WO2016202207A1 - 获取电子文件的方法及装置 - Google Patents
获取电子文件的方法及装置 Download PDFInfo
- Publication number
- WO2016202207A1 WO2016202207A1 PCT/CN2016/085216 CN2016085216W WO2016202207A1 WO 2016202207 A1 WO2016202207 A1 WO 2016202207A1 CN 2016085216 W CN2016085216 W CN 2016085216W WO 2016202207 A1 WO2016202207 A1 WO 2016202207A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- verification
- platform server
- user
- information providing
- Prior art date
Links
Images
Classifications
-
- F—MECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
- F02—COMBUSTION ENGINES; HOT-GAS OR COMBUSTION-PRODUCT ENGINE PLANTS
- F02B—INTERNAL-COMBUSTION PISTON ENGINES; COMBUSTION ENGINES IN GENERAL
- F02B33/00—Engines characterised by provision of pumps for charging or scavenging
- F02B33/02—Engines with reciprocating-piston pumps; Engines with crankcase pumps
- F02B33/06—Engines with reciprocating-piston pumps; Engines with crankcase pumps with reciprocating-piston pumps other than simple crankcase pumps
- F02B33/18—Engines with reciprocating-piston pumps; Engines with crankcase pumps with reciprocating-piston pumps other than simple crankcase pumps with crankshaft being arranged between working and pumping cylinders
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
Definitions
- the present application relates to the field of information technology, and in particular, to a method and an apparatus for acquiring an electronic file.
- the patient's personal information such as the patient's name, medical record number, and address is hidden, deleted, or encrypted.
- e-prescribing involves different user roles during use, such as doctors, patients, pharmacies, etc.
- the regulatory department also needs to check the electronic prescription when conducting the case review. Patient identity. Therefore, simply hiding or deleting the patient's identity information can not trace the patient's past medical records because of the loss of the patient's key information.
- the present application provides a new technical solution, which can solve the technical problem in the prior art that the user's private information cannot be effectively protected.
- a method for acquiring an electronic file, which is applied to a terminal device includes:
- the platform server Determining, by the platform server, the information providing server according to the first identifier, and determining, according to the first login information of the user of the platform server, the user identifier registered by the user in the information providing server And sending the first verification information and the user identifier to the information providing server, receiving the electronic file from the information providing server forwarded by the platform server, and the private information in the electronic file
- the first encryption key is encrypted by the information providing server.
- a method for obtaining an electronic file which is applied to a platform server, includes:
- the terminal device determines the first verification information for the identity verification according to the first prompt information, receiving the first verification information from the terminal device;
- the information providing server After the information providing server verifies the first verification information and determines the electronic file according to the user identifier, receiving the electronic file from the information providing server, and forwarding the electronic file to the The terminal device, the private information in the electronic file is encrypted by a first encryption key of the information providing server.
- a method for obtaining an electronic file is provided, which is applied to an information providing server, and includes:
- an apparatus for acquiring an electronic file, which is applied to a terminal color device includes:
- a first sending module configured to send, to the platform server, a first request message for acquiring an electronic file, where the first request message carries a first identifier of an information providing server that provides the electronic file;
- a first receiving module configured to receive first prompt information returned by the platform server according to the first request message sent by the first sending module
- a first determining module configured to determine first verification information for identity verification according to the first prompt information received by the first receiving module, and send the first verification information to the platform server;
- a second receiving module configured to determine, according to the first identifier, the information providing server, and determine, according to the first login information of the user of the platform server, that the user is in the Receiving, by the information providing server, the user identifier, and sending the first verification information and the user identifier determined by the first determining module to the information providing server, and receiving the information provided by the platform server
- the electronic file of the server, the private information in the electronic file being encrypted by a first encryption key of the information providing server.
- an apparatus for acquiring an electronic file which is applied to a platform server, includes:
- a ninth receiving module configured to receive a first request message for acquiring an electronic file from the terminal device, where the first request message carries a first identifier of an information providing server that provides the electronic file;
- a seventh sending module configured to return the first prompt information to the terminal device according to the first request message received by the ninth receiving module
- An eighth sending module configured to receive, after the terminal device determines, according to the first prompt information sent by the seventh sending module, the first verification information for the identity verification, the first verification information from the terminal device ;
- a ninth sending module configured to determine, according to the first identifier received by the ninth receiving module, the information providing server, registering the first authentication information, a user of the terminal device, in the information providing server User ID is sent to the information providing server;
- a first forwarding module configured to receive, after the information providing server verifies the first verification information sent by the ninth sending module, and determine the electronic file according to the user identifier, receive the information from the information providing server
- the electronic file forwards the electronic file to the terminal device, and the private information in the electronic file is encrypted by a first encryption key of the information providing server.
- an apparatus for acquiring an electronic file which is applied to an information providing server, includes:
- a 16th receiving module configured to receive first verification information from the platform server, and a user identifier registered by the user of the terminal device in the information providing server;
- a third verification module configured to verify the first verification information received by the sixteenth receiving module, Determining the electronic file according to the user identifier after the verification is passed;
- a third encryption module configured to encrypt the private information in the electronic file by using a first encryption key of the information providing server
- a fifteenth sending module configured to send the electronic file encrypted by the third encryption module to the platform server, so that the platform server forwards the electronic file to the terminal device.
- the present application encrypts and protects the private information in the electronic file by using the first encryption key. Since the platform server does not have the first encryption key of the information providing server, even if the electronic file is on the platform server Stealing, the stealer can not get the user's real privacy information, the administrator on the platform server side can not obtain the user's real privacy information, thereby effectively protecting the user's private information from being leaked by the platform server, ensuring the privacy of the user. .
- FIG. 1 is a flowchart of a method of acquiring an electronic file, according to an exemplary embodiment
- FIG. 2 is a flowchart of a method of acquiring an electronic file, according to an exemplary embodiment
- FIG. 3 is a flowchart of a method of acquiring an electronic file, according to an exemplary embodiment 3;
- FIG. 4 is a flowchart of a method of acquiring an electronic file, according to an exemplary embodiment 4;
- FIG. 5 is a flowchart of a method of acquiring an electronic file, according to still another exemplary embodiment
- FIG. 6 is a flowchart of a method of acquiring an electronic file, according to still another exemplary embodiment
- FIG. 7 is a flowchart of a method of acquiring an electronic file, according to still another exemplary embodiment.
- FIG. 8 is a flowchart of a method of acquiring an electronic file, according to still another exemplary embodiment 4.
- FIG. 9 is a flowchart of a method of acquiring an electronic file, according to another exemplary embodiment.
- FIG. 10 is a flowchart of a method of acquiring an electronic file, according to another exemplary embodiment.
- FIG. 11 is a flowchart of a method of acquiring an electronic file, according to another exemplary embodiment 3.
- FIG. 12 is a flowchart of a method of acquiring an electronic file, according to another exemplary embodiment 4.
- FIG. 13 is one of a scene diagram of a method of acquiring an electronic file, according to an exemplary embodiment
- FIG. 14 is a second scene diagram of a method for acquiring an electronic file, according to an exemplary embodiment
- FIG. 15 is a third scene diagram of a method for acquiring an electronic file, according to an exemplary embodiment
- 16 is a fourth scene view of a method of acquiring an electronic file, according to an exemplary embodiment
- FIG. 17 is a structural diagram of a terminal device according to an exemplary embodiment of the present invention.
- FIG. 18 is a block diagram showing a platform server according to an exemplary embodiment of the present invention.
- FIG. 19 is a block diagram showing an information providing server according to an exemplary embodiment of the present invention.
- FIG. 20 is a schematic structural diagram of an apparatus for acquiring an electronic file according to an exemplary embodiment
- FIG. 21 is a schematic structural diagram of an apparatus for acquiring an electronic file, according to an exemplary embodiment
- FIG. 22 is a schematic structural diagram of an apparatus for acquiring an electronic file according to still another exemplary embodiment
- FIG. 23 is a schematic structural diagram of an apparatus for acquiring an electronic file according to still another exemplary embodiment
- FIG. 24 is a schematic structural diagram of an apparatus for acquiring an electronic file, according to another exemplary embodiment.
- FIG. 25 is a schematic structural diagram of an apparatus for acquiring an electronic file, according to another exemplary embodiment.
- first, second, third, etc. may be used to describe various information in this application, such information should not be limited to these terms. These terms are only used to distinguish the same type of information from each other.
- first information may also be referred to as the second information without departing from the scope of the present application.
- second information may also be referred to as the first information.
- word "if” as used herein may be interpreted as "when” or “when” or “in response to a determination.”
- the present application encrypts and protects the private information in the electronic file by using the first encryption key. Since the platform server does not have the first encryption key of the information providing server, even if the electronic file is stolen on the platform server, the stealer cannot Obtaining the user's real privacy information, the administrator on the platform server side can not obtain the real privacy information of the user, thereby effectively protecting the user's private information from being leaked by the platform server and ensuring the privacy of the user.
- FIG. 1 is a flowchart of a method for acquiring an electronic file according to an exemplary embodiment.
- the embodiment may be applied to a terminal device.
- the terminal device may be a smart phone or a tablet.
- One The human computer or the like can communicate with the platform server and the information providing server by using an application program or a browser on the terminal device, as shown in FIG. 1 , including the following steps:
- Step 101 Send a first request message for acquiring an electronic file to the platform server, where the first request message carries a first identifier of the information providing server that provides the electronic file.
- Step 102 Receive first prompt information returned by the platform server according to the first request message.
- Step 103 Determine first verification information for identity verification according to the first prompt information, and send first verification information to the platform server.
- Step 104 The platform server determines the information providing server according to the first identifier, and determines the user identifier registered by the user in the information providing server according to the first login information of the user of the terminal device, and sends the first verification information and the user identifier. After the information providing server receives the electronic file forwarded by the platform server from the information providing server, the private information in the electronic file is encrypted by the first encryption key of the information providing server.
- the platform server may serve as a network platform for connecting the terminal device and the information providing server, and may be provided by an e-commerce platform, and different terminal devices and different information providing servers may perform electronic through the platform server.
- File transfer
- the electronic file may be an electronic prescription
- the information providing server may be a hospital information system (Hospital Information System, HIS for short)
- the platform server may be an electronic prescription platform located on the network side (Electronic Prescription Platform)
- the electronic file may also be a social security file of the user on the terminal device side
- the information providing server may be a social security service system on the social security center side
- the platform server may be the social security information located on the network side.
- the electronic file may also be a housing provident fund account of the user on the terminal device side
- the information providing server may be a provident fund service system on the side of the housing provident fund management center
- the platform server may be a provident fund information platform located on the network side. Therefore, it is understood that the present application does not limit the specific content of the electronic file, and any electronic file that needs to be encrypted and protected by the present application is an electronic file in the present application.
- the electronic document is specifically an electronic prescription as an example.
- the first request message may carry the first identifier, and the first identifier is the user of the terminal device in the hospital corresponding to the HIS.
- the code HIS_ID if the first request message does not carry the prescription number P_ID of the electronic prescription (the second identifier in the present application), the HIS can determine that the user needs the latest electronic prescription according to the opening time of the electronic prescription, if the second identifier is carried The HIS can provide the user with an electronic prescription corresponding to the second identifier.
- the first verification information may be generated by encrypting the first original verification information input by the user on the terminal device by using a first encryption key, where the first original verification information is, for example, a user.
- the prompt information determines the first original verification information input by the user at the terminal device and determines the first encryption key of the information providing server, encrypts the first original verification information according to the first encryption key, and obtains the first verification for identity verification.
- the first verification information is encrypted by the first encryption key of the information providing server, so that the platform server side cannot obtain the original verification information of the user, for example, if the first verification information that needs to be determined according to the first prompt information is the user
- the ID number of the ID card is encrypted by the first encryption key and sent to the platform server.
- the platform server cannot obtain the real ID number of the user, thus ensuring that the user's real authentication information is
- the platform server is kept secret.
- the private information in the electronic file may be, for example, a user's name, an ID number, a mobile phone number, a home address, etc., and the private information is encrypted by the first encryption key, thereby The platform server is not made to obtain the private information of the user in the electronic file.
- the information providing server employs a symmetric encryption algorithm
- the first encryption key on the information providing server may be the same as the first decryption key of the information providing server.
- the symmetric encryption algorithm may be DES (Data Encryption Standard), 3DES (Triple DES), AES (Advanced Encryption Standard), or the like.
- the first encryption key may be the public key of the information providing server, and the first decryption key of the information providing server is the private key of the information providing server.
- the asymmetric encryption algorithm employed by the information providing server may be RSA (Rivest Shamir Adlemen), Elgamal, Backpack Algorithm, Rabin, D-H (Diffie-Hellman), Elliptic Curve Encryption Algorithm (ECC), and the like.
- the platform server since the platform server does not have the first encryption key of the information providing server, even if the electronic file is stolen on the platform server, the theft is stolen.
- the user cannot obtain the real privacy information of the user, and the administrator on the platform server side cannot obtain the real privacy information of the user, thereby effectively protecting the user's private information from being leaked by the platform server and ensuring the privacy of the user.
- FIG. 2 is a flowchart of a method for acquiring an electronic file according to an exemplary embodiment.
- This embodiment is exemplified by a user logging in to a platform server by using a terminal device, and includes the following steps:
- Step 201 When the user is not logged in to the platform server, determine the first login information of the user, and log in to the platform server by using the first login information.
- Step 202 Receive a first verification code from the information providing server by using the first mobile phone number, where the first verification code is that the platform server sends the first mobile phone number according to the second mobile phone number indication information, and the second mobile phone number is encrypted by the first The key is encrypted for the first mobile number.
- Step 203 Send the first verification code to the platform server.
- Step 204 After the platform server verifies the first verification code and the second verification code from the information providing server, determine that the user successfully logs in, and receives a first response message that the platform server returns a successful login.
- the first login information may include a login name and a login password of the user on the platform server, where the login name may be the real first mobile phone number of the user, and the first encryption key pair is used.
- the user's real first mobile phone number is encrypted, and the first login information is generated.
- the user logs in to the platform server through the encrypted mobile phone number, thereby ensuring that the platform server cannot obtain the real mobile phone number of the user.
- the user may determine, according to the first login information, that the user encrypts the first encryption key provided when the platform server registers.
- the second mobile phone number in another embodiment, if the login name in the first login information is the second mobile phone number, the second mobile phone number can be determined by using the login name in the first login information, thereby, the platform server
- the information providing server may send a first verification code to the terminal device corresponding to the second mobile phone number, and after receiving the second mobile phone number, the information providing server decrypts the second mobile phone number by using the first decryption key of the information providing server. Obtaining the original first mobile phone number registered by the user in the information providing server, and then sending the first verification code to the terminal device by using the first mobile phone number.
- the first verification code may be a short message verification code.
- the information providing server when the information providing server sends the first verification code to the terminal device, the information providing server may send the second verification code to the platform server, and the terminal device sends the first verification code to the platform server. Therefore, when the first verification code is verified, the platform server can compare whether the content of the first verification code and the second verification code are the same. If the information is the same, the verification succeeds.
- the user's real login information is encrypted by the first encryption key, and the encrypted first login information is used to log in to the platform server, and the data on the platform server is
- the first login information stolen by the stealer from the platform server is the encrypted data, so the original login information of the user cannot be obtained, and the login information obtained from the platform server cannot be used to log in to the platform server, thereby effectively It prevents the thief from illegally logging in to the platform server through the login information stolen on the platform server to ensure the security of the user login information.
- FIG. 3 is a flowchart of a method for acquiring an electronic file according to an exemplary embodiment, where the user needs to bind the first login information of the user on the platform server and the user generates the information on the information providing server.
- the user ID is exemplified as an example. As shown in FIG. 3, the following steps are included:
- Step 301 When the first login information of the platform server is not bound to the user identifier, the user sends an association request to the platform server, where the association request carries the first identifier of the information providing server.
- Step 302 Receive second prompt information returned by the platform server according to the association request.
- Step 303 Determine, according to the second prompt information, second original verification information input by the user on the terminal device.
- Step 304 Encrypt the second original verification information according to the first encryption key, obtain second verification information for identity verification, send second verification information to the platform server, and the platform server forwards the binding request and the second verification information.
- the information providing server decrypts the second verification information according to the first decryption key corresponding to the first encryption key, and determines the user identifier of the user in the information providing server according to the decrypted second verification information, After the user identifier is returned to the platform server, the platform server establishes a binding relationship between the first login information and the user identifier.
- the user identifier may be a unique identifier of the user in the information providing server, and the user identifier does not contain the user's private information, and may be used as an index by the platform server when initiating the request for the electronic prescription to the information providing server to avoid information providing.
- the server obtains the first mobile phone number by decrypting the second mobile phone number from the platform server each time, and then uses the first mobile phone number as an index to search for the corresponding electronic file.
- the platform server is an EPP and the information providing server is an example of the HIS.
- the terminal device logs in to the EPP through the second mobile phone number, where the second mobile phone number is the original first mobile phone number through the HIS information providing server.
- An encryption key is obtained by encrypting the encryption key; the terminal device sends an association request to the EPP, and the association request carries the HIS_ID.
- the identity card number is performed by using the first encryption key.
- the EPP Encrypting to obtain the second verification information; the EPP sends the second mobile phone number, the second verification information, and the second encryption key of the EPP to the HIS, requesting the HIS to verify the second verification information; after the HIS verifies the second verification information, Returning the user identifier to the EPP; the EPP stores the second verification information, and stores the association relationship between the second mobile phone number and the user identifier.
- the HIS may generate a user identification based on the first mobile number.
- the information providing server assists the platform server to implement secondary identity authentication by verifying the second verification information from the platform server; and on the platform server, the second authentication information is the first encryption by the information providing server.
- the key is generated by encrypting the second original authentication information, so the platform server cannot obtain the real authentication information of the user of the terminal device, thereby preventing the eavesdropper from stealing the authentication information of the user of the terminal device, and preventing the illegal user from going to the platform.
- the server binds the first login information of the legitimate user on the platform server and the user identifier of the user in the information providing server through an illegal association request.
- FIG. 4 is a flowchart of a method for acquiring an electronic file according to an exemplary embodiment. This embodiment is exemplified by a user registering on a platform server and an information providing server, as shown in FIG. 4 .
- the indication includes the following steps:
- Step 401 Send a second request message for acquiring a second encryption key of the platform server to the platform server.
- Step 402 Receive a second encryption key returned by the platform server according to the second request message.
- Step 403 When the user is not registered on the platform server and the information providing server, the first registration information registered by the information providing server by the user of the terminal device is encrypted by the second encryption key of the platform server.
- Step 404 After the user logs in to the information providing server through the first mobile phone number, the first registration information encrypted by the second encryption key is sent to the information providing server.
- Step 405 After the information providing server generates the user identifier according to the first mobile phone number, receiving the first encryption key from the information providing server, the first response message of successful registration, and the second mobile phone number, where the second mobile phone number is encrypted by the first The key is generated by encrypting the first mobile phone number.
- Step 406 registering with the platform server by using the second mobile phone number.
- Step 407 After the platform server registers the second mobile phone number, receiving a second response message that is successfully registered by the platform server.
- the second encryption key on the platform server may be the same as the second decryption key of the platform server.
- the symmetric encryption algorithm may be DES (Data Encryption Standard), 3DES (Triple DES), AES (Advanced Encryption Standard), or the like.
- the second encryption key may be the public key of the platform server, and the second decryption key of the platform server may be the private key of the platform server.
- the asymmetric encryption algorithm used by the platform server may be RSA (Rivest Shamir Adlemen), Elgamal, Backpack Algorithm, Rabin, D-H (Diffie-Hellman), Elliptic Curve Encryption Algorithm (ECC), and the like.
- the public key of the asymmetric encryption algorithm may be used as the second encryption key.
- the transmission of the symmetric key it can be carried out through a secure transmission channel, or the symmetric key is encrypted and then transmitted, thereby ensuring the security of the symmetric key.
- the terminal device may send the second mobile phone number to the platform server, and receive the third verification code returned from the information providing server, where the third verification code may be sent by the platform server according to the second mobile phone number request information providing server.
- the platform server obtains the second mobile phone number encrypted by the first encryption key of the information providing server, since the corresponding decryption key is not available, the second mobile phone number cannot be decrypted and obtained.
- the first mobile number so even if the second mobile number is stolen on the platform server, the stolen person is not getting
- the stealer may not decrypt the second mobile phone number because there is no decryption key; meanwhile, the private data registered by the user on the information providing server is encrypted by the second encryption key of the platform server, so The information providing server cannot decrypt the data stored on the platform server. Since the stealer is difficult to attack the platform server and the information providing server at the same time, the application can greatly improve the security protection degree of the platform server and the information providing server.
- FIG. 5 it is a flowchart of a method for acquiring an electronic file according to another exemplary embodiment.
- the embodiment may be applied to a platform server.
- the platform server may be an e-commerce platform.
- the service as shown in Figure 5, includes the following steps:
- Step 501 Receive a first request message for acquiring an electronic file from a terminal device, where the first request message carries a first identifier of an information providing server that provides an electronic file.
- Step 502 Return the first prompt information to the terminal device according to the first request message.
- Step 503 After determining, by the terminal device, the first verification information for the identity verification according to the first prompt information, receiving the first verification information from the terminal device.
- Step 504 The information providing server is determined according to the first identifier, and the first authentication information and the user identifier registered by the user of the terminal device in the information providing server are sent to the information providing server.
- Step 505 After the information providing server verifies the first verification information and determines the electronic file according to the user identifier, receives the electronic file from the information providing server, and forwards the electronic file to the terminal device, and the private information in the electronic file passes through the information providing server.
- the first encryption key is encrypted.
- the platform server may serve as an intermediary platform to provide electronic file forwarding and user identity authentication for different terminal devices and different information providing servers, and the platform server resolves from the first request message.
- the corresponding information providing server is determined according to the first identifier; and the information providing server is enabled by transmitting the first authentication information and the user identifier registered by the user of the terminal device in the information providing server to the information providing server A verification information is verified, and after the verification is passed, the electronic file that the user needs to view is determined according to the user identifier.
- the platform server determines the information providing server according to the first identifier, and sends the first verification information and the user identifier to the information providing server, where
- the information providing server determines an electronic file corresponding to the user identifier, and the privacy information in the electronic file is encrypted and protected by the first encryption key of the information providing server, and since the platform server does not have the first decryption key of the information providing server, even the electronic
- the file is stolen on the platform server side, and the stealer cannot obtain the user's real private information through the electronic file.
- the administrator on the platform server side cannot obtain the user's real private information through the electronic file, thereby effectively protecting the user's privacy. Information is not leaked by the platform server, ensuring the privacy of the user.
- FIG. 6 it is a flowchart of a method for acquiring an electronic file according to another exemplary embodiment.
- This embodiment is exemplified by a user logging in to a platform server by using a terminal device, as shown in FIG. 6 .
- the indication includes the following steps:
- Step 601 Determine, when the user is not logged in to the platform server, the first login information of the user on the platform server.
- Step 602 The second mobile phone number registration information providing server registered by the user of the terminal device in the platform server sends a first verification code to the terminal device, where the second mobile phone number is encrypted by the first encryption key to the first mobile phone number, and the first The mobile number is the mobile number of the user who is registered with the information providing server.
- Step 603 The first mobile phone number is decrypted by the information providing server by using the first decryption key of the information providing server to obtain the first mobile phone number, and the first mobile phone number is used to indicate to the terminal device that the first verification code is sent, and then the terminal device is received.
- Step 604 verifying the first verification code and the second verification code, and determining that the user login is successful after the verification is passed.
- Step 605 Return a first response message that the login is successful to the terminal device.
- step 201 For the description of the first login information, refer to the related description of step 201 above, which is not described in detail herein.
- the information providing server may send the second verification code to the platform server when the first verification code is sent to the terminal device, so the platform server may compare the first verification code when verifying the first verification code.
- the content of the verification code and the second verification code are the same. If they are the same, the verification is passed to determine that the user has successfully logged in.
- the stealer steals from the platform server.
- a login message is encrypted data, so it cannot be accessed by login information obtained from the platform server. Recording to the platform server, thereby effectively preventing the stealer from illegally logging in to the platform server through the login information stolen on the platform server, ensuring the security of the user login information; realizing the user by comparing the first verification code and the second verification code Secondary authentication is performed, which improves the security of the user during login to the platform server.
- FIG. 7 is a flowchart of a method for acquiring an electronic file according to another exemplary embodiment 3, where the user needs to bind the first login information of the user on the platform server to the user on the information providing server.
- the generated user identifier is exemplified as an example. As shown in FIG. 7, the following steps are included:
- step 701 when the first login information of the user on the platform server and the user identifier registered by the user in the information providing server are not bound, the association request is received from the terminal device, and the association request carries the first identifier.
- Step 702 Return second prompt information to the terminal device according to the association request.
- Step 703 The terminal device determines second verification information for identity verification according to the second prompt information, and receives second verification information returned by the terminal device according to the second prompt information, where the second verification information is encrypted by using the first encryption key.
- Step 704 Forward the binding request and the second verification information that passes the first encryption key to the information providing server, so that the information providing server decrypts the second verification information encrypted by the first encryption key, according to the decrypted
- the second verification information determines the user identification that the user has registered with the information providing server.
- Step 705 Receive a user identifier returned from the information providing server, and establish a binding relationship between the first login information and the user identifier.
- the platform server is an EPP and the information providing server is an example of the HIS.
- the terminal device logs in to the EPP through the second mobile phone number, where the second mobile phone number is the original first mobile phone number through the HIS information providing server.
- the EPP receives the association request from the terminal device, and the association request carries the HIS_ID.
- the EPP After receiving the second verification information from the terminal device, the EPP sends the second mobile phone number and the second verification information to the HIS.
- the second encryption key of the EPP requesting the HIS to verify the second verification information; after the HIS verifies the second verification information, the HIS returns the user identifier to the EPP; the EPP stores the second verification information, and stores the second mobile phone number and the user.
- the association of the identity In an embodiment, the HIS may generate a user identification by the first mobile number.
- the information providing server assists the platform server to implement secondary identity authentication by verifying the second verification information from the platform server; and on the platform server, the second authentication information is the first encryption by the information providing server.
- the key is generated by encrypting the second original authentication information, so the platform server cannot obtain the real authentication information of the user of the terminal device, thereby preventing the eavesdropper from stealing the authentication information of the user of the terminal device, and preventing the illegal user from going to the platform.
- the server binds a legitimate user to the platform server through an illegal association request.
- FIG. 8 is a flowchart of a method for acquiring an electronic file according to another exemplary embodiment 4, which is exemplified by a user registering on a platform server and an information providing server, as shown in FIG. Including the following steps:
- Step 801 Receive a second request message from the terminal device for acquiring a second encryption key of the platform server.
- Step 802 Return a second encryption key to the terminal device according to the second request message.
- Step 803 when the user is not registered on the platform server, registering by using the second registration information from the terminal device.
- Step 804 Acquire a third verification code from the information providing server according to the second registration information, and instruct the information providing server to send a fourth verification code to the first mobile phone number corresponding to the second mobile phone number.
- Step 805 Receive a fourth verification code from the terminal device.
- Step 806 verifying the third verification code and the fourth verification code.
- Step 807 After the platform server passes the third verification code and the fourth verification verification, the second response message of the registration success is returned to the terminal device.
- the platform server obtains the second mobile phone number encrypted by the first encryption key of the information providing server, since the corresponding decryption key is not available, the second mobile phone number cannot be decrypted and obtained.
- the first mobile phone number so even if the second mobile phone number is stolen on the platform server, the stealer cannot decrypt the second mobile phone number because there is no decryption key when the stealer does not acquire the first decryption key of the information providing server
- the private data registered by the user on the information providing server is encrypted by the second encryption key of the platform server, so the information providing server cannot decrypt the data stored on the platform server, because the stealer simultaneously attacks the platform server and the information. It is very difficult to provide a server, so this application can greatly improve the security protection of the platform server and the information providing server.
- FIG. 9 is a flowchart of a method for acquiring an electronic file according to another exemplary embodiment.
- the embodiment may be applied to an information providing server.
- the information providing server may be a hospital system.
- the server provides an electronic prescription for the user of the terminal device through the information providing server, as shown in FIG. 9, and includes the following steps:
- Step 901 Receive first authentication information from the platform server, and a user identifier registered by the user of the terminal device in the information providing server.
- Step 902 Verify the first verification information, and determine the electronic file according to the user identifier after the verification is passed.
- step 903 the private information in the electronic file is encrypted by the first encryption key of the information providing server.
- step 904 the electronic file is sent to the platform server for the platform server to forward the electronic file to the terminal device.
- the information providing server may decrypt the first verification information by using the first decryption key of the information providing server, and encrypt the decrypted first verification information by using the second encryption key of the platform server to obtain the first An encrypted character string; determining a second encrypted character string generated by the user when the information providing server registers, the second encrypted character string being generated by the first verification information encrypted by the second encryption key of the platform server; determining the first encrypted character string and Whether the second encrypted string is the same, if the same, the verification of the first verification information is passed.
- the information providing server determines the electronic file according to the user identifier from the platform server, and encrypts the private information of the electronic file by using the first encryption key. Since the platform server does not have the first encryption key of the information providing server, even if the electronic file is stolen on the platform server side, the stealer cannot obtain the user's real private information through the electronic file, and the administrator on the platform server side cannot. The user's real privacy information is obtained through the electronic file, thereby effectively protecting the user's private information from being leaked by the platform server, and ensuring the privacy of the user.
- FIG. 10 is a flowchart of a method for acquiring an electronic file according to another exemplary embodiment. This embodiment is exemplified by a user logging in to a platform server through a terminal device, as shown in FIG. 10 .
- the indication includes the following steps:
- Step 1001 When the user is not logged in to the platform server, receive an indication message that is sent by the platform server to the information providing server to send the first verification code to the second mobile phone number registered by the user in the platform server, where the second mobile phone number is An encryption key is obtained by encrypting the first mobile phone number, and the first mobile phone number is a mobile phone number registered by the user in the information providing server.
- Step 1002 Decrypt the second mobile phone number by using the first decryption key according to the indication message to obtain the first mobile phone number.
- Step 1003 Send a first verification code to the terminal device by using the first mobile phone number and return a second verification code to the platform server, so that the platform server performs login verification on the user according to the first verification code and the second verification code.
- the information providing server decrypts the second mobile phone number by using the first decryption key according to the instruction message from the platform server, and obtains the first mobile phone number, and passes the first mobile phone number. Sending the first verification code to the terminal device and returning the second verification code to the platform server, thereby assisting the platform server to perform secondary authentication on the user, thereby improving the security of the user in the process of logging in to the platform server.
- FIG. 11 is a flowchart of a method for acquiring an electronic file according to another exemplary embodiment 3.
- the embodiment is exemplified by taking the first login information of the user on the platform server and the user identifier generated by the user on the information providing server as an example. As shown in FIG. 11 , the method includes the following steps:
- Step 1101 Receive, when the first login information of the platform server is not bound to the user identifier, the second verification information from the platform server and the second encryption key of the platform server, where the second verification information passes the first encryption key. encryption.
- Step 1102 Decrypt the second verification information by using the first decryption key of the information providing server, and encrypt the decrypted second original verification information by using the second encryption key to obtain a third encrypted character string.
- Step 1103 Determine a fourth encrypted character string generated by the user when the information providing server registers, and the fourth encrypted character string is generated by the second original authentication information encrypted by the second encryption key of the platform server.
- Step 1104 Determine whether the third encrypted string and the fourth encrypted string are the same.
- Step 1105 If the same, return the user identifier registered by the user of the terminal device on the information providing server to the platform server, so that the platform server establishes a binding relationship between the first login information and the user identifier.
- the second authentication information received by the information providing server from the platform server is the string "AAAA&&&” and the second encryption key "121212" of the platform server, since "AAAA&&&” is encrypted by the first encryption key. Therefore, the information providing server decrypts "AAAA&&&” with its first decryption key, generates real verification information "BBBB&&&”, encrypts "BBBB&&&” with the second encryption key "121212", and obtains the third encrypted string.
- CCCC&&& determining a fourth encrypted character string "DDDD&&&” generated by the user when registering with the information providing server, and the fourth encrypted character string is encrypted by the second authentication information AAAA&&& by the second encryption key "121212" of the platform server, It can be seen that the third encrypted character string "CCCC&&&” and the fourth encrypted character string "DDDD&&&” should be the same character string. If they are not the same, the user's association request is illegal or the illegal user requests the association.
- the information providing server verifies the second verification information from the platform server by using the encrypted string, and assists the platform server to implement the secondary identity authentication; on the platform server, the second verification information is the information.
- the first encryption key of the server is generated by encrypting the second original verification information, so the platform server cannot obtain the real verification information of the user of the terminal device, and the fourth encrypted character string passes the second verification information through the platform.
- the second encryption key of the server is encrypted and generated, so that the information providing server can obtain the real authentication information only when the user is authenticated, thereby preventing the eavesdropper from stealing the authentication of the user of the terminal device on the platform server and the information providing server.
- the information is used to prevent the illegal user from binding the first login information of the legitimate user on the platform server and the user identifier of the user in the information providing server to the platform server through an illegal association request.
- FIG. 12 is a flowchart of a method for acquiring an electronic file according to another exemplary embodiment 4, the embodiment is exemplified by a user registering on a platform server and an information providing server, as shown in FIG. As shown, the following steps are included:
- Step 1201 When the user is not registered on the information providing server, the registration is performed by the first registration information from the terminal device.
- Step 1202 After the user logs in to the information providing server through the first mobile phone number, the first mobile phone number is encrypted by using the first encryption key to obtain a second mobile phone number.
- Step 1203 Send the second mobile phone number to the terminal device, so that the terminal device registers on the platform server by using the second mobile phone number.
- Step 1204 Generate a user identifier according to the first mobile phone number.
- Step 1205 Receive a second mobile number from the platform server.
- Step 1206 decrypting the second mobile phone number by using the first decryption key to obtain the first mobile phone number
- Step 1207 the third verification code is returned to the terminal device by using the first mobile phone number, and the third verification code is sent by the platform server to the terminal device according to the second registration information request information providing server;
- Step 1208 returning a fourth verification code to the platform server, so that the platform server compares the third verification code and the fourth verification code to determine whether the verification is passed.
- the platform server obtains the second mobile phone number encrypted by the first encryption key of the information providing server, since the corresponding decryption key is not available, the second mobile phone number cannot be decrypted and obtained.
- the first mobile phone number so even if the second mobile phone number is stolen on the platform server, the stealer cannot decrypt the second mobile phone number because there is no decryption key when the stealer does not acquire the first decryption key of the information providing server
- the private data registered by the user on the information providing server is encrypted by the second encryption key of the platform server, so the information providing server cannot decrypt the data stored on the platform server, because the stealer simultaneously attacks the platform server and the information. It is very difficult to provide a server, so this application can greatly improve the security protection of the platform server and the information providing server.
- FIG. 13 is a scene diagram of a method for acquiring an electronic file according to an exemplary embodiment
- the present embodiment describes an user by using an electronic file as an electronic prescription, a platform server as an EPP, and an information providing server as an HIS as an example.
- HIS in which both HIS and EPP use an asymmetric encryption algorithm, correspondingly, the public key on the HIS side is the first encryption key, the private key is the first decryption key, and the public key on the EPP side
- the private key is the second decryption key; as shown in FIG. 13, the following steps are included:
- Step 1301 The patient logs in through the terminal device using the login name and login password encrypted by the HIS public key.
- EPP in which the login method can be logged in by pattern, or by logging in by entering the login name or password.
- Step 1302 The EPP returns a first response message of successful login to the terminal device.
- Step 1303 The terminal device sends a first request message for acquiring an electronic prescription to the EPP, and requests to view an electronic prescription of the patient at the designated hospital, where the first request message carries a hospital identifier HIS_ID (which may also be referred to as a first identifier).
- HIS_ID hospital identifier
- Step 1304 The EPP returns a first prompt message to the terminal device according to the first request message, prompting the user to input the first verification information.
- Step 1305 The terminal device determines, according to the first prompt information, the first original verification information input by the user at the terminal device, and the first encryption key of the information providing server, and encrypts the first original verification information according to the first encryption key. First verification information for authentication.
- Step 1306 Send the first verification information to the EPP.
- Step 1307 the EPP finds the user ID (PatientID) of the patient in the designated hospital by using the login name of the patient, and sends the user ID, the second mobile phone number, the first verification information, and the second encryption key of the EPP to the HIS.
- PatientID user ID
- the EPP finds the user ID (PatientID) of the patient in the designated hospital by using the login name of the patient, and sends the user ID, the second mobile phone number, the first verification information, and the second encryption key of the EPP to the HIS.
- Step 1308 the HIS decrypts the second mobile phone number by using the first decryption key to obtain the first mobile phone number, and searches for the user identity of the patient in the HIS by using the first mobile phone number.
- Step 1309 The HIS decrypts the first verification information by using the first decryption key of the HIS, and encrypts the decrypted first verification information by using the second encryption key of the EPP to obtain the first encrypted character string.
- Step 1310 The HIS determines a second encrypted character string generated by the patient when the HIS is registered, and the second encrypted character string is generated by the first verification information encrypted by the second encryption key of the EPP, and compares the first encrypted character string with the second encrypted character. Whether the strings are the same, if the same, the verification of the first verification information is passed.
- step 1311 the HIS determines the electronic prescription, encrypts the private information in the electronic prescription by the first encryption key, and transmits the encrypted electronic prescription to the EPP.
- step 1312 the EPP returns an electronic prescription to the terminal device.
- the electronic prescription that the patient needs to view is the diagnosis record, the prescription, the medication instruction, and the like of the patient
- the privacy protection of the private information in the electronic prescription through the first encryption key of the HIS does not affect the patient. user experience. Since the HIS encrypts only the private information in the electronic prescription by the first encryption key, and the non-private information is not encrypted, the computational complexity on the HIS side can be reduced.
- FIG. 14 is a second scene diagram of a method for acquiring an electronic file according to an exemplary embodiment
- the embodiment describes the user by using an electronic file as an electronic prescription, a platform server as an EPP, and an information providing server as an HIS as an example. How to log in to the EPP through the second mobile phone number; as shown in Figure 14, the following steps are included:
- Step 1401 When the patient initiates a login request to the EPP through the terminal device, the terminal device encrypts the real first mobile phone number of the user through the first encryption key of the HIS, obtains the second mobile phone number, and logs in through the second mobile phone number.
- Step 1402 The EPP requests the HIS to send the first verification code to the terminal device to the HIS based on the second mobile phone number.
- Step 1403 The HIS decrypts the second mobile phone number by using the corresponding first decryption key based on the second mobile phone number to obtain the first mobile phone number, and sends the first verification code to the terminal device by using the first mobile phone number.
- Step 1404 the HIS returns a second verification code to the EPP.
- Step 1405 the EPP receives the first verification code from the terminal device.
- Step 1406 The EPP compares the first verification code and the second verification code. When determining that the two are the same, determining that the patient is successfully logged in, and returning the first response message of the successful login to the terminal device.
- the user's real login information is encrypted by the first encryption key, and the encrypted first login information is used to log in to the platform server, and the data on the platform server is met.
- the first login information stolen by the stealer from the platform server is encrypted data, so it cannot log in to the platform server through the login information obtained from the platform server, thereby effectively preventing the stealer from passing through the platform server.
- the stolen login information is illegally logged into the platform server to ensure the security of the user login information.
- the HIS decrypts the second mobile phone number by using the first decryption key to obtain the first mobile phone number, and sends the first verification code and the second verification code to the terminal device and the EPP respectively, thereby assisting the EPP to complete the secondary identity verification.
- FIG. 15 is a third scene diagram of a method for acquiring an electronic file according to an exemplary embodiment
- the present embodiment describes how to use an electronic file as an electronic prescription, a platform server as an EPP, and an information providing server as an HIS as an example.
- the login name of the user in the first login information of the EPP is bound to the user identifier of the user in the HIS; as shown in FIG. 15, the following steps are included:
- step 1501 the terminal application logs in to the EPP using the second mobile phone number (ie, obtained by encrypting the original first mobile phone number through the first decryption key of the HIS) and the login password.
- the second mobile phone number ie, obtained by encrypting the original first mobile phone number through the first decryption key of the HIS
- Step 1502 The EPP returns a first response message of successful login to the terminal device.
- Step 1503 The terminal device sends an association request to the EPP, where the association request carries a hospital identifier.
- Step 1504 The EPP returns a second prompt information to the terminal device to prompt the user to input the second original verification information by using the terminal device.
- Step 1505 The user inputs the second original verification information (for example, the ID number) according to the second prompt information, and encrypts the second original verification information by using the first encryption key of the HIS to generate the second verification information.
- the second original verification information for example, the ID number
- Step 1506 The terminal device sends the second verification information to the EPP.
- Step 1507 The EPP sends the second mobile phone number, the second verification information, the second encryption key of the EPP, and the name of the encryption algorithm used by the EPP to the HIS, and requests the HIS to verify the second verification information.
- Step 1508 the HIS decrypts the second mobile phone number by using the corresponding encryption algorithm by using the first decryption key, obtains the first mobile phone number, searches for the user identity according to the first mobile phone number, and uses the first decryption key pair of the information providing server.
- the second verification information is decrypted to obtain the second original verification information, and the second original verification information is encrypted by the second encryption key to obtain a third encrypted character string.
- Step 1509 Determine a fourth encrypted character string generated by the user when the information providing server registers, and the fourth encrypted character string is generated by the second original authentication information encrypted by the second encryption key of the platform server.
- step 1510 the HIS compares whether the third encrypted string and the fourth encrypted string are the same, and performs verification.
- step 1511 if the same, the HIS verification is passed, and the user identifier is returned to the EPP.
- Step 1512 The EPP stores the second verification information, and stores the association relationship between the second mobile phone number and the user identifier.
- the HIS obtains the second original authentication information encrypted by the first encryption key through the first decryption key of the HIS by obtaining the second verification information from the EPP, and the second encryption by the EPP.
- the key encrypts the second original verification information to obtain a third encrypted character string, thereby achieving the purpose of identity authentication.
- other data on the HIS side is confidential, and the EPP platform The login information of the user on the side is also confidential, thus achieving the purpose of privacy protection.
- FIG. 16 is a fourth scene diagram of a method for acquiring an electronic file according to an exemplary embodiment
- an electronic file is an electronic prescription
- a platform server is an EPP
- an information providing server is an HIS. How to register on the EPP and HIS side; as shown in Figure 16, the following steps are included:
- step 1601 the patient requests the second encryption key of the EPP from the EPP through the terminal device.
- Step 1602 the EPP returns a second encryption key of the EPP to the terminal device, and sends a digital signature to the terminal device.
- the terminal device registers with the HIS using the first mobile phone number (ie, the original mobile phone number), and uses the second encryption key of the EPP to encrypt the information that needs to be registered by using the second encryption key.
- the information that needs to be registered in HIS includes: name, medical record card number, ID card number, mobile phone number home address, drug allergy record, past medical history, etc.
- Step 1604 the HIS saves the first mobile phone number, generates a patient ID (PatientID), and saves the authentication information (eg, ID number, etc.) encrypted according to the second encryption key of the EPP.
- PatientID patient ID
- authentication information eg, ID number, etc.
- Step 1605 The HIS returns a second response message of successful registration to the terminal device, and returns a first encryption key of the HIS to the terminal device, and a second mobile phone generated by encrypting the first mobile phone number by using the first encryption key of the HIS. number.
- Step 1606 The terminal device registers with the EPP using the second mobile phone number.
- Step 1607 The EPP sends the second mobile phone number to the HIS, and requests the HIS to send the short message verification code to the terminal device.
- Step 1608 The HIS decrypts the second mobile phone number by using the first encryption key of the HIS to obtain the first mobile phone number.
- step 1609 the HIS returns a third verification code to the EPP.
- Step 1610 The HIS returns a fourth verification code to the terminal device based on the first mobile phone number.
- step 1611 the terminal device reports the fourth verification code to the EPP.
- Step 1612 The EPP compares the fourth verification code reported by the terminal device with the third verification code returned by the HIS. If they are consistent, the verification succeeds, and the second mobile phone number is stored.
- step 1613 the EPP returns a second response message that the registration is successful to the terminal device.
- the terminal device can set a login password for logging in to the EPP by using the second mobile phone number.
- step 1615 the EPP returns a successful response to the terminal device platform.
- the second mobile phone number cannot be decrypted and obtained.
- First mobile number so even if the second mobile number is stolen on the platform server, the stealer cannot decrypt the second mobile number because there is no decryption key when the stealer does not obtain the first decryption key of the HIS;
- the private data registered by the user on the HIS is encrypted by the second encryption key of the EPP, so the HIS cannot decrypt the data stored on the EPP. Since the stealer is difficult to break the EPP and the HIS at the same time, the application can be Greatly improve the safety protection of EPP and HIS.
- the HIS can decrypt the first mobile phone number according to its first decryption key, thereby assisting the EPP to send the short message verification code and complete the secondary verification.
- the present application also proposes a schematic structural diagram of the terminal device according to an exemplary embodiment of the present application shown in FIG.
- the server includes a processor, an internal bus, a network interface, a memory, and a non-volatile memory, and may of course include hardware required for other services.
- the processor reads the corresponding computer program from the non-volatile memory into memory and then runs to form a device for acquiring the electronic file on a logical level.
- the present application does not exclude other implementation manners, such as a logic device or a combination of software and hardware, etc., that is, the execution body of the following processing flow is not limited to each logical unit, and may be Hardware or logic device.
- the present application also proposes a schematic structural diagram of the platform server according to an exemplary embodiment of the present application shown in FIG. 18. Please refer to Figure 18.
- the server includes processing. , internal bus, network interface, memory, and non-volatile memory, of course, may also include the hardware required for other services.
- the processor reads the corresponding computer program from the non-volatile memory into memory and then runs to form a device for acquiring the electronic file on a logical level.
- the present application does not exclude other implementation manners, such as a logic device or a combination of software and hardware, etc., that is, the execution body of the following processing flow is not limited to each logical unit, and may be Hardware or logic device.
- the present application also proposes a schematic configuration diagram of the information providing server according to an exemplary embodiment of the present application shown in FIG.
- the server includes a processor, an internal bus, a network interface, a memory, and a non-volatile memory, and may of course include hardware required for other services.
- the processor reads the corresponding computer program from the non-volatile memory into memory and then runs to form a device for acquiring the electronic file on a logical level.
- the present application does not exclude other implementation manners, such as a logic device or a combination of software and hardware, etc., that is, the execution body of the following processing flow is not limited to each logical unit, and may be Hardware or logic device.
- the apparatus for acquiring an electronic file may include: a first sending module 2001, a first receiving module. 2202, a first determining module 2203, a second receiving module 2204; wherein:
- the first sending module 2001 is configured to send, to the platform server, a first request message for acquiring an electronic file, where the first request message carries a first identifier of the information providing server that provides the electronic file;
- the first receiving module 2002 is configured to receive first prompt information returned by the platform server according to the first request message sent by the first sending module 2001;
- the first determining module 2003 is configured to determine first verification information for identity verification according to the first prompt information received by the first receiving module 2002, and send first verification information to the platform server;
- the second receiving module 2004 is configured to determine, according to the first identifier, the information providing server, and determine, according to the first login information of the platform server, the user identifier registered by the user in the information providing server, and determine the first identifier
- the first verification information and the user identifier determined by the module 2003 are sent to the information providing server, the electronic file from the information providing server forwarded by the platform server is received, and the private information in the electronic file is encrypted by the first encryption key of the information providing server.
- the first determining module 2003 may include:
- the first determining unit 20031 is configured to determine, according to the first prompt information, a first original input by the user at the terminal device Verifying the information and determining a first encryption key of the information providing server;
- the first encryption unit 20032 is configured to encrypt the first original verification information according to the first encryption key determined by the first determining unit 20031 to obtain first verification information for identity verification.
- the apparatus may further include:
- the second determining module 2005 is configured to determine, when the user is not logged in to the platform server, the first login information of the user, and log in to the platform server by using the first login information;
- the third receiving module 2006 is configured to receive, after the second determining module 2005 determines that the user logs in successfully, the first response message that is successfully returned by the platform server.
- the apparatus may further include:
- the fourth receiving module 2007 is configured to receive, by using the first mobile phone number, a first verification code from the information providing server, where the first verification code is that the platform server sends the first mobile phone number according to the second mobile phone number indication information providing server, and the second mobile phone The number is obtained by encrypting the first mobile phone number by the first encryption key;
- the second sending module 2008 is configured to send the first verification code received by the fourth receiving module 2007 to the platform server by using the second mobile phone number;
- the third determining module 2009 is configured to determine, after the platform server verifies the first verification code sent by the second sending module 2008 and the second verification code from the information providing server, that the user logs in successfully, and the third receiving module 2006 executes the receiving platform. The step of the server returning the first response message for successful login.
- the apparatus may further include:
- the third sending module 2010 is configured to send an association request to the platform server when the first login information of the platform server is not bound to the user identifier, where the association request carries the first identifier of the information providing server;
- the fifth receiving module 2011 is configured to receive second prompt information returned by the platform server according to the association request sent by the third sending module 2010;
- the fourth determining module 2012 is configured to determine, according to the second prompt information received by the fifth receiving module 2011, the second original verification information input by the user in the terminal device;
- the first encryption module 2013 is configured to encrypt the second original verification information determined by the fourth determining module 2012 according to the first encryption key to obtain second verification information for identity verification.
- the fourth sending module 2014 is configured to send the second verification information encrypted by the first encryption module 2013 to the platform server, and the platform server forwards the binding request and the second verification information to the information providing server, where the information providing server is configured according to the first
- the first decryption key pair corresponding to the encryption key is decrypted by the second verification information, and the user identifier of the information providing server is determined according to the decrypted second verification information, and the user identifier is returned to the platform server.
- the platform server establishes a binding relationship between the first login information and the user identifier.
- the apparatus may further include:
- a second encryption module 2015 configured to: when the user is not registered on the platform server and the information providing server, encrypt the first registration information that is registered by the information providing server by the user of the terminal device by using the second encryption key of the platform server;
- the fifth sending module 2016 is configured to: after the user logs in to the information providing server by using the first mobile phone number, send the first registration information encrypted by the first encryption key to the information providing server;
- the sixth receiving module 2017 is configured to: after the information providing server generates the user identifier according to the first mobile phone number, receive the first encryption key from the information providing server, the first response message of successful registration, and the second mobile phone number, and the second mobile phone The number is generated by encrypting the first mobile phone number by the first encryption key;
- the first registration module 2018 is configured to register with the platform server by using the second mobile phone number
- the seventh receiving module 2019 is configured to receive, after the platform server registers the second mobile phone number, a second response message that is successfully registered by the platform server.
- the apparatus further includes:
- a sixth sending module 2020 configured to send, to the platform server, a second request message for acquiring a second encryption key of the platform server;
- the eighth receiving module 2021 is configured to receive a second encryption key returned by the platform server according to the second request message sent by the sixth sending module 39.
- the first registration module 2018 can include:
- the first sending unit 20181 is configured to send a second mobile phone number to the platform server.
- the first receiving unit 20182 is configured to receive a third verification code returned by the information providing server, where the third verification code is sent by the platform server to the terminal device according to the second mobile phone number request information sending server sent by the first sending unit;
- a second sending unit 20183 configured to send, to the platform server, a third verification code received by the first receiving unit 20182;
- the seventh receiving module 2019 performs the step of receiving the second successful response message of the registration returned by the platform server.
- FIG. 22 is a schematic structural diagram of an apparatus for acquiring an electronic file according to another exemplary embodiment; in the software implementation, the apparatus for acquiring an electronic file may include: a ninth receiving module 2201, a seventh sending module 2202 The eighth sending module 2203, the ninth sending module 2204, and the first forwarding module 2205; wherein:
- the ninth receiving module 2201 is configured to receive a first request message for acquiring an electronic file from the terminal device, where the first request message carries a first identifier of the information providing server that provides the electronic file;
- the seventh sending module 2202 is configured to return, according to the first request message received by the ninth receiving module 2201, the first prompt information to the terminal device;
- the eighth sending module 2203 is configured to: after determining, by the terminal device, the first verification information for the identity verification according to the first prompt information sent by the seventh sending module 2202, receiving the first verification information from the terminal device;
- the ninth sending module 2204 is configured to determine, according to the first identifier determining information providing server received by the ninth receiving module 2201, the first verification information received by the eighth sending module 2203, and the user registered by the user of the terminal device in the information providing server.
- the identifier is sent to the information providing server;
- the first forwarding module 2205 is configured to: after the first verification information sent by the information providing server to the ninth sending module 2204 is verified and the electronic file is determined according to the user identifier, receive the electronic file from the information providing server, and forward the electronic file to the terminal.
- the private information in the electronic file is encrypted by the first encryption key of the information providing server.
- FIG. 23 is a schematic structural diagram of an apparatus for acquiring an electronic file according to another exemplary embodiment of the present invention.
- the first verification information is that the original verification information input by the user at the terminal device passes.
- the first encryption key is encrypted and generated.
- the apparatus may further include:
- the fifth determining module 2206 is configured to determine, when the user is not logged in to the platform server, the first login information of the user on the platform server;
- the tenth sending module 2207 is configured to: after the fifth determining module 2206 determines that the user logs in successfully, returns a first response message that the login is successful to the terminal device.
- the apparatus may further include:
- the eleventh sending module 2208 is configured to send, by the second mobile phone number registration information registration server registered by the user of the terminal device, the first verification code to the terminal device, where the second mobile phone number is used by the first encryption key to the first mobile phone The number is encrypted, and the first mobile number is the mobile number of the user registered in the information providing server;
- the tenth receiving module 2209 is configured to: after the information providing server decrypts the second mobile phone number by using the first decryption key of the information providing server, to obtain the first mobile phone number, and after the first mobile phone number is instructed to send the first verification code to the terminal device, Receiving a first verification code from the terminal device and receiving a second verification code from the information providing server;
- the first verification module 2210 is configured to verify the first verification code and the second verification code, and determine after the verification is passed.
- the user login is successful, and the tenth sending module 2209 performs the step of returning the first response message of the successful login to the terminal device.
- the apparatus may further include:
- the eleventh receiving module 2211 is configured to receive an association request from the terminal device when the first login information of the user on the platform server and the user identifier registered by the user in the information providing server are not bound, where the association request carries the first identifier ;
- the twelfth sending module 2212 is configured to return, according to the association request, the second prompt information to the terminal device;
- the twelfth receiving module 2213 is configured to: determine, by the terminal device, the second verification information for the identity verification according to the second prompt information, and receive the second verification information that is returned by the terminal device according to the second prompt information, where the second verification information passes the An encryption key encryption;
- the second forwarding module 2214 is configured to forward the binding request and the second verification information that passes the first encryption key to the information providing server, so that the information providing server decrypts the second verification information encrypted by the first encryption key. Determining, according to the decrypted second verification information, a user identifier registered by the user in the information providing server;
- the thirteenth receiving module 2215 is configured to receive a user identifier returned from the information providing server, and establish a binding relationship between the first login information and the user identifier.
- the apparatus may further include:
- the second registration module 2216 is configured to register by using the second registration information from the terminal device when the user is not registered on the platform server;
- the first obtaining module 2217 is configured to obtain a third verification code from the information providing server according to the second registration information registered by the second registration module 2216, and instruct the information providing server to send a fourth verification code to the first mobile phone number corresponding to the second mobile phone number. ;
- a fourteenth receiving module 2218 configured to receive a fourth verification code from the terminal device
- a second verification module 2219 configured to verify the third verification code and the fourth verification code
- the thirteenth sending module 2220 is configured to return, after the second verification module 2219 passes the third verification code and the fourth verification verification, a second response message that is successfully registered to the terminal device.
- the apparatus may further include:
- a fifteenth receiving module 2221 configured to receive a second request message from the terminal device for acquiring a second encryption key of the platform server
- the fourteenth sending module 2222 is configured to return a second encryption key to the terminal device according to the second request message received by the fifteenth receiving module 2221.
- FIG. 24 is a schematic structural diagram of an apparatus for acquiring an electronic file according to another exemplary embodiment.
- the apparatus for acquiring an electronic file may include: a sixteenth receiving module 2401, and a third verifying module 2402. a third encryption module 2403 and a fifteenth transmission module 2404; wherein:
- a sixteenth receiving module 2401 configured to receive first verification information from the platform server, and a user identifier registered by the user of the terminal device in the information providing server;
- the third verification module 2402 is configured to verify the first verification information received by the sixteenth receiving module 2401, and determine an electronic file according to the user identifier after the verification is passed;
- a third encryption module 2403 configured to encrypt the private information in the electronic file determined by the third verification module 2402 by using a first encryption key of the information providing server;
- the fifteenth sending module 2404 is configured to send the electronic file encrypted by the third encryption module 2403 to the platform server, so that the platform server forwards the electronic file to the terminal device.
- FIG. 25 is a schematic structural diagram of an apparatus for acquiring an electronic file according to another exemplary embodiment.
- the third verification module 2402 includes:
- the first decryption unit 24021 is configured to decrypt the first verification information by using the first decryption key of the information providing server;
- the first encryption unit 24022 is configured to encrypt the first verification information decrypted by the first decryption unit by using the second encryption key of the platform server to obtain a first encrypted character string;
- the first determining unit 24023 is configured to determine a second encrypted character string generated by the user when the information providing server registers, and the second encrypted character string is generated by the first verification information by using a second encryption key of the platform server;
- the second determining unit 24024 is configured to determine whether the first encrypted character string obtained by the first encryption unit 24022 and the second encrypted character string determined by the first determining unit 24023 are the same. If they are the same, the verification of the first verification information is passed.
- the apparatus may further include:
- the seventeenth receiving module 2405 is configured to receive, when the user is not logged in to the platform server, an indication message that is sent by the platform server to instruct the information providing server to send the first verification code to the second mobile phone number registered by the user in the platform server, where The second mobile phone number is obtained by encrypting the first mobile phone number by the first encryption key, and the first mobile phone number is the mobile phone number registered by the user in the information providing server;
- the first decryption module 2406 is configured to decrypt the second mobile phone number by using the first decryption key according to the indication message received by the seventeenth receiving module 2405, to obtain the first mobile phone number;
- the sixteenth sending module 2407 is configured to send, by using the first mobile phone number, the first verification code and the flatness to the terminal device
- the server returns a second verification code for the platform server to perform login verification on the user according to the first verification code and the second verification code.
- the apparatus may further include:
- the eighteenth receiving module 2408 is configured to receive, when the first login information of the platform server is not bound to the user identifier, the second verification information from the platform server and the second encryption key of the platform server, and the second verification information. Encrypted by the first encryption key;
- the second decryption module 2409 is configured to decrypt the second verification information by using the first decryption key of the information providing server, and encrypt the decrypted second original verification information by using the second encryption key to obtain a third encrypted string. ;
- a sixth determining module 2410 configured to determine a fourth encrypted character string generated by the user when the information providing server registers, and the fourth encrypted character string is generated by the second original authentication information by using a second encryption key of the platform server;
- a seventh determining module 2411 configured to determine whether the third encrypted string and the fourth encrypted string are the same;
- the seventeenth sending module 2412 is configured to: if the seventh determining module 2411 determines the same, return the user identifier registered by the user of the terminal device to the information providing server to the platform server, so that the platform server establishes the binding of the first login information and the user identifier. Relationship.
- the apparatus may further include:
- the third registration module 2413 is configured to register by using the first registration information from the terminal device when the user is not registered on the information providing server;
- the fourth encryption module 2414 is configured to: after the user logs in to the information providing server by using the first mobile phone number, encrypt the first mobile phone number by using the first encryption key to obtain the second mobile phone number;
- the eighteenth sending module 2415 is configured to send the second mobile phone number to the terminal device, so that the terminal device registers on the platform server by using the second mobile phone number;
- the identifier generating module 2416 is configured to generate a user identifier according to the first mobile phone number.
- the apparatus may further include:
- a nineteenth receiving module 2417 configured to receive a second mobile phone number from the platform server
- the third decryption module 2418 is configured to decrypt the second mobile phone number by using the first decryption key to obtain the first mobile phone number;
- the ninth sending module 2419 is configured to return a third verification code to the terminal device by using the first mobile phone number, where the third verification code is sent by the platform server to the terminal device according to the second registration information request information providing server;
- the twentieth sending module 2420 is configured to return a fourth verification code to the platform server, so that the platform server compares the third verification code and the fourth verification code to determine whether the verification is passed.
- the user needs to encrypt the related information of the user by using the second encryption key of the platform server when registering with the information providing server, and use the first encryption key pair of the information providing server when the platform server registers.
- the user's related information (including the private information in the electronic file) is encrypted; when making the association request and viewing the electronic file, the platform server needs to send the encrypted information to the information providing server for decryption, then verify, or information.
- the server is provided to decrypt the information and send it back to the platform server for verification.
- the stealer cannot obtain the original data; similarly, even if the data on the platform server is leaked, the stealer Nor can I get raw data.
- the platform server can complete the identity authentication with the assistance of the information providing server, which effectively protects the user's private information and realizes identity authentication.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Chemical & Material Sciences (AREA)
- Combustion & Propulsion (AREA)
- Mechanical Engineering (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Telephonic Communication Services (AREA)
- Information Transfer Between Computers (AREA)
Abstract
一种获取电子文件的方法及装置,该获取电子文件的方法包括:向平台服务器发送用于获取电子文件的第一请求消息(101),第一请求消息中携带有提供电子文件的信息提供服务器的第一标识;接收来自平台服务器根据第一请求消息返回的第一提示信息(102);根据第一提示信息确定用于身份验证的第一验证信息,向平台服务器发送第一验证信息(103);接收平台服务器转发的来自信息提供服务器的电子文件,电子文件中的隐私信息经过信息提供服务器的第一加密密钥加密(104)。可以有效地保护用户的隐私信息不被平台服务器泄露,确保用户的隐私安全。
Description
本申请要求2015年06月15日递交的申请号为201510330914.9、发明名称为“获取电子文件的方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本申请涉及信息技术领域,尤其涉及一种获取电子文件的方法及装置。
为了加强处方药的流通管理,保证民众用药安全、有效,处方药的销售需要依据医生开具的纸质处方才可以销售。目前国家正逐渐放开在线销售处方药,以进一步降低国家和民众的医疗成本、提高药品采购的便利性。电子处方相对于纸质处方,具有格式规范、内容全面清晰、便于医患查询历史记录等优点,是规模推广处方药在线销售的基础。
为保护电子处方中涉及到的患者的隐私信息,在使用电子处方的流程中,将患者的姓名、病历号、住址等患者隐私信息进行隐藏、删除或加解密处理。但电子处方在使用过程中会涉及不同的用户角色,例如,医生、患者、药房等,此外,医生在核对患者既往诊疗信息时、监管部门在进行案例审查时,还需要核对电子处方中涉及到的患者身份。因此单纯的隐藏或删除患者的身份信息,会因为丢失患者的关键信息而无法追溯患者的既往就诊记录。
发明内容
有鉴于此,本申请提供一种新的技术方案,可以解决现有技术中不能有效地保护用户的隐私信息的技术问题。
为实现上述目的,本申请提供技术方案如下:
根据本申请的第一方面,提出了一种获取电子文件的方法,应用在终端设备上,包括:
向平台服务器发送用于获取电子文件的第一请求消息,所述第一请求消息中携带有提供所述电子文件的信息提供服务器的第一标识;
接收来自所述平台服务器根据所述第一请求消息返回的第一提示信息;
根据所述第一提示信息确定用于身份验证的第一验证信息,向所述平台服务器发送
所述第一验证信息;
在所述平台服务器根据所述第一标识确定所述信息提供服务器,以及根据所述终端设备的用户在所述平台服务器的第一登录信息确定所述用户在所述信息提供服务器注册的用户标识,并将所述第一验证信息、所述用户标识发送至所述信息提供服务器后,接收所述平台服务器转发的来自所述信息提供服务器的所述电子文件,所述电子文件中的隐私信息经过所述信息提供服务器的第一加密密钥加密。
根据本申请的第二方面,提出了一种获取电子文件的方法,应用在平台服务器上,包括:
接收来自终端设备的用于获取电子文件的第一请求消息,所述第一请求消息中携带有提供所述电子文件的信息提供服务器的第一标识;
根据所述第一请求消息向所述终端设备返回第一提示信息;
在所述终端设备根据所述第一提示信息确定用于身份验证的第一验证信息后,接收来自所述终端设备的第一验证信息;
根据所述第一标识确定所述信息提供服务器,将所述第一验证信息、所述终端设备的用户在所述信息提供服务器注册的用户标识发送至所述信息提供服务器;
在所述信息提供服务器对所述第一验证信息验证通过并根据所述用户标识确定所述电子文件后,接收来自所述信息提供服务器的所述电子文件,将所述电子文件转发至所述终端设备,所述电子文件中的隐私信息经过所述信息提供服务器的第一加密密钥加密。
根据本申请的第三方面,提出了一种获取电子文件的方法,应用在信息提供服务器上,包括:
接收来自平台服务器的第一验证信息、终端设备的用户在所述信息提供服务器注册的用户标识;
对所述第一验证信息进行验证,在验证通过后根据所述用户标识确定所述电子文件;
将所述电子文件中的隐私信息通过所述信息提供服务器的第一加密密钥加密;
将所述电子文件发送至所述平台服务器,以供所述平台服务器将所述电子文件转发至所述终端设备。
根据本申请的第四方面,提出了一种获取电子文件的装置,应用在终端色设备上,包括:
第一发送模块,用于向平台服务器发送用于获取电子文件的第一请求消息,所述第一请求消息中携带有提供所述电子文件的信息提供服务器的第一标识;
第一接收模块,用于接收来自所述平台服务器根据所述第一发送模块发送的所述第一请求消息返回的第一提示信息;
第一确定模块,用于根据所述第一接收模块接收到的所述第一提示信息确定用于身份验证的第一验证信息,向所述平台服务器发送所述第一验证信息;
第二接收模块,用于在所述平台服务器根据所述第一标识确定所述信息提供服务器,以及根据所述终端设备的用户在所述平台服务器的第一登录信息确定所述用户在所述信息提供服务器注册的用户标识,并将所述第一确定模块确定的所述第一验证信息、所述用户标识发送至所述信息提供服务器后,接收所述平台服务器转发的来自所述信息提供服务器的所述电子文件,所述电子文件中的隐私信息经过所述信息提供服务器的第一加密密钥加密。
根据本申请的第五方面,提出了一种获取电子文件的装置,应用在平台服务器上,包括:
第九接收模块,用于接收来自终端设备的用于获取电子文件的第一请求消息,所述第一请求消息中携带有提供所述电子文件的信息提供服务器的第一标识;
第七发送模块,用于根据所述第九接收模块接收到的所述第一请求消息向所述终端设备返回第一提示信息;
第八发送模块,用于在所述终端设备根据所述第七发送模块发送的所述第一提示信息确定用于身份验证的第一验证信息后,接收来自所述终端设备的第一验证信息;
第九发送模块,用于根据所述第九接收模块接收到的所述第一标识确定所述信息提供服务器,将所述第一验证信息、所述终端设备的用户在所述信息提供服务器注册的用户标识发送至所述信息提供服务器;
第一转发模块,用于在所述信息提供服务器对所述第九发送模块发送的所述第一验证信息验证通过并根据所述用户标识确定所述电子文件后,接收来自所述信息提供服务器的所述电子文件,将所述电子文件转发至所述终端设备,所述电子文件中的隐私信息经过所述信息提供服务器的第一加密密钥加密。
根据本申请的第六方面,提出了一种获取电子文件的装置,应用在信息提供服务器上,包括:
第十六接收模块,用于接收来自平台服务器的第一验证信息、终端设备的用户在所述信息提供服务器注册的用户标识;
第三验证模块,用于对所述第十六接收模块接收到的所述第一验证信息进行验证,
在验证通过后根据所述用户标识确定所述电子文件;
第三加密模块,用于将所述电子文件中的隐私信息通过所述信息提供服务器的第一加密密钥加密;
第十五发送模块,用于将所述第三加密模块加密后的所述电子文件发送至所述平台服务器,以供所述平台服务器将所述电子文件转发至所述终端设备。
由以上技术方案可见,本申请通过对电子文件中的隐私信息通过第一加密密钥进行加密保护,由于平台服务器并没有信息提供服务器的第一加密密钥,因此即使电子文件在平台服务器时被窃取,窃取者也无法得到用户的真实的隐私信息,平台服务器侧的管理员也无法获取到用户的真实的隐私信息,从而有效地保护用户的隐私信息不被平台服务器泄露,确保用户的隐私安全。
图1是根据一示例性实施例一示出的获取电子文件的方法的流程图;
图2是根据一示例性实施例二示出的获取电子文件的方法的流程图;
图3是根据一示例性实施例三示出的获取电子文件的方法的流程图;
图4是根据一示例性实施例四示出的获取电子文件的方法的流程图;
图5是根据又一示例性实施例一示出的获取电子文件的方法的流程图;
图6是根据又一示例性实施例二示出的获取电子文件的方法的流程图;
图7是根据又一示例性实施例三示出的获取电子文件的方法的流程图;
图8是根据又一示例性实施例四示出的获取电子文件的方法的流程图;
图9是根据另一示例性实施例一示出的获取电子文件的方法的流程图;
图10是根据另一示例性实施例二示出的获取电子文件的方法的流程图;
图11是根据另一示例性实施例三示出的获取电子文件的方法的流程图;
图12是根据另一示例性实施例四示出的获取电子文件的方法的流程图;
图13是根据一示例性实施例示出的获取电子文件的方法的场景图之一;
图14是根据一示例性实施例示出的获取电子文件的方法的场景图之二;
图15是根据一示例性实施例示出的获取电子文件的方法的场景图之三;
图16是根据一示例性实施例示出的获取电子文件的方法的场景图之四;
图17示出了根据本发明的一示例性实施例的终端设备的结构图;
图18示出了根据本发明的一示例性实施例的平台服务器的结构图;
图19示出了根据本发明的一示例性实施例的信息提供服务器的结构图;
图20是根据一示例性实施例一示出的获取电子文件的装置的结构示意图;
图21是根据一示例性实施例二示出的获取电子文件的装置的结构示意图;
图22是根据又一示例性实施例一示出的获取电子文件的装置的结构示意图;
图23是根据又一示例性实施例二示出的获取电子文件的装置的结构示意图;
图24是根据另一示例性实施例一示出的获取电子文件的装置的结构示意图;
图25是根据另一示例性实施例二示出的获取电子文件的装置的结构示意图。
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本申请相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本申请的一些方面相一致的装置和方法的例子。
在本申请使用的术语是仅仅出于描述特定实施例的目的,而非旨在限制本申请。在本申请和所附权利要求书中所使用的单数形式的“一种”、“所述”和“该”也旨在包括多数形式,除非上下文清楚地表示其他含义。还应当理解,本文中使用的术语“和/或”是指并包含一个或多个相关联的列出项目的任何或所有可能组合。
应当理解,尽管在本申请可能采用术语第一、第二、第三等来描述各种信息,但这些信息不应限于这些术语。这些术语仅用来将同一类型的信息彼此区分开。例如,在不脱离本申请范围的情况下,第一信息也可以被称为第二信息,类似地,第二信息也可以被称为第一信息。取决于语境,如在此所使用的词语“如果”可以被解释成为“在……时”或“当……时”或“响应于确定”。
本申请通过对电子文件中的隐私信息通过第一加密密钥进行加密保护,由于平台服务器并没有信息提供服务器的第一加密密钥,因此即使电子文件在平台服务器时被窃取,窃取者也无法得到用户的真实的隐私信息,平台服务器侧的管理员也无法获取到用户的真实的隐私信息,从而有效地保护用户的隐私信息不被平台服务器泄露,确保用户的隐私安全。
为对本申请进行进一步说明,提供下列实施例:
请参考图1,为根据一示例性实施例一示出的获取电子文件的方法的流程图,本实施例可以应用在终端设备上,在一实施例中,终端设备可以为智能手机、平板电脑、个
人计算机等,可以通过在终端设备上以应用程序或者浏览器的方式与平台服务器和信息提供服务器进行通信,如图1所示,包括如下步骤:
步骤101,向平台服务器发送用于获取电子文件的第一请求消息,第一请求消息中携带有提供电子文件的信息提供服务器的第一标识。
步骤102,接收来自平台服务器根据第一请求消息返回的第一提示信息。
步骤103,根据第一提示信息确定用于身份验证的第一验证信息,向平台服务器发送第一验证信息。
步骤104,在平台服务器根据第一标识确定信息提供服务器,以及根据终端设备的用户在平台服务器的第一登录信息确定用户在信息提供服务器注册的用户标识,并将第一验证信息、用户标识发送至信息提供服务器后,接收平台服务器转发的来自信息提供服务器的电子文件,电子文件中的隐私信息经过信息提供服务器的第一加密密钥加密。
在上述步骤101中,在一实施例中,平台服务器可以作为连接终端设备与信息提供服务器的网络平台,可以由电商平台提供,不同的终端设备与不同的信息提供服务器可以通过平台服务器进行电子文件的传输。在一实施例中,电子文件可以为电子处方,信息提供服务器可以为位于医院侧的医院信息系统(Hospital Information System,简称为HIS),平台服务器可以为位于网络侧的电子处方平台(Electronic Prescription Platform,简称为EPP),在另一实施例中,电子文件还可以为终端设备侧的用户的社保文件,信息提供服务器可以为社保中心侧的社保服务系统,平台服务器可以为位于网络侧的社保信息平台,在再一实施例中,电子文件还可以为终端设备侧的用户的住房公积金账单,信息提供服务器可以为住房公积金管理中心侧的公积金服务系统,平台服务器可以为位于网络侧的公积金信息平台,由此可知,本申请不对电子文件的具体内容进行限制,只要是需要通过本申请进行加密保护的电子文件均为本申请中的电子文件。本实施例以电子文件具体为电子处方为例进行示例性说明,在一实施例中,第一请求消息中可以携带有第一标识,此时第一标识为终端设备的用户在HIS对应的医院代码HIS_ID,如果第一请求消息中未携带电子处方的处方号P_ID(本申请中的第二标识),则HIS可以根据电子处方的开设时间确定用户需要最新的电子处方,如果携带有第二标识,HIS可以为用户提供第二标识对应的电子处方。
在上述步骤102和步骤103中,在一实施例中,第一验证信息可以为用户在终端设备输入的第一原始验证信息通过第一加密密钥加密生成的,第一原始验证信息例如为用户的身份证号或者身份证号的后四位、用户的名字等等。在一实施例中,可以根据第一
提示信息确定用户在终端设备输入的第一原始验证信息以及确定信息提供服务器的第一加密密钥,根据第一加密密钥对第一原始验证信息进行加密,得到用于身份验证的第一验证信息,第一验证信息通过信息提供服务器的第一加密密钥加密,可以使平台服务器侧获取不到用户的原始的验证信息,例如,如果根据第一提示信息需要确定的第一验证信息为用户的身份证号,通过对身份证号以第一加密密钥进行加密后,发送至平台服务器,则平台服务器是无法获取到用户的真实的身份证号的,从而确保用户的真实的验证信息在平台服务器上是保密的。
在上述步骤104中,在一实施例中,电子文件中的隐私信息例如可以为用户的姓名、身份证号、手机号码、家庭住址等等,通过第一加密密钥对隐私信息进行加密,从而使平台服务器不能获取到电子文件中的用户的隐私信息。在一实施例中,如果信息提供服务器采用对称加密算法,则信息提供服务器上的第一加密密钥可以与信息提供服务器的第一解密密钥相同。对称加密算法可以为DES(Data Encryption Standard)、3DES(Triple DES)、AES(Advanced Encryption Standard)等。如果信息提供服务器采用非对称加密算法,第一加密密钥可以为信息提供服务器的公钥,信息提供服务器的第一解密密钥则为信息提供服务器的私钥。在一实施例中,信息提供服务器的采用的非对称加密算法可以为RSA(Rivest Shamir Adlemen)、Elgamal、背包算法、Rabin、D-H(Diffie-Hellman)、椭圆曲线加密算法(ECC)等。
本实施例中,通过对电子文件中的隐私信息通过第一加密密钥进行加密保护,由于平台服务器并没有信息提供服务器的第一加密密钥,因此即使电子文件在平台服务器时被窃取,窃取者也无法得到用户的真实的隐私信息,平台服务器侧的管理员也无法获取到用户的真实的隐私信息,从而有效地保护用户的隐私信息不被平台服务器泄露,确保用户的隐私安全。
请参考图2,为根据一示例性实施例二示出的获取电子文件的方法的流程图,本实施例以用户需要通过终端设备登录到平台服务器为例进行示例性说明,包括如下步骤:
步骤201,在用户未登录到平台服务器时,确定用户的第一登录信息,通过第一登录信息登录平台服务器。
步骤202,通过第一手机号码接收来自信息提供服务器的第一验证码,第一验证码为平台服务器根据第二手机号码指示信息提供服务器发送第一手机号码的,第二手机号码由第一加密密钥对第一手机号码加密得到。
步骤203,将第一验证码发送给平台服务器。
步骤204,在平台服务器对第一验证码与来自信息提供服务器的第二验证码进行验证后,确定用户登录成功,接收平台服务器返回的登录成功的第一响应消息。
在上述步骤201中,在一实施例中,第一登录信息可以包括用户在平台服务器的登录名和登录密码,其中,登录名可以为用户的真实的第一手机号码,通过第一加密密钥对用户的真实的第一手机号码加密,生成第一登录信息,用户通过加密后的手机号码登录到平台服务器,由此,确保平台服务器不能够获取到用户的真实的手机号码。
在上述步骤202和步骤203中,在一实施例中,在用户通过第一登录信息登录到平台服务器之后,可以基于第一登录信息确定用户在平台服务器注册时提供的经过第一加密密钥加密后的第二手机号码,在另一实施例中,如果第一登录信息中的登录名为第二手机号码,可以通过第一登录信息中的登录名确定第二手机号码,由此,平台服务器可以向信息提供服务器请求向第二手机号码对应的终端设备发送第一验证码,信息提供服务器在接收到第二手机号码后,通过信息提供服务器的第一解密密钥对第二手机号码解密,得到用户在信息提供服务器注册的原始的第一手机号码,进而通过第一手机号码向终端设备发送第一验证码。在一实施例中,第一验证码可以为短信验证码。
在上述步骤204中,在一实施例中,信息提供服务器在向终端设备发送第一验证码时,可以向平台服务器发送第二验证码,终端设备再将第一验证码发送给平台服务器。因此平台服务器在对第一验证码进行验证时,可以比较第一验证码与第二验证码的内容是否相同,如果相同,则验证通过,确定用户登录成功。
本实施例中,在用户需要登录到平台服务器时,通过第一加密密钥对用户的真实登录信息进行加密,并通过加密后的第一登录信息登录到平台服务器,在平台服务器上的数据遭到泄露时,窃取者从平台服务器窃取到的第一登录信息是加密后的数据,因此其无法获得用户的原始登录信息,也无法通过从平台服务器上得到的登录信息登录到平台服务器,从而有效地避免了窃取者通过其在平台服务器上窃取的登录信息非法登录到平台服务器,确保用户登录信息的安全。
请参考图3,为根据一示例性实施例三示出的获取电子文件的方法的流程图,本实施例以用户需要绑定用户在平台服务器的第一登录信息与用户在信息提供服务器上生成的用户标识为例进行示例性说明,如图3所示,包括如下步骤:
步骤301,在用户在平台服务器的第一登录信息与用户标识未绑定时,向平台服务器发送关联请求,关联请求中携带有信息提供服务器的第一标识。
步骤302,接收来自平台服务器根据关联请求返回的第二提示信息。
步骤303,根据第二提示信息确定用户在终端设备输入的第二原始验证信息。
步骤304,根据第一加密密钥对第二原始验证信息进行加密,得到用于身份验证的第二验证信息,向平台服务器发送第二验证信息,平台服务器将绑定请求和第二验证信息转发至信息提供服务器,以供信息提供服务器根据与第一加密密钥对应的第一解密密钥对第二验证信息进行解密,根据解密后的第二验证信息确定用户在信息提供服务器的用户标识,将用户标识返回平台服务器后,以供平台服务器建立第一登录信息和用户标识之间的绑定关系。
在一实施例中,用户标识可以为用户在信息提供服务器的唯一标识,该用户标识不含有用户的隐私信息,可以用于平台服务器在向信息提供服务器发起请求电子处方时作为索引,避免信息提供服务器每次都要通过对来自平台服务器的第二手机号码进行解密得到第一手机号码,之后将第一手机号码作为索引查找相应的电子文件。
本实施例以平台服务器为EPP和信息提供服务器为HIS为例进行说明,终端设备通过第二手机号码登录到EPP,其中,第二手机号码为原始的第一手机号码通过HIS信息提供服务器的第一加密密钥加密得到的;终端设备向EPP发送关联请求,该关联请求中携带有HIS_ID,终端设备的用户在根据EPP的提示输入身份证号后,对身份证号通过第一加密密钥进行加密,得到第二验证信息;EPP向HIS发送第二手机号码、第二验证信息、EPP的第二加密密钥,请求HIS对第二验证信息进行验证;HIS对第二验证信息验证通过后,向EPP返回用户标识;EPP存储第二验证信息,并存储第二手机号和用户标识的关联关系。在一实施例中,HIS可以基于第一手机号码生成用户标识。
本实施例中,信息提供服务器通过对来自平台服务器的第二验证信息进行验证,协助平台服务器实现了二次身份认证;在平台服务器上,由于第二验证信息是由信息提供服务器的第一加密密钥对第二原始验证信息进行加密后生成的,因此平台服务器并不能获取到终端设备的用户的真实的验证信息,从而可以防止窃听者窃取终端设备的用户的验证信息,避免非法用户向平台服务器通过非法的关联请求绑定合法用户在平台服务器的第一登录信息和用户在信息提供服务器的用户标识。
请参考图4,为根据一示例性实施例四示出的获取电子文件的方法的流程图,本实施例以用户在平台服务器和信息提供服务器上注册为例进行示例性说明,如图4所示,包括如下步骤:
步骤401,向平台服务器发送用于获取平台服务器的第二加密密钥的第二请求消息。
步骤402,接收平台服务器根据第二请求消息返回的第二加密密钥。
步骤403,在用户在平台服务器和信息提供服务器上未注册时,通过平台服务器的第二加密密钥对终端设备的用户需要在信息提供服务器注册的第一注册信息进行加密。
步骤404,在用户通过第一手机号码登录到信息提供服务器后,将通过第二加密密钥加密后的第一注册信息发送至信息提供服务器。
步骤405,在信息提供服务器根据第一手机号码生成用户标识后,接收来自信息提供服务器的第一加密密钥、注册成功的第一响应消息以及第二手机号码,第二手机号码由第一加密密钥对第一手机号码加密生成。
步骤406,通过第二手机号码向平台服务器注册。
步骤407,在平台服务器对第二手机号码注册后,接收平台服务器返回的注册成功的第二响应消息。
在上述步骤402中,在一实施例中,如果平台服务器采用对称加密算法,则平台服务器上的第二加密密钥可以与平台服务器的第二解密密钥相同。在一实施例中,对称加密算法可以为DES(Data Encryption Standard)、3DES(Triple DES)、AES(Advanced Encryption Standard)等。在另一实施例中,如果平台服务器采用非对称加密算法,第二加密密钥可以为平台服务器的公钥,平台服务器的第二解密密钥可以为平台服务器的私钥。在一实施例中,平台服务器采用的非对称加密算法可以为RSA(Rivest Shamir Adlemen)、Elgamal、背包算法、Rabin、D-H(Diffie-Hellman)、椭圆曲线加密算法(ECC)等。在一实施例中,在平台服务器需要将第二加密密钥发送给信息提供服务器时,可以将非对称加密算法的公钥作为第二加密密钥。对于对称密钥的传输,可以通过安全传输通道来进行,或者是对对称密钥进行加密后再传输,从而确保对称密钥的安全性。
在上述步骤404中,终端设备可以向平台服务器发送第二手机号码,接收来自信息提供服务器返回的第三验证码,其中,第三验证码可以为平台服务器根据第二手机号码请求信息提供服务器发送给终端设备的;终端设备向平台服务器发送第三验证码;在平台服务器根据第三验证码与信息提供服务器返回给平台服务器的第四验证码进行比较以确定验证通过后,接收平台服务器返回的注册成功的第二响应消息。由于信息提供服务器可以根据其第一解密密钥对第二手机号码进行解密,并协助平台服务器发送短信验证码,实现了对用户的二次验证。
本实施例中,平台服务器在拿到通过信息提供服务器的第一加密密钥加密后的第二手机号码后,由于没有相应的解密密钥,因此并不能对第二手机号码进行解密获取到真实的第一手机号码,因此即使第二手机号码在平台服务器上被窃取,在窃取者未获取到
信息提供服务器的第一解密密钥时窃取者会由于没有解密密钥不能对第二手机号码解密;同时,用户在信息提供服务器上注册的隐私数据通过平台服务器的第二加密密钥加密,因此信息提供服务器也不能对存储在平台服务器上的数据进行解密,由于窃取者同时攻破平台服务器和信息提供服务器的难度很高,因此本申请可以大大提高平台服务器和信息提供服务器的安全防护程度。
请参考图5,为根据又一示例性实施例一示出的获取电子文件的方法的流程图;本实施例可以应用在平台服务器上,在一实施例中,平台服务器可以为电商平台的服务,如图5所示,包括如下步骤:
步骤501,接收来自终端设备的用于获取电子文件的第一请求消息,第一请求消息中携带有提供电子文件的信息提供服务器的第一标识。
步骤502,根据第一请求消息向终端设备返回第一提示信息。
步骤503,在终端设备根据第一提示信息确定用于身份验证的第一验证信息后,接收来自终端设备的第一验证信息。
步骤504,根据第一标识确定信息提供服务器,将第一验证信息、终端设备的用户在信息提供服务器注册的用户标识发送至信息提供服务器。
步骤505,在信息提供服务器对第一验证信息验证通过并根据用户标识确定电子文件后,接收来自信息提供服务器的电子文件,将电子文件转发至终端设备,电子文件中的隐私信息经过信息提供服务器的第一加密密钥加密。
在上述步骤501中,关于第一请求消息以及电子文件的描述请参见上述步骤101的相关描述,在此不再详述。
在上述步骤502和步骤503中,第一验证信息以及第一原始验证信息的相关描述请参见上述步骤102和步骤103的相关描述,在此不再详述。
在上述步骤504中,在一实施例中,平台服务器可以作为中介平台为不同的终端设备与不同的信息提供服务器提供电子文件的转发和用户身份的认证,当平台服务器从第一请求消息中解析出第一标识后,根据第一标识确定相对应的信息提供服务器;通过将第一验证信息、终端设备的用户在信息提供服务器注册的用户标识发送至信息提供服务器,使信息提供服务器能够对第一验证信息进行验证,在验证通过后根据用户标识确定用户需要查看的电子文件。
在上述步骤505中,电子文件中的隐私信息的描述请参见上述步骤104的相关描述,在此不再详述。
本实施例中,平台服务器接收到来自终端设备的第一验证信息和第一请求消息之后,根据第一标识确定信息提供服务器,并将第一验证信息和用户标识发送至信息提供服务器,以供信息提供服务器确定用户标识相对应的电子文件,电子文件中的隐私信息通过信息提供服务器的第一加密密钥进行加密保护,由于平台服务器并没有信息提供服务器的第一解密密钥,因此即使电子文件在平台服务器侧被窃取,窃取者也无法通过电子文件得到用户的真实的隐私信息,平台服务器侧的管理员也无法通过电子文件获取到用户的真实的隐私信息,从而有效地保护用户的隐私信息不被平台服务器泄露,确保用户的隐私安全。
请参见图6,为根据又一示例性实施例二示出的获取电子文件的方法的流程图;本实施例以用户需要通过终端设备登录到平台服务器为例进行示例性说明,如图6所示,包括如下步骤:
步骤601,在用户未登录到平台服务器时,确定用户在平台服务器上的第一登录信息。
步骤602,通过终端设备的用户在平台服务器注册的第二手机号码指示信息提供服务器向终端设备发送第一验证码,第二手机号码由第一加密密钥对第一手机号码加密得到,第一手机号码为用户注册在信息提供服务器的手机号码。
步骤603,在信息提供服务器通过信息提供服务器的第一解密密钥对第二手机号码解密得到第一手机号码,通过第一手机号码向终端设备指示发送第一验证码后,接收来自终端设备的第一验证码以及接收来自信息提供服务器的第二验证码。
步骤604,对第一验证码和第二验证码进行验证,在验证通过后确定用户登录成功。
步骤605,向终端设备返回登录成功的第一响应消息。
在上述步骤601中,第一登录信息的描述可以参见上述步骤201的相关描述,在此不再详述。
在上述步骤602至步骤604中,信息提供服务器在向终端设备发送第一验证码时,可以向平台服务器发送第二验证码,因此平台服务器在对第一验证码进行验证时,可以比较第一验证码与第二验证码的内容是否相同,如果相同,则验证通过,确定用户登录成功。
本实施例中,在用户需要登录到平台服务器时,由于用户是通过加密后的第一登录信息登录到平台服务器,在平台服务器上的数据遭到泄露时,窃取者从平台服务器窃取到的第一登录信息是加密后的数据,因此其无法通过从平台服务器上得到的登录信息登
录到平台服务器,从而有效地避免了窃取者通过其在平台服务器上窃取的登录信息非法登录到平台服务器,确保用户登录信息的安全;通过比较第一验证码和第二验证码,实现对用户进行二次身份验证,从而提高了用户在登录平台服务器的过程中的安全性。
请参见图7,为根据又一示例性实施例三示出的获取电子文件的方法的流程图,本实施例以用户需要绑定用户在平台服务器的第一登录信息与用户在信息提供服务器上生成的用户标识为例进行示例性说明,如图7所示,包括如下步骤:
步骤701,在用户在平台服务器的第一登录信息和用户在信息提供服务器注册的用户标识未绑定时,接收来自终端设备的关联请求,关联请求中携带有第一标识。
步骤702,根据关联请求向终端设备返回第二提示信息。
步骤703,在终端设备根据第二提示信息确定用于身份验证的第二验证信息,接收来自终端设备根据第二提示信息返回的第二验证信息,第二验证信息经过第一加密密钥加密。
步骤704,将绑定请求和经过第一加密密钥的第二验证信息转发至信息提供服务器,以供信息提供服务器对经过第一加密密钥加密的第二验证信息进行解密,根据解密后的第二验证信息确定用户在信息提供服务器注册的用户标识。
步骤705,接收来自信息提供服务器返回的用户标识,建立第一登录信息和用户标识之间的绑定关系。
本实施例以平台服务器为EPP和信息提供服务器为HIS为例进行说明,终端设备通过第二手机号码登录到EPP,其中,第二手机号码为原始的第一手机号码通过HIS信息提供服务器的第一加密密钥加密得到的;EPP接收来自终端设备的关联请求,该关联请求中携带有HIS_ID,EPP接收到来自终端设备的第二验证信息后,向HIS发送第二手机号码、第二验证信息、EPP的第二加密密钥,请求HIS对第二验证信息进行验证;HIS对第二验证信息验证通过后,向EPP返回用户标识;EPP存储第二验证信息,并存储第二手机号和用户标识的关联关系。在一实施例中,HIS可以通过第一手机号码生成用户标识。
本实施例中,信息提供服务器通过对来自平台服务器的第二验证信息进行验证,协助平台服务器实现了二次身份认证;在平台服务器上,由于第二验证信息是由信息提供服务器的第一加密密钥对第二原始验证信息进行加密后生成的,因此平台服务器并不能获取到终端设备的用户的真实的验证信息,从而可以防止窃听者窃取终端设备的用户的验证信息,避免非法用户向平台服务器通过非法的关联请求绑定合法用户在平台服务器
的第一登录信息和用户在信息提供服务器的用户标识。
图8是根据又一示例性实施例四示出的获取电子文件的方法的流程图,本实施例以用户在平台服务器和信息提供服务器上注册为例进行示例性说明,如图8所示,包括如下步骤:
步骤801,接收来自终端设备的用于获取平台服务器的第二加密密钥的第二请求消息。
步骤802,根据第二请求消息向终端设备返回第二加密密钥。
步骤803,在用户在平台服务器上未注册时,通过来自终端设备的第二注册信息进行注册。
步骤804,根据第二注册信息向信息提供服务器获取第三验证码,指示信息提供服务器向第二手机号码对应的第一手机号码发送第四验证码。
步骤805,接收来自终端设备的第四验证码。
步骤806,对第三验证码和第四验证码进行验证。
步骤807,在平台服务器对第三验证码和第四验证验证通过后,向终端设备返回注册成功的第二响应消息。
本实施例中,平台服务器在拿到通过信息提供服务器的第一加密密钥加密后的第二手机号码后,由于没有相应的解密密钥,因此并不能对第二手机号码进行解密获取到真实的第一手机号码,因此即使第二手机号码在平台服务器上被窃取,在窃取者未获取到信息提供服务器的第一解密密钥时窃取者会由于没有解密密钥不能对第二手机号码解密;同时,用户在信息提供服务器上注册的隐私数据通过平台服务器的第二加密密钥加密,因此信息提供服务器也不能对存储在平台服务器上的数据进行解密,由于窃取者同时攻破平台服务器和信息提供服务器的难度很高,因此本申请可以大大提高平台服务器和信息提供服务器的安全防护程度。
请参见图9,为根据另一示例性实施例一示出的获取电子文件的方法的流程图;本实施例可以应用在信息提供服务器上,在一实施例中,信息提供服务器可以为医院系统的服务器,通过信息提供服务器可以为终端设备的用户提供电子处方,如图9所示,包括如下步骤:
步骤901,接收来自平台服务器的第一验证信息、终端设备的用户在信息提供服务器注册的用户标识。
步骤902,对第一验证信息进行验证,在验证通过后根据用户标识确定电子文件。
步骤903,将电子文件中的隐私信息通过信息提供服务器的第一加密密钥加密。
步骤904,将电子文件发送至平台服务器,以供平台服务器将电子文件转发至终端设备。
在上述步骤902中,信息提供服务器可以通过信息提供服务器的第一解密密钥对第一验证信息进行解密,通过平台服务器的第二加密密钥对解密后的第一验证信息进行加密,得到第一加密字符串;确定用户在信息提供服务器注册时生成的第二加密字符串,第二加密字符串由第一验证信息通过平台服务器的第二加密密钥加密生成;确定第一加密字符串和第二加密字符串是否相同,如果相同,则第一验证信息的验证通过。
本实施例中,信息提供服务器在对来自平台服务器的第一验证信息进行验证并且验证通过后,根据来自平台服务器的用户标识确定电子文件,通过第一加密密钥将电子文件的隐私信息进行加密,由于平台服务器并没有信息提供服务器的第一加密密钥,因此即使电子文件在平台服务器侧被窃取,窃取者也无法通过电子文件得到用户的真实的隐私信息,平台服务器侧的管理员也无法通过电子文件获取到用户的真实的隐私信息,从而有效地保护用户的隐私信息不被平台服务器泄露,确保用户的隐私安全。
请参见图10,为根据另一示例性实施例二示出的获取电子文件的方法的流程图,本实施例以用户需要通过终端设备登录到平台服务器为例进行示例性说明,如图10所示,包括如下步骤:
步骤1001,在用户未登录到平台服务器时,接收来自平台服务器用于指示信息提供服务器向用户在平台服务器注册的第二手机号码发送第一验证码的指示消息,其中,第二手机号码由第一加密密钥对第一手机号码加密得到,第一手机号码为用户注册在信息提供服务器的手机号码。
步骤1002,根据指示消息通过第一解密密钥对第二手机号码进行解密,得到第一手机号码。
步骤1003,通过第一手机号码向终端设备发送第一验证码以及向平台服务器返回第二验证码,以供平台服务器根据第一验证码和第二验证码对用户进行登录验证。
本实施例中,在用户需要登录到平台服务器时,信息提供服务器根据来自平台服务器的指示消息通过第一解密密钥对第二手机号码进行解密,得到第一手机号码,并通过第一手机号码向终端设备发送第一验证码以及向平台服务器返回第二验证码,从而协助平台服务器对用户进行二次身份验证,提高了用户在登录平台服务器的过程中的安全性。
请参见图11,为根据另一示例性实施例三示出的获取电子文件的方法的流程图,本
实施例以用户需要绑定用户在平台服务器的第一登录信息与用户在信息提供服务器上生成的用户标识为例进行示例性说明,如图11所示,包括如下步骤:
步骤1101,在用户在平台服务器的第一登录信息与用户标识未绑定时,接收来自平台服务器的第二验证信息和平台服务器的第二加密密钥,第二验证信息经过第一加密密钥加密。
步骤1102,通过信息提供服务器的第一解密密钥对第二验证信息进行解密,通过第二加密密钥对解密后的第二原始验证信息进行加密,得到第三加密字符串。
步骤1103,确定用户在信息提供服务器注册时生成的第四加密字符串,第四加密字符串由第二原始验证信息通过平台服务器的第二加密密钥加密生成。
步骤1104,确定第三加密字符串和第四加密字符串是否相同。
步骤1105,如果相同,向平台服务器返回终端设备的用户在信息提供服务器上注册的用户标识,以供平台服务器建立第一登录信息和用户标识的绑定关系。
作为一个示例性场景,信息提供服务器接收到的来自平台服务器的第二验证信息为字符串“AAAA&&&”和平台服务器的第二加密密钥“121212”,由于“AAAA&&&”经过第一加密密钥加密,因此信息提供服务器利用其第一解密密钥对“AAAA&&&”解密后,生成真实的验证信息“BBBB&&&”,通过第二加密秘钥“121212”对“BBBB&&&”进行加密,得到第三加密字符串“CCCC&&&”,确定用户在信息提供服务器注册时生成的第四加密字符串“DDDD&&&”,第四加密字符串由第二验证信息AAAA&&&通过平台服务器的第二加密密钥“121212”加密生成,由此可知,第三加密字符串“CCCC&&&”与第四加密字符串“DDDD&&&”应为内容相同的字符串,如果不相同,说明用户的关联请求非法或者非法用户请求关联。
本实施例中,信息提供服务器通过采用加密字符串的方式对来自平台服务器的第二验证信息进行验证,协助平台服务器实现了二次身份认证;在平台服务器上,由于第二验证信息是由信息提供服务器的第一加密密钥对第二原始验证信息进行加密后生成的,因此平台服务器并不能获取到终端设备的用户的真实的验证信息,而第四加密字符串由第二验证信息通过平台服务器的第二加密密钥加密生成,因此信息提供服务器侧只有在对用户进行验证时才能够得到真实的验证信息,从而可以防止窃听者窃取终端设备的用户在平台服务器和信息提供服务器上的验证信息,避免非法用户向平台服务器通过非法的关联请求绑定合法用户在平台服务器的第一登录信息和用户在信息提供服务器的用户标识。
请参见图12,为根据另一示例性实施例四示出的获取电子文件的方法的流程图,本实施例以用户在平台服务器和信息提供服务器上注册为例进行示例性说明,如图12所示,包括如下步骤:
步骤1201,在用户在信息提供服务器上未注册时,通过来自终端设备的第一注册信息进行注册。
步骤1202,在用户通过第一手机号码登录到信息提供服务器后,将第一手机号码通过第一加密密钥进行加密,得到第二手机号码。
步骤1203,将第二手机号码发送至终端设备,以供终端设备通过第二手机号码在平台服务器上注册。
步骤1204,根据第一手机号码生成用户标识。
步骤1205,接收来自平台服务器的第二手机号码。
步骤1206,通过第一解密密钥对第二手机号码进行解密,得到第一手机号码;
步骤1207,通过第一手机号码向终端设备返回第三验证码,第三验证码为平台服务器根据第二注册信息请求信息提供服务器发送给终端设备的;
步骤1208,向平台服务器返回第四验证码,以供平台服务器对第三验证码和第四验证码进行比较以确定验证是否通过。
本实施例中,平台服务器在拿到通过信息提供服务器的第一加密密钥加密后的第二手机号码后,由于没有相应的解密密钥,因此并不能对第二手机号码进行解密获取到真实的第一手机号码,因此即使第二手机号码在平台服务器上被窃取,在窃取者未获取到信息提供服务器的第一解密密钥时窃取者会由于没有解密密钥不能对第二手机号码解密;同时,用户在信息提供服务器上注册的隐私数据通过平台服务器的第二加密密钥加密,因此信息提供服务器也不能对存储在平台服务器上的数据进行解密,由于窃取者同时攻破平台服务器和信息提供服务器的难度很高,因此本申请可以大大提高平台服务器和信息提供服务器的安全防护程度。
请参见图13,为根据一示例性实施例示出的获取电子文件的方法的场景图之一,本实施例以电子文件为电子处方、平台服务器为EPP以及信息提供服务器为HIS为例,描述用户如何从HIS获取到电子处方的,其中,HIS和EPP均采用非对称加密算法,相应地,HIS侧的公钥为第一加密密钥,私钥为第一解密密钥,EPP侧的公钥为第二加密密钥,私钥为第二解密密钥;如图13所示,包括如下步骤:
步骤1301,患者通过终端设备使用经过HIS的公钥加密后的登录名、登录密码登录
EPP,其中,登录的方式可以通过图案方式登录,也可以通过输入登录名、密码登录的方式登录。
步骤1302,EPP向终端设备返回登录成功的第一响应消息。
步骤1303,终端设备向EPP发送获取电子处方的第一请求消息,请求查看患者在指定医院的电子处方,该第一请求消息中携带医院标识HIS_ID(也可称为第一标识)。
步骤1304,EPP根据第一请求消息向终端设备返回第一提示消息,提示用户输入第一验证信息。
步骤1305,终端设备根据第一提示信息确定用户在终端设备输入的第一原始验证信息以及确定信息提供服务器的第一加密密钥,根据第一加密密钥对第一原始验证信息进行加密,得到用于身份验证的第一验证信息。
步骤1306,向EPP发送第一验证信息。
步骤1307,EPP通过患者的登录名查找到患者在指定医院的用户标识(PatientID),将该用户标识、第二手机号码、第一验证信息,EPP的第二加密密钥发送至HIS。
步骤1308,HIS通过其第一解密密钥对第二手机号码进行解密,得到第一手机号码,通过第一手机号查找患者在HIS的用户标识。
步骤1309,HIS通过HIS的第一解密密钥对第一验证信息进行解密,通过EPP的第二加密密钥对解密后的第一验证信息进行加密,得到第一加密字符串。
步骤1310,HIS确定患者在HIS注册时生成的第二加密字符串,第二加密字符串由第一验证信息通过EPP的第二加密密钥加密生成,比较第一加密字符串和第二加密字符串是否相同,如果相同,则第一验证信息的验证通过。
步骤1311,HIS确定电子处方,通过第一加密密钥对电子处方中的隐私信息进行加密,将加密后的电子处方发送至EPP。
步骤1312,EPP向终端设备返回电子处方。
本实施例中,由于患者需要查看的电子处方是患者的诊治记录、药方、服药说明等,因此通过HIS的第一加密密钥对电子处方中的隐私信息进行去隐私保护并不会影响患者的用户体验。由于HIS仅对电子处方中的隐私信息通过第一加密密钥加密,而对非隐私信息不用加密,因此可以降低HIS侧的计算复杂度。
请参见图14,为根据一示例性实施例示出的获取电子文件的方法的场景图之二,本实施例以电子文件为电子处方、平台服务器为EPP以及信息提供服务器为HIS为例,描述用户如何通过第二手机号码登录到EPP的;如图14所示,包括如下步骤:
步骤1401,患者通过终端设备向EPP发起登录请求时,终端设备将用户的真实的第一手机号码通过HIS的第一加密密钥进行加密,得到第二手机号码,通过第二手机号码进行登录。
步骤1402,EPP向HIS基于第二手机号码,向HIS请求向终端设备发送第一验证码。
步骤1403,HIS基于第二手机号码通过其对应的第一解密密钥对第二手机号码解密,得到第一手机号,通过第一手机号码向终端设备发送第一验证码。
步骤1404,HIS向EPP返回第二验证码。
步骤1405,EPP接收来自终端设备的第一验证码。
步骤1406,EPP比较第一验证码和第二验证码,在确定二者相同时,确定患者登录成功,向终端设备返回登录成功的第一响应消息。
本实施例中,在用户需要登录到EPP时,通过第一加密密钥对用户的真实登录信息进行加密,并通过加密后的第一登录信息登录到平台服务器,在平台服务器上的数据遭到泄露时,窃取者从平台服务器窃取到的第一登录信息是加密后的数据,因此其无法通过从平台服务器上得到的登录信息登录到平台服务器,从而有效地避免了窃取者通过其在平台服务器上窃取的登录信息非法登录到平台服务器,确保用户登录信息的安全。HIS通过其第一解密秘钥对第二手机号码解密得到第一手机号码,并分别向终端设备和EPP发送第一验证码和第二验证码,从而协助EPP完成了二次身份验证。
请参见图15,为根据一示例性实施例示出的获取电子文件的方法的场景图之三,本实施例以电子文件为电子处方、平台服务器为EPP以及信息提供服务器为HIS为例,描述如何对用户在EPP的第一登录信息中的登录名与用户在HIS的用户标识进行绑定的;如图15所示,包括如下步骤:
步骤1501,终端应用使用第二手机号(即对原始的第一手机号通过HIS的第一解密密钥加密得到的)、登录密码登录EPP。
步骤1502,EPP向终端设备返回登录成功的第一响应消息。
步骤1503,终端设备向EPP发送关联请求,该关联请求中携带有医院标识。
步骤1504,EPP向终端设备返回第二提示信息,以提示用户通过终端设备输入第二原始验证信息。
步骤1505,用户根据第二提示信息输入第二原始验证信息(例如,身份证号),并通过HIS的第一加密密钥对第二原始验证信息进行加密,生成的第二验证信息。
步骤1506,终端设备向EPP发送第二验证信息。
步骤1507,EPP将第二手机号、第二验证信息、EPP的第二加密密钥以及EPP所采用的加密算法的名称发送给HIS,请求HIS对第二验证信息进行验证。
步骤1508,HIS通过其第一解密密钥采用相应的加密算法对第二手机号码解密,得到第一手机号码,根据第一手机号码查找用户标识,通过信息提供服务器的第一解密密钥对第二验证信息进行解密,得到第二原始验证信息,通过第二加密密钥对第二原始验证信息进行加密,得到第三加密字符串。
步骤1509,确定用户在信息提供服务器注册时生成的第四加密字符串,第四加密字符串由第二原始验证信息通过平台服务器的第二加密密钥加密生成。
步骤1510,HIS比较第三加密字符串和第四加密字符串是否相同,进行验证。
步骤1511,如果相同,HIS验证通过,向EPP返回用户标识。
步骤1512,EPP存储第二验证信息,并存储第二手机号和用户标识的关联关系。
在本实施例所述的流程中,HIS通过得到来自EPP的第二验证信息,通过HIS的第一解密密钥得到第一加密密钥加密后的第二原始验证信息,通过EPP的第二加密密钥对第二原始验证信息加密得到第三加密字符串,从而实现了身份认证的目的。在将第一登录信息与用户标识进行绑定的过程中,除了用于索引的第一手机号码和用于验证的第二验证信息之外,HIS侧的其它数据均为机密的,而EPP平台侧的用户的登录信息也是机密的,从而达到了隐私保护的目的。
请参见图16,为根据一示例性实施例示出的获取电子文件的方法的场景图之四,本实施例以电子文件为电子处方、平台服务器为EPP以及信息提供服务器为HIS为例,描述用户如何在EPP和HIS侧注册的;如图16所示,包括如下步骤:
步骤1601,患者通过终端设备向EPP请求EPP的第二加密密钥。
步骤1602,EPP向终端设备返回EPP的第二加密密钥,并向终端设备发送数字签名。
步骤1603,终端设备使用第一手机号码(即原始的手机号)在HIS注册,使用EPP的第二加密密钥,对需要注册的信息通过第二加密密钥进行加密。其中,需要在HIS注册的信息包括:姓名、病历卡号、身份证号、手机号码家庭住址、药物过敏记录、过往病史等。
步骤1604,HIS保存第一手机号,生成患者标识(PatientID),并保存基于EPP的第二加密密钥加密后的验证信息(例如,身份证号等)。
步骤1605,HIS向终端设备返回注册成功的第二响应消息,并向终端设备返回HIS的第一加密密钥,以及使用HIS的第一加密密钥对第一手机号码加密后生成的第二手机
号码。
步骤1606,终端设备使用第二手机号码向EPP注册。
步骤1607,EPP将第二手机号码发送到HIS,请求HIS向终端设备发送短信验证码。
步骤1608,HIS通过HIS的第一加密密钥对第二手机号号码进行解密,得到第一手机号码。
步骤1609,HIS向EPP返回第三验证码。
步骤1610,HIS基于第一手机号码向终端设备返回第四验证码。
步骤1611,终端设备向EPP上报第四验证码。
步骤1612,EPP比较终端设备上报的第四验证码和HIS返回的第三验证码,如果一致,则验证通过,并存储第二手机号。
步骤1613,EPP向终端设备返回注册成功的第二响应消息。
步骤1614,终端设备可以通过第二手机号码设置登录到EPP的登录密码。
步骤1615,EPP向终端设备平台返回设置成功的响应。
在本实施例的流程中,EPP在拿到通过HIS的第一加密密钥加密后的第二手机号码后,由于没有相应的解密密钥,因此并不能对第二手机号码进行解密获取到真实的第一手机号码,因此即使第二手机号码在平台服务器上被窃取,在窃取者未获取到HIS的第一解密密钥时窃取者会由于没有解密密钥不能对第二手机号码解密;同时,用户在HIS上注册的隐私数据通过EPP的第二加密密钥加密,因此HIS也不能对存储在EPP上的数据进行解密,由于窃取者同时攻破EPP和HIS的难度很高,因此本申请可以大大提高EPP和HIS的安全防护程度。此外,HIS可以根据自己的第一解密密钥解密得到第一手机号号,从而可以协助EPP发送短信验证码,完成二次验证。
对应于上述的获取电子文件的方法,本申请还提出了图17所示的根据本申请的一示例性实施例的终端设备的示意结构图。请参考图17,在硬件层面,该服务器包括处理器、内部总线、网络接口、内存以及非易失性存储器,当然还可能包括其他业务所需要的硬件。处理器从非易失性存储器中读取对应的计算机程序到内存中然后运行,在逻辑层面上形成获取电子文件的装置。当然,除了软件实现方式之外,本申请并不排除其他实现方式,比如逻辑器件抑或软硬件结合的方式等等,也就是说以下处理流程的执行主体并不限定于各个逻辑单元,也可以是硬件或逻辑器件。
对应于上述的获取电子文件的方法,本申请还提出了图18所示的根据本申请的一示例性实施例的平台服务器的示意结构图。请参考图18,在硬件层面,该服务器包括处理
器、内部总线、网络接口、内存以及非易失性存储器,当然还可能包括其他业务所需要的硬件。处理器从非易失性存储器中读取对应的计算机程序到内存中然后运行,在逻辑层面上形成获取电子文件的装置。当然,除了软件实现方式之外,本申请并不排除其他实现方式,比如逻辑器件抑或软硬件结合的方式等等,也就是说以下处理流程的执行主体并不限定于各个逻辑单元,也可以是硬件或逻辑器件。
对应于上述的获取电子文件的方法,本申请还提出了图19所示的根据本申请的一示例性实施例的信息提供服务器的示意结构图。请参考图19,在硬件层面,该服务器包括处理器、内部总线、网络接口、内存以及非易失性存储器,当然还可能包括其他业务所需要的硬件。处理器从非易失性存储器中读取对应的计算机程序到内存中然后运行,在逻辑层面上形成获取电子文件的装置。当然,除了软件实现方式之外,本申请并不排除其他实现方式,比如逻辑器件抑或软硬件结合的方式等等,也就是说以下处理流程的执行主体并不限定于各个逻辑单元,也可以是硬件或逻辑器件。
请参考图20,为根据一示例性实施例一示出的获取电子文件的装置的结构示意图;在软件实施方式中,该获取电子文件的装置可以包括:第一发送模块2001、第一接收模块2202、第一确定模块2203、第二接收模块2204;其中:
第一发送模块2001,用于向平台服务器发送用于获取电子文件的第一请求消息,第一请求消息中携带有提供电子文件的信息提供服务器的第一标识;
第一接收模块2002,用于接收来自平台服务器根据第一发送模块2001发送的第一请求消息返回的第一提示信息;
第一确定模块2003,用于根据第一接收模块2002接收到的第一提示信息确定用于身份验证的第一验证信息,向平台服务器发送第一验证信息;
第二接收模块2004,用于在平台服务器根据第一标识确定信息提供服务器,以及根据终端设备的用户在平台服务器的第一登录信息确定用户在信息提供服务器注册的用户标识,并将第一确定模块2003确定的第一验证信息、用户标识发送至信息提供服务器后,接收平台服务器转发的来自信息提供服务器的电子文件,电子文件中的隐私信息经过信息提供服务器的第一加密密钥加密。
请参见图21,为根据一示例性实施例二示出的获取电子文件的装置的结构示意图,在上述图20所示实施例的基础上,第一确定模块2003可包括:
第一确定单元20031,用于根据第一提示信息确定用户在终端设备输入的第一原始
验证信息以及确定信息提供服务器的第一加密密钥;
第一加密单元20032,用于根据第一确定单元20031确定的第一加密密钥对第一原始验证信息进行加密,得到用于身份验证的第一验证信息。
在一实施例中,装置还可包括:
第二确定模块2005,用于在用户未登录到平台服务器时,确定用户的第一登录信息,通过第一登录信息登录平台服务器;
第三接收模块2006,用于在第二确定模块2005确定用户登录成功后,接收平台服务器返回的登录成功的第一响应消息。
在一实施例中,装置还可包括:
第四接收模块2007,用于通过第一手机号码接收来自信息提供服务器的第一验证码,第一验证码为平台服务器根据第二手机号码指示信息提供服务器发送第一手机号码的,第二手机号码由第一加密密钥对第一手机号码加密得到;
第二发送模块2008,用于将第四接收模块2007接收到的第一验证码通过第二手机号码发送给平台服务器;
第三确定模块2009,用于在平台服务器对第二发送模块2008发送的第一验证码与来自信息提供服务器的第二验证码进行验证后,确定用户登录成功,第三接收模块2006执行接收平台服务器返回的登录成功的第一响应消息的步骤。
在一实施例中,装置还可包括:
第三发送模块2010,用于在用户在平台服务器的第一登录信息与用户标识未绑定时,向平台服务器发送关联请求,关联请求中携带有信息提供服务器的第一标识;
第五接收模块2011,用于接收来自平台服务器根据第三发送模块2010发送的关联请求返回的第二提示信息;
第四确定模块2012,用于根据第五接收模块2011接收到的第二提示信息确定用户在终端设备输入的第二原始验证信息;
第一加密模块2013,用于根据第一加密密钥对第四确定模块2012确定的第二原始验证信息进行加密,得到用于身份验证的第二验证信息;
第四发送模块2014,用于向平台服务器发送第一加密模块2013加密的第二验证信息,平台服务器将绑定请求和第二验证信息转发至信息提供服务器,以供信息提供服务器根据与第一加密密钥对应的第一解密密钥对经过第二验证信息进行解密,根据解密后的第二验证信息确定用户在信息提供服务器的用户标识,将用户标识返回平台服务器后,
以供平台服务器建立第一登录信息和用户标识之间的绑定关系。
在一实施例中,装置还可包括:
第二加密模块2015,用于在用户在平台服务器和信息提供服务器上未注册时,通过平台服务器的第二加密密钥对终端设备的用户需要在信息提供服务器注册的第一注册信息进行加密;
第五发送模块2016,用于在用户通过第一手机号码登录到信息提供服务器后,将通过第一加密密钥加密后的第一注册信息发送至信息提供服务器;
第六接收模块2017,用于在信息提供服务器根据第一手机号码生成用户标识后,接收来自信息提供服务器的第一加密密钥、注册成功的第一响应消息以及第二手机号码,第二手机号码由第一加密密钥对第一手机号码加密生成;
第一注册模块2018,用于通过第二手机号码向平台服务器注册;
第七接收模块2019,用于在平台服务器对第二手机号码注册后,接收平台服务器返回的注册成功的第二响应消息。
在一实施例中,装置还包括:
第六发送模块2020,用于向平台服务器发送用于获取平台服务器的第二加密密钥的第二请求消息;
第八接收模块2021,用于接收平台服务器根据第六发送模块39发送的第二请求消息返回的第二加密密钥。
在一实施例中,第一注册模块2018可包括:
第一发送单元20181,用于向平台服务器发送第二手机号码;
第一接收单元20182,用于接收来自信息提供服务器返回的第三验证码,第三验证码为平台服务器根据第一发送单元发送的第二手机号码请求信息提供服务器发送给终端设备的;
第二发送单元20183,用于向平台服务器发送第一接收单元20182接收到的第三验证码;
在平台服务器根据第三验证码与信息提供服务器返回给平台服务器的第四验证码进行比较以确定验证通过后,第七接收模块2019执行接收平台服务器返回的注册成功的第二响应消息的步骤。
图22是根据又一示例性实施例一示出的获取电子文件的装置的结构示意图;在软件实施方式中,该获取电子文件的装置可以包括:第九接收模块2201、第七发送模块2202、
第八发送模块2203、第九发送模块2204、第一转发模块2205;其中:
第九接收模块2201,用于接收来自终端设备的用于获取电子文件的第一请求消息,第一请求消息中携带有提供电子文件的信息提供服务器的第一标识;
第七发送模块2202,用于根据第九接收模块2201接收到的第一请求消息向终端设备返回第一提示信息;
第八发送模块2203,用于在终端设备根据第七发送模块2202发送的第一提示信息确定用于身份验证的第一验证信息后,接收来自终端设备的第一验证信息;
第九发送模块2204,用于根据第九接收模块2201接收到的第一标识确定信息提供服务器,将第八发送模块2203接收到的第一验证信息、终端设备的用户在信息提供服务器注册的用户标识发送至信息提供服务器;
第一转发模块2205,用于在信息提供服务器对第九发送模块2204发送的第一验证信息验证通过并根据用户标识确定电子文件后,接收来自信息提供服务器的电子文件,将电子文件转发至终端设备,电子文件中的隐私信息经过信息提供服务器的第一加密密钥加密。
图23是根据又一示例性实施例二示出的获取电子文件的装置的结构示意图;在上述图22所示实施例的基础上,第一验证信息为用户在终端设备输入的原始验证信息通过第一加密密钥加密生成的。
在一实施例中,装置还可包括:
第五确定模块2206,用于在用户未登录到平台服务器时,确定用户在平台服务器上的第一登录信息;
第十发送模块2207,用于在第五确定模块2206确定用户登录成功后,向终端设备返回登录成功的第一响应消息。
在一实施例中,装置还可包括:
第十一发送模块2208,用于通过终端设备的用户在平台服务器注册的第二手机号码指示信息提供服务器向终端设备发送第一验证码,第二手机号码由第一加密密钥对第一手机号码加密得到,第一手机号码为用户注册在信息提供服务器的手机号码;
第十接收模块2209,用于在信息提供服务器通过信息提供服务器的第一解密密钥对第二手机号码解密得到第一手机号码,通过第一手机号码向终端设备指示发送第一验证码后,接收来自终端设备的第一验证码以及接收来自信息提供服务器的第二验证码;
第一验证模块2210,用于对第一验证码和第二验证码进行验证,在验证通过后确定
用户登录成功,第十发送模块2209执行向终端设备返回登录成功的第一响应消息的步骤。
在一实施例中,装置还可包括:
第十一接收模块2211,用于在用户在平台服务器的第一登录信息和用户在信息提供服务器注册的用户标识未绑定时,接收来自终端设备的关联请求,关联请求中携带有第一标识;
第十二发送模块2212,用于根据关联请求向终端设备返回第二提示信息;
第十二接收模块2213,用于在终端设备根据第二提示信息确定用于身份验证的第二验证信息,接收来自终端设备根据第二提示信息返回的第二验证信息,第二验证信息经过第一加密密钥加密;
第二转发模块2214,用于将绑定请求和经过第一加密密钥的第二验证信息转发至信息提供服务器,以供信息提供服务器对经过第一加密密钥加密的第二验证信息进行解密,根据解密后的第二验证信息确定用户在信息提供服务器注册的用户标识;
第十三接收模块2215,用于接收来自信息提供服务器返回的用户标识,建立第一登录信息和用户标识之间的绑定关系。
在一实施例中,装置还可包括:
第二注册模块2216,用于在用户在平台服务器上未注册时,通过来自终端设备的第二注册信息进行注册;
第一获取模块2217,用于根据第二注册模块2216注册的第二注册信息向信息提供服务器获取第三验证码,指示信息提供服务器向第二手机号码对应的第一手机号码发送第四验证码;
第十四接收模块2218,用于接收来自终端设备的第四验证码;
第二验证模块2219,用于对第三验证码和第四验证码进行验证;
第十三发送模块2220,用于在第二验证模块2219对第三验证码和第四验证验证通过后,向终端设备返回注册成功的第二响应消息。
在一实施例中,装置还可包括:
第十五接收模块2221,用于接收来自终端设备的用于获取平台服务器的第二加密密钥的第二请求消息;
第十四发送模块2222,用于根据第十五接收模块2221接收到的第二请求消息向终端设备返回第二加密密钥。
图24是根据另一示例性实施例一示出的获取电子文件的装置的结构示意图;在软件实施方式中,该获取电子文件的装置可以包括:第十六接收模块2401、第三验证模块2402、第三加密模块2403、第十五发送模块2404;其中:
第十六接收模块2401,用于接收来自平台服务器的第一验证信息、终端设备的用户在信息提供服务器注册的用户标识;
第三验证模块2402,用于对第十六接收模块2401接收到的第一验证信息进行验证,在验证通过后根据用户标识确定电子文件;
第三加密模块2403,用于将第三验证模块2402确定的电子文件中的隐私信息通过信息提供服务器的第一加密密钥加密;
第十五发送模块2404,用于将第三加密模块2403加密后的电子文件发送至平台服务器,以供平台服务器将电子文件转发至终端设备。
图25是根据另一示例性实施例二示出的获取电子文件的装置的结构示意图,在上述图24所示实施例的基础上,第三验证模块2402包括:
第一解密单元24021,用于通过信息提供服务器的第一解密密钥对第一验证信息进行解密;
第一加密单元24022,用于通过平台服务器的第二加密密钥对第一解密单元解密后的第一验证信息进行加密,得到第一加密字符串;
第一确定单元24023,用于确定用户在信息提供服务器注册时生成的第二加密字符串,第二加密字符串由第一验证信息通过平台服务器的第二加密密钥加密生成;
第二确定单元24024,用于确定第一加密单元24022得到的第一加密字符串和第一确定单元24023确定的第二加密字符串是否相同,如果相同,则第一验证信息的验证通过。
在一实施例中,装置还可包括:
第十七接收模块2405,用于在用户未登录到平台服务器时,接收来自平台服务器用于指示信息提供服务器向用户在平台服务器注册的第二手机号码发送第一验证码的指示消息,其中,第二手机号码由第一加密密钥对第一手机号码加密得到,第一手机号码为用户注册在信息提供服务器的手机号码;
第一解密模块2406,用于根据第十七接收模块2405接收到的指示消息通过第一解密密钥对第二手机号码进行解密,得到第一手机号码;
第十六发送模块2407,用于通过第一手机号码向终端设备发送第一验证码以及向平
台服务器返回第二验证码,以供平台服务器根据第一验证码和第二验证码对用户进行登录验证。
在一实施例中,装置还可包括:
第十八接收模块2408,用于在用户在平台服务器的第一登录信息与用户标识未绑定时,接收来自平台服务器的第二验证信息和平台服务器的第二加密密钥,第二验证信息经过第一加密密钥加密;
第二解密模块2409,用于通过信息提供服务器的第一解密密钥对第二验证信息进行解密,通过第二加密密钥对解密后的第二原始验证信息进行加密,得到第三加密字符串;
第六确定模块2410,用于确定用户在信息提供服务器注册时生成的第四加密字符串,第四加密字符串由第二原始验证信息通过平台服务器的第二加密密钥加密生成;
第七确定模块2411,用于确定第三加密字符串和第四加密字符串是否相同;
第十七发送模块2412,用于如果第七确定模块2411确定相同,向平台服务器返回终端设备的用户在信息提供服务器上注册的用户标识,以供平台服务器建立第一登录信息和用户标识的绑定关系。
在一实施例中,装置还可包括:
第三注册模块2413,用于在用户在信息提供服务器上未注册时,通过来自终端设备的第一注册信息进行注册;
第四加密模块2414,用于在用户通过第一手机号码登录到信息提供服务器后,将第一手机号码通过第一加密密钥进行加密,得到第二手机号码;
第十八发送模块2415,用于将第二手机号码发送至终端设备,以供终端设备通过第二手机号码在平台服务器上注册;
标识生成模块2416,用于根据第一手机号码生成用户标识。
在一实施例中,装置还可包括:
第十九接收模块2417,用于接收来自平台服务器的第二手机号码;
第三解密模块2418,用于通过第一解密密钥对第二手机号码进行解密,得到第一手机号码;
第十九发送模块2419,用于通过第一手机号码向终端设备返回第三验证码,第三验证码为平台服务器根据第二注册信息请求信息提供服务器发送给终端设备的;
第二十发送模块2420,用于向平台服务器返回第四验证码,以供平台服务器对第三验证码和第四验证码进行比较以确定验证是否通过。
由上述实施例可见,用户需要在信息提供服务器注册时,使用平台服务器的第二加密密钥对用户的相关信息进行加密;而在平台服务器注册时,使用信息提供服务器的第一加密密钥对用户的相关信息(包括电子文件中的隐私信息)进行加密;在进行关联请求、查看电子文件时,平台服务器均需要将加密后的信息发给信息提供服务器进行解密之后再进行验证,或者是信息提供服务器对信息进行解密后发回平台服务器进行验证,在信息提供服务器上的隐私数据遭到泄露时,可以使窃取者无法得到原始数据;同样,即使平台服务器上的数据遭到泄露,窃取者也无法得到原始数据。此外,平台服务器还可以在信息提供服务器的协助下,完成身份认证,既有效地保护了用户的隐私信息,又实现了身份认证。
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本申请的其它实施方案。本申请旨在涵盖本申请的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本申请的一般性原理并包括本申请未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本申请的真正范围和精神由下面的权利要求指出。
还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、商品或者设备中还存在另外的相同要素。
以上所述仅为本申请的较佳实施例而已,并不用以限制本申请,凡在本申请的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本申请保护的范围之内。
Claims (42)
- 一种获取电子文件的方法,应用在终端设备上,其特征在于,所述方法包括:向平台服务器发送用于获取电子文件的第一请求消息,所述第一请求消息中携带有提供所述电子文件的信息提供服务器的第一标识;接收来自所述平台服务器根据所述第一请求消息返回的第一提示信息;根据所述第一提示信息确定用于身份验证的第一验证信息,向所述平台服务器发送所述第一验证信息;在所述平台服务器根据所述第一标识确定所述信息提供服务器,以及根据所述终端设备的用户在所述平台服务器的第一登录信息确定所述用户在所述信息提供服务器注册的用户标识,并将所述第一验证信息、所述用户标识发送至所述信息提供服务器后,接收所述平台服务器转发的来自所述信息提供服务器的所述电子文件,所述电子文件中的隐私信息经过所述信息提供服务器的第一加密密钥加密。
- 根据权利要求1所述的方法,其特征在于,所述根据所述第一提示信息确定用于身份验证的第一验证信息的步骤,包括:根据所述第一提示信息确定所述用户在所述终端设备输入的第一原始验证信息以及确定所述信息提供服务器的所述第一加密密钥;根据所述第一加密密钥对所述第一原始验证信息进行加密,得到用于身份验证的第一验证信息。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:在所述用户未登录到所述平台服务器时,确定所述用户的第一登录信息,通过所述第一登录信息登录所述平台服务器;在所述用户登录成功后,接收所述平台服务器返回的登录成功的第一响应消息。
- 根据权利要求3所述的方法,其特征在于,所述方法还包括:通过第一手机号码接收来自所述信息提供服务器的第一验证码,所述第一验证码为所述平台服务器根据第二手机号码指示所述信息提供服务器发送所述第一手机号码的,所述第二手机号码由所述第一加密密钥对所述第一手机号码加密得到;将所述第一验证码通过第二手机号码发送给所述平台服务器;在所述平台服务器对所述第一验证码与来自所述信息提供服务器的第二验证码进行验证后,确定所述用户登录成功,执行所述接收所述平台服务器返回的登录成功的第一响应消息的步骤。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:在所述用户在所述平台服务器的第一登录信息与所述用户标识未绑定时,向所述平台服务器发送关联请求,所述关联请求中携带有所述信息提供服务器的第一标识;接收来自所述平台服务器根据所述关联请求返回的第二提示信息;根据所述第二提示信息确定所述用户在所述终端设备输入的第二原始验证信息;根据所述第一加密密钥对所述第二原始验证信息进行加密,得到用于身份验证的第二验证信息,向所述平台服务器发送所述第二验证信息,所述平台服务器将所述绑定请求和所述第二验证信息转发至所述信息提供服务器,以供所述信息提供服务器根据与所述第一加密密钥对应的第一解密密钥对经过所述第二验证信息进行解密,根据解密后的所述第二验证信息确定所述用户在所述信息提供服务器的用户标识,将所述用户标识返回所述平台服务器后,以供所述平台服务器建立所述第一登录信息和所述用户标识之间的绑定关系。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:在所述用户在所述平台服务器和所述信息提供服务器上未注册时,通过所述平台服务器的第二加密密钥对所述终端设备的用户需要在所述信息提供服务器注册的第一注册信息进行加密;在所述用户通过第一手机号码登录到所述信息提供服务器后,将通过所述第一加密密钥加密后的所述第一注册信息发送至所述信息提供服务器;在所述信息提供服务器根据所述第一手机号码生成用户标识后,接收来自所述信息提供服务器的所述第一加密密钥、注册成功的第一响应消息以及所述第二手机号码,所述第二手机号码由所述第一加密密钥对所述第一手机号码加密生成;通过所述第二手机号码向所述平台服务器注册;在所述平台服务器对所述第二手机号码注册后,接收所述平台服务器返回的注册成功的第二响应消息。
- 根据权利要求6所述的方法,其特征在于,所述方法还包括:向所述平台服务器发送用于获取所述平台服务器的第二加密密钥的第二请求消息;接收所述平台服务器根据所述第二请求消息返回的第二加密密钥。
- 根据权利要求6所述的方法,其特征在于,所述通过所述第二手机号码向所述平台服务器注册的步骤,包括:向所述平台服务器发送所述第二手机号码;接收来自所述信息提供服务器返回的第三验证码,所述第三验证码为所述平台服务器根据所述第二手机号码请求所述信息提供服务器发送给所述终端设备的;向所述平台服务器发送所述第三验证码;在所述平台服务器根据所述第三验证码与所述信息提供服务器返回给所述平台服务器的第四验证码进行比较以确定验证通过后,执行所述接收所述平台服务器返回的注册成功的第二响应消息的步骤。
- 一种获取电子文件的方法,应用在平台服务器上,其特征在于,所述方法包括:接收来自终端设备的用于获取电子文件的第一请求消息,所述第一请求消息中携带有提供所述电子文件的信息提供服务器的第一标识;根据所述第一请求消息向所述终端设备返回第一提示信息;在所述终端设备根据所述第一提示信息确定用于身份验证的第一验证信息后,接收来自所述终端设备的第一验证信息;根据所述第一标识确定所述信息提供服务器,将所述第一验证信息、所述终端设备的用户在所述信息提供服务器注册的用户标识发送至所述信息提供服务器;在所述信息提供服务器对所述第一验证信息验证通过并根据所述用户标识确定所述电子文件后,接收来自所述信息提供服务器的所述电子文件,将所述电子文件转发至所述终端设备,所述电子文件中的隐私信息经过所述信息提供服务器的第一加密密钥加密。
- 根据权利要求9所述的方法,其特征在于,所述第一验证信息为所述用户在所述终端设备输入的原始验证信息通过所述第一加密密钥加密生成的。
- 根据权利要求9所述的方法,其特征在于,所述方法还包括:在所述用户未登录到所述平台服务器时,确定所述用户在所述平台服务器上的第一登录信息;在所述用户登录成功后,向所述终端设备返回登录成功的第一响应消息。
- 根据权利要求11所述的方法,其特征在于,所述方法还包括:通过所述终端设备的用户在所述平台服务器注册的第二手机号码指示所述信息提供服务器向所述终端设备发送第一验证码,所述第二手机号码由所述第一加密密钥对第一手机号码加密得到,所述第一手机号码为所述用户注册在所述信息提供服务器的手机号码;在所述信息提供服务器通过所述信息提供服务器的第一解密密钥对所述第二手机 号码解密得到所述第一手机号码,通过所述第一手机号码向所述终端设备指示发送第一验证码后,接收来自所述终端设备的所述第一验证码以及接收来自所述信息提供服务器的第二验证码;对所述第一验证码和所述第二验证码进行验证,在验证通过后确定所述用户登录成功,执行所述向所述终端设备返回登录成功的第一响应消息的步骤。
- 根据权利要求9所述的方法,其特征在于,所述方法还包括:在所述用户在所述平台服务器的第一登录信息和所述用户在所述信息提供服务器注册的用户标识未绑定时,接收来自所述终端设备的关联请求,所述关联请求中携带有所述第一标识;根据所述关联请求向所述终端设备返回第二提示信息;在所述终端设备根据所述第二提示信息确定用于身份验证的第二验证信息,接收来自所述终端设备根据所述第二提示信息返回的所述第二验证信息,所述第二验证信息经过所述第一加密密钥加密;将所述绑定请求和经过所述第一加密密钥的所述第二验证信息转发至所述信息提供服务器,以供所述信息提供服务器对经过所述第一加密密钥加密的所述第二验证信息进行解密,根据解密后的所述第二验证信息确定所述用户在所述信息提供服务器注册的用户标识;接收来自所述信息提供服务器返回的所述用户标识,建立所述第一登录信息和所述用户标识之间的绑定关系。
- 根据权利要求9所述的方法,其特征在于,所述方法还包括:在所述用户在所述平台服务器上未注册时,通过来自所述终端设备的第二注册信息进行注册;根据所述第二注册信息向所述信息提供服务器获取第三验证码,指示所述信息提供服务器向所述第二手机号码对应的第一手机号码发送第四验证码;接收来自所述终端设备的所述第四验证码;对所述第三验证码和所述第四验证码进行验证;在所述平台服务器对所述第三验证码和所述第四验证验证通过后,向所述终端设备返回注册成功的第二响应消息。
- 根据权利要求14所述的方法,其特征在于,所述方法还包括:接收来自所述终端设备的用于获取所述平台服务器的第二加密密钥的第二请求消 息;根据所述第二请求消息向所述终端设备返回所述第二加密密钥。
- 一种获取电子文件的方法,应用在信息提供服务器上,其特征在于,所述方法包括:接收来自平台服务器的第一验证信息、终端设备的用户在所述信息提供服务器注册的用户标识;对所述第一验证信息进行验证,在验证通过后根据所述用户标识确定所述电子文件;将所述电子文件中的隐私信息通过所述信息提供服务器的第一加密密钥加密;将所述电子文件发送至所述平台服务器,以供所述平台服务器将所述电子文件转发至所述终端设备。
- 根据权利要求16所述的方法,其特征在于,所述对所述第一验证信息进行验证的步骤,包括:通过所述信息提供服务器的所述第一解密密钥对所述第一验证信息进行解密;通过所述平台服务器的第二加密密钥对所述解密后的所述第一验证信息进行加密,得到第一加密字符串;确定所述用户在所述信息提供服务器注册时生成的第二加密字符串,所述第二加密字符串由所述第一验证信息通过所述平台服务器的第二加密密钥加密生成;确定所述第一加密字符串和所述第二加密字符串是否相同,如果相同,则所述第一验证信息的验证通过。
- 根据权利要求16所述的方法,其特征在于,所述方法还包括:在所述用户未登录到所述平台服务器时,接收来自所述平台服务器用于指示所述信息提供服务器向所述用户在所述平台服务器注册的第二手机号码发送第一验证码的指示消息,其中,所述第二手机号码由所述第一加密密钥对第一手机号码加密得到,所述第一手机号码为所述用户注册在所述信息提供服务器的手机号码;根据所述指示消息通过所述第一解密密钥对所述第二手机号码进行解密,得到所述第一手机号码;通过所述第一手机号码向所述终端设备发送第一验证码以及向所述平台服务器返回第二验证码,以供所述平台服务器根据所述第一验证码和所述第二验证码对所述用户进行登录验证。
- 根据权利要求16所述的方法,其特征在于,所述方法还包括:在所述用户在所述平台服务器的第一登录信息与所述用户标识未绑定时,接收来自所述平台服务器的第二验证信息和所述平台服务器的第二加密密钥,所述第二验证信息经过所述第一加密密钥加密;通过所述信息提供服务器的第一解密密钥对所述第二验证信息进行解密,通过所述第二加密密钥对解密后的所述第二原始验证信息进行加密,得到第三加密字符串;确定所述用户在所述信息提供服务器注册时生成的第四加密字符串,所述第四加密字符串由所述第二原始验证信息通过所述平台服务器的第二加密密钥加密生成;确定所述第三加密字符串和所述第四加密字符串是否相同;如果相同,向所述平台服务器返回所述终端设备的用户在所述信息提供服务器上注册的用户标识,以供所述平台服务器建立所述第一登录信息和所述用户标识的绑定关系。
- 根据权利要求16所述的方法,其特征在于,所述方法还包括:在所述用户在所述信息提供服务器上未注册时,通过来自所述终端设备的第一注册信息进行注册;在所述用户通过第一手机号码登录到所述信息提供服务器后,将所述第一手机号码通过所述第一加密密钥进行加密,得到第二手机号码;将所述第二手机号码发送至所述终端设备,以供所述终端设备通过所述第二手机号码在所述平台服务器上注册;根据所述第一手机号码生成用户标识。
- 根据权利要求20所述的方法,其特征在于,所述方法还包括:接收来自平台服务器的第二手机号码;通过所述第一解密密钥对所述第二手机号码进行解密,得到所述第一手机号码;通过所述第一手机号码向所述终端设备返回第三验证码,所述第三验证码为所述平台服务器根据所述第二注册信息请求所述信息提供服务器发送给所述终端设备的;向所述平台服务器返回第四验证码,以供所述平台服务器对所述第三验证码和所述第四验证码进行比较以确定验证是否通过。
- 一种获取电子文件的装置,应用在终端设备上,其特征在于,所述装置包括:第一发送模块,用于向平台服务器发送用于获取电子文件的第一请求消息,所述第一请求消息中携带有提供所述电子文件的信息提供服务器的第一标识;第一接收模块,用于接收来自所述平台服务器根据所述第一发送模块发送的所述第一请求消息返回的第一提示信息;第一确定模块,用于根据所述第一接收模块接收到的所述第一提示信息确定用于身份验证的第一验证信息,向所述平台服务器发送所述第一验证信息;第二接收模块,用于在所述平台服务器根据所述第一标识确定所述信息提供服务器,以及根据所述终端设备的用户在所述平台服务器的第一登录信息确定所述用户在所述信息提供服务器注册的用户标识,并将所述第一确定模块确定的所述第一验证信息、所述用户标识发送至所述信息提供服务器后,接收所述平台服务器转发的来自所述信息提供服务器的所述电子文件,所述电子文件中的隐私信息经过所述信息提供服务器的第一加密密钥加密。
- 根据权利要求22所述的装置,其特征在于,所述第一确定模块包括:第一确定单元,用于根据所述第一提示信息确定所述用户在所述终端设备输入的第一原始验证信息以及确定所述信息提供服务器的所述第一加密密钥;第一加密单元,用于根据所述第一确定单元确定的所述第一加密密钥对所述第一原始验证信息进行加密,得到用于身份验证的第一验证信息。
- 根据权利要求22所述的装置,其特征在于,所述装置还包括:第二确定模块,用于在所述用户未登录到所述平台服务器时,确定所述用户的第一登录信息,通过所述第一登录信息登录所述平台服务器;第三接收模块,用于在所述第二确定模块确定所述用户登录成功后,接收所述平台服务器返回的登录成功的第一响应消息。
- 根据权利要求24所述的装置,其特征在于,所述装置还包括:第四接收模块,用于通过第一手机号码接收来自所述信息提供服务器的第一验证码,所述第一验证码为所述平台服务器根据第二手机号码指示所述信息提供服务器发送所述第一手机号码的,所述第二手机号码由所述第一加密密钥对所述第一手机号码加密得到;第二发送模块,用于将所述第四接收模块接收到的所述第一验证码通过第二手机号码发送给所述平台服务器;第三确定模块,用于在所述平台服务器对所述第二发送模块发送的所述第一验证码与来自所述信息提供服务器的第二验证码进行验证后,确定所述用户登录成功,所述第三接收模块执行所述接收所述平台服务器返回的登录成功的第一响应消息的步骤。
- 根据权利要求22所述的装置,其特征在于,所述装置还包括:第三发送模块,用于在所述用户在所述平台服务器的第一登录信息与所述用户标识未绑定时,向所述平台服务器发送关联请求,所述关联请求中携带有所述信息提供服务器的第一标识;第五接收模块,用于接收来自所述平台服务器根据所述第三发送模块发送的所述关联请求返回的第二提示信息;第四确定模块,用于根据所述第五接收模块接收到的所述第二提示信息确定所述用户在所述终端设备输入的第二原始验证信息;第一加密模块,用于根据所述第一加密密钥对所述第四确定模块确定的所述第二原始验证信息进行加密,得到用于身份验证的第二验证信息;第四发送模块,用于向所述平台服务器发送所述第一加密模块加密的所述第二验证信息,所述平台服务器将所述绑定请求和所述第二验证信息转发至所述信息提供服务器,以供所述信息提供服务器根据与所述第一加密密钥对应的第一解密密钥对经过所述第二验证信息进行解密,根据解密后的所述第二验证信息确定所述用户在所述信息提供服务器的用户标识,将所述用户标识返回所述平台服务器后,以供所述平台服务器建立所述第一登录信息和所述用户标识之间的绑定关系。
- 根据权利要求22所述的装置,其特征在于,所述装置还包括:第二加密模块,用于在所述用户在所述平台服务器和所述信息提供服务器上未注册时,通过所述平台服务器的第二加密密钥对所述终端设备的用户需要在所述信息提供服务器注册的第一注册信息进行加密;第五发送模块,用于在所述用户通过第一手机号码登录到所述信息提供服务器后,将通过所述第一加密密钥加密后的所述第一注册信息发送至所述信息提供服务器;第六接收模块,用于在所述信息提供服务器根据所述第一手机号码生成用户标识后,接收来自所述信息提供服务器的所述第一加密密钥、注册成功的第一响应消息以及所述第二手机号码,所述第二手机号码由所述第一加密密钥对所述第一手机号码加密生成;第一注册模块,用于通过所述第二手机号码向所述平台服务器注册;第七接收模块,用于在所述平台服务器对所述第二手机号码注册后,接收所述平台服务器返回的注册成功的第二响应消息。
- 根据权利要求27所述的装置,其特征在于,所述装置还包括:第六发送模块,用于向所述平台服务器发送用于获取所述平台服务器的第二加密密钥的第二请求消息;第八接收模块,用于接收所述平台服务器根据所述第六发送模块发送的所述第二请求消息返回的第二加密密钥。
- 根据权利要求27所述的装置,其特征在于,所述第一注册模块包括:第一发送单元,用于向所述平台服务器发送所述第二手机号码;第一接收单元,用于接收来自所述信息提供服务器返回的第三验证码,所述第三验证码为所述平台服务器根据所述第一发送单元发送的所述第二手机号码请求所述信息提供服务器发送给所述终端设备的;第二发送单元,用于向所述平台服务器发送所述第一接收单元接收到的所述第三验证码;在所述平台服务器根据所述第三验证码与所述信息提供服务器返回给所述平台服务器的第四验证码进行比较以确定验证通过后,所述第七接收模块执行所述接收所述平台服务器返回的注册成功的第二响应消息的步骤。
- 一种获取电子文件的装置,应用在平台服务器上,其特征在于,所述装置包括:第九接收模块,用于接收来自终端设备的用于获取电子文件的第一请求消息,所述第一请求消息中携带有提供所述电子文件的信息提供服务器的第一标识;第七发送模块,用于根据所述第九接收模块接收到的所述第一请求消息向所述终端设备返回第一提示信息;第八发送模块,用于在所述终端设备根据所述第七发送模块发送的所述第一提示信息确定用于身份验证的第一验证信息后,接收来自所述终端设备的第一验证信息;第九发送模块,用于根据所述第九接收模块接收到的所述第一标识确定所述信息提供服务器,将所述第一验证信息、所述终端设备的用户在所述信息提供服务器注册的用户标识发送至所述信息提供服务器;第一转发模块,用于在所述信息提供服务器对所述第九发送模块发送的所述第一验证信息验证通过并根据所述用户标识确定所述电子文件后,接收来自所述信息提供服务器的所述电子文件,将所述电子文件转发至所述终端设备,所述电子文件中的隐私信息经过所述信息提供服务器的第一加密密钥加密。
- 根据权利要求30所述的装置,其特征在于,所述第一验证信息为所述用户在所述终端设备输入的原始验证信息通过所述第一加密密钥加密生成的。
- 根据权利要求30所述的装置,其特征在于,所述装置还包括:第五确定模块,用于在所述用户未登录到所述平台服务器时,确定所述用户在所述平台服务器上的第一登录信息;第十发送模块,用于在所述第五确定模块确定所述用户登录成功后,向所述终端设备返回登录成功的第一响应消息。
- 根据权利要求32所述的装置,其特征在于,所述装置还包括:第十一发送模块,用于通过所述终端设备的用户在所述平台服务器注册的第二手机号码指示所述信息提供服务器向所述终端设备发送第一验证码,所述第二手机号码由所述第一加密密钥对第一手机号码加密得到,所述第一手机号码为所述用户注册在所述信息提供服务器的手机号码;第十接收模块,用于在所述信息提供服务器通过所述信息提供服务器的第一解密密钥对所述第二手机号码解密得到所述第一手机号码,通过所述第一手机号码向所述终端设备指示发送第一验证码后,接收来自所述终端设备的所述第一验证码以及接收来自所述信息提供服务器的第二验证码;第一验证模块,用于对所述第一验证码和所述第二验证码进行验证,在验证通过后确定所述用户登录成功,所述第十发送模块执行所述向所述终端设备返回登录成功的第一响应消息的步骤。
- 根据权利要求30所述的装置,其特征在于,所述装置还包括:第十一接收模块,用于在所述用户在所述平台服务器的第一登录信息和所述用户在所述信息提供服务器注册的用户标识未绑定时,接收来自所述终端设备的关联请求,所述关联请求中携带有所述第一标识;第十二发送模块,用于根据所述关联请求向所述终端设备返回第二提示信息;第十二接收模块,用于在所述终端设备根据所述第二提示信息确定用于身份验证的第二验证信息,接收来自所述终端设备根据所述第二提示信息返回的所述第二验证信息,所述第二验证信息经过所述第一加密密钥加密;第二转发模块,用于将所述绑定请求和经过所述第一加密密钥的所述第二验证信息转发至所述信息提供服务器,以供所述信息提供服务器对经过所述第一加密密钥加密的所述第二验证信息进行解密,根据解密后的所述第二验证信息确定所述用户在所述信息提供服务器注册的用户标识;第十三接收模块,用于接收来自所述信息提供服务器返回的所述用户标识,建立所 述第一登录信息和所述用户标识之间的绑定关系。
- 根据权利要求30所述的装置,其特征在于,所述装置还包括:第二注册模块,用于在所述用户在所述平台服务器上未注册时,通过来自所述终端设备的第二注册信息进行注册;第一获取模块,用于根据所述第二注册模块注册的所述第二注册信息向所述信息提供服务器获取第三验证码,指示所述信息提供服务器向所述第二手机号码对应的第一手机号码发送第四验证码;第十四接收模块,用于接收来自所述终端设备的所述第四验证码;第二验证模块,用于对所述第三验证码和所述第四验证码进行验证;第十三发送模块,用于在所述第二验证模块对所述第三验证码和所述第四验证验证通过后,向所述终端设备返回注册成功的第二响应消息。
- 根据权利要求35所述的装置,其特征在于,所述装置还包括:第十五接收模块,用于接收来自所述终端设备的用于获取所述平台服务器的第二加密密钥的第二请求消息;第十四发送模块,用于根据所述第十五接收模块接收到的所述第二请求消息向所述终端设备返回所述第二加密密钥。
- 一种获取电子文件的装置,应用在信息提供服务器上,其特征在于,所述装置包括:第十六接收模块,用于接收来自平台服务器的第一验证信息、终端设备的用户在所述信息提供服务器注册的用户标识;第三验证模块,用于对所述第十六接收模块接收到的所述第一验证信息进行验证,在验证通过后根据所述用户标识确定所述电子文件;第三加密模块,用于将所述电子文件中的隐私信息通过所述信息提供服务器的第一加密密钥加密;第十五发送模块,用于将所述第三加密模块加密后的所述电子文件发送至所述平台服务器,以供所述平台服务器将所述电子文件转发至所述终端设备。
- 根据权利要求37所述的装置,其特征在于,所述第三验证模块包括:第一解密单元,用于通过所述信息提供服务器的所述第一解密密钥对所述第一验证信息进行解密;第一加密单元,用于通过所述平台服务器的第二加密密钥对所述第一解密单元解密 后的所述第一验证信息进行加密,得到第一加密字符串;第一确定单元,用于确定所述用户在所述信息提供服务器注册时生成的第二加密字符串,所述第二加密字符串由所述第一验证信息通过所述平台服务器的第二加密密钥加密生成;第二确定单元,用于确定所述第一加密单元得到的所述第一加密字符串和所述第一确定单元确定的所述第二加密字符串是否相同,如果相同,则所述第一验证信息的验证通过。
- 根据权利要求37所述的装置,其特征在于,所述装置还包括:第十七接收模块,用于在所述用户未登录到所述平台服务器时,接收来自所述平台服务器用于指示所述信息提供服务器向所述用户在所述平台服务器注册的第二手机号码发送第一验证码的指示消息,其中,所述第二手机号码由所述第一加密密钥对第一手机号码加密得到,所述第一手机号码为所述用户注册在所述信息提供服务器的手机号码;第一解密模块,用于根据所述第十七接收模块接收到的所述指示消息通过所述第一解密密钥对所述第二手机号码进行解密,得到所述第一手机号码;第十六发送模块,用于通过所述第一手机号码向所述终端设备发送第一验证码以及向所述平台服务器返回第二验证码,以供所述平台服务器根据所述第一验证码和所述第二验证码对所述用户进行登录验证。
- 根据权利要求37所述的装置,其特征在于,所述装置还包括:第十八接收模块,用于在所述用户在所述平台服务器的第一登录信息与所述用户标识未绑定时,接收来自所述平台服务器的第二验证信息和所述平台服务器的第二加密密钥,所述第二验证信息经过所述第一加密密钥加密;第二解密模块,用于通过所述信息提供服务器的第一解密密钥对所述第二验证信息进行解密,通过所述第二加密密钥对解密后的所述第二原始验证信息进行加密,得到第三加密字符串;第六确定模块,用于确定所述用户在所述信息提供服务器注册时生成的第四加密字符串,所述第四加密字符串由所述第二原始验证信息通过所述平台服务器的第二加密密钥加密生成;第七确定模块,用于确定所述第三加密字符串和所述第四加密字符串是否相同;第十七发送模块,用于如果所述第七确定模块确定相同,向所述平台服务器返回所 述终端设备的用户在所述信息提供服务器上注册的用户标识,以供所述平台服务器建立所述第一登录信息和所述用户标识的绑定关系。
- 根据权利要求37所述的装置,其特征在于,所述装置还包括:第三注册模块,用于在所述用户在所述信息提供服务器上未注册时,通过来自所述终端设备的第一注册信息进行注册;第四加密模块,用于在所述用户通过第一手机号码登录到所述信息提供服务器后,将所述第一手机号码通过所述第一加密密钥进行加密,得到第二手机号码;第十八发送模块,用于将所述第二手机号码发送至所述终端设备,以供所述终端设备通过所述第二手机号码在所述平台服务器上注册;标识生成模块,用于根据所述第一手机号码生成用户标识。
- 根据权利要求41所述的装置,其特征在于,所述装置还包括:第十九接收模块,用于接收来自平台服务器的第二手机号码;第三解密模块,用于通过所述第一解密密钥对所述第二手机号码进行解密,得到所述第一手机号码;第十九发送模块,用于通过所述第一手机号码向所述终端设备返回第三验证码,所述第三验证码为所述平台服务器根据所述第二注册信息请求所述信息提供服务器发送给所述终端设备的;第二十发送模块,用于向所述平台服务器返回第四验证码,以供所述平台服务器对所述第三验证码和所述第四验证码进行比较以确定验证是否通。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/580,829 US11002180B2 (en) | 2015-06-15 | 2016-06-08 | Method and apparatus for securing communications using multiple encryption keys |
US17/242,679 US20210246824A1 (en) | 2015-06-15 | 2021-04-28 | Method and apparatus for securing communications using multiple encryption keys |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510330914.9 | 2015-06-15 | ||
CN201510330914.9A CN106326763B (zh) | 2015-06-15 | 2015-06-15 | 获取电子文件的方法及装置 |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/580,829 A-371-Of-International US11002180B2 (en) | 2015-06-15 | 2016-06-08 | Method and apparatus for securing communications using multiple encryption keys |
US17/242,679 Continuation US20210246824A1 (en) | 2015-06-15 | 2021-04-28 | Method and apparatus for securing communications using multiple encryption keys |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016202207A1 true WO2016202207A1 (zh) | 2016-12-22 |
Family
ID=57545423
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2016/085216 WO2016202207A1 (zh) | 2015-06-15 | 2016-06-08 | 获取电子文件的方法及装置 |
Country Status (3)
Country | Link |
---|---|
US (2) | US11002180B2 (zh) |
CN (1) | CN106326763B (zh) |
WO (1) | WO2016202207A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018149145A1 (en) * | 2017-02-15 | 2018-08-23 | Beijing Didi Infinity Technology And Development Co., Ltd. | Systems and methods for on-demand service |
US11246014B2 (en) | 2017-02-15 | 2022-02-08 | Beijing Didi Infinity Technology And Development Co., Ltd. | System and method for providing information on terminal devices |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107113172B (zh) * | 2015-12-10 | 2019-03-29 | 深圳市大疆创新科技有限公司 | 无人机认证方法,安全通信方法及对应系统 |
US10523423B2 (en) * | 2016-08-10 | 2019-12-31 | Nextlabs, Inc. | Sharing encrypted documents within and outside an organization |
CN108509799A (zh) * | 2017-02-23 | 2018-09-07 | 珠海金山办公软件有限公司 | 一种模板文档获取方法、装置及系统 |
CN107040382A (zh) * | 2017-03-27 | 2017-08-11 | 努比亚技术有限公司 | 身份验证装置及方法 |
CN107194782B (zh) * | 2017-05-27 | 2021-03-12 | Oppo广东移动通信有限公司 | 信息输出方法及相关产品 |
CN108200089B (zh) * | 2018-02-07 | 2022-06-07 | 腾讯云计算(北京)有限责任公司 | 信息安全的实现方法、装置、系统以及存储介质 |
CN108900479A (zh) * | 2018-06-12 | 2018-11-27 | 泰康保险集团股份有限公司 | 短信验证码获取方法及装置 |
CN111639352B (zh) * | 2020-05-24 | 2023-06-20 | 中信银行股份有限公司 | 电子证明的生成方法、装置、电子设备及可读存储介质 |
CN112231762A (zh) * | 2020-12-15 | 2021-01-15 | 北京联想协同科技有限公司 | 一种文件访问方法、装置及存储介质 |
CN116527246A (zh) * | 2021-11-19 | 2023-08-01 | 荣耀终端有限公司 | 数据保护方法及电子设备 |
CN114338149B (zh) * | 2021-12-28 | 2022-12-27 | 北京深盾科技股份有限公司 | 一种服务器的登录凭据授权方法、终端及密钥托管平台 |
CN115001756B (zh) * | 2022-05-16 | 2024-01-26 | 李愿军 | 基于网络的身份验证方法及系统 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102663844A (zh) * | 2012-05-02 | 2012-09-12 | 李凯 | 不同条件下控制移动设备权限的方法 |
CN102930225A (zh) * | 2012-10-25 | 2013-02-13 | 中国航天科工集团第二研究院七〇六所 | 基于密级标识的电子文档访问控制方法 |
CN103824031A (zh) * | 2014-02-28 | 2014-05-28 | 江苏敏捷科技股份有限公司 | 使用电子文件安全标签保证电子文件安全的方法及系统 |
CN104104657A (zh) * | 2013-04-07 | 2014-10-15 | 腾讯科技(深圳)有限公司 | 信息验证方法、服务器、终端及系统 |
US20140344943A1 (en) * | 2013-05-20 | 2014-11-20 | Hand Held Products, Inc. | System and method for securing sensitive data |
CN104660557A (zh) * | 2013-11-19 | 2015-05-27 | 腾讯科技(深圳)有限公司 | 操作处理方法和装置 |
Family Cites Families (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4634808A (en) | 1984-03-15 | 1987-01-06 | M/A-Com Government Systems, Inc. | Descrambler subscriber key production system utilizing key seeds stored in descrambler |
US5224166A (en) | 1992-08-11 | 1993-06-29 | International Business Machines Corporation | System for seamless processing of encrypted and non-encrypted data and instructions |
US5636280A (en) | 1994-10-31 | 1997-06-03 | Kelly; Tadhg | Dual key reflexive encryption security system |
US6044154A (en) | 1994-10-31 | 2000-03-28 | Communications Devices, Inc. | Remote generated, device identifier key for use with a dual-key reflexive encryption security system |
US6263435B1 (en) | 1999-07-06 | 2001-07-17 | Matsushita Electric Industrial Co., Ltd. | Dual encryption protocol for scalable secure group communication |
US7181017B1 (en) * | 2001-03-23 | 2007-02-20 | David Felsher | System and method for secure three-party communications |
US20030018495A1 (en) | 2001-07-11 | 2003-01-23 | Lester Sussman | System and method for medical drug prescription acquisition |
US7376826B2 (en) * | 2002-05-31 | 2008-05-20 | Broadcom Corporation | Methods and apparatus for performing encryption and authentication |
US20040230489A1 (en) * | 2002-07-26 | 2004-11-18 | Scott Goldthwaite | System and method for mobile payment and fulfillment of digital goods |
GB0426624D0 (en) | 2004-12-03 | 2005-01-05 | Firstondemand Ltd | Prescription generation,validation and tracking |
US20060259330A1 (en) * | 2005-05-10 | 2006-11-16 | Schranz Paul S | Electronic prescription system for internet pharmacies and method threfor |
US7661146B2 (en) | 2005-07-01 | 2010-02-09 | Privamed, Inc. | Method and system for providing a secure multi-user portable database |
US20070180259A1 (en) | 2006-01-20 | 2007-08-02 | Bulot Earl J | Secure Personal Medical Process |
US7908487B2 (en) * | 2006-05-10 | 2011-03-15 | Ndchealth Corporation | Systems and methods for public-key encryption for transmission of medical information |
US8225380B2 (en) * | 2006-05-25 | 2012-07-17 | Celltrust Corporation | Methods to authenticate access and alarm as to proximity to location |
US7974924B2 (en) | 2006-07-19 | 2011-07-05 | Mvisum, Inc. | Medical data encryption for communication over a vulnerable system |
US8212677B2 (en) | 2007-02-12 | 2012-07-03 | Alexander Ferguson | Automated medication management system and method for use |
US9158933B2 (en) | 2007-08-17 | 2015-10-13 | Sybase, Inc. | Protection of encryption keys in a database |
US9141758B2 (en) | 2009-02-20 | 2015-09-22 | Ims Health Incorporated | System and method for encrypting provider identifiers on medical service claim transactions |
US8498884B2 (en) | 2010-03-19 | 2013-07-30 | Universal Healthcare Network, LLC | Encrypted portable electronic medical record system |
US20130110540A1 (en) | 2011-10-26 | 2013-05-02 | Patient Identification Network LLC | Method of Collecting Patient Information in an Electronic System |
US20140156296A1 (en) | 2012-12-04 | 2014-06-05 | 12th Man Technologies, Inc. | Medication Adherence Scoring System and Method |
US9959385B2 (en) | 2013-02-15 | 2018-05-01 | Davincian Healthcare, Inc. | Messaging within a multi-access health care provider portal |
US20150213204A1 (en) | 2013-11-05 | 2015-07-30 | MS Card Central Corp. | Dual smart card e-prescription system and method |
-
2015
- 2015-06-15 CN CN201510330914.9A patent/CN106326763B/zh active Active
-
2016
- 2016-06-08 US US15/580,829 patent/US11002180B2/en active Active
- 2016-06-08 WO PCT/CN2016/085216 patent/WO2016202207A1/zh active Application Filing
-
2021
- 2021-04-28 US US17/242,679 patent/US20210246824A1/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102663844A (zh) * | 2012-05-02 | 2012-09-12 | 李凯 | 不同条件下控制移动设备权限的方法 |
CN102930225A (zh) * | 2012-10-25 | 2013-02-13 | 中国航天科工集团第二研究院七〇六所 | 基于密级标识的电子文档访问控制方法 |
CN104104657A (zh) * | 2013-04-07 | 2014-10-15 | 腾讯科技(深圳)有限公司 | 信息验证方法、服务器、终端及系统 |
US20140344943A1 (en) * | 2013-05-20 | 2014-11-20 | Hand Held Products, Inc. | System and method for securing sensitive data |
CN104660557A (zh) * | 2013-11-19 | 2015-05-27 | 腾讯科技(深圳)有限公司 | 操作处理方法和装置 |
CN103824031A (zh) * | 2014-02-28 | 2014-05-28 | 江苏敏捷科技股份有限公司 | 使用电子文件安全标签保证电子文件安全的方法及系统 |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018149145A1 (en) * | 2017-02-15 | 2018-08-23 | Beijing Didi Infinity Technology And Development Co., Ltd. | Systems and methods for on-demand service |
CN110301132A (zh) * | 2017-02-15 | 2019-10-01 | 北京嘀嘀无限科技发展有限公司 | 用于按需服务的系统和方法 |
US11246014B2 (en) | 2017-02-15 | 2022-02-08 | Beijing Didi Infinity Technology And Development Co., Ltd. | System and method for providing information on terminal devices |
Also Published As
Publication number | Publication date |
---|---|
CN106326763A (zh) | 2017-01-11 |
US11002180B2 (en) | 2021-05-11 |
US20180340466A1 (en) | 2018-11-29 |
US20210246824A1 (en) | 2021-08-12 |
CN106326763B (zh) | 2020-01-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2016202207A1 (zh) | 获取电子文件的方法及装置 | |
US11165757B2 (en) | Method and apparatus for securing communications using multiple encryption keys | |
US9092643B2 (en) | Secure access to personal health records in emergency situations | |
WO2018050081A1 (zh) | 设备身份认证的方法、装置、电子设备及存储介质 | |
CN110247881B (zh) | 基于可穿戴设备的身份认证方法及系统 | |
WO2020186827A1 (zh) | 用户认证方法、装置、计算机设备及计算机可读存储介质 | |
WO2019020051A1 (zh) | 一种安全认证的方法及装置 | |
US20140211944A1 (en) | System and method of protecting, storing and decrypting keys over a computerized network | |
WO2017071493A1 (zh) | 身份识别、业务处理以及生物特征信息的处理方法和设备 | |
KR20190000578A (ko) | 블록체인 기반의 공개 분산 데이터베이스에서 데이터에 대한 보안을 유지하는 방법 및 이를 이용한 블록체인 관리 서버 | |
JP2017175244A (ja) | 1:n生体認証・暗号・署名システム | |
JP4256361B2 (ja) | 認証管理方法及びシステム | |
US20210392003A1 (en) | Decentralized computing systems and methods for performing actions using stored private data | |
US20220005039A1 (en) | Delegation method and delegation request managing method | |
TW201108696A (en) | Account identification system, method and peripheral device of performing function thereof | |
KR101884776B1 (ko) | 환자 정보 전달 시스템 및 방법 | |
KR20140099362A (ko) | 바이오인식 기반의 전자건강기록(ehr) 보안 시스템 및 방법 | |
WO2017050152A1 (zh) | 用于移动设备的密码安全系统及其密码安全输入方法 | |
CN111274592B (zh) | 一种基于区块链和生物特征的电子病历系统 | |
JP2005197912A (ja) | 情報開示制御方法、情報開示制御プログラム、ならびに、耐タンパ装置 | |
CN110224989A (zh) | 信息交互方法、装置、计算机设备及可读存储介质 | |
KR100788278B1 (ko) | 정보의 익명화를 위한 데이터 저장 시스템 및 방법 | |
Nagamani et al. | A mobile cloud-based approach for secure m-health prediction application | |
CN112182628B (zh) | 一种隐私信息安全访问方法及装置 | |
CN118282670A (zh) | 基于标记物的区块链双向身份认证系统及方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16810948 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 15580829 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 16810948 Country of ref document: EP Kind code of ref document: A1 |