • the caller and the responder communicate in clear text. It is proved that there is no trust relationship between the calling party and the responding party. At this time, the calling party and the responding party can communicate in plain text to complete the communication interaction between the calling party and the responding party.
  • the method of the embodiment of the present invention can solve the contradiction between ease of use and content protection by automatically encrypting communication content that may be required to be kept secret according to the user's usage habits or characteristics.
  • a third embodiment of a system for automatically selecting a secure channel based on user usage characteristics in an embodiment includes:
  • the communication party includes at least one calling party and at least one responder;
  • step 402 Before the calling party initiates the communication request, determine whether the responding party is in the calling party's security list. If the step 402 is performed, otherwise step 405 is performed;
  • the two parties of the communication include a calling party and a responding party, and the calling party includes a mobile phone number, an email address, or an account of the social networking tool; the responding party includes a mobile phone number, an email address, or an account of a social tool.
  • the foregoing security list may be generated by the calling party. Before the calling party initiates the communication request, it is determined whether the responding party is in the calling party's security list. If the step 402 is performed, otherwise step 405 is performed.
  • the responder receives a communication request initiated by the calling party.
  • the responder receives the communication request initiated by the calling party.
  • the responder determines whether the caller is in the security list of the responder, if it is to perform step 404, otherwise step 405;
  • step 404 After the responder receives the communication request initiated by the calling party, it determines whether the calling party is in the responder's security The full list, if yes, proves that the calling party belongs to the relying party's relying party, step 404 may be performed, otherwise step 405 is performed.
  • the calling party and the answering party communicate according to a preset secure channel
  • the caller and the responder can communicate according to the preset secure channel.
  • the above-mentioned preset security channel is a secure channel pre-agreed by the calling party and the responding party or a secure channel determined according to the condition.
  • the calling party and the responding party can communicate through the IBE mechanism, which may not be limited herein.
  • step 405. Determine whether a secure communication is required between the calling party and the responding party. If step 406 is performed, otherwise step 410 is performed; and there is no trust relationship between the calling party and the responding party, and the caller and the responding party can be determined at this time. Whether it is necessary to perform secure communication, if step 406 is performed, otherwise step 410 is performed.
  • the specific process of the above step 405 may include:
  • step 406 Checking the data of the calling party and/or the answering party from the network, if the data is confirmed to be secure, sending a secure communication suggestion to the responding party and/or the calling party, and performing step 406 when the responding party and/or the calling party accepts the secure communication suggestion, otherwise Go to step 410.
  • the respondent is not in the caller's security list, and the respondent's data can be checked from the network.
  • the respondent's background can be queried from the network, and then judged according to the above data. If the security is confirmed, the plaintext communication suggestion is sent to the calling party. And step 406 is performed when the calling party accepts the plaintext communication suggestion, otherwise step 410 is performed.
  • the foregoing determining according to the data may specifically include: determining whether the respondent data contains untrusted words such as fraud or crime, and if so, determining that the responder is unsafe.
  • step 410 Perform protection needs analysis on the calling party and/or the responder according to the judgment rule, and send a secure communication proposal to the responder and/or the caller if it is confirmed that there is protection requirement, and execute when the responder and/or the caller accepts the secure communication proposal Step 406, otherwise step 410 is performed.
  • the caller is not in the security list of the respondent, and the caller can be analyzed for security requirements according to the judgment rule. If it is confirmed that there is no security requirement, the plaintext communication proposal is sent to the responder, and Step 406 is performed when the answering party accepts the plaintext communication suggestion, otherwise step 410 is performed.
  • the above-mentioned judging rules may be customized by the responding party, or may be obtained from the network by others, and are not limited herein. Specifically, it may be: determining whether the calling party belongs to a trusted attribution.
  • step 406 is performed when the responding party and/or the calling party accepts the secure communication suggestion. Otherwise, step 410 is performed.
  • step 406 when the calling party communicates with the responding party in plain text, the communication content of the calling party and the responding party can be checked to determine whether confidentiality is required. If the step 406 is performed, otherwise step 410 is performed.
  • step 406 the calling party negotiates with the responder to establish a trusted communication mechanism, if the negotiation is successful, step 407 is performed, otherwise step 409 is performed;
  • the caller and the responder can be negotiated to establish a trusted communication mechanism. If the negotiation is successful, go to step 407. If the negotiation fails, go to step 409.
  • step 407 the trusted communication mechanism between the calling party and the responder is started, if the startup is successful, step 408 is performed, otherwise step 409 is performed;
  • step 408 After determining that the trusted caller and the responder establish a trusted communication mechanism, the trusted communication mechanism between the caller and the responder is started. If the startup is successful, step 408 is performed; otherwise, step 409 is performed.
  • the communication is started according to the preset secure channel and the security channel is added to the security list as a preset. Since the caller and the responder have already negotiated successfully, the secure channel can be added to the security list as a preset to speed up the response and simplify the communication process.
  • the calling party and the responding party communicate by using a third-party relay; After determining that the negotiated caller and the responder establish a trusted communication mechanism, or the trusted communication mechanism between the caller and the responder fails to start, since the caller and the responder need to communicate securely, the caller and the responder can pass The third party relays the communication.
  • the calling party and the responding party communicate in clear text. It is proved that there is no trust relationship between the calling party and the responding party. At this time, the calling party and the responding party can communicate in plain text to complete the communication interaction between the calling party and the responding party.
  • the method of the embodiment of the present invention can solve the contradiction between ease of use and content protection by automatically encrypting communication content that may be required to be kept secret according to the user's usage habits or characteristics.
  • a second embodiment of a system for automatically selecting a secure channel based on user usage characteristics in an example includes:
  • the communicating party includes at least one calling party 51 and at least one answering party 52;
  • the calling party 51 includes a first determining module 511;
  • the first determining module 511 is configured to determine, before the calling party 51 initiates the communication request, whether the responding party 52 is in the security list of the calling party;
  • the responder 52 includes a receiving module 521 and a second determining module 522;
  • the receiving module 521 is configured to receive a communication request initiated by the calling party 51.
  • the second determining module 522 is configured to determine whether the calling party 51 is in the security list of the answering party 52.
  • the secure channel communication module 53 is configured to use the calling party 51 and the answering party 52 to communicate according to a preset secure channel;
  • the third determining module 54 is configured to determine whether a secure communication is required between the calling party 51 and the answering party 52;
  • the negotiation establishing module 55 is configured to: the calling party 51 negotiates with the responding party 52 to establish a trusted communication mechanism; the starting module 56 is configured to initiate a trusted communication mechanism between the calling party 51 and the responding party 52; and the trusted communication module 57 is configured to According to the secure channel after startup, the security channel is added to the security list as a preset startup;
  • the third-party communication module 58 is used for the calling party 51 and the responding party 52 to communicate through the third-party relay Letter
  • the plaintext communication module 59 is configured to perform clear text communication between the calling party 51 and the answering party 52.
  • the calling party 51 includes a mobile phone number, an email address, or an account of a social tool;
  • the responder 52 includes a mobile number, an email address, or an account number of a social tool.
  • the second embodiment of the system of the present invention is a system embodiment corresponding to the second embodiment and the third embodiment of the method of the present invention. Therefore, the specific operation process of each module of the system of the present invention is referred to the method embodiment, and details are not described herein again. .
  • the disclosed apparatus and method can be implemented in other ways.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored, or not executed.
  • the mutual coupling or direct connection or communication connection shown or discussed may be an indirect engagement or communication connection through some interface, device or unit, and may be in electrical, mechanical or other form.
  • the components displayed by the unit may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
  • the technical solution of the present invention may contribute to the prior art or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium.
  • a number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention.
  • the storage medium includes: a USB flash drive, a removable hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk or an optical disk, and the like, which can store program codes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

一种基于用户使用特征而自动选择安全通道的方法和系统,通过根据用户的使用习惯或特征,自动地对有可能需要保密的通信内容进行加密,能够解决使用便利性和内容保护性之间的矛盾。本发明方法包括:通信方包括至少一个呼叫方和至少一个应答方;S1、所述呼叫方发起通信请求前,判断所述应答方是否在所述呼叫方的安全名单,若是执行步骤S2,否则执行步骤S5;S2、所述应答方接收所述呼叫方发起的通信请求;S3、所述应答方判断所述呼叫方是否在所述应答方的安全名单,若是执行步骤S4,否则执行步骤S5;S4、所述呼叫方与所述应答方按预设的安全通道进行通信;S5、所述呼叫方与所述应答方通过第三方中转安全机制实现可信任通信。

Description

一种基于用户使用特征而自动选择安全通道的方法和系统 本申请要求于 2014 年 6 月 13 日提交中国专利局、 申请号为 201410261903.5 , 发明名称为 "一种基于用户使用特征而自动选择安全通道的 方法和系统"的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明实施例涉及通信安全领域,具体涉及一种基于用户使用特征而自动 选择安全通道的方法和系统。
背景技术
信息加密和安全通信对于通信双方都是至关重要的, 同时, 安全机制的启 动如何变得智能化和自动化,使得安全机制不会影响使用者通信双方的主要目 的 (即是通信, 而不是加密通信信息), 同时又能够保证信息或隐私不会泄露 (以防万一通信资讯被不法分子盗用) 变得尤为重要。
现在的所有安全系统和加密系统, 需要使用者明确地使用或启用加密机 制。 亦即要么在通信时启动安全机制, 这样就需要通信双方启动密钥交换, 或 通过可信第三方进行, 这样才能保证对通信内容进行加密,使得通信双方能够 加解密通信内容, 而其他第三方由于没有相应的密钥而无法解密得到内容; 要 么就是完全不用安全保护措施。主动启用安保机制对通信使用者造成最大的影 响就是妨碍了通信双方自然的通信,因为多了一个主动的或预先设定的安全启 动以及相关的密钥交换发放等步骤, 用户必须要明确主动选择安全通信机制, 由于这个动作违反人们通信的自然使用天性, 因此, 除非必要, 很多人都选择 根本不用任何安全通信机制, 但是当知道信息被人盗用以后却已经为时已晚, 因为通信内容并没有在生成的第一时间加密而以明文形式流传到公共网络之 上。
如何使得用户不用担心安保机制,也不用担心通信内容是否将来有保密价 值, 可以如以前一样自如地使用通信工具, 成为本领域技术人员亟待解决的重 要技术问题。
发明内容
本发明实施例提供了一种基于用户使用特征而自动选择安全通道的方法 和系统,通过根据用户的使用习惯或特征, 自动地对有可能需要保密的通信内 容进行加密, 能够解决使用便利性和内容保护性之间的矛盾。
本发明实施例提供的基于用户使用特征而自动选择安全通道的方法, 包 括:
通信方包括至少一个呼叫方和至少一个应答方;
Sl、所述呼叫方发起通信请求前,判断所述应答方是否在所述呼叫方的安 全名单, 若是执行步骤 S2, 否则执行步骤 S5;
52、 所述应答方接收所述呼叫方发起的通信请求;
53、所述应答方判断所述呼叫方是否在所述应答方的安全名单,若是执行 步骤 S4, 否则执行步骤 S5;
S4、 所述呼叫方与所述应答方按预设的安全通道进行通信;
S5、 所述呼叫方与所述应答方通过第三方中转安全机制实现可信任通信。 可选地,
所述步骤 S4包括:
所述呼叫方与所述应答方通过 IBE机制进行通信。
本发明实施例提供的基于用户使用特征而自动选择安全通道的系统, 包 括:
通信方包括至少一个呼叫方和至少一个应答方;
其中所述呼叫方包括第一判断模块;
所述第一判断模块, 用于在所述呼叫方发起通信请求前, 判断所述应答方 是否在所述呼叫方的安全名单;
其中所述应答方包括接收模块及第二判断模块;
所述接收模块, 用于所述应答方接收所述呼叫方发起的通信请求; 所述第二判断模块,用于所述应答方判断所述呼叫方是否在所述应答方的 安全名单;
安全通信模块, 用于所述呼叫方与所述应答方按预设的安全通道进行通 信;
第三方通信模块,用于所述呼叫方与所述应答方通过第三方中转安全机制 实现可信任通信。
本发明实施例提供的基于用户使用特征而自动选择安全通道的方法, 包 括:
通信方包括至少一个呼叫方和至少一个应答方;
Kl、 所述呼叫方发起通信请求前, 判断所述应答方是否在所述呼叫方的 安全名单, 若是执行步骤 Κ2, 否则执行步骤 Κ5;
Κ2、 所述应答方接收所述呼叫方发起的通信请求;
Κ3、 所述应答方判断所述呼叫方是否在所述应答方的安全名单, 若是执 行步骤 Κ4, 否则执行步骤 Κ5;
Κ4、 所述呼叫方与所述应答方按预设的安全通道进行通信;
Κ5、 判断所述呼叫方与所述应答方之间是否需要进行安全通信, 若是执 行步骤 Κ6, 否则执行步骤 K10;
Κ6、 所述呼叫方与所述应答方协商建立可信通信机制, 若协商成功则执 行步骤 Κ7, 否则执行步骤 Κ9;
Κ7、 启动所述呼叫方与所述应答方间的可信通信机制, 若启动成功, 则 执行步骤 Κ8, 否则执行步骤 Κ9;
Κ8、 按启动后的安全通道进行通信并将所述安全通道加入安全名单作为 预设启动;
Κ9、 所述呼叫方与所述应答方通过第三方中转进行通信;
Κ10、 所述呼叫方与所述应答方进行明文通信。
可选地,
所述步骤 Κ5包括:
从网络检查所述呼叫方和 /或所述应答方的资料, 若确认所述资料安全则 向所述应答方和 /或所述呼叫方发送安全通信建议, 并在所述应答方和 /或所述 呼叫方接受所述安全通信建议时执行步骤 Κ6, 否则执行步骤 Κ10。
可选地,
所述步骤 Κ5包括:
根据判断规则对所述呼叫方和 /或所述应答方进行保护需求分析, 若确认 存在保护需求则向所述应答方和 /或所述呼叫方发送安全通信建议, 并在所述 应答方和 /或所述呼叫方接受所述安全通信建议时执行步骤 Κ6, 否则执行步骤 Κ10。 可选地,
所述步骤 K5包括:
对所述呼叫方与所述应答方的通信内容进行检查并判断是否需要进行保 密, 若是向所述应答方和 /或所述呼叫方发送安全通信建议, 并在所述应答方 和 /或所述呼叫方接受所述安全通信建议时执行步骤 K6, 否则执行步骤 Κ10。
可选地,
所述呼叫方包括手机号码、 邮箱地址或社交工具的账号;
所述应答方包括手机号码、 邮箱地址或社交工具的账号。
可选地,
所述步骤 Κ5包括:
所述呼叫方与所述应答方通过 ΙΒΕ机制进行通信。
本发明实施例提供的基于用户使用特征而自动选择安全通道的系统, 包 括:
通信方包括至少一个呼叫方和至少一个应答方;
所述呼叫方包括第一判断模块;
所述第一判断模块,用于在所述呼叫方发起通信请求前, 判断所述应答方 是否在所述呼叫方的安全名单;
所述应答方包括接收模块及第二判断模块;
所述接收模块, 用于接收所述呼叫方发起的通信请求;
所述第二判断模块, 用于判断所述呼叫方是否在所述应答方的安全名单; 安全通道通信模块,用于所述呼叫方与所述应答方按预设的安全通道进行 通信;
第三判断模块,用于判断所述呼叫方与所述应答方之间是否需要进行安全 通信;
协商建立模块, 用于所述呼叫方与所述应答方协商建立可信通信机制; 启动模块, 用于启动所述呼叫方与所述应答方间的可信通信机制; 可信通信模块,用于按启动后的安全通道进行通信并将所述安全通道加入 安全名单作为预设启动;
第三方通信模块, 用于所述呼叫方与所述应答方通过第三方中转进行通 信;
明文通信模块, 用于所述呼叫方与所述应答方进行明文通信。
可选地,
所述呼叫方包括手机号码、 邮箱地址或社交工具的账号;
所述应答方包括手机号码、 邮箱地址或社交工具的账号。
本发明实施例中, 通信方包括至少一个呼叫方和至少一个应答方; Kl、 所述呼叫方发起通信请求前, 判断所述应答方是否在所述呼叫方的安全名单, 若是执行步骤 Κ2, 否则执行步骤 Κ5; Κ2、 所述应答方接收所述呼叫方发起 的通信请求; Κ3、 所述应答方判断所述呼叫方是否在所述应答方的安全名单, 若是执行步骤 Κ4, 否则执行步骤 Κ5; Κ4、 所述呼叫方与所述应答方按预设 的安全通道进行通信; Κ5、 判断所述呼叫方与所述应答方之间是否需要进行 安全通信, 若是执行步骤 Κ4, 否则执行步骤 Κ6; Κ6、 所述呼叫方与所述应 答方进行明文通信。通过根据用户的使用习惯或特征, 自动地对有可能需要保 密的通信内容进行加密,本发明基于用户使用特征而自动选择安全通道的方法 和系统能够解决使用便利性和内容保护性之间的矛盾。
附图说明
图 1 为本发明基于用户使用特征而自动选择安全通道的方法第一实施例 流程图;
图 2 为本发明基于用户使用特征而自动选择安全通道的系统第一实施例 结构示意图;
图 3 为本发明基于用户使用特征而自动选择安全通道的方法第二实施例 流程图;
图 4 为本发明基于用户使用特征而自动选择安全通道的方法第三实施例 流程图;
图 5 为本发明基于用户使用特征而自动选择安全通道的系统第二实施例 结构示意图。
具体实施方式
本发明实施例提供了一种基于用户使用特征而自动选择安全通道的方法 和系统,通过根据用户的使用习惯或特征, 自动地对有可能需要保密的通信内 容进行加密, 能够解决使用便利性和内容保护性之间的矛盾。
基于身份的加密 (Identity Based Encryption, IBE ), 使用的是非对称密码 体系, 加密与解密使用两套不同的密钥, 每个人的公钥就是他的身份标识, 比 如 E-Mail地址, 电话号码等, 而私钥则以数据的形式由用户自己掌握, 密钥 管理相当简单, 可以很方便的对数据信息进行加解密。
请参阅图 1, 本发明实施例中基于用户使用特征而自动选择安全通道的方 法第一实施例, 包括:
通信方包括至少一个呼叫方和至少一个应答方;
51、 呼叫方发起通信请求前, 判断应答方是否在呼叫方的安全名单, 若是 执行步骤 S2, 否则执行步骤 S5;
上述的安全名单可以由呼叫方自定义生成,呼叫方发起通信请求前, 判断 应答方是否在呼叫方的安全名单, 若是执行步骤 S2, 否则执行步骤 S5。
52、 应答方接收呼叫方发起的通信请求;
呼叫方发起通信请求后, 应答方接收呼叫方发起的通信请求。
S3、 应答方判断呼叫方是否在应答方的安全名单, 若是执行步骤 S4, 否 则执行步骤 S5;
应答方接收到呼叫方发起的通信请求之后,判断呼叫方是否在应答方的安 全名单, 若是, 证明呼叫方属于应答方的信任方, 可以执行步骤 S4, 否则执 行步骤 S5。
S4、 呼叫方与应答方按预设的安全通道进行通信;
确定呼叫方在应答方的安全名单及应答方在呼叫方的安全名单,证明呼叫 方与应答方之间存在信任关系,此时呼叫方与应答方可以按预设的安全通道进 行通信。上述预设的安全通道为呼叫方与应答方预先约定的安全通道或根据条 件判断的安全通道,例如呼叫方与应答方可以通过 IBE机制进行通信可以为在 此处不作限定。
S5、 呼叫方与应答方通过第三方中转安全机制实现可信任通信。 证明呼叫方与应答方之间不存在信任关系,此时呼叫方与应答方可以通过第三 方中转安全机制实现可信任通信。 通过根据用户的使用习惯或特征, 自动地对有可能需要保密的通信内容进 行加密, 本发明实施例的方法能够解决使用便利性和内容保护性之间的矛盾。
上面介绍了本发明基于用户使用特征而自动选择安全通道的方法的第一 实施例,下面介绍本发明基于用户使用特征而自动选择安全通道的系统的第一 实施例, 请参阅图 2, 本发明实施例中基于用户使用特征而自动选择安全通道 的系统第一实施例包括:
通信方包括至少一个呼叫方 21和至少一个应答方 22;
其中呼叫方 21包括第一判断模块 211;
第一判断模块 211, 用于在呼叫方 21发起通信请求前, 判断应答方 22是 否在呼叫方 21的安全名单;
其中应答方 22包括接收模块 221及第二判断模块 222;
接收模块 221, 用于应答方 22接收呼叫方 21发起的通信请求;
第二判断模块 222, 用于应答方 22判断呼叫方 21是否在应答方 22的安 全名单;
安全通信模块 23, 用于呼叫方 21与应答方 22按预设的安全通道进行通 信;
第三方通信模块 24, 用于呼叫方 21与应答方 22通过第三方中转安全机 制实现可信任通信。
由于本发明系统的第一实施例为本发明方法的第一实施例对应的系统实 施例, 因此本发明系统各个模块的具体操作过程请参阅方法第一实施例, 此处 不再赘述。此外本发明系统的第一实施例也应该具有本发明方法的第一实施例 所具有的效果, 亦即能够解决使用便利性和内容保护性之间的矛盾。
请参阅图 3, 本发明实施例提供的基于用户使用特征而自动选择安全通道 的方法的第二实施例, 包括:
通信方包括至少一个呼叫方和至少一个应答方;
Kl、 呼叫方发起通信请求前, 判断应答方是否在呼叫方的安全名单, 若 是执行步骤 Κ2, 否则执行步骤 Κ5;
上述的安全名单可以由呼叫方自定义生成,呼叫方发起通信请求前, 判断 应答方是否在呼叫方的安全名单, 若是执行步骤 Κ2, 否则执行步骤 Κ5。 K2、 应答方接收呼叫方发起的通信请求;
呼叫方发起通信请求后, 应答方接收呼叫方发起的通信请求。
Κ3、 应答方判断呼叫方是否在应答方的安全名单, 若是执行步骤 Κ4, 否 则执行步骤 Κ5;
应答方接收到呼叫方发起的通信请求之后,判断呼叫方是否在应答方的安 全名单, 若是, 证明呼叫方属于应答方的信任方, 可以执行步骤 Κ4, 否则执 行步骤 Κ5。
Κ4、 呼叫方与应答方按预设的安全通道进行通信;
确定呼叫方在应答方的安全名单及应答方在呼叫方的安全名单,证明呼叫 方与应答方之间存在信任关系,此时呼叫方与应答方可以按预设的安全通道进 行通信。上述预设的安全通道为呼叫方与应答方预先约定的安全通道或根据条 件判断的安全通道,例如呼叫方与应答方可以通过 ΙΒΕ机制进行通信可以为在 此处不作限定。
Κ5、判断呼叫方与应答方之间是否需要进行安全通信,若是执行步骤 Κ6, 否则执行步骤 K10; 证明呼叫方与应答方之间不存在信任关系,此时可以判断呼叫方与应答方之间 是否需要进行安全通信, 若是执行步骤 Κ6, 否则执行步骤 Κ10。
Κ6、呼叫方与应答方协商建立可信通信机制,若协商成功则执行步骤 Κ7, 否则执行步骤 Κ9;
确定呼叫方与应答方之间需要进行安全通信之后,可以协商呼叫方与应答 方建立可信通信机制,并在协商成功时执行步骤 Κ7,协商失败时执行步骤 Κ9。
Κ7、 启动呼叫方与应答方间的可信通信机制, 若启动成功, 则执行步骤 Κ8, 否则执行步骤 Κ9;
确定协商呼叫方与应答方建立可信通信机制成功后,接着启动呼叫方与应 答方间的可信通信机制, 若启动成功, 则执行步骤 Κ8, 否则执行步骤 Κ9。
Κ8、 按启动后的安全通道进行通信并将安全通道加入安全名单作为预设 启动;
确定呼叫方与应答方间的可信通信机制启动成功后,按预设的安全通道进 行通信并将安全通道加入安全名单作为预设启动。由于呼叫方与应答方已经协 商成功, 因此可以将安全通道加入安全名单作为预设启动,从而可以加快响应 速度及简化通信流程。
K9、 呼叫方与应答方通过第三方中转进行通信;
确定协商呼叫方与应答方建立可信通信机制,或呼叫方与应答方间的可信 通信机制启动失败后, 由于呼叫方与应答方之间需要进行安全通信, 因此呼叫 方与应答方可以通过第三方中转进行通信。
Κ10、 呼叫方与应答方进行明文通信。 证明呼叫方与应答方之间不存在信任关系,此时呼叫方与应答方之间可以进行 明文通信, 完成呼叫方与应答方的通信交互。
通过根据用户的使用习惯或特征, 自动地对有可能需要保密的通信内容进 行加密, 本发明实施例的方法能够解决使用便利性和内容保护性之间的矛盾。
上面介绍了本发明基于用户使用特征而自动选择安全通道的方法的第二 实施例,下面介绍本发明基于用户使用特征而自动选择安全通道的方法的第三 实施例, 请参阅图 4, 本发明实施例中基于用户使用特征而自动选择安全通道 的系统第三实施例包括:
通信方包括至少一个呼叫方和至少一个应答方;
401、 呼叫方发起通信请求前, 判断应答方是否在呼叫方的安全名单, 若 是执行步骤 402, 否则执行步骤 405;
通信双方包括呼叫方和应答方, 上述呼叫方包括手机号码、邮箱地址或社 交工具的账号; 上述应答方包括手机号码、 邮箱地址或社交工具的账号。
上述的安全名单可以由呼叫方自定义生成,呼叫方发起通信请求前, 判断 应答方是否在呼叫方的安全名单, 若是执行步骤 402, 否则执行步骤 405。
402、 应答方接收呼叫方发起的通信请求;
呼叫方发起通信请求后, 应答方接收呼叫方发起的通信请求。
403、 应答方判断呼叫方是否在应答方的安全名单, 若是执行步骤 404, 否则执行步骤 405;
应答方接收到呼叫方发起的通信请求之后,判断呼叫方是否在应答方的安 全名单, 若是, 证明呼叫方属于应答方的信任方, 可以执行步骤 404, 否则执 行步骤 405。
404、 呼叫方与应答方按预设的安全通道进行通信;
确定呼叫方在应答方的安全名单及应答方在呼叫方的安全名单,证明呼叫 方与应答方之间存在信任关系,此时呼叫方与应答方可以按预设的安全通道进 行通信。上述预设的安全通道为呼叫方与应答方预先约定的安全通道或根据条 件判断的安全通道,例如呼叫方与应答方可以通过 IBE机制进行通信可以为在 此处不作限定。
405、 判断呼叫方与应答方之间是否需要进行安全通信, 若是执行步骤 406, 否则执行步骤 410; 证明呼叫方与应答方之间不存在信任关系,此时可以判断呼叫方与应答方之间 是否需要进行安全通信, 若是执行步骤 406, 否则执行步骤 410。
上述步骤 405的具体过程可以包括:
从网络检查呼叫方和 /或应答方的资料, 若确认资料安全则向应答方和 /或 呼叫方发送安全通信建议, 并在应答方和 /或呼叫方接受安全通信建议时执行 步骤 406, 否则执行步骤 410。
亦即确定应答方不在呼叫方的安全名单, 可以从网络检查应答方的资料, 例如可以从网络查询应答方的背景, 然后根据上述的资料进行判断, 若确认安 全则向呼叫方发送明文通信建议, 并在呼叫方接受明文通信建议时执行步骤 406, 否则执行步骤 410。
上述根据资料进行判断具体可以包括: 判断应答方资料是否包含作骗、犯 罪等不信任词汇, 若存在则可判断应答方不安全。
或包括:
根据判断规则对呼叫方和 /或应答方进行保护需求分析, 若确认存在保护 需求则向应答方和 /或呼叫方发送安全通信建议, 并在应答方和 /或呼叫方接受 安全通信建议时执行步骤 406, 否则执行步骤 410。
亦即确定呼叫方不在应答方的安全名单,可以根据判断规则对呼叫方进行 安保需求分析, 若确认不存在安保需求则向应答方发送明文通信建议, 并在应 答方接受明文通信建议时执行步骤 406, 否则执行步骤 410。
上述的判断规则可以由应答方自定义, 也可以从网络获取他人自定义的, 在此处不作限定。 具体的可以是: 判断呼叫方是否属于可信归属地。
或包括:
对呼叫方与应答方的通信内容进行检查并判断是否需要进行保密,若否向 应答方和 /或呼叫方发送安全通信建议, 并在应答方和 /或呼叫方接受安全通信 建议时执行步骤 406, 否则执行步骤 410。
亦即呼叫方与应答方进行明文通信时,可以对呼叫方与应答方的通信内容 进行检查并判断是否需要进行保密, 若是执行步骤 406, 否则执行步骤 410。
需要说明的是, 除了从网络检查应答方或呼叫方的资料、对呼叫方与应答 方的通信内容进行检查这两种判断方法之外, 还可以包含其他安全判断方法, 例如还可以包括记录应答方或呼叫方的使用习惯,并根据使用习惯自动帮用户 做出安全通信选择, 在此处不作限定。
406、 呼叫方与应答方协商建立可信通信机制, 若协商成功则执行步骤 407, 否则执行步骤 409;
确定呼叫方与应答方之间需要进行安全通信之后,可以协商呼叫方与应答 方建立可信通信机制, 并在协商成功时执行步骤 407, 协商失败时执行步骤 409。
407、 启动呼叫方与应答方间的可信通信机制, 若启动成功, 则执行步骤 408, 否则执行步骤 409;
确定协商呼叫方与应答方建立可信通信机制成功后,接着启动呼叫方与应 答方间的可信通信机制, 若启动成功, 则执行步骤 408, 否则执行步骤 409。
408、 按启动后的安全通道进行通信并将安全通道加入安全名单作为预设 启动;
确定呼叫方与应答方间的可信通信机制启动成功后,按预设的安全通道进 行通信并将安全通道加入安全名单作为预设启动。由于呼叫方与应答方已经协 商成功, 因此可以将安全通道加入安全名单作为预设启动,从而可以加快响应 速度及简化通信流程。
409、 呼叫方与应答方通过第三方中转进行通信; 确定协商呼叫方与应答方建立可信通信机制,或呼叫方与应答方间的可信 通信机制启动失败后, 由于呼叫方与应答方之间需要进行安全通信, 因此呼叫 方与应答方可以通过第三方中转进行通信。
410、 呼叫方与应答方进行明文通信。 证明呼叫方与应答方之间不存在信任关系,此时呼叫方与应答方之间可以进行 明文通信, 完成呼叫方与应答方的通信交互。
通过根据用户的使用习惯或特征, 自动地对有可能需要保密的通信内容进 行加密, 本发明实施例的方法能够解决使用便利性和内容保护性之间的矛盾。
上面介绍了本发明基于用户使用特征而自动选择安全通道的方法的第三 实施例,下面介绍本发明基于用户使用特征而自动选择安全通道的系统第二实 施例, 请参阅图 5, 本发明实施例中基于用户使用特征而自动选择安全通道的 系统第二实施例包括:
通信方包括至少一个呼叫方 51和至少一个应答方 52;
其中呼叫方 51包括第一判断模块 511 ;
第一判断模块 511, 用于在呼叫方 51发起通信请求前, 判断应答方 52是 否在所述呼叫方的安全名单;
应答方 52包括接收模块 521及第二判断模块 522;
接收模块 521, 用于接收呼叫方 51发起的通信请求;
第二判断模块 522, 用于判断呼叫方 51是否在应答方 52的安全名单; 安全通道通信模块 53, 用于呼叫方 51与应答方 52按预设的安全通道进 行通信;
第三判断模块 54, 用于判断呼叫方 51与应答方 52之间是否需要进行安 全通信;
协商建立模块 55, 用于呼叫方 51与应答方 52协商建立可信通信机制; 启动模块 56, 用于启动呼叫方 51与应答方 52间的可信通信机制; 可信通信模块 57, 用于按启动后的安全通道进行通信并将安全通道加入 安全名单作为预设启动;
第三方通信模块 58, 用于呼叫方 51与应答方 52通过第三方中转进行通 信;
明文通信模块 59, 用于呼叫方 51与应答方 52进行明文通信。
可选地,
呼叫方 51包括手机号码、 邮箱地址或社交工具的账号;
应答方 52包括手机号码、 邮箱地址或社交工具的账号。
由于本发明的系统第二实施例为本发明方法的第二实施例及第三实施例 对应的系统实施例,因此本发明系统各个模块的具体操作过程请参阅方法实施 例, 此处不再赘述。
在本申请所提供的几个实施例中,应该理解到, 所揭露的装置和方法可以 通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如, 所述单元的划分,仅仅为一种逻辑功能划分, 实际实现时可以有另外的划分方 式, 例如多个单元或组件可以结合或者可以集成到另一个系统, 或一些特征可 以忽略, 或不执行。 另一点, 所显示或讨论的相互之间的耦合或直接辆合或通 信连接可以是通过一些接口,装置或单元的间接辆合或通信连接,可以是电性, 机械或其它的形式。 单元显示的部件可以是或者也可以不是物理单元, 即可以位于一个地方, 或者 也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部 单元来实现本实施例方案的目的。
另外, 在本发明各个实施例中的各功能单元可以集成在一个处理单元中, 也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元 中。上述集成的单元既可以釆用硬件的形式实现,也可以釆用软件功能单元的 形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售 或使用时, 可以存储在一个计算机可读取存储介质中。基于这样的理解, 本发 明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全 部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储 介质中, 包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器, 或者网络设备等)执行本发明各个实施例所述方法的全部或部分步骤。 而前述 的存储介质包括: U盘、 移动硬盘、 只读存储器(ROM, Read-Only Memory ), 随机存取存储器(RAM, Random Access Memory ), 磁碟或者光盘等各种可以 存储程序代码的介质。
以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于 此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内, 可轻易想到 变化或替换, 都应涵盖在本发明的保护范围之内。 因此, 本发明的保护范围应 所述以权利要求的保护范围为准。

Claims

权 利 要 求
1、 一种基于用户使用特征而自动选择安全通道的方法, 其特征在于, 包 括:
通信方包括至少一个呼叫方和至少一个应答方;
Sl、所述呼叫方发起通信请求前,判断所述应答方是否在所述呼叫方的安 全名单, 若是执行步骤 S2, 否则执行步骤 S5;
52、 所述应答方接收所述呼叫方发起的通信请求;
53、所述应答方判断所述呼叫方是否在所述应答方的安全名单,若是执行 步骤 S4, 否则执行步骤 S5;
S4、 所述呼叫方与所述应答方按预设的安全通道进行通信;
S5、 所述呼叫方与所述应答方通过第三方中转安全机制实现可信任通信。
2、根据权利要求 1所述的基于用户使用特征而自动选择安全通道的方法, 其特征在于, 所述步骤 S4包括:
所述呼叫方与所述应答方通过 IBE机制进行通信。
3、 一种基于用户使用特征而自动选择安全通道的系统, 其特征在于, 包 括:
通信方包括至少一个呼叫方和至少一个应答方;
其中所述呼叫方包括第一判断模块;
所述第一判断模块,用于在所述呼叫方发起通信请求前, 判断所述应答方 是否在所述呼叫方的安全名单;
其中所述应答方包括接收模块及第二判断模块;
所述接收模块, 用于所述应答方接收所述呼叫方发起的通信请求; 所述第二判断模块,用于所述应答方判断所述呼叫方是否在所述应答方的 安全名单;
安全通信模块, 用于所述呼叫方与所述应答方按预设的安全通道进行通 信;
第三方通信模块,用于所述呼叫方与所述应答方通过第三方中转安全机制 实现可信任通信。
4、 一种基于用户使用特征而自动选择安全通道的方法, 其特征在于, 包 括:
通信方包括至少一个呼叫方和至少一个应答方;
Kl、 所述呼叫方发起通信请求前, 判断所述应答方是否在所述呼叫方的 安全名单, 若是执行步骤 Κ2, 否则执行步骤 Κ5;
Κ2、 所述应答方接收所述呼叫方发起的通信请求;
Κ3、 所述应答方判断所述呼叫方是否在所述应答方的安全名单, 若是执 行步骤 Κ4, 否则执行步骤 Κ5;
Κ4、 所述呼叫方与所述应答方按预设的安全通道进行通信;
Κ5、 判断所述呼叫方与所述应答方之间是否需要进行安全通信, 若是执 行步骤 Κ6, 否则执行步骤 K10;
Κ6、 所述呼叫方与所述应答方协商建立可信通信机制, 若协商成功则执 行步骤 Κ7, 否则执行步骤 Κ9;
Κ7、 启动所述呼叫方与所述应答方间的可信通信机制, 若启动成功, 则 执行步骤 Κ8, 否则执行步骤 Κ9;
Κ8、 按启动后的安全通道进行通信并将所述安全通道加入安全名单作为 预设启动;
Κ9、 所述呼叫方与所述应答方通过第三方中转进行通信;
Κ10、 所述呼叫方与所述应答方进行明文通信。
5、根据权利要求 4所述的基于用户使用特征而自动选择安全通道的方法, 其特征在于, 所述步骤 Κ5包括:
从网络检查所述呼叫方和 /或所述应答方的资料, 若确认所述资料安全则 向所述应答方和 /或所述呼叫方发送安全通信建议, 并在所述应答方和 /或所述 呼叫方接受所述安全通信建议时执行步骤 Κ6, 否则执行步骤 Κ10。
6、根据权利要求 4所述的基于用户使用特征而自动选择安全通道的方法, 其特征在于, 所述步骤 Κ5包括:
根据判断规则对所述呼叫方和 /或所述应答方进行保护需求分析, 若确认 存在保护需求则向所述应答方和 /或所述呼叫方发送安全通信建议, 并在所述 应答方和 /或所述呼叫方接受所述安全通信建议时执行步骤 Κ6, 否则执行步骤 Κ10。
7、根据权利要求 4所述的基于用户使用特征而自动选择安全通道的方法, 其特征在于, 所述步骤 K5包括:
对所述呼叫方与所述应答方的通信内容进行检查并判断是否需要进行保 密, 若是向所述应答方和 /或所述呼叫方发送安全通信建议, 并在所述应答方 和 /或所述呼叫方接受所述安全通信建议时执行步骤 K6, 否则执行步骤 Κ10。
8、 根据权利要求 4至 7中任一项所述的基于用户使用特征而自动选择安 全通道的方法, 其特征在于,
所述呼叫方包括手机号码、 邮箱地址或社交工具的账号;
所述应答方包括手机号码、 邮箱地址或社交工具的账号。
9、 根据权利要求 4至 7中任一项所述的基于用户使用特征而自动选择安 全通道的方法, 其特征在于, 所述步骤 Κ5包括:
所述呼叫方与所述应答方通过 ΙΒΕ机制进行通信。
10、 一种基于用户使用特征而自动选择安全通道的系统, 其特征在于, 包 括:
通信方包括至少一个呼叫方和至少一个应答方;
所述呼叫方包括第一判断模块;
所述第一判断模块,用于在所述呼叫方发起通信请求前, 判断所述应答方 是否在所述呼叫方的安全名单;
所述应答方包括接收模块及第二判断模块;
所述接收模块, 用于接收所述呼叫方发起的通信请求;
所述第二判断模块, 用于判断所述呼叫方是否在所述应答方的安全名单; 安全通道通信模块,用于所述呼叫方与所述应答方按预设的安全通道进行 通信;
第三判断模块,用于判断所述呼叫方与所述应答方之间是否需要进行安全 通信;
协商建立模块, 用于所述呼叫方与所述应答方协商建立可信通信机制; 启动模块, 用于启动所述呼叫方与所述应答方间的可信通信机制; 可信通信模块,用于按启动后的安全通道进行通信并将所述安全通道加入 安全名单作为预设启动; 第三方通信模块, 用于所述呼叫方与所述应答方通过第三方中转进行通 信;
明文通信模块, 用于所述呼叫方与所述应答方进行明文通信。
11、 根据权利要求 10所述的基于用户使用特征而自动选择安全通道的方 法, 其特征在于,
所述呼叫方包括手机号码、 邮箱地址或社交工具的账号;
所述应答方包括手机号码、 邮箱地址或社交工具的账号。
PCT/CN2014/081362 2014-06-13 2014-07-01 一种基于用户使用特征而自动选择安全通道的方法和系统 WO2015188411A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410261903.5A CN104023019B (zh) 2014-06-13 2014-06-13 一种基于用户使用特征而自动选择安全通道的方法和系统
CN201410261903.5 2014-06-13

Publications (1)

Publication Number Publication Date
WO2015188411A1 true WO2015188411A1 (zh) 2015-12-17

Family

ID=51439589

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/081362 WO2015188411A1 (zh) 2014-06-13 2014-07-01 一种基于用户使用特征而自动选择安全通道的方法和系统

Country Status (2)

Country Link
CN (1) CN104023019B (zh)
WO (1) WO2015188411A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105141881B (zh) * 2015-09-30 2018-03-13 北京奇虎科技有限公司 一种进行视频通话的方法及终端设备
CN105208027B (zh) * 2015-09-30 2019-12-03 北京奇虎科技有限公司 一种进行语音通话的方法及终端设备

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20020072240A (ko) * 2001-03-08 2002-09-14 주식회사 엠차지정보기술 무선통신 시스템에서 단문메시지의 보안 서비스 방법
CN1832596A (zh) * 2005-03-07 2006-09-13 蔡林川 一种对小灵通手机加密方法
CN101060670A (zh) * 2007-05-24 2007-10-24 深圳市杰特电信控股有限公司 一种手机短信加解密方法
CN101188496A (zh) * 2007-12-10 2008-05-28 中兴通讯股份有限公司 一种短信加密传输方法
US20110178933A1 (en) * 2010-01-20 2011-07-21 American Express Travel Related Services Company, Inc. Dynamically reacting policies and protections for securing mobile financial transaction data in transit
US20130031365A1 (en) * 2011-07-28 2013-01-31 Electronics And Telecommunications Research Institute Information protection system and method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1697364A (zh) * 2004-05-13 2005-11-16 宽联(上海)通信科技有限公司 具有安全性和质量保障的互联设备网
CN101686127A (zh) * 2008-09-24 2010-03-31 北京创原天地科技有限公司 一种新型的USBKey安全调用方法和USBKey装置
GB201015325D0 (en) * 2010-09-14 2010-10-27 Vodafone Ip Licensing Ltd Controlling access to mobile telecommunications networks
CN103560886B (zh) * 2013-11-04 2016-08-17 北京旋极信息技术股份有限公司 电子签名设备认证方法

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20020072240A (ko) * 2001-03-08 2002-09-14 주식회사 엠차지정보기술 무선통신 시스템에서 단문메시지의 보안 서비스 방법
CN1832596A (zh) * 2005-03-07 2006-09-13 蔡林川 一种对小灵通手机加密方法
CN101060670A (zh) * 2007-05-24 2007-10-24 深圳市杰特电信控股有限公司 一种手机短信加解密方法
CN101188496A (zh) * 2007-12-10 2008-05-28 中兴通讯股份有限公司 一种短信加密传输方法
US20110178933A1 (en) * 2010-01-20 2011-07-21 American Express Travel Related Services Company, Inc. Dynamically reacting policies and protections for securing mobile financial transaction data in transit
US20130031365A1 (en) * 2011-07-28 2013-01-31 Electronics And Telecommunications Research Institute Information protection system and method

Also Published As

Publication number Publication date
CN104023019B (zh) 2018-05-08
CN104023019A (zh) 2014-09-03

Similar Documents

Publication Publication Date Title
US10397202B2 (en) Secure communication channels
US8997254B2 (en) Systems and methods for fast startup streaming of encrypted multimedia content
EP2314090B1 (en) Portable device association
EP2316097B1 (en) Protocol for device to station association
JP6399382B2 (ja) 認証システム
CN107040513B (zh) 一种可信访问认证处理方法、用户终端和服务端
JP7133285B2 (ja) ユーザ端末、メッセージを送受信する方法及びコンピュータプログラム
CN108111497B (zh) 摄像机与服务器相互认证方法和装置
CA2982539C (en) Method of operating a computing device, computing device and computer program
CN105634737B (zh) 一种数据传输方法、终端及其系统
JP2016502377A (ja) 安全計算を用いて安全性を提供する方法
EP3610603A1 (en) Secure password sharing for wireless networks
US20170099269A1 (en) Secure transmission system with upgraded encryption strength
WO2016045464A1 (zh) 解密方法和移动终端
CN109309566B (zh) 一种认证方法、装置、系统、设备及存储介质
WO2016179923A1 (zh) 一种加密通话的处理方法、装置、终端及kmc
CN108768613A (zh) 一种基于多种加密算法的密文口令校验方法
CN105577619B (zh) 一种客户端登录方法、客户端以及系统
CN105187382A (zh) 防止撞库攻击的多因子身份认证方法
WO2015117437A1 (zh) 一种文件加密方法、解密方法及装置
US20160099919A1 (en) System and method for providing a secure one-time use capsule based personalized and encrypted on-demand communication platform
KR101479290B1 (ko) 보안 클라우드 서비스를 제공하기 위한 에이전트 및 보안 클라우드 서비스를위한 보안키장치
WO2015188411A1 (zh) 一种基于用户使用特征而自动选择安全通道的方法和系统
KR20140058196A (ko) 모바일 메시지 데이터의 보안 장치 및 방법
WO2016146046A1 (zh) 数据访问方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14894240

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 07/04/2017)

122 Ep: pct application non-entry in european phase

Ref document number: 14894240

Country of ref document: EP

Kind code of ref document: A1