WO2019072042A1 - 一种防消息泄密的方法及装置 - Google Patents

一种防消息泄密的方法及装置 Download PDF

Info

Publication number
WO2019072042A1
WO2019072042A1 PCT/CN2018/102773 CN2018102773W WO2019072042A1 WO 2019072042 A1 WO2019072042 A1 WO 2019072042A1 CN 2018102773 W CN2018102773 W CN 2018102773W WO 2019072042 A1 WO2019072042 A1 WO 2019072042A1
Authority
WO
WIPO (PCT)
Prior art keywords
receiving terminal
message
key
receiving
information
Prior art date
Application number
PCT/CN2018/102773
Other languages
English (en)
French (fr)
Inventor
赵勇
程均
蒋晓彬
代洪跃
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2019072042A1 publication Critical patent/WO2019072042A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords

Definitions

  • the present disclosure relates to the field of mobile communication messaging technologies, and in particular, to a method and apparatus for preventing message leakage.
  • the traditional method is to encrypt the message during the transmission process, and the encryption means are mainly divided into two types: one is terminal encryption, the key is private, that is, both sides have a key, the sender encrypts, and the receiver decrypts.
  • the key or public key is decrypted.
  • the present disclosure provides an anti-disclosure. Method and device for leaking information.
  • the authentication storage platform After receiving the message that the sending terminal sends the receiving terminal information and the encrypted information, the authentication storage platform decrypts the encrypted information in the message by using the pre-stored sending terminal key to obtain the plaintext;
  • the authentication storage platform After saving the plaintext, the authentication storage platform sends a prompt message to the receiving terminal according to the receiving terminal information;
  • the authentication storage platform After receiving the extraction request sent by the receiving terminal in response to the prompt message, the authentication storage platform verifies the receiving terminal key carried by the extraction request, and performs the plaintext by using the verified receiving terminal key. After the encryption process, the encrypted ciphertext is sent to the receiving terminal.
  • the decryption module is configured to receive the message including the receiving terminal information and the encrypted information sent by the transmitting terminal, and decrypt the encrypted information in the message by using the pre-stored transmitting terminal key to obtain the plaintext;
  • a sending module configured to send a prompt message to the receiving terminal according to the receiving terminal information after saving the plaintext
  • the verification and encryption module is configured to, after receiving the extraction request sent by the receiving terminal in response to the prompt message, verify the receiving terminal key carried by the extraction request, and use the verified receiving terminal key pair After the plaintext is encrypted, the encrypted ciphertext is sent to the receiving terminal.
  • An apparatus for preventing message leakage includes: a processor, and a memory coupled to the processor; and the memory stores an anti-operation executable on the processor a message leaking program, when the anti-message program is executed by the processor, the implementation includes:
  • a computer storage medium stores a program for preventing message leakage, and the implementation of the anti-message program when executed by a processor includes:
  • FIG. 1 is a flowchart of a method for preventing message leakage according to an embodiment of the present disclosure
  • FIG. 2 is a schematic diagram of an apparatus for preventing message leakage according to an embodiment of the present disclosure
  • FIG. 3 is a network structure diagram provided by an embodiment of the present disclosure.
  • FIG. 4 is a schematic diagram of functions of an internal module of an authentication storage platform according to an embodiment of the present disclosure
  • FIG. 5 is a schematic diagram of a message delivery process according to an embodiment of the present disclosure.
  • FIG. 1 is a flowchart of a method for preventing message leakage according to an embodiment of the present disclosure. As shown in FIG. 1 , the method includes:
  • Step S101 After receiving the message that the sending terminal sends the information including the receiving terminal and the encrypted information, the authentication storage platform decrypts the encrypted information in the message by using the pre-stored sending terminal key to obtain the plaintext.
  • Step S102 After saving the plaintext, the authentication storage platform sends a prompt message to the receiving terminal according to the receiving terminal information.
  • Step S103 After receiving the extraction request sent by the receiving terminal in response to the prompt message, the authentication storage platform verifies the receiving terminal key carried by the extraction request, and uses the verified receiving terminal key pair. After the encrypted text is encrypted, the encrypted ciphertext is sent to the receiving terminal.
  • the authentication storage platform receives the message including the receiving terminal information and the encrypted information sent by the sending terminal, and decrypts the encrypted information in the message by using the pre-stored sending terminal key to obtain the plaintext, including: the authentication storage platform. After receiving the message including the receiving terminal information and the encrypted information sent by the transmitting terminal, searching for a sending terminal key corresponding to the sending terminal from the database; the authentication storage platform uses the found sending terminal key to encrypt the The information is decrypted and processed to obtain plaintext.
  • the sending, by the authentication storage platform, the prompting message to the receiving terminal according to the receiving terminal information after saving the plaintext includes: the authentication storage platform saves the plaintext, and is configured to prompt the receiving terminal to extract the encryption in the message. A prompt message of the information, and the prompt message is sent to the receiving terminal.
  • the authentication storage platform After receiving the extraction request sent by the receiving terminal in response to the prompt message, the authentication storage platform verifies the receiving terminal key carried by the extraction request, and uses the verified receiving terminal key pair. After the plaintext is encrypted, the encrypted ciphertext is sent to the receiving terminal, and the authentication storage platform searches the database for the extraction request that is received by the receiving terminal and includes the receiving terminal key. Receiving, by the receiving terminal, a corresponding receiving terminal key; the authentication storage platform performs verification processing on the found receiving terminal key and the receiving terminal key in the extraction request, and obtains a verification result; if the authentication storage platform obtains the verification result as After the verification, the plaintext is encrypted by using the verified receiving terminal key, and then the encrypted ciphertext is sent to the receiving terminal.
  • the method includes: a decryption module 201, configured to receive a message including a receiving terminal information and an encrypted information sent by a transmitting terminal, and then use The pre-stored transmitting terminal key decrypts the encrypted information in the message to obtain a plaintext; the sending module 202 is configured to: after saving the plaintext, send a prompt message to the receiving terminal according to the receiving terminal information; And the encryption module 203 is configured to: after receiving the extraction request sent by the receiving terminal in response to the prompt message, verify the receiving terminal key carried by the extraction request, and use the verified receiving terminal key pair After the plaintext is encrypted, the encrypted ciphertext is sent to the receiving terminal.
  • a decryption module 201 configured to receive a message including a receiving terminal information and an encrypted information sent by a transmitting terminal, and then use The pre-stored transmitting terminal key decrypts the encrypted information in the message to obtain a plaintext
  • the sending module 202 is configured to: after saving the plaintext, send a prompt message to the receiving terminal according to the
  • the decryption module 201 includes: a search unit, configured to: after receiving the message including the receiving terminal information and the encrypted information sent by the transmitting terminal, searching for a sending terminal key corresponding to the sending terminal from the database; And configured to decrypt the encrypted information by using the found sending terminal key to obtain a plaintext.
  • a search unit configured to: after receiving the message including the receiving terminal information and the encrypted information sent by the transmitting terminal, searching for a sending terminal key corresponding to the sending terminal from the database; And configured to decrypt the encrypted information by using the found sending terminal key to obtain a plaintext.
  • the sending module 202 is configured to save the plaintext, and construct a prompt message for prompting the receiving terminal to extract the encrypted information in the message, and send the prompt message to the receiving terminal.
  • the verification and encryption module 203 includes: a searching unit, configured to: after receiving the extraction request including the receiving terminal key sent by the receiving terminal, searching for a receiving terminal key corresponding to the receiving terminal in the database a verification unit configured to perform a verification process on the found receiving terminal key and the receiving terminal key in the extraction request to obtain a verification result; and the encryption unit is configured to use the verification result if the verification result is verified After the plaintext is encrypted by the verified receiving terminal key, the encrypted ciphertext is sent to the receiving terminal.
  • a searching unit configured to: after receiving the extraction request including the receiving terminal key sent by the receiving terminal, searching for a receiving terminal key corresponding to the receiving terminal in the database a verification unit configured to perform a verification process on the found receiving terminal key and the receiving terminal key in the extraction request to obtain a verification result; and the encryption unit is configured to use the verification result if the verification result is verified After the plaintext is encrypted by the verified receiving terminal key, the encrypted ciphertext is sent to the receiving terminal.
  • An embodiment of the present disclosure provides an apparatus for preventing message leakage, the apparatus comprising: a processor, and a memory coupled to the processor; the memory storing an anti-message operable on the processor a compromised program, when the anti-message program is executed by the processor, includes:
  • Embodiments of the present disclosure provide a computer storage medium storing a program for preventing message leakage.
  • the program for preventing message leakage is executed by a processor, the implementation includes:
  • the user includes an user A, an authentication storage platform, and a user B.
  • user A sends a message, it is encrypted by the local key and then pushed to the authentication storage platform.
  • the authentication storage platform After receiving the message from the sender (user A), the authentication storage platform sends an encrypted message to the receiver (user B) to be extracted.
  • the receiver After receiving the key, the receiver initiates the acquisition of the message extraction request from the authentication storage platform; after the authentication storage platform verifies that the recipient key is legal, the recipient encrypts the message and sends the message to the receiver; the receiver After receiving the message, decrypt it again with your own key.
  • FIG. 4 is a schematic diagram of functions of an internal module of an authentication storage platform according to an embodiment of the present disclosure.
  • a CSP Create and Storage Platform
  • the platform can save the sender number and The key used by the sender to encrypt the message, the recipient number and the key information used to decrypt the information; and the function of decrypting the encrypted message submitted by the sender, encrypting and storing the message by the key provided by the receiver .
  • the user Before sending a message, the user needs to set configuration information on the authentication storage platform, including but not limited to: sender number, receiver number, and a number of key pairs for sender encryption and receiver decryption.
  • the content is first encrypted and then sent by using the key set on the authentication storage platform; the authentication storage platform decrypts the key group set by the sender on the platform, and decrypts it, and temporarily stores it on the authentication storage platform; At the same time, the receiving user is sent an encrypted message to be extracted.
  • the message extraction request is sent to the platform.
  • the authentication storage platform determines that the recipient's key is matched. If the matching is successful, the message is encrypted according to the key carried in the extraction request and then pushed to the receiver. After the receiver enters the key again, the terminal decrypts and views the message. After viewing, the message can self-immolate.
  • FIG. 5 is a schematic diagram of a message delivery process according to an embodiment of the present disclosure. As shown in FIG. 5, the method includes the following steps:
  • the authentication storage platform in the system has a configuration management function for the user number and key information, and the configuration management functions include but are not limited to operations such as adding, deleting, and modifying.
  • the platform also has the ability to receive encrypted messages sent by the user, and can perform decryption and temporary storage according to the key group preset by the sender; at the same time, initiate a message extraction request to the receiving user, and perform authentication and authentication on the key carried by the extraction request, And use this key to encrypt the message and push it to the receiver and other functions.
  • user A configures the information about the receiving user and the sending user through the portal portal of the authentication storage platform.
  • the information includes but is not limited to: the sender's user number, the recipient's user number, and several pairs for the sender.
  • the key pair that is encrypted and decrypted by the receiver.
  • the configuration method can be, but is not limited to, input through multiple channels such as two-dimensional scanning code and portal website.
  • the key agreement can be a custom password pair or a fingerprint information that can uniquely identify the identity. (Considering that the fingerprints collected at different times may not be exactly the same, if the fingerprint key is set, the setting should be auxiliary. The corresponding number or combination of letters, when the fingerprint can not be encrypted and decrypted, you can enter the password for encryption and decryption).
  • Step 2 When the user A configures information on the authentication storage platform, the user A can directly configure the key according to the key provided by the user B, and can also notify the other party after the configuration. Of course, you can also initiate a key invitation through the authentication storage platform, and let user B configure its own personalized key through its own terminal.
  • Step 3 When the user B receives the key invitation initiated by the authentication and authentication platform, the user sets the personalized key through the terminal.
  • the key submitted by User B can be paired with the key submitted by A, or it can be a one-to-many relationship.
  • Step 4 After collecting the number and key information of the user A and the user B, the authentication storage platform saves a complete mapping list.
  • the authentication storage platform has the mapping relationship and key mapping relationship between the user A and the user B number.
  • the information data is used to decrypt the message sent by A, and to authenticate and encrypt the key in the message extraction request sent by B.
  • Step 5 The authentication storage to the user A and the user B may initiate a confirmation message of successful configuration, and prompt the user to send the encrypted message through the key set in the platform in the future.
  • the sending user and the receiving user should remember the key that belongs to themselves set on the platform, and do not need to care about what key the other party uses.
  • Step 6 User A inputs information to be sent to User B at his own terminal, and encrypts the message content according to the previously configured key through the terminal before transmission.
  • the encryption process can complete the encryption calculation of the message content and the key by installing the APP on the mobile terminal.
  • the encryption and decryption methods in the entire system should be consistent.
  • specific content can be embedded in a specific location of the message content, for example, in the first position of the message content, a keyword such as "test" is fixedly implanted.
  • Step 7 User A clicks the send button to send the encrypted message to the authentication storage platform through the network.
  • Step 8 When the authentication storage platform receives the encrypted message submitted by the user A, the user uses the key group configured by the user A to decrypt the message content.
  • the judgment flag for successful decryption of the message content may be the "test" keyword embedded in the message content in step 6. If user A configures multiple keys, the keys are calculated one by one, and each calculation result is judged until the decoding is successful. If all the keys configured by user A fail to be unpacked, a notification message is sent to user A, prompting the user to submit the encrypted message because the key is invalid, causing the transmission to fail and resending.
  • Step 9 The authentication storage platform saves the decrypted message content, and sends an encrypted message to be extracted and sent out on the number of the user B.
  • the information content may be “You have an encrypted information to be received, please input the authentication key to extract. ".
  • Step 10 After seeing the prompt, the user B enters key information on the terminal, and the key may be any key of one of the key groups of the home user B set on the authentication storage platform, and initiates a content extraction request. .
  • Step 11 After receiving the extraction request of the user B, the authentication store performs the verification on the key carried by the user B in the extraction request. If the key is the key corresponding to the user A that is previously set by the user B in the authentication storage platform, If the real user B user initiates the message extraction request, the user B extracts the key in the request information to perform encryption operation on the content to be sent.
  • step 12 the authentication storage platform sends the encrypted message to the terminal of the user B through the network through the network. If the key of the authenticated user B fails, the user B sends a prompt message: "The key you entered is incorrect. Please enter the key again.” For abnormal situations, you can set a maximum number of failures. When the number of errors exceeds When the maximum number of times, the user B is no longer allowed to initiate the extraction request, and the user A is notified. The encrypted information just sent to the user B is incorrectly input because the user B incorrectly inputs the key multiple times. At this point, user A can choose to initiate a destroy operation on the previously initiated message.
  • Step 13 After receiving the encrypted message pushed by the authentication storage platform on the terminal, the user B needs to input the key provided by the message extraction again to decrypt the message content.
  • Step 14 When User B successfully decrypts and reads the short message, it sends a message to User A that “the information you sent has been successfully authenticated by xxx.” At the same time, the key and content information generated during the communication process is cleaned up.
  • the message content of the solution is actively extracted by the receiving user, and the network is not directly pushed to the terminal, thereby avoiding the risk of information leakage due to the terminal being cracked or lost; the sender's encryption behavior has no direct correspondence with the recipient's decryption behavior;
  • the key can be set as needed to memorize and understand the key, and the usability is high; the sender and the receiver can update and modify the key periodically to prevent leakage; the receiver must verify the key twice and improve System security.
  • the user when the user sends a message, the user first encrypts the key and then sends it to the authentication storage platform. After receiving the message from the sender, the authentication storage platform sends an encrypted message to the receiver to be extracted. After receiving the key, the receiver initiates the acquisition of the message extraction request from the authentication storage platform; after the authentication storage platform verifies that the recipient key is legal, the recipient encrypts the message and sends the message to the receiver; the receiver After receiving the message, it will decrypt it again through its own key, which improves the security of the information.
  • the content of the message is actively extracted by the receiving user, and the non-network is directly pushed to the terminal, thereby avoiding the risk of information leakage due to the terminal being cracked or lost.
  • the keys of both parties can be set with some keys for easy memory and understanding as needed, and the usability is high.
  • the sender and receiver can update and modify the key periodically to prevent leakage.
  • the receiver must verify the key twice, and the security of the system is higher.
  • computer storage medium includes volatile and nonvolatile, implemented in any method or technology for storing information, such as computer readable instructions, data structures, program modules or other data. Sex, removable and non-removable media.
  • Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disc (DVD) or other optical disc storage, magnetic cartridge, magnetic tape, magnetic disk storage or other magnetic storage device, or may Any other medium used to store the desired information and that can be accessed by the computer.
  • communication media typically includes computer readable instructions, data structures, program modules or other data in a modulated data signal, such as a carrier wave or other transport mechanism, and can include any information delivery media. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

提供了一种防消息泄密的方法及装置,所述方法包括:认证存储平台接收到发送终端发送的包含接收终端信息和加密信息的消息后,利用预存的发送终端密钥对所述消息中的加密信息进行解密处理,得到明文(S101);认证存储平台在保存所述明文后,根据所述接收终端信息向所述接收终端发送提示消息(S102);认证存储平台在接收到所述接收终端响应所述提示消息而发送的提取请求后,对所述提取请求携带的接收终端密钥进行验证,并利用通过验证的接收终端密钥对所述明文进行加密处理后,将加密后的密文发送给所述接收终端(S103)。

Description

一种防消息泄密的方法及装置 技术领域
本公开涉及移动通信消息收发技术领域,特别涉及一种防消息泄密的方法及装置。
背景技术
随着信息大爆炸和科技发展,人们对隐私的关注程度越来越高,一些重要的信息,比如商情、机密等,都想通过加密的方式投递到对方,而且只想让唯一确定的接收者查看。传统的做法,是传输过程中对消息进行加密,而加密手段,主要分为两种:一种是终端加密,密钥私存,即双方都保存有密钥,发送方加密,接收方再解密的一种模式;另外一种为终端加密,密钥共存,即密钥由第三方平台管理,发送方先到密钥平台申请密钥对内容进行加密,接收方再根据密钥平台提供的密钥或者公钥进行解密。这些方法虽然发送过程,内容都是加密发送,但都存在一个问题,如果接收方的终端被破解或者丢失后,则存在消息泄密的风险,同时如果接收方被伪造,也会同样收到消息,也增加泄密风险。
发明概述
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。
针对以下问题,即,如果接收方的终端被破解或者丢失后,则存在消息泄密的风险,同时如果接收方被伪造,也会同样收到消息,也增加泄密风险,本公开提供了一种防消息泄密的方法及装置。
根据本公开实施例提供的一种防消息泄密的方法,包括:
认证存储平台接收到发送终端发送的包含接收终端信息和加密信息的消息后,利用预存的发送终端密钥对所述消息中的加密信息进行解密处理,得到明文;
认证存储平台在保存所述明文后,根据所述接收终端信息向所述接收终端发送提示消息;
认证存储平台在接收到所述接收终端响应所述提示消息而发送的提取请求后,对所述提取请求携带的接收终端密钥进行验证,并利用通过验证的接收终端密钥对所述明文进行加密处理后,将加密后的密文发送给所述接收终端。
根据本公开实施例提供的一种防消息泄密的装置,包括:
解密模块,设置为接收到发送终端发送的包含接收终端信息和加密信息的消息后,利用预存的发送终端密钥对所述消息中的加密信息进行解密处理,得到明文;
发送模块,设置为在保存所述明文后,根据所述接收终端信息向所述接收终端发送提示消息;
验证及加密模块,设置为在接收到所述接收终端响应所述提示消息而发送的提取请求后,对所述提取请求携带的接收终端密钥进行验证,并利用通过验证的接收终端密钥对所述明文进行加密处理后,将加密后的密文发送给所述接收终端。
根据本公开实施例提供的一种防消息泄密的设备,所述设备包括:处理器,以及与所述处理器耦接的存储器;所述存储器上存储有可在所述处理器上运行的防消息泄密的程序,所述防消息泄密的程序被所述处理器执行时实现包括:
接收到发送终端发送的包含接收终端信息和加密信息的消息后,利用预存的发送终端密钥对所述消息中的加密信息进行解密处理,得到明文;
在保存所述明文后,根据所述接收终端信息向所述接收终端发送提示消息;
在接收到所述接收终端响应所述提示消息而发送的提取请求后,对所述提取请求携带的接收终端密钥进行验证,并利用通过验证的接收终端密钥对所述明文进行加密处理后,将加密后的密文发送给所述接收终端。
根据本公开实施例提供的一种计算机存储介质,存储有防消息泄密的程 序,所述防消息泄密的程序被处理器执行时实现包括:
接收到发送终端发送的包含接收终端信息和加密信息的消息后,利用预存的发送终端密钥对所述消息中的加密信息进行解密处理,得到明文;
在保存所述明文后,根据所述接收终端信息向所述接收终端发送提示消息;
在接收到所述接收终端响应所述提示消息而发送的提取请求后,对所述提取请求携带的接收终端密钥进行验证,并利用通过验证的接收终端密钥对所述明文进行加密处理后,将加密后的密文发送给所述接收终端。
在阅读并理解了附图和详细描述后,可以明白其他方面。
附图概述
图1是本公开实施例提供的一种防消息泄密的方法流程图;
图2是本公开实施例提供的一种防消息泄密的装置示意图;
图3是本公开实施例提供的网络结构图;
图4是本公开实施例提供的认证存储平台内部模块功能示意图;
图5是本公开实施例提供的消息下发流程示意图。
详述
以下结合附图对本公开的示例性实施例进行详细说明,应当理解,以下所说明的示例性实施例仅用于说明和解释本公开,并不用于限定本公开。
图1是本公开实施例提供的一种防消息泄密的方法流程图,如图1所示,包括:
步骤S101:认证存储平台接收到发送终端发送的包含接收终端信息和加密信息的消息后,利用预存的发送终端密钥对所述消息中的加密信息进行解密处理,得到明文;
步骤S102:认证存储平台在保存所述明文后,根据所述接收终端信息向所述接收终端发送提示消息;
步骤S103:认证存储平台在接收到所述接收终端响应所述提示消息而发送的提取请求后,对所述提取请求携带的接收终端密钥进行验证,并利用通过验证的接收终端密钥对所述明文进行加密处理后,将加密后的密文发送给所述接收终端。
其中,所述认证存储平台接收到发送终端发送的包含接收终端信息和加密信息的消息后,利用预存的发送终端密钥对所述消息中的加密信息进行解密处理,得到明文包括:认证存储平台接收到发送终端发送的包含接收终端信息和加密信息的消息后,从数据库中查找与所述发送终端相对应的发送终端密钥;认证存储平台利用所查找到的发送终端密钥对所述加密信息进行解密处理,得到明文。
其中,所述认证存储平台在保存所述明文后,根据所述接收终端信息向所述接收终端发送提示消息包括:认证存储平台保存所述明文,构建用于提示所述消息中接收终端提取加密信息的提示消息,并将所述提示消息发送给所述接收终端。
其中,所述认证存储平台在接收到所述接收终端响应所述提示消息而发送的提取请求后,对所述提取请求携带的接收终端密钥进行验证,并利用通过验证的接收终端密钥对所述明文进行加密处理后,将加密后的密文发送给所述接收终端包括:认证存储平台接收到所述接收终端发送的包含接收终端密钥的提取请求后,在数据库中查找与所述接收终端向对应的接收终端密钥;认证存储平台将所查找到的接收终端密钥与所述提取请求中的接收终端密钥进行验证处理,得到验证结果;认证存储平台若得到的验证结果为通过验证,则利用通过验证的接收终端密钥对所述明文进行加密处理后,将加密后的密文发送给所述接收终端。
图2是本公开实施例提供的一种防消息泄密的装置示意图,如图2所示,包括:解密模块201,设置为接收到发送终端发送的包含接收终端信息和加密信息的消息后,利用预存的发送终端密钥对所述消息中的加密信息进行解密处理,得到明文;发送模块202,设置为在保存所述明文后,根据所述接收终端信息向所述接收终端发送提示消息;验证及加密模块203,设置为在接收到所述接收终端响应所述提示消息而发送的提取请求后,对所述提取请 求携带的接收终端密钥进行验证,并利用通过验证的接收终端密钥对所述明文进行加密处理后,将加密后的密文发送给所述接收终端。
其中,所述解密模块201包括:查找单元,设置为接收到发送终端发送的包含接收终端信息和加密信息的消息后,从数据库中查找与所述发送终端相对应的发送终端密钥;解密单元,设置为利用所查找到的发送终端密钥对所述加密信息进行解密处理,得到明文。
其中,所述发送模块202设置为保存所述明文,构建用于提示所述消息中接收终端提取加密信息的提示消息,并将所述提示消息发送给所述接收终端。
其中,所述验证及加密模块203包括:查找单元,设置为接收到所述接收终端发送的包含接收终端密钥的提取请求后,在数据库中查找与所述接收终端向对应的接收终端密钥;验证单元,设置为将所查找到的接收终端密钥与所述提取请求中的接收终端密钥进行验证处理,得到验证结果;加密单元,设置为若得到的验证结果为通过验证,则利用通过验证的接收终端密钥对所述明文进行加密处理后,将加密后的密文发送给所述接收终端。
本公开实施例提供了一种防消息泄密的设备,所述设备包括:处理器,以及与所述处理器耦接的存储器;所述存储器上存储有可在所述处理器上运行的防消息泄密的程序,所述防消息泄密的程序被所述处理器执行时实现包括:
接收到发送终端发送的包含接收终端信息和加密信息的消息后,利用预存的发送终端密钥对所述消息中的加密信息进行解密处理,得到明文;
在保存所述明文后,根据所述接收终端信息向所述接收终端发送提示消息;
在接收到所述接收终端响应所述提示消息而发送的提取请求后,对所述提取请求携带的接收终端密钥进行验证,并利用通过验证的接收终端密钥对所述明文进行加密处理后,将加密后的密文发送给所述接收终端。
本公开实施例提供了一种计算机存储介质,存储有防消息泄密的程序,所述防消息泄密的程序被处理器执行时实现包括:
接收到发送终端发送的包含接收终端信息和加密信息的消息后,利用预存的发送终端密钥对所述消息中的加密信息进行解密处理,得到明文;
在保存所述明文后,根据所述接收终端信息向所述接收终端发送提示消息;
在接收到所述接收终端响应所述提示消息而发送的提取请求后,对所述提取请求携带的接收终端密钥进行验证,并利用通过验证的接收终端密钥对所述明文进行加密处理后,将加密后的密文发送给所述接收终端。
图3是本公开实施例提供的网络结构图,如图3所示,包括用户A、认证存储平台以及用户B。用户A发送消息时,先通过本地密钥进行加密,再推送到认证存储平台;认证存储平台接收到发送方(用户A)的消息后,给接收方(用户B)发送一条加密消息待提取的提示;接收方在输入自己的密钥后,从认证存储平台发起获取消息提取申请;认证存储平台验证接收方密钥合法后,以接收方的密钥进行消息加密后推送给接收方;接收方收到消息过后,再次通过自己的密钥进行解密查看。
图4是本公开实施例提供的认证存储平台内部模块功能示意图,如图4所示,要在网络中部署一套CSP(Certify and storage platform,认证存储平台),该平台能保存发送方号码和发送方用于加密消息的密钥,接收方号码和用于解密信息的密钥信息;以及能对发送方提交的加密消息进行解密,以接收方提供的密钥对消息进行加密和存储等功能。用户在发送消息前,要在认证存储平台上设置配置信息,信息包括但不限于:发送方号码、接收方号码、若干对用于发送方加密和接收方解密的密钥对。用户发送消息时,采用在认证存储平台上设置的密钥对内容进行先加密再发送;认证存储平台通过发送方在平台上设置的密钥组进行解密,解密后,暂存到认证存储平台;同时给接收用户发送一条加密短信待提取的提示。接收用户输入密钥过后,即向平台发送消息提取请求。认证存储平台判断接收方的密钥进行匹配,如果匹配成功,再根据提取请求携带的密钥,对消息进行加密后推送给接收方。接收方再次输入密钥后,才对消息进行终端解密和查看,查看过后,消息可以自焚。
图5是本公开实施例提供的消息下发流程示意图,如图5所示,包括如 下步骤:
步骤1、系统中的认证存储平台,拥有对用户号码、密钥信息的配置管理功能,配置管理功能包括但不限于新增、删除和修改等操作。平台还拥有接收用户发送的加密消息,并能按照发送方预设的密钥组进行解密和暂时存储能力;同时对接收用户发起消息提取请求,对提取请求携带的密钥进行鉴权和认证,并用此密钥对消息进行加密后,推送到接收方等功能。
用户A在发送消息前,先通过认证存储平台的门户入口,配置接收用户和发送用户的相关信息,信息包括但不限于:发送方的用户号码、接收方的用户号码、若干对用于发送方加密和接收方解密的密钥对。配置方式,可以但不限于通过二维扫码、门户网站等多种途径进行录入。密钥的约定,可以为双方约定俗成的密码对,也可以是能唯一认证身份的指纹信息等(考虑到不同时刻采集到的指纹可能不完全一致,如果设置的是指纹密钥,则要辅助设置对应的数字或者字母组合的密钥,当指纹无法加解密时,可以输入密码进行加解密)。
步骤2、用户A在认证存储平台进行信息配置时,可以根据用户B提供的密钥直接进行配置,也可以配置过后,再告诉对方密钥。当然,也可以通过认证存储平台,发起密钥邀请,让用户B通过自己的终端,配置归属自己的个性化密钥。
步骤3、当用户B在接收到认证鉴权平台发起的密钥邀请时,通过终端对自己个性化密钥进行设置。用户B提交的密钥,可以和A提交的密钥一一成对,也可以是一对多的关系。
步骤4、认证存储平台在采集完用户A和用户B的号码、密钥信息过后,保存一个完整的映射列表,至此认证存储平台上拥有用户A和用户B号码的映射关系和密钥映射关系。该信息数据用来对A发送的消息进行解密、对B发送的消息提取请求中的密钥进行身份验证和内容加密。
步骤5、认证存储给用户A和用户B可以发起一个配置成功的确认消息,并提示用户以后可以通过在平台设置的密钥进行加密消息的发送。通常情况下,发送用户和接收用户要记住自己在平台上设置的归属于自己的密钥即可,无需关心对方采用的是什么密钥。
步骤6、用户A在自己终端输入要发送给用户B的信息,在发送前通过终端对消息内容根据之前配置的密钥进行加密。加密过程可以通过在手机终端安装APP等方式,完成消息内容和密钥的加密计算。整个系统中的加密和解密方式要一致。为了确认用户发送的消息最终能在认证存储平台解密成功,可以在消息内容的特定位置植入特定的内容,如在消息内容的第一个位置,固定植入“test”等关键字。
步骤7、用户A点击发送按钮,将加密过后的消息通过网络发送到认证存储平台上。
步骤8、认证存储平台接收到用户A提交的加密消息时,使用用户A配置的密钥组,对消息内容进行解密。消息内容解密成功的判断标志可以为在步骤6中对消息内容植入的“test”关键字。如果用户A配置了多个密钥,则要对密钥进行逐一计算,并对每次的计算结果进行判断,直到解码成功。如果采用用户A配置的所有密钥,都未能解开,则要给用户A发送一条通知消息,提示用户所提交的加密消息由于密钥无效,导致发送失败,要重新发送。
步骤9、认证存储平台保存解密过后的消息内容,并在用户B的号码上下发一条加密消息待提取的提示信息,信息内容可以为“您有一条加密信息待接收,请输入认证密钥进行提取”。
步骤10、用户B看到提示后,在自己的终端上,输入密钥信息,该密钥可以为在认证存储平台设置的归属用户B的密钥组之一的任何密钥,发起内容提取请求。
步骤11、认证存储接收到用户B的提取请求后,对用户B在提取请求中携带的密钥进行验证,如果密钥为用户B事先在认证存储平台事先设置的和用户A对应的密钥,则认为真实的用户B用户发起了消息提取请求,则按用户B提取请求信息中的密钥对内容进行加密运算,以待发送。
步骤12、认证存储平台根据用户B的提取请求的密钥认证成功,则把该加密消息通过网络下发到用户B的终端上。如果认证用户B的密钥失败,则给用户B发送一条提示短信:“您输入的密钥不正确,请再次输入密钥。”对于异常情况,可以设置一个失败的最大次数,当错误次数超过最大次数时, 则不再允许用户B发起提取请求,同时通知用户A,刚才发送到用户B的加密信息由于用户B多次错误输入密钥,未能提取成功。此时用户A可以选择对先前发起的消息发起销毁操作。
步骤13、用户B在终端上接收到认证存储平台推送的加密消息过后,要再次输入消息提取时所提供的密钥,对消息内容进行解密查看。
步骤14、用户B成功解密并阅读完短信时,给用户A发送一条“您发送的信息已被xxx成功认证读取。”同时清理本次通信过程中产生的密钥和内容信息。
该方案消息内容为接收用户主动提取,而非网络直接推送到终端,从而避免由于终端被破解或者丢失导致信息泄密的风险;发送方的加密行为和接收方的解密行为没有直接的对应关系;双方的密钥可以根据需要设置一些便于记忆和理解的密钥,易用性高;发送方和接收方可以定期对密钥进行更新和修改,以防止泄密;接收方要二次验证密钥,提高系统的安全性。
根据本公开实施例提供的方案,用户发送消息时,先通过本地密钥进行加密,再推送到认证存储平台;认证存储平台接收到发送方的消息后,给接收方发送一条加密消息待提取的提示;接收方在输入自己的密钥后,从认证存储平台发起获取消息提取申请;认证存储平台验证接收方密钥合法后,以接收方的密钥进行消息加密后推送给接收方;接收方收到消息过后,再次通过自己的密钥进行解密查看,提高了信息的安全性。
根据本公开实施例提供的方案,具有以下有益效果:
1、消息内容为接收用户主动提取,而非网络直接推送到终端,从而避免由于终端被破解或者丢失导致信息泄密的风险。
2、发送方的加密行为和接收方的解密行为没有直接的对应关系。
3、双方的密钥可以根据需要设置一些便于记忆和理解的密钥,易用性高。
4、发送方和接收方可以定期对密钥进行更新和修改,以防止泄密。
5、接收方要二次验证密钥,系统的安全性更高。
本领域普通技术人员可以理解,上文中所公开方法中的全部或某些步 骤、系统、装置中的功能模块/单元可以被实施为软件、固件、硬件及其适当的组合。在硬件实施方式中,在以上描述中提及的功能模块/单元之间的划分不一定对应于物理组件的划分;例如,一个物理组件可以具有多个功能,或者一个功能或步骤可以由若干物理组件合作执行。某些组件或所有组件可以被实施为由处理器,如数字信号处理器或微处理器执行的软件,或者被实施为硬件,或者被实施为集成电路,如专用集成电路。这样的软件可以分布在计算机可读介质上,计算机可读介质可以包括计算机存储介质(或非暂时性介质)和通信介质(或暂时性介质)。如本领域普通技术人员公知的,术语计算机存储介质包括在用于存储信息(诸如计算机可读指令、数据结构、程序模块或其他数据)的任何方法或技术中实施的易失性和非易失性、可移除和不可移除介质。计算机存储介质包括但不限于RAM、ROM、EEPROM、闪存或其他存储器技术、CD-ROM、数字多功能盘(DVD)或其他光盘存储、磁盒、磁带、磁盘存储或其他磁存储装置、或者可以用于存储期望的信息并且可以被计算机访问的任何其他的介质。此外,本领域普通技术人员公知的是,通信介质通常包含计算机可读指令、数据结构、程序模块或者诸如载波或其他传输机制之类的调制数据信号中的其他数据,并且可包括任何信息递送介质。
尽管上文对本公开进行了详细说明,但是本公开不限于此,本技术领域技术人员可以根据本公开的原理进行各种修改。因此,凡按照本公开原理所作的修改,都应当理解为落入本公开的保护范围。

Claims (10)

  1. 一种防消息泄密的方法,包括:
    认证存储平台接收到发送终端发送的包含接收终端信息和加密信息的消息后,利用预存的发送终端密钥对所述消息中的加密信息进行解密处理,得到明文(S101);
    认证存储平台在保存所述明文后,根据所述接收终端信息向所述接收终端发送提示消息(S102);
    认证存储平台在接收到所述接收终端响应所述提示消息而发送的提取请求后,对所述提取请求携带的接收终端密钥进行验证,并利用通过验证的接收终端密钥对所述明文进行加密处理后,将加密后的密文发送给所述接收终端(S103)。
  2. 根据权利要求1所述的方法,所述认证存储平台接收到发送终端发送的包含接收终端信息和加密信息的消息后,利用预存的发送终端密钥对所述消息中的加密信息进行解密处理,得到明文(S101)包括:
    认证存储平台接收到发送终端发送的包含接收终端信息和加密信息的消息后,从数据库中查找与所述发送终端相对应的发送终端密钥;
    认证存储平台利用所查找到的发送终端密钥对所述加密信息进行解密处理,得到明文。
  3. 根据权利要求1或2所述的方法,所述认证存储平台在保存所述明文后,根据所述接收终端信息向所述接收终端发送提示消息(S102)包括:
    认证存储平台保存所述明文,构建用于提示所述消息中接收终端提取加密信息的提示消息,并将所述提示消息发送给所述接收终端。
  4. 根据权利要求3所述的方法,所述认证存储平台在接收到所述接收终端响应所述提示消息而发送的提取请求后,对所述提取请求携带的接收终端密钥进行验证,并利用通过验证的接收终端密钥对所述明文进行加密处理后,将加密后的密文发送给所述接收终端(S103)包括:
    认证存储平台接收到所述接收终端发送的包含接收终端密钥的提取请 求后,在数据库中查找与所述接收终端向对应的接收终端密钥;
    认证存储平台将所查找到的接收终端密钥与所述提取请求中的接收终端密钥进行验证处理,得到验证结果;
    认证存储平台若得到的验证结果为通过验证,则利用通过验证的接收终端密钥对所述明文进行加密处理后,将加密后的密文发送给所述接收终端。
  5. 一种防消息泄密的装置,包括:
    解密模块(201),设置为接收到发送终端发送的包含接收终端信息和加密信息的消息后,利用预存的发送终端密钥对所述消息中的加密信息进行解密处理,得到明文;
    发送模块(202),设置为在保存所述明文后,根据所述接收终端信息向所述接收终端发送提示消息;
    验证及加密模块(203),设置为在接收到所述接收终端响应所述提示消息而发送的提取请求后,对所述提取请求携带的接收终端密钥进行验证,并利用通过验证的接收终端密钥对所述明文进行加密处理后,将加密后的密文发送给所述接收终端。
  6. 根据权利要求5所述的装置,所述解密模块(201)包括:
    查找单元,设置为接收到发送终端发送的包含接收终端信息和加密信息的消息后,从数据库中查找与所述发送终端相对应的发送终端密钥;
    解密单元,设置为利用所查找到的发送终端密钥对所述加密信息进行解密处理,得到明文。
  7. 根据权利要求5或6所述的装置,所述发送模块(202)设置为保存所述明文,构建用于提示所述消息中接收终端提取加密信息的提示消息,并将所述提示消息发送给所述接收终端。
  8. 根据权利要求7所述的装置,所述验证及加密模块(203)包括:
    查找单元,设置为接收到所述接收终端发送的包含接收终端密钥的提取请求后,在数据库中查找与所述接收终端向对应的接收终端密钥;
    验证单元,设置为将所查找到的接收终端密钥与所述提取请求中的接收 终端密钥进行验证处理,得到验证结果;
    加密单元,设置为若得到的验证结果为通过验证,则利用通过验证的接收终端密钥对所述明文进行加密处理后,将加密后的密文发送给所述接收终端。
  9. 一种防消息泄密的设备,所述设备包括:处理器,以及与所述处理器耦接的存储器;所述存储器上存储有在所述处理器上可运行的防消息泄密的程序,所述防消息泄密的程序被所述处理器执行时实现包括:
    接收到发送终端发送的包含接收终端信息和加密信息的消息后,利用预存的发送终端密钥对所述消息中的加密信息进行解密处理,得到明文(S101);
    在保存所述明文后,根据所述接收终端信息向所述接收终端发送提示消息(S102);
    在接收到所述接收终端响应所述提示消息而发送的提取请求后,对所述提取请求携带的接收终端密钥进行验证,并利用通过验证的接收终端密钥对所述明文进行加密处理后,将加密后的密文发送给所述接收终端(S103)。
  10. 一种计算机存储介质,存储有防消息泄密的程序,所述防消息泄密的程序被处理器执行时实现包括:
    接收到发送终端发送的包含接收终端信息和加密信息的消息后,利用预存的发送终端密钥对所述消息中的加密信息进行解密处理,得到明文(S101);
    在保存所述明文后,根据所述接收终端信息向所述接收终端发送提示消息(S102);
    在接收到所述接收终端响应所述提示消息而发送的提取请求后,对所述提取请求携带的接收终端密钥进行验证,并利用通过验证的接收终端密钥对所述明文进行加密处理后,将加密后的密文发送给所述接收终端(S103)。
PCT/CN2018/102773 2017-10-10 2018-08-28 一种防消息泄密的方法及装置 WO2019072042A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710935346.4 2017-10-10
CN201710935346.4A CN109660488A (zh) 2017-10-10 2017-10-10 一种防消息泄密的方法及装置

Publications (1)

Publication Number Publication Date
WO2019072042A1 true WO2019072042A1 (zh) 2019-04-18

Family

ID=66101283

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/102773 WO2019072042A1 (zh) 2017-10-10 2018-08-28 一种防消息泄密的方法及装置

Country Status (2)

Country Link
CN (1) CN109660488A (zh)
WO (1) WO2019072042A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115119150A (zh) * 2022-07-26 2022-09-27 广东安创信息科技开发有限公司 一种短信加解密方法、装置、设备及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080250245A1 (en) * 2006-10-05 2008-10-09 Sanderson Daniel O Biometric-based document security
CN102088441A (zh) * 2009-12-08 2011-06-08 北京大学 消息中间件的数据加密传输方法和系统
CN103490889A (zh) * 2013-08-07 2014-01-01 金子光 一种无限长密钥互联网通信加密方法
CN104954378A (zh) * 2015-06-19 2015-09-30 收付宝科技有限公司 一种非对称加密消息的方法和系统

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8776249B1 (en) * 2011-04-11 2014-07-08 Google Inc. Privacy-protective data transfer
CN102638459B (zh) * 2012-03-23 2018-01-26 腾讯科技(深圳)有限公司 认证信息传输系统、认证信息传输服务平台及传输方法
CN105007254B (zh) * 2014-04-17 2019-04-12 腾讯科技(深圳)有限公司 数据传输方法和系统、终端
CN103945348A (zh) * 2014-04-25 2014-07-23 长沙市梦马软件有限公司 一种非对称密钥短信加密方法和系统
CN106130954A (zh) * 2016-06-01 2016-11-16 成都银事达信息技术有限公司 一种移动互联网教学系统的数据处理方法
CN106911718A (zh) * 2017-04-17 2017-06-30 江苏亨通问天量子信息研究院有限公司 基于量子密钥服务站的保密对讲系统及方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080250245A1 (en) * 2006-10-05 2008-10-09 Sanderson Daniel O Biometric-based document security
CN102088441A (zh) * 2009-12-08 2011-06-08 北京大学 消息中间件的数据加密传输方法和系统
CN103490889A (zh) * 2013-08-07 2014-01-01 金子光 一种无限长密钥互联网通信加密方法
CN104954378A (zh) * 2015-06-19 2015-09-30 收付宝科技有限公司 一种非对称加密消息的方法和系统

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115119150A (zh) * 2022-07-26 2022-09-27 广东安创信息科技开发有限公司 一种短信加解密方法、装置、设备及存储介质
CN115119150B (zh) * 2022-07-26 2023-10-03 广东安创信息科技开发有限公司 一种短信加解密方法、装置、设备及存储介质

Also Published As

Publication number Publication date
CN109660488A (zh) 2019-04-19

Similar Documents

Publication Publication Date Title
CN106656476B (zh) 一种密码保护方法、装置及计算机可读存储介质
US11265319B2 (en) Method and system for associating a unique device identifier with a potential security threat
US20220014524A1 (en) Secure Communication Using Device-Identity Information Linked To Cloud-Based Certificates
US8099761B2 (en) Protocol for device to station association
US9137223B2 (en) Apparatus and method for transmitting data, and recording medium storing program for executing method of the same in computer
US8769612B2 (en) Portable device association
US11336641B2 (en) Security enhanced technique of authentication protocol based on trusted execution environment
CN103166958B (zh) 一种文件的保护方法及系统
AU2012334829C1 (en) Secure messaging
CN107241339B (zh) 身份验证方法、装置和存储介质
WO2019109097A1 (en) Identity verification document request handling utilizing a user certificate system and user identity document repository
US20150350894A1 (en) Method and System for Establishing a Secure Communication Channel
US20060005033A1 (en) System and method for secure communications between at least one user device and a network entity
US20080130879A1 (en) Method and system for a secure PKI (Public Key Infrastructure) key registration process on mobile environment
CN105024819A (zh) 一种基于移动终端的多因子认证方法及系统
TWI581599B (zh) 金鑰生成系統、資料簽章與加密系統和方法
CN103297403A (zh) 一种实现动态密码认证的方法和系统
CN114900304B (zh) 数字签名方法和装置、电子设备和计算机可读存储介质
US8972734B2 (en) Symmetric dynamic authentication and key exchange system and method thereof
CN114143082B (zh) 一种加密通信方法、系统及装置
KR101558557B1 (ko) 아이디와 패스워드 입력 방식을 대체하는 휴대 전화번호 기반의 회원인증 방법 및 서버 시스템
KR101358375B1 (ko) 스미싱 방지를 위한 문자메시지 보안 시스템 및 방법
RU2698424C1 (ru) Способ управления авторизацией
WO2019072042A1 (zh) 一种防消息泄密的方法及装置
KR102053993B1 (ko) 인증서를 이용한 사용자 인증 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18866585

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 10/09/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 18866585

Country of ref document: EP

Kind code of ref document: A1