[go: up one dir, main page]

CN102752270B - Electronic document transfer system, mobile communication device and related decryption device - Google Patents

Electronic document transfer system, mobile communication device and related decryption device Download PDF

Info

Publication number
CN102752270B
CN102752270B CN201110101503.4A CN201110101503A CN102752270B CN 102752270 B CN102752270 B CN 102752270B CN 201110101503 A CN201110101503 A CN 201110101503A CN 102752270 B CN102752270 B CN 102752270B
Authority
CN
China
Prior art keywords
challenge
value
response
mobile communication
communication device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201110101503.4A
Other languages
Chinese (zh)
Other versions
CN102752270A (en
Inventor
林岱宏
洪伯岳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JRSYS INTERNATIONAL CORP
Original Assignee
JRSYS INTERNATIONAL CORP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JRSYS INTERNATIONAL CORP filed Critical JRSYS INTERNATIONAL CORP
Priority to CN201110101503.4A priority Critical patent/CN102752270B/en
Publication of CN102752270A publication Critical patent/CN102752270A/en
Application granted granted Critical
Publication of CN102752270B publication Critical patent/CN102752270B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

One embodiment of the mobile communication device provided by the invention comprises a wireless communication interface, a challenge response module and a decryption module. The wireless communication interface is used for receiving the encrypted electronic file and the challenge value. The challenge response module is used for generating a response value according to the challenge value and a challenge response algorithm. The decryption module is used for decrypting the encrypted electronic file by using the response value. If the challenge-response algorithm stored in the challenge-response module does not correspond to the encryption process of the encrypted electronic file, the decryption module cannot decrypt the received encrypted electronic file.

Description

电子文件传递系统、移动通信装置及相关的解密装置Electronic document transfer system, mobile communication device and related decryption device

技术领域 technical field

本发明有关移动通信装置,尤指一种可搭配挑战响应模块进行文件解密功能的移动通信装置。The present invention relates to a mobile communication device, especially a mobile communication device that can be used with a challenge response module to perform file decryption.

背景技术 Background technique

随着科技的进步,许多信息已由寄送实体文件的方式改为以电子文件的方式传输,因此,确保电子文件传输时的信息安全已成为刻不容缓的议题。例如,当文件提供者欲将电子文件提供给目标收件者时,为确保电子文件中的信息不会泄漏,文件提供者常先将电子文件加密,再将经加密的电子文件(以下称加密电子文件)提供给目标收件者,目标收件者必需使用特定的解密金钥才能将加密电子文件解密而获得信息。With the advancement of science and technology, many information has been transferred from sending physical documents to electronic documents. Therefore, ensuring information security during electronic document transmission has become an urgent issue. For example, when the file provider intends to provide the electronic file to the target recipient, in order to ensure that the information in the electronic file will not be leaked, the file provider often encrypts the electronic file first, and then encrypts the encrypted electronic file (hereinafter referred to as encrypted file). Electronic file) is provided to the target recipient, and the target recipient must use a specific decryption key to decrypt the encrypted electronic file and obtain information.

某些文件提供者会使用与目标收件者相关的信息来做为加密电子文件的解密金钥,例如使用目标收件者的身分证字号、生日、帐号号码、或手机门号等来做为解密金钥。然而,恶意的第三者可能知道目标收件者相关的信息而轻易的猜出此类的解密金钥,导致电子文件的信息面临泄漏的风险。Some file providers will use information related to the target recipient as the decryption key for encrypted electronic files, such as using the target recipient's ID number, date of birth, account number, or mobile phone number, etc. decryption key. However, a malicious third party may know the relevant information of the target recipient and easily guess such a decryption key, resulting in the risk of information leakage of the electronic file.

某些文件提供者为避免上述解密金钥被轻易猜出的情形,则会使用与目标收件者的个人信息无关的解密金钥,并将解密金钥传送给目标收件者。然而,解密金钥仍可能在传输的过程中受到恶意第三者的拦截,而导致电子文件面临泄漏的风险。In order to avoid the situation where the above-mentioned decryption key is easily guessed, some file providers will use a decryption key that has nothing to do with the personal information of the target recipient, and transmit the decryption key to the target recipient. However, the decryption key may still be intercepted by a malicious third party in the process of transmission, resulting in the risk of electronic files being leaked.

此外,某些文件提供者为了提升信息的安全度,会时常更换解密金钥。然而,定期更换解密金钥的流程常是相当繁琐的,不但增加了系统的复杂度,并且目标收件者必须不断记忆或储存新的解密金钥,而降低目标收件者使用时的便利性。In addition, some file providers will change the decryption key from time to time in order to improve the security of information. However, the process of regularly replacing the decryption key is often quite cumbersome, which not only increases the complexity of the system, but also the target recipient must constantly memorize or store new decryption keys, which reduces the convenience of the target recipient .

发明内容Contents of the invention

有鉴于此,如何提升信息的安全性,并且增加使用者操作时的便利性,实系业界有待解决的问题。In view of this, how to improve the security of information and increase the convenience of user operations is a problem to be solved in the industry.

本说明书提供了一种电子文件传递系统,包含有:一文件提供装置,包含有:一数据库,用于储存复数个挑战响应算法;一处理器,依据一目标收件者的一信息查找该数据库,以决定对应于该目标收件者的一挑战响应算法,并依据该挑战响应算法,产生对应的一挑战值和一响应值;一加密模块,依据该响应值将一电子文件加密为一加密电子文件;以及一通信接口,用于将该加密电子文件及该挑战值传送至一移动通信装置;以及该移动通信装置,包含有:一无线通信接口,用于接收该加密电子文件及该挑战值;一挑战响应模块,用于储存该挑战响应算法,并依据该挑战值及该挑战响应算法产生该响应值;以及一解密模块,用于依据该响应值对该加密电子文件进行解密。This specification provides an electronic document delivery system, including: a document providing device, including: a database for storing a plurality of challenge response algorithms; a processor for searching the database according to information of a target recipient , to determine a challenge-response algorithm corresponding to the target recipient, and generate a corresponding challenge value and a response value according to the challenge-response algorithm; an encryption module, encrypt an electronic file into an encrypted file according to the response value electronic file; and a communication interface for transmitting the encrypted electronic file and the challenge value to a mobile communication device; and the mobile communication device includes: a wireless communication interface for receiving the encrypted electronic file and the challenge value; a challenge response module, used to store the challenge response algorithm, and generate the response value according to the challenge value and the challenge response algorithm; and a decryption module, used to decrypt the encrypted electronic file according to the response value.

本说明书另提供了一种解密金钥产生装置的实施例,用于允许一移动通信装置在收到一加密电子文件与一挑战值后执行一解密金钥产生运算,其特征在于,该解密金钥产生装置包含有:用于利用该移动通信装置的一输入接口接收一输入值的装置;用于利用该移动通信装置的一通信接口将该输入值传送给一挑战响应模块的装置;以及用于利用该通信接口从该挑战响应模块接收对应于该输入值的一响应值的装置;其中若该输入值等于该挑战值,则该移动通信装置使用该响应值来对该加密电子文件进行解密。This specification also provides an embodiment of a device for generating a decryption key, which is used to allow a mobile communication device to perform a decryption key generation operation after receiving an encrypted electronic file and a challenge value. It is characterized in that the decryption key The key generation device includes: means for receiving an input value using an input interface of the mobile communication device; means for transmitting the input value to a challenge response module using a communication interface of the mobile communication device; and A device for receiving a response value corresponding to the input value from the challenge response module using the communication interface; wherein if the input value is equal to the challenge value, the mobile communication device uses the response value to decrypt the encrypted electronic file .

本说明书还提供了一种解密装置的实施例,用于允许一移动通信装置在收到一加密电子文件与一挑战值后执行一解密运算,其特征在于,该解密装置包含有:用于利用该移动通信装置的一通信接口将该挑战值传送给一挑战响应模块的装置;用于利用该通信接口从该挑战响应模块接收对应于该挑战值的一响应值的装置;以及用于利用该移动通信装置的一解密模块,以该响应值来对该加密电子文件进行解密的装置。This specification also provides an embodiment of a decryption device, which is used to allow a mobile communication device to perform a decryption operation after receiving an encrypted electronic file and a challenge value. It is characterized in that the decryption device includes: for using A communication interface of the mobile communication device transmits the challenge value to means for a challenge response module; means for receiving a response value corresponding to the challenge value from the challenge response module using the communication interface; and means for using the A decryption module of the mobile communication device is used to decrypt the encrypted electronic file with the response value.

本说明书又提供了一种电子文件提供装置的实施例,其包含有:用于决定在一电子文件的一目标收件者的一挑战响应算法下,相互对应的一挑战值及一响应值的装置,其中该挑战值异于该响应值;用于使用该响应值来对该电子文件进行加密以产生一加密电子文件的装置;以及用于传送该加密电子文件及该挑战值至该目标收件者可存取的一或多个装置的装置。This specification also provides an embodiment of an electronic file providing device, which includes: a method for determining a challenge value and a response value corresponding to each other under a challenge-response algorithm of a target recipient of an electronic file means, wherein the challenge value is different from the response value; means for encrypting the electronic document using the response value to generate an encrypted electronic document; and for transmitting the encrypted electronic document and the challenge value to the target recipient A device that can be accessed by one or more devices.

本说明书另提供了一种移动通信装置的实施例,包含有:无线通信接口,用来接收加密电子文件与挑战值;挑战响应模块,用来依据挑战值及挑战响应算法产生响应值;以及解密模块,用来使用响应值来对加密电子文件进行解密。This specification also provides an embodiment of a mobile communication device, including: a wireless communication interface, used to receive encrypted electronic files and challenge values; a challenge response module, used to generate response values according to the challenge value and challenge response algorithm; and decryption A module for decrypting an encrypted electronic document using the response value.

本说明书又提供了另一种解密装置的实施例,用于允许一移动通信装置接收到一加密电子文件以及一挑战值后,执行一解密运算,其特征在于,该解密装置包含有:用于接收到一解密金钥产生指令时,利用该移动通信装置的一显示介面显示一挑战值输入请求;用于通过该移动通信装置的一输入接口接收一第一输入值;用于若储存有一挑战响应算法的外部储存装置被可卸除式地插入该移动通信装置,且该第一输入值等于该挑战值,则利用该移动通信装置的一显示介面来显示一响应值的装置;用于利用该输入接口来接收一第二输入值的装置;以及用于若该第二输入值等于该响应值,则利用该移动通信装置的一解密模块来解密该加密电子文件的装置。This specification also provides another embodiment of a decryption device, which is used to allow a mobile communication device to perform a decryption operation after receiving an encrypted electronic file and a challenge value. It is characterized in that the decryption device includes: When a decryption key generation instruction is received, a display interface of the mobile communication device is used to display a challenge value input request; for receiving a first input value through an input interface of the mobile communication device; for storing a challenge value The external storage device of the response algorithm is removably inserted into the mobile communication device, and the first input value is equal to the challenge value, then a display interface of the mobile communication device is used to display a response value; A device for receiving a second input value through the input interface; and a device for decrypting the encrypted electronic file by using a decryption module of the mobile communication device if the second input value is equal to the response value.

上述实施例的优点之一在于能够提升信息传输的安全性。此外,上述实施例的另一优点在于能够让使用者操作上更加便利。One of the advantages of the above embodiments is that the security of information transmission can be improved. In addition, another advantage of the above-mentioned embodiment is that it can make the operation more convenient for the user.

附图说明 Description of drawings

图1为本发明的电子文件传递系统的一实施例简化后的功能方框图。FIG. 1 is a simplified functional block diagram of an embodiment of the electronic file delivery system of the present invention.

图2为图1之文件提供装置所执行的文件提供方法的一实施例流程图。FIG. 2 is a flowchart of an embodiment of a file providing method executed by the file providing device in FIG. 1 .

图3为图1之移动通信装置所执行的文件存取方法的第一实施例简化后的流程图。FIG. 3 is a simplified flow chart of the first embodiment of the file access method executed by the mobile communication device in FIG. 1 .

图4为图1之移动通信装置所执行的文件存取方法的第二实施例简化后的流程图。FIG. 4 is a simplified flow chart of a second embodiment of the file access method executed by the mobile communication device in FIG. 1 .

具体实施方式 Detailed ways

以下将配合相关图式来说明本发明之实施例。在这些图式中,相同的标号系表示相同或类似的元件。Embodiments of the present invention will be described below in conjunction with related drawings. In the drawings, the same reference numerals designate the same or similar elements.

在说明书及后续的申请专利范围当中使用了某些词汇来指称特定的元件。所属领域中具有通常知识者应可理解,同样的元件可能会用不同的名词来称呼。本说明书及后续的申请专利范围并不以名称的差异来作为区分元件的方式,而是以元件在功能上的差异来作为区分的基准。在通篇说明书及后续的权利要求当中所提及的「包含」为一开放式的用语,故应解释成「包含但不限定于...」。Certain terms are used in the specification and subsequent claims to refer to particular elements. It should be understood by those skilled in the art that the same element may be referred to by different names. This specification and subsequent patent applications do not use the difference in name as a way to distinguish components, but use the difference in function of components as a basis for differentiation. "Includes" mentioned throughout the specification and subsequent claims is an open-ended term, so it should be interpreted as "including but not limited to...".

图1为本发明一实施例的电子文件传递系统100简化后的功能方框图。电子文件传递系统100包含有文件提供装置110、网络130、移动通信装置150_1~150_K、以及挑战响应模块170_1~170_K。图1中仅绘示了移动通信装置150_K的内部功能方框以简化说明。此外,移动通信装置150_1~150_K和挑战响应模块170_1~170_K可以分别采用相同、类似或是不同的装置。FIG. 1 is a simplified functional block diagram of an electronic file delivery system 100 according to an embodiment of the present invention. The electronic file delivery system 100 includes a file providing device 110 , a network 130 , mobile communication devices 150_1 - 150_K, and challenge response modules 170_1 - 170_K. In FIG. 1 , only the internal functional blocks of the mobile communication device 150_K are shown to simplify the description. In addition, the mobile communication devices 150_1 - 150_K and the challenge response modules 170_1 - 170_K may respectively adopt the same, similar or different devices.

文件提供装置110可以是服务器,其拥有者(以下称文件提供者)可以是政府、金融机构、医院、公用事业公司或相关的数据处理机构等。移动通信装置150_1~150_K可以是手机、平板电脑、个人数字助理或各种可携式装置,其拥有者(以下称目标收件者)可以是文件提供者的客户、供应商或合作伙伴等。网络130则可以是网际网络、移动通信网络、及/或各种有线或无线的信息传递媒介。The file providing device 110 may be a server, and its owner (hereinafter referred to as the file provider) may be a government, a financial institution, a hospital, a public utility company or a related data processing institution, etc. The mobile communication devices 150_1-150_K may be mobile phones, tablet computers, personal digital assistants or various portable devices, and their owners (hereinafter referred to as target recipients) may be customers, suppliers or partners of the file provider. The network 130 may be the Internet, a mobile communication network, and/or various wired or wireless information transmission media.

文件提供装置110会通过网络130将特定的电子文件(图中未绘示)传送给目标收件者的移动通信装置150_K。前述的电子文件的内容可以是目标收件者的税务信息、交易信息、电子帐单、电子票券、病历数据、或其他与个人隐私或机密相关的信息等。为防止恶意第三者窃取电子文件中的信息,文件提供装置110会先对电子文件进行加密以产生加密电子文件,再将加密电子文件传送给移动通信装置150_K。移动通信装置150_K收到加密电子文件之后,则需对加密电子文件进行解密才能呈现电子文件内的信息给目标使用者。The file providing device 110 transmits a specific electronic file (not shown in the figure) to the target recipient's mobile communication device 150_K through the network 130 . The content of the aforementioned electronic files may be the target recipient's tax information, transaction information, electronic bills, electronic coupons, medical record data, or other information related to personal privacy or confidentiality. In order to prevent a malicious third party from stealing information in the electronic file, the file providing device 110 first encrypts the electronic file to generate an encrypted electronic file, and then transmits the encrypted electronic file to the mobile communication device 150_K. After receiving the encrypted electronic file, the mobile communication device 150_K needs to decrypt the encrypted electronic file to present the information in the electronic file to the target user.

在开始提供电子文件传递的服务之前,文件提供者会提供每个目标收件者一个专属的挑战响应模块,挑战响应模块中存有一个挑战响应算法(challengeresponsealgorithm)。目标收件者必须将其移动通信装置与文件提供者配发的挑战响应模块搭配使用,才能解开文件提供者传送过来的加密电子文件的内容。前述的挑战响应算法可以采用各种加密算法,以依据挑战值产生对应的响应值。因此,当第三者不知道挑战响应算法时,即使取得了挑战值,也无法据以得出响应值。此外,即使第三者取得了少数的挑战值与响应值,也难以推导出挑战响应算法。在本实施例中,将挑战响应算法设置为不会产生与挑战值相同数值的响应值。在另一实施例中,可将挑战响应算法设置为会产生部分的响应值与挑战值具有的相同数值。Before starting to provide electronic file delivery services, the file provider will provide each target recipient with a dedicated challenge response module, and a challenge response algorithm (challenge response algorithm) is stored in the challenge response module. The intended recipient must use their mobile communication device with the challenge-response module issued by the file provider to decrypt the content of the encrypted electronic file sent by the file provider. The aforementioned challenge-response algorithm may use various encryption algorithms to generate a corresponding response value according to the challenge value. Therefore, when the third party does not know the challenge-response algorithm, even if the challenge value is obtained, the response value cannot be obtained accordingly. In addition, even if a third party obtains a small number of challenge values and response values, it is difficult to derive a challenge-response algorithm. In this embodiment, the challenge-response algorithm is set so as not to produce a response value of the same numerical value as the challenge value. In another embodiment, the challenge-response algorithm can be set to result in a portion of the response value having the same value as the challenge value.

实作上,可以随机选择挑战值或依特定的次序选择挑战值,再将选定的挑战值依据挑战响应算法以产生响应值。或者,可以采用依一定频率重复的挑战值或者采用不会重复的挑战值。In practice, the challenge value can be selected randomly or in a specific order, and then the selected challenge value can be used according to the challenge response algorithm to generate the response value. Alternatively, a challenge value that repeats at a certain frequency or a challenge value that does not repeat may be used.

如图1所示,文件提供装置110包含有处理器112、数据库114、加密模块116、及通信接口118。数据库114可以是各种形式的储存装置,用于储存加密算法或目标使用者的信息等数据。电子文件传递系统100中有多组移动通信装置与挑战响应模块(图1中以K组为例),每组移动通信装置与挑战响应模块各属于一个目标收件者。文件提供装置110的数据库114中会储存各个目标收件者与对应的挑战响应算法间的配对关系。加密模块116可以采用软件、硬件、或软件配合硬件的方式对电子文件进行加密。通信接口118可以采用各种有线或无线的通信接口,以将文件提供装置110连接至网络130。As shown in FIG. 1 , the file providing device 110 includes a processor 112 , a database 114 , an encryption module 116 , and a communication interface 118 . The database 114 can be a storage device in various forms for storing data such as encryption algorithms or target user information. There are multiple groups of mobile communication devices and challenge response modules in the electronic document delivery system 100 (group K is taken as an example in FIG. 1 ), and each group of mobile communication devices and challenge response modules belongs to a target recipient. The database 114 of the file providing device 110 stores the pairing relationship between each target recipient and the corresponding challenge-response algorithm. The encryption module 116 may use software, hardware, or a combination of software and hardware to encrypt electronic files. The communication interface 118 can adopt various wired or wireless communication interfaces to connect the file providing device 110 to the network 130 .

移动通信装置150_K包含有处理器152_K、无线通信接口154_K、显示介面156_K、使用者输入接口158_K、通信接口162_K、及解密模块164_K。无线通信接口154_K可用来将移动通信装置150_K连接至网络130。显示介面156_K用来将信息显示给使用者。使用者输入接口158_K可以是键盘、触控装置、影像输入接口、语音输入模组等各种输入装置,用来让使用者对移动通信装置150_K输入信息或下达指令。通信接口162_K可以采用各种有线或无线的接口来实现,例如记忆卡接口、1394接口、通用序列总线(USB)接口、或能与移动通信装置的用户身分模块(subscriberidentitymodule,SIM)传输数据的接口等,以耦接至挑战响应模块170_K。解密模块164_K可以采用软件、硬件、或软件配合硬件的方式对加密电子文件进行解密。The mobile communication device 150_K includes a processor 152_K, a wireless communication interface 154_K, a display interface 156_K, a user input interface 158_K, a communication interface 162_K, and a decryption module 164_K. The wireless communication interface 154_K can be used to connect the mobile communication device 150_K to the network 130 . The display interface 156_K is used to display information to the user. The user input interface 158_K can be various input devices such as a keyboard, a touch device, an image input interface, a voice input module, etc., and is used for allowing the user to input information or issue instructions to the mobile communication device 150_K. The communication interface 162_K can be realized by various wired or wireless interfaces, such as a memory card interface, a 1394 interface, a universal serial bus (USB) interface, or an interface capable of transmitting data with a subscriber identity module (SIM) of a mobile communication device etc., to be coupled to the challenge response module 170_K. The decryption module 164_K may use software, hardware, or a combination of software and hardware to decrypt encrypted electronic files.

在本实施例中,挑战响应模块170_K是具有运算能力的微型电路,能执行目标收件者的挑战响应算法的运算。例如,挑战响应模块170_K可以是文件提供者提供给目标收件者的薄型电路板,用于贴附于目标收件者的用户身分模块上,并储存有文件提供者指定给目标收件者的挑战响应算法。挑战响应算法可依据一挑战值而产生一对应的响应值,因此,挑战响应模块170_K可以储存挑战响应算法及/或储存挑战值和响应值的各种对应组合。目标收件者将贴有薄型电路板的用户身分模块装设于移动通信装置150_K后,移动通信装置150_K即可存取挑战响应模块170_K。In this embodiment, the challenge-response module 170_K is a microcircuit with computing capability, capable of executing the computation of the target recipient's challenge-response algorithm. For example, the challenge-response module 170_K may be a thin circuit board provided by the file provider to the target recipient, used to be attached to the target recipient's user identity module, and stores the information specified by the file provider to the target recipient. Challenge Response Algorithm. The challenge response algorithm can generate a corresponding response value according to a challenge value, therefore, the challenge response module 170_K can store the challenge response algorithm and/or store various corresponding combinations of the challenge value and the response value. After the target recipient installs the SIM with the thin circuit board on the mobile communication device 150_K, the mobile communication device 150_K can access the challenge response module 170_K.

实做上,可依据设计考量将移动通信装置150_K中的多个功能方框合并为单一元件来实现,或者将单一功能方框以多个元件来实现。例如,可将显示介面156_K与使用者输入接口158_K整合成单一的触控屏幕。In practice, according to design considerations, multiple functional blocks in the mobile communication device 150_K can be combined into a single component, or a single functional block can be implemented with multiple components. For example, the display interface 156_K and the user input interface 158_K can be integrated into a single touch screen.

在图1的电子文件传递系统中,文件提供装置110使用响应值对电子文件加密,目标使用者的移动通信装置150_K则依据响应值对加密电子文件进行解密。例如,目标使用者的移动通信装置150_K可单独使用响应值对加密电子文件进行解密。或者,亦可采用响应值搭配密码、私密金钥、语音及/或影像等方式,对加密电子文件进行解密。因此,即使第三者取得加密电子文件及挑战值,但无法得知响应值或目标使用者的挑战响应算法时,第三者仍然无法读取加密电子文件中的信息,而能够提升电子文件在信息传输上的安全性。In the electronic file delivery system in FIG. 1 , the file providing device 110 encrypts the electronic file using the response value, and the target user's mobile communication device 150_K decrypts the encrypted electronic file according to the response value. For example, the target user's mobile communication device 150_K can use the response value alone to decrypt the encrypted electronic file. Alternatively, the encrypted electronic file may also be decrypted by using the response value together with a password, a private key, voice and/or image, and the like. Therefore, even if a third party obtains the encrypted electronic file and the challenge value, but cannot know the response value or the challenge-response algorithm of the target user, the third party still cannot read the information in the encrypted electronic file, and can improve the security of the electronic file. Security of information transmission.

在一实施例中,文件提供者会为目标收件者设置一对应的挑战响应算法,并储存于文件提供装置110的数据库114及提供给目标收件者的挑战响应模块170_K之中。文件提供装置110与挑战响应模块170_K使用同一个挑战响应算法,其他使用者或未授权的第三者不会知道该挑战响应算法的细节。因此,当文件提供装置110将应传送给移动通信装置150_K的挑战值与加密电子文件误传给其他使用者的移动通信装置时,其他使用者的移动通信装置会因为没有对应的挑战响应模块170_K可搭配运算,而无法获得正确的响应值来解密该电子文件,藉此可以确保加密电子文件中的信息难以被其他人所读取。In one embodiment, the file provider sets a corresponding challenge-response algorithm for the target recipient, and stores it in the database 114 of the file-providing device 110 and the challenge-response module 170_K provided to the target recipient. The file providing device 110 and the challenge-response module 170_K use the same challenge-response algorithm, and other users or unauthorized third parties will not know the details of the challenge-response algorithm. Therefore, when the file providing device 110 mistransmits the challenge value and the encrypted electronic file that should be sent to the mobile communication device 150_K to the mobile communication devices of other users, the mobile communication devices of other users will not have the corresponding challenge response module 170_K It can be combined with calculations to decrypt the electronic file without obtaining the correct response value, thereby ensuring that the information in the encrypted electronic file is difficult to be read by others.

在另一实施例中,文件提供者可将数个通信装置设置为使用相同的挑战响应算法,以减少数据库114中所需储存的挑战响应算法个数。此外,也可依设计考量,对上述的功能方框设置更多安全防护机制。例如,在一实施例中,目标收件者可对移动通信装置150_K进行设定,使得任何人都必须先输入移动通信装置150_K中的用户身分模块的个人身分码(Personalidentificationnumber,PIN)后才能存取挑战响应模块170_K,以进一步能降低挑战响应模块170_K被其他未授权的第三者盗用的风险。In another embodiment, the file provider can configure several communication devices to use the same challenge-response algorithm, so as to reduce the number of challenge-response algorithms that need to be stored in the database 114 . In addition, according to design considerations, more safety protection mechanisms can be set for the above-mentioned functional blocks. For example, in one embodiment, the target recipient can set the mobile communication device 150_K so that anyone must first input the personal identification number (Personal identification number, PIN) of the user identity module in the mobile communication device 150_K before saving The challenge response module 170_K is used to further reduce the risk of the challenge response module 170_K being stolen by other unauthorized third parties.

以下将搭配图2至图4的流程图,来进一步说明图1中的电子文件传递系统100的运作方式。The operation of the electronic document delivery system 100 in FIG. 1 will be further described below with reference to the flowcharts of FIGS. 2 to 4 .

图2为图1中文件提供装置110所执行的文件提供方法的一实施例简化后的流程图。文件提供装置110可执行图2的方法,将电子文件提供给目标收件者的移动通信装置150_K。FIG. 2 is a simplified flowchart of an embodiment of the file providing method executed by the file providing device 110 in FIG. 1 . The file providing device 110 can implement the method shown in FIG. 2 to provide the electronic file to the target recipient's mobile communication device 150_K.

于流程210中,处理器112查找数据库114来决定对应于目标收件者的挑战响应算法。处理器112可以依据目标收件者的信息来查找数据库114,以决定对应于目标收件者的挑战响应算法。例如,处理器112可依据目标收件者的姓名、帐号、电话号码、或电子邮件地址等信息来查找数据库114。In the process 210, the processor 112 looks up the database 114 to determine the challenge response algorithm corresponding to the target recipient. The processor 112 may search the database 114 according to the information of the target recipient to determine the challenge response algorithm corresponding to the target recipient. For example, the processor 112 may search the database 114 based on information such as the target recipient's name, account number, phone number, or email address.

于流程220中,处理器112依据目标收件者所对应的挑战响应算法,产生一组对应的挑战值与响应值。在本实施例中,数据库114中储存有目标收件者的挑战响应算法,处理器112依据目标收件者的挑战响应算法和挑战值,以产生对应的响应值。在另一实施例中,数据库114中储存有基于目标收件者的挑战响应算法所产生的挑战值与响应值的组合,处理器112可以选取相互对应的一组挑战值与响应值以进行后续的运算。In the process 220, the processor 112 generates a set of corresponding challenge values and response values according to the challenge-response algorithm corresponding to the target recipient. In this embodiment, the target recipient's challenge response algorithm is stored in the database 114 , and the processor 112 generates a corresponding response value according to the target recipient's challenge response algorithm and the challenge value. In another embodiment, the database 114 stores a combination of challenge values and response values based on the target recipient's challenge-response algorithm, and the processor 112 can select a set of challenge values and response values corresponding to each other for subsequent operation.

于流程230中,加密模块116以响应值作为加密金钥,并搭配合适的加密算法对电子文件进行加密,以产生加密电子文件。例如,加密模块116可以采用各种对称式加密算法或非对称式加密算法对电子文件进行加密。In the process 230, the encryption module 116 uses the response value as an encryption key and uses a suitable encryption algorithm to encrypt the electronic file to generate an encrypted electronic file. For example, the encryption module 116 may use various symmetric encryption algorithms or asymmetric encryption algorithms to encrypt electronic files.

于流程240中,文件提供装置110通过通信接口118及网络130,将加密电子文件及挑战值传送给目标收件者的移动通信装置150_K。移动通信装置150_K可利用挑战响应模块170_K依据挑战值产生解密金钥,而将加密电子文件进行解密。在本实施例中,为防止未授权的第三者取得可用来解密的响应值,文件提供装置110并不会将响应值发送出去。In the process 240 , the file providing device 110 transmits the encrypted electronic file and the challenge value to the target recipient's mobile communication device 150_K through the communication interface 118 and the network 130 . The mobile communication device 150_K can use the challenge response module 170_K to generate a decryption key according to the challenge value to decrypt the encrypted electronic file. In this embodiment, in order to prevent an unauthorized third party from obtaining the response value that can be used for decryption, the file providing device 110 does not send the response value.

在一实施例的流程240中,加密电子文件及挑战值可放在单一个电子信息之中,例如,存放在单一个电子邮件或多媒体信息之中。加密电子文件可以是此电子信息所夹带的附件文件,挑战值则可以显示于电子信息的标题、本文、及/或附件的文件名称之中,或是存放于电子信息的另一个附件中。在另一实施例中,文件提供装置110会将加密电子文件及挑战值存放于多个电子信息中传送给目标收件者。In the process 240 of an embodiment, the encrypted electronic file and the challenge value can be placed in a single electronic message, for example, stored in a single email or multimedia message. The encrypted electronic file can be an attachment file attached to the electronic information, and the challenge value can be displayed in the title, text, and/or file name of the attachment of the electronic information, or stored in another attachment of the electronic information. In another embodiment, the file providing device 110 will store the encrypted electronic file and the challenge value in a plurality of electronic messages and send them to the target recipients.

图3为图1中的移动通信装置150_K所执行的文件存取方法的一实施例简化后的流程图。FIG. 3 is a simplified flowchart of an embodiment of the file access method executed by the mobile communication device 150_K in FIG. 1 .

于流程305中,移动通信装置150_K通过无线通信接口154_K接收包含有挑战值与加密电子文件的电子信息。In the process 305, the mobile communication device 150_K receives the electronic information including the challenge value and the encrypted electronic file through the wireless communication interface 154_K.

于流程310中,处理器152_K利用使用者输入接口158_K来接收使用者所下达的开启电子信息的指令。In the process 310, the processor 152_K uses the user input interface 158_K to receive an instruction from the user to open the electronic information.

于流程315中,处理器152_K利用显示介面156_K来显示挑战值及加密电子文件的文件图示或文字。In the process 315, the processor 152_K uses the display interface 156_K to display the challenge value and the file icon or text of the encrypted electronic file.

于流程320中,处理器152_K利用使用者输入接口158_K来接收使用者所下达的解密金钥产生指令。在开始进行解密金钥产生的相关流程之前,处理器152_K可先进入流程325对使用者进行身分验证。In the process 320, the processor 152_K utilizes the user input interface 158_K to receive a decryption key generation command issued by the user. Before starting the process of generating the decryption key, the processor 152_K may first enter into process 325 to verify the identity of the user.

于流程325中,处理器152_K先利用显示介面156_K来显示使用者身分验证请求的画面。例如,处理器152_K可先利用显示介面156_K显示密码输入请求、语音输入请求、及/或影像输入请求等,要求使用者输入用户身分模块的个人身分码、输入使用者的个人声音、及/或进行指纹扫描、虹膜扫描等方式,以确认使用者的身分。In the process 325, the processor 152_K first uses the display interface 156_K to display the screen of the user identity verification request. For example, the processor 152_K may first use the display interface 156_K to display a password input request, a voice input request, and/or an image input request, etc., requiring the user to input the personal identification code of the user identity module, input the user's personal voice, and/or Perform fingerprint scanning, iris scanning, etc. to confirm the identity of the user.

于流程330中,利用使用者输入接口158_K来接收使用者所输入的信息,以验证使用者的身分。当验证成功,代表使用者为授权的使用者,即进入流程340。当验证失败,代表使用者不是授权的使用者,则进入流程335。In the process 330, the user input interface 158_K is used to receive the information input by the user to verify the identity of the user. When the verification is successful, it means that the user is an authorized user, and the flow 340 is entered. When the verification fails, it means that the user is not an authorized user, and then enter the process 335 .

于流程335中,处理器152_K利用显示介面156_K显示身分验证错误的信息,并且可回到流程325重复身分验证的流程。In the process 335 , the processor 152_K uses the display interface 156_K to display the information of the identity verification error, and returns to the process 325 to repeat the identity verification process.

于流程340中,处理器152_K利用显示介面156_K来显示挑战值输入请求,要求使用者输入挑战值。在另一实施例中,处理器152_K可通过语音方式要求使用者输入挑战值。In the process 340, the processor 152_K utilizes the display interface 156_K to display a challenge value input request, requiring the user to input a challenge value. In another embodiment, the processor 152_K may ask the user to input the challenge value by voice.

于流程345中,处理器152_K利用使用者输入接口158_K来接收使用者所提供的输入值。使用者可利用使用者输入接口158_K以文字、语音及/或影像等方式输入挑战值,或者使用者可选取电子信息中存放有挑战值的附件以作为输入挑战值的方式。In the process 345, the processor 152_K utilizes the user input interface 158_K to receive input values provided by the user. The user can use the user input interface 158_K to input the challenge value in the form of text, voice and/or video, or the user can select an attachment storing the challenge value in the electronic message as the way of inputting the challenge value.

于流程350中,处理器152_K利用通信接口162_K将流程345中收到的输入值传送给挑战响应模块170_K。在本实施例中,挑战响应模块170_K会依据所储存的目标收件者的挑战响应算法,并以所接收的输入值作为挑战值,以产生对应的响应值。In the process 350, the processor 152_K uses the communication interface 162_K to transmit the input value received in the process 345 to the challenge response module 170_K. In this embodiment, the challenge response module 170_K will use the received input value as the challenge value according to the stored challenge response algorithm of the target recipient to generate a corresponding response value.

于流程355中,处理器152_K利用通信接口162_K来接收挑战响应模块170_K所回传的响应值。In the process 355 , the processor 152_K utilizes the communication interface 162_K to receive the response value returned by the challenge response module 170_K.

于流程360中,处理器152_K利用显示介面156_K来显示接收自挑战响应模块170_K的响应值。移动通信装置150_K的使用者可通过显示介面156_K得知响应值。In the process 360, the processor 152_K uses the display interface 156_K to display the response value received from the challenge response module 170_K. The user of the mobile communication device 150_K can know the response value through the display interface 156_K.

于流程365中,处理器152_K利用使用者输入接口158_K来接收使用者所下达的解密指令,以对加密电子文件进行解密。举例来说,使用者可通过点击加密电子文件的文件图示的方式来下达此指令。处理器152_K会依据此指令而进行流程370~380的解密运算。In the process 365, the processor 152_K utilizes the user input interface 158_K to receive a decryption command from the user to decrypt the encrypted electronic file. For example, the user can issue the command by clicking on the file icon of the encrypted electronic file. The processor 152_K will perform the decryption operations of processes 370-380 according to the instruction.

于流程370中,处理器152_K利用显示介面156_K来显示解密金钥输入请求,要求使用者输入流程360中所显示的响应值。In the process 370 , the processor 152_K utilizes the display interface 156_K to display a decryption key input request, requiring the user to input the response value displayed in the process 360 .

于流程375中,处理器152_K利用使用者输入接口158_K接收使用者所提供的输入值,使用者可利用使用者输入接口158_K以文字、语音及/或影像等方式进行输入。In the process 375, the processor 152_K uses the user input interface 158_K to receive the input value provided by the user, and the user can use the user input interface 158_K to input in the form of text, voice and/or video.

于流程380中,处理器152_K利用解密模块164_K,以流程375所接收的输入值作为解密金钥来对加密电子文件进行解密。若解密成功,处理器152_K可使用解密模块164_K或其他软硬/件模块来开启已解密的电子文件的内容。若此电子文件包含有文字及/或图片信息,则处理器152_K可使用显示介面156_K来显示电子文件中的文字及/或图片信息。若解密失败,例如在流程375中收到的输入值与流程360所显示的响应值不符时,处理器152_K可利用显示介面156_K来显示解密失败信息。In the process 380 , the processor 152_K uses the decryption module 164_K to decrypt the encrypted electronic file by using the input value received in the process 375 as the decryption key. If the decryption is successful, the processor 152_K may use the decryption module 164_K or other software/hardware/hardware modules to open the content of the decrypted electronic file. If the electronic file contains text and/or image information, the processor 152_K can use the display interface 156_K to display the text and/or image information in the electronic file. If the decryption fails, for example, when the input value received in the process 375 does not match the response value displayed in the process 360 , the processor 152_K can use the display interface 156_K to display the decryption failure information.

换言之,若挑战响应模块170_K贴附于移动通信装置150_K的用户身分模块上,且处理器152_K在流程345接收到的输入值等于挑战值,则挑战响应模块170_K便能通过通信接口162_K收到挑战值,并依据内建的挑战响应算法计算出响应值,并将响应值通过通信接口162_K回传给处理器152_K,使处理器152_K得以进行后续的流程360。In other words, if the challenge response module 170_K is attached to the user identity module of the mobile communication device 150_K, and the input value received by the processor 152_K in the process 345 is equal to the challenge value, then the challenge response module 170_K can receive the challenge through the communication interface 162_K value, and calculate the response value according to the built-in challenge response algorithm, and send the response value back to the processor 152_K through the communication interface 162_K, so that the processor 152_K can carry out the subsequent process 360 .

图4为图1中的移动通信装置150_K所执行的文件存取方法的另一实施例简化后的流程图。除了与图3相同的流程305、310、315、325、330、335、及355之外,图4另包含有流程420、450及490。以下仅针对流程420、450及490进行说明。FIG. 4 is a simplified flowchart of another embodiment of the file access method executed by the mobile communication device 150_K in FIG. 1 . In addition to the same processes 305 , 310 , 315 , 325 , 330 , 335 , and 355 as in FIG. 3 , FIG. 4 further includes processes 420 , 450 , and 490 . Only the processes 420 , 450 and 490 will be described below.

于流程420中,处理器152_K利用使用者输入接口158_K来接收使用者所下达的解密指令。举例来说,使用者可通过点击加密电子文件的文件图示的方式,来下达解密指令。在开始进行解密指令的相关流程之前,处理器152_K可先进入流程325对使用者进行身分验证。In the process 420, the processor 152_K utilizes the user input interface 158_K to receive a decryption command issued by the user. For example, the user can issue a decryption command by clicking the file icon of the encrypted electronic file. The processor 152_K may enter into a process 325 to verify the user's identity before starting the related process of decrypting the command.

于流程450中,处理器152_K利用通信接口162_K将电子信息中的挑战值传送给挑战响应模块170_K。挑战响应模块170_K依据所储存的挑战响应算法,并以所接收的输入值作为挑战值,以产生对应的响应值。In the process 450, the processor 152_K transmits the challenge value in the electronic message to the challenge response module 170_K through the communication interface 162_K. The challenge response module 170_K uses the received input value as the challenge value according to the stored challenge response algorithm to generate a corresponding response value.

于流程490中,处理器152_K会直接撷取挑战响应模块170_K通过通信接口162_K所回传的响应值,并利用解密模块164_K以该响应值作为解密金钥来对加密电子文件进行解密。In the process 490, the processor 152_K directly retrieves the response value returned by the challenge response module 170_K through the communication interface 162_K, and uses the response value as a decryption key to decrypt the encrypted electronic file by the decryption module 164_K.

程序设计师可将图3和图4的全部或部分流程编译成计算机程序,当移动通信装置150_K执行此计算机程序时,处理器152_K就可以执行图3和图4的全部或部分流程。举例来说,此计算机程序可包含有图3中流程340~360的解密金钥产生运算及/或图4中流程450、355及380的解密运算等。Programmers can compile all or part of the flow in FIG. 3 and FIG. 4 into a computer program, and when the mobile communication device 150_K executes the computer program, the processor 152_K can execute all or part of the flow in FIG. 3 and FIG. 4 . For example, the computer program may include the decryption key generation operations of the processes 340-360 in FIG. 3 and/or the decryption operations of the processes 450, 355 and 380 in FIG. 4, etc.

在另一实施例中,可以调整验证使用者身份的流程325和330的执行顺序,例如移至流程305之前。如此一来,处理器152_K在移动通信装置150_K开机时会先执行流程325及330,若使用者是授权的使用者,才能使用移动通信装置150_K。当稍后开始执行文件存取方法时,则可不需重复进行验证使用者身份的流程。In another embodiment, the execution sequence of the processes 325 and 330 of authenticating the user can be adjusted, for example, moved before the process 305 . In this way, the processor 152_K will first execute the processes 325 and 330 when the mobile communication device 150_K is turned on, and the mobile communication device 150_K can only be used if the user is an authorized user. When the file access method is executed later, the process of verifying the identity of the user may not be repeated.

在另一实施例中,移动通信装置150_K可以省略验证使用者身份的流程,而直接进行后续的流程。例如,移动通信装置150_K可省略图3或图4中的流程325、330及335,而直接执行流程340或450。In another embodiment, the mobile communication device 150_K may omit the process of verifying the identity of the user, and directly perform the subsequent process. For example, the mobile communication device 150_K can omit the processes 325 , 330 and 335 in FIG. 3 or 4 , and directly execute the process 340 or 450 .

实作上,处理器152_K可于前述的身分验证程序的错误次数到达预设的次数(例如3次)时,结束文件存取程序而不继续进行相关的流程。在另一实施例中,处理器152_K可于身分验证错误的次数到达预设的次数后,将文件存取程序、移动通信装置150_K、及/或挑战响应模块170_K等进行锁定,以防止恶意的第三者通过不断的尝试而通过身分验证。In practice, the processor 152_K may end the file access process without continuing the related process when the number of errors in the aforementioned identity verification process reaches a preset number of times (for example, 3 times). In another embodiment, the processor 152_K may lock the file access program, the mobile communication device 150_K, and/or the challenge response module 170_K after the number of identity verification errors reaches a preset number of times, so as to prevent malicious The third party is authenticated through repeated attempts.

在前述的实施例说明中,挑战响应模块170_K是具有运算能力的微型电路,能执行目标收件者的挑战响应算法的运算。这只是本发明的一实施例,而非局限本案的实际实施方式。在实际应用上,文件提供者也可以将对应于目标收件者的挑战响应算法,预先储存至移动通信装置150_K的内建储存装置中,或是储存在一独立的储存装置中,并提供给目标收件者。例如,文件提供者可以将对应于目标收件者的挑战响应算法储存在记忆卡、USB储存装置或采用其他通信接口的储存装置中并提供给目标收件者让目标收件者将此外部储存装置可卸除式地插入移动通信装置150_K中使用。文件提供者可以将该储存装置设计成唯读型的储存装置,以避免其内存的挑战响应算法遭到窜改。在此情况下,前述挑战响应模块170_K的运算功能可以由处理器152_K来取代。例如,处理器152_K可将前述的流程350和355省略,并于流程345收到使用者所提供的挑战值后,读取挑战响应模块170_K中储存的挑战响应算法,并依据挑战值和挑战响应算法产生响应值,并进行后续的流程。换言之,前述实施例中的挑战响应模块170_K在本实施例中是由处理器152_K和文件提供者提供给目标收件者的储存装置两者的组合来实现。In the foregoing description of the embodiments, the challenge response module 170_K is a microcircuit with computing capability, capable of executing the calculation of the target recipient's challenge response algorithm. This is just an embodiment of the present invention, rather than limiting the actual implementation of this case. In practical applications, the file provider can also pre-store the challenge response algorithm corresponding to the target recipient in the built-in storage device of the mobile communication device 150_K, or store it in an independent storage device, and provide it to intended recipients. For example, the file provider may store the challenge-response algorithm corresponding to the target recipient in a memory card, a USB storage device, or a storage device using other communication interfaces and provide the target recipient to allow the target recipient to store this externally. The device is detachably plugged into the mobile communication device 150_K for use. The file provider can design the storage device as a read-only storage device to prevent the challenge response algorithm in its memory from being tampered with. In this case, the computing function of the aforementioned challenge response module 170_K can be replaced by the processor 152_K. For example, the processor 152_K can omit the above-mentioned processes 350 and 355, and after receiving the challenge value provided by the user in the process 345, read the challenge response algorithm stored in the challenge response module 170_K, and based on the challenge value and the challenge response Algorithms generate response values and carry out subsequent processes. In other words, the challenge response module 170_K in the foregoing embodiments is implemented by a combination of the processor 152_K and the storage device provided by the file provider to the target recipient in this embodiment.

请注意,后续权利要求书中的某些装置权利要求中的组成部分与前述的计算机程序的运作流程内容对应一致。因此,权利要求书中的这些装置权利要求应当理解为主要通过说明书记载的计算机程序实现前述解决方案的功能模组架构,而不应当理解为主要通过硬件方式实现该解决方案的实体装置。Please note that the components in some device claims in the subsequent claims correspond to the content of the operation flow of the aforementioned computer program. Therefore, these device claims in the claims should be understood as the functional module structure of the aforementioned solution mainly realized through the computer program described in the specification, rather than as the physical device that realizes the solution mainly through hardware.

由前述说明可知,图3的算法需要较多的使用者介入,使用者与移动通信装置150_K间需进行较多的互动操作,可避免第三者通过恶意的程序来远端操控移动通信装置150_K。而图4中的文件存取方法需要较少的使用者介入,例如使用者不需先读取再输入挑战值,亦不需先读取再输入响应值,故图4的方法对于使用者而言是较为便利的,并可以减少人为操作的错误发生。因此,可依据设计考量而调整使用者所需要的操作方式。It can be seen from the foregoing description that the algorithm in FIG. 3 requires more user intervention, and requires more interactive operations between the user and the mobile communication device 150_K, which can prevent a third party from remotely controlling the mobile communication device 150_K through malicious programs. . The file access method in FIG. 4 requires less user intervention. For example, the user does not need to read and then input the challenge value, and does not need to read and then input the response value. Therefore, the method in FIG. 4 is more important to the user. Language is more convenient and can reduce human error. Therefore, the operation mode required by the user can be adjusted according to design considerations.

在以上各实施例中,文件提供装置110传送给移动通信装置150_K的电子信息中只会包含有加密电子文件及挑战值,但不会包含有响应值,而挑战值并无法直接用来对加密电子文件进行解密,只有使用对应于目标收件者的挑战响应算法,才有办法依据挑战值得出正确的响应值,以对加密电子文件进行解密。而除了存放在数据库114之中以外,目标收件者所对应的挑战响应算法只会存放在挑战响应模块170_K之中,故移动通信装置150_K以外的装置即使接收到了前述的电子信息,依旧无法对加密电子文件进行解密,而能提升信息传输的安全性。In the above embodiments, the electronic information transmitted by the file providing device 110 to the mobile communication device 150_K only contains encrypted electronic files and challenge values, but does not contain response values, and the challenge value cannot be directly used to encrypt For decrypting electronic files, only by using the challenge-response algorithm corresponding to the target recipient, can there be a way to obtain the correct response value based on the challenge value to decrypt encrypted electronic files. In addition to being stored in the database 114, the challenge response algorithm corresponding to the target recipient will only be stored in the challenge response module 170_K, so even if devices other than the mobile communication device 150_K receive the aforementioned electronic information, they still cannot Encrypted electronic files are decrypted, which can improve the security of information transmission.

此外,若文件提供装置110有多个电子文件需要加密传送给移动通信装置150_K,文件提供装置110可避免对不同的电子文件使用相同的响应值进行加密。如此一来,故即使恶意的第三者取得了一个使用过的响应值,也只有相对应的一个电子文件会有泄漏的风险,其他的电子文件依旧会是安全的。In addition, if the file providing device 110 has multiple electronic files that need to be encrypted and sent to the mobile communication device 150_K, the file providing device 110 can avoid using the same response value to encrypt different electronic files. In this way, even if a malicious third party obtains a used response value, only the corresponding electronic file will be leaked, and other electronic files will still be safe.

而使用特殊设计的薄型电路板和与用户身分模块来分别实现挑战响应模块170_K与移动通信装置150_K的结合方式,可以大幅提升信息传输的安全性。例如,将薄型电路板设计为当贴附至用户身分模块之后,即无法在不损及薄型电路板的方式下将两者分离。因此,即使未经授权的第三者盗取了薄型电路板和与用户身分模块,此未经授权的第三者仍无法拆下薄型电路板而贴附至另一个用户身分模块而进行使用。The combination of the challenge response module 170_K and the mobile communication device 150_K is achieved by using a specially designed thin circuit board and the user identity module, which can greatly improve the security of information transmission. For example, the thin circuit board is designed so that after being attached to the SIM, the two cannot be separated without damaging the thin circuit board. Therefore, even if an unauthorized third party steals the thin circuit board and the SIM, the unauthorized third party cannot remove the thin circuit board and attach it to another SIM for use.

此外,目标收件者可对移动通信装置150_K设置进一步的安全防护措施,例如,设定成只有知悉用户身分模块的个人身分码的人士,才能使用挑战响应模块170_K。因此,即使恶意第三者窃取或盗用移动通信装置150_K,依旧无法得出正确的响应值来对加密电子文件进行解密。因此,目标收件者可以仅记忆和保存少数的几组密码,而不须时常的手动更换电子文件的解密密码,因而能够提升使用者的便利性。In addition, the target recipient can set further security measures for the mobile communication device 150_K, for example, setting the challenge response module 170_K only to those who know the PIN of the user identity module. Therefore, even if a malicious third party steals or embezzles the mobile communication device 150_K, it still cannot obtain a correct response value to decrypt the encrypted electronic file. Therefore, the target recipient can memorize and save only a few groups of passwords, without having to manually change the decryption passwords of the electronic files frequently, thereby improving the convenience of the users.

以上所述仅为本发明之较佳实施例,凡依本发明申请专利范围所做之均等变化与修饰,皆应属本发明之涵盖范围。The above descriptions are only preferred embodiments of the present invention, and all equivalent changes and modifications made according to the scope of the patent application of the present invention shall fall within the scope of the present invention.

Claims (8)

1.一种电子文件传递系统,其特征在于,包含有:1. An electronic file delivery system, characterized in that it comprises: 一文件提供装置,包含有:A file providing device includes: 一数据库,用于储存复数个挑战响应算法;a database for storing a plurality of challenge response algorithms; 一处理器,依据一目标收件者的一信息查找该数据库,以决定对应于该目标收件者的一挑战响应算法,并依据该挑战响应算法,产生对应的一挑战值和一响应值;A processor searches the database according to information of a target recipient to determine a challenge-response algorithm corresponding to the target recipient, and generates a corresponding challenge value and a response value according to the challenge-response algorithm; 一加密模块,依据该响应值将一电子文件加密为一加密电子文件;以及an encryption module, which encrypts an electronic file into an encrypted electronic file according to the response value; and 一通信接口,用于将该加密电子文件及该挑战值传送至一移动通信装置;以及a communication interface for transmitting the encrypted electronic file and the challenge value to a mobile communication device; and 该移动通信装置,包含有:The mobile communication device includes: 一无线通信接口,用于接收该加密电子文件及该挑战值;a wireless communication interface for receiving the encrypted electronic file and the challenge value; 一挑战响应模块,用于储存该挑战响应算法,并依据该挑战值及该挑战响应算法产生该响应值;以及a challenge response module, used to store the challenge response algorithm, and generate the response value according to the challenge value and the challenge response algorithm; and 一解密模块,用于依据该响应值对该加密电子文件进行解密。A decryption module is used for decrypting the encrypted electronic file according to the response value. 2.一种解密金钥产生装置,用于允许一移动通信装置在收到一加密电子文件与一挑战值后执行一解密金钥产生运算,其特征在于,该解密金钥产生装置包含有:2. A decryption key generation device, used to allow a mobile communication device to perform a decryption key generation operation after receiving an encrypted electronic file and a challenge value, it is characterized in that the decryption key generation device includes: 用于利用该移动通信装置的一输入接口接收一输入值的装置;means for receiving an input value using an input interface of the mobile communication device; 用于利用该移动通信装置的一通信接口将该输入值传送给一挑战响应模块的装置;以及means for communicating the input value to a challenge response module using a communication interface of the mobile communication device; and 用于利用该通信接口从该挑战响应模块接收对应于该输入值的一响应值的装置;means for receiving a response value corresponding to the input value from the challenge response module using the communication interface; 其中若该输入值等于该挑战值,则该移动通信装置使用该响应值来对该加密电子文件进行解密。Wherein if the input value is equal to the challenge value, the mobile communication device uses the response value to decrypt the encrypted electronic file. 3.如权利要求2所述的解密金钥产生装置,其特征在于,该解密金钥产生装置另包含有:3. The decryption key generation device as claimed in claim 2, wherein the decryption key generation device further comprises: 用于将使用者的一第一输入值与一预设文字、一预设语音及一预设影像的至少其中之一进行比对,以验证该移动通信装置的使用者身分的装置。A device for comparing a first input value of the user with at least one of a preset text, a preset voice and a preset image to verify the user identity of the mobile communication device. 4.如权利要求3所述的解密金钥产生装置,其特征在于,该解密金钥产生装置包含有:4. The decryption key generation device according to claim 3, wherein the decryption key generation device comprises: 用于利用该移动通信装置的一显示介面显示一密码输入请求的装置;A device for displaying a password input request using a display interface of the mobile communication device; 用于利用该输入接口接收一输入密码的装置;以及means for receiving an input password using the input interface; and 用于判断该输入密码是否等于一预设密码的装置。A device for judging whether the input password is equal to a preset password. 5.如权利要求4所述的解密金钥产生装置,其特征在于,该预设密码为安装于该移动通信装置中的用户身分模块卡的个人身分码。5. The decryption key generating device according to claim 4, wherein the preset password is a personal identity code of a SIM card installed in the mobile communication device. 6.一种电子文件提供装置,其包含有:6. An electronic file providing device, which includes: 用于决定在一电子文件的一目标收件者的一挑战响应算法下,相互对应的一挑战值及一响应值的装置,其中该挑战值异于该响应值;means for determining a challenge value and a response value corresponding to each other under a challenge-response algorithm of a target recipient of an electronic document, wherein the challenge value is different from the response value; 用于使用该响应值来对该电子文件进行加密以产生一加密电子文件的装置;means for encrypting the electronic document using the response value to generate an encrypted electronic document; 用于传送该加密电子文件及该挑战值至该目标收件者可存取的一或多个装置的装置;以及a device for transmitting the encrypted electronic document and the challenge value to one or more devices accessible to the intended recipient; and 用于使用该目标收件者的信息来查找一数据库以决定该挑战响应算法的装置,其中该数据库记录有复数个收件者与复数个挑战响应算法之间的配对关系。The means for searching a database to determine the challenge-response algorithm by using the information of the target recipient, wherein the database records the pairing relationship between the plurality of recipients and the plurality of challenge-response algorithms. 7.一种解密装置,用于允许一移动通信装置接收到一加密电子文件以及一挑战值后,执行一解密运算,其特征在于,该解密装置包含有:7. A decryption device for allowing a mobile communication device to perform a decryption operation after receiving an encrypted electronic file and a challenge value, characterized in that the decryption device includes: 用于接收到一解密金钥产生指令时,利用该移动通信装置的一显示介面显示一挑战值输入请求的装置;A device for displaying a challenge value input request by using a display interface of the mobile communication device when a decryption key generation instruction is received; 用于通过该移动通信装置的一输入接口接收一第一输入值的装置;means for receiving a first input value via an input interface of the mobile communication device; 用于若储存有一挑战响应算法的外部储存装置被可卸除式地插入该移动通信装置,且该第一输入值等于该挑战值,则利用该移动通信装置的一显示介面来显示一响应值的装置;If the external storage device storing a challenge response algorithm is removably inserted into the mobile communication device, and the first input value is equal to the challenge value, a display interface of the mobile communication device is used to display a response value installation; 用于利用该输入接口来接收一第二输入值的装置;以及means for receiving a second input value using the input interface; and 用于若该第二输入值等于该响应值,则利用该移动通信装置的一解密模块来解密该加密电子文件的装置。A device for decrypting the encrypted electronic file by using a decryption module of the mobile communication device if the second input value is equal to the response value. 8.一种解密方法,用于允许一移动通信装置接收到一加密电子文件以及一挑战值后,执行一解密运算,其特征在于,该解密方法包含有:8. A decryption method for allowing a mobile communication device to perform a decryption operation after receiving an encrypted electronic file and a challenge value, characterized in that the decryption method includes: 接收到一解密金钥产生指令时,利用该移动通信装置的一显示介面显示一挑战值输入请求;When a decryption key generation instruction is received, a display interface of the mobile communication device is used to display a challenge value input request; 通过该移动通信装置的一输入接口接收一第一输入值;receiving a first input value through an input interface of the mobile communication device; 若储存有一挑战响应算法的外部储存装置被可卸除式地插入该移动通信装置,且该第一输入值等于该挑战值,则利用该移动通信装置的一显示介面来显示一响应值;If an external storage device storing a challenge response algorithm is detachably inserted into the mobile communication device, and the first input value is equal to the challenge value, a response value is displayed using a display interface of the mobile communication device; 利用该输入接口来接收一第二输入值的装置;以及means for receiving a second input value using the input interface; and 若该第二输入值等于该响应值,则利用该移动通信装置的一解密模块来解密该加密电子文件。If the second input value is equal to the response value, a decryption module of the mobile communication device is used to decrypt the encrypted electronic file.
CN201110101503.4A 2011-04-22 2011-04-22 Electronic document transfer system, mobile communication device and related decryption device Expired - Fee Related CN102752270B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110101503.4A CN102752270B (en) 2011-04-22 2011-04-22 Electronic document transfer system, mobile communication device and related decryption device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110101503.4A CN102752270B (en) 2011-04-22 2011-04-22 Electronic document transfer system, mobile communication device and related decryption device

Publications (2)

Publication Number Publication Date
CN102752270A CN102752270A (en) 2012-10-24
CN102752270B true CN102752270B (en) 2015-11-11

Family

ID=47032171

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110101503.4A Expired - Fee Related CN102752270B (en) 2011-04-22 2011-04-22 Electronic document transfer system, mobile communication device and related decryption device

Country Status (1)

Country Link
CN (1) CN102752270B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1503504A (en) * 2002-10-31 2004-06-09 ���µ�����ҵ��ʽ���� Communication device, communication system and algorithm selection method
CN101123495A (en) * 2007-09-07 2008-02-13 农革 A data encryption, decryption system and method
CN101147377A (en) * 2005-02-04 2008-03-19 高通股份有限公司 Secure Self-Startup for Wireless Communications
CN101281495A (en) * 2007-04-02 2008-10-08 北京华旗资讯数码科技有限公司 Method for ciphering file using movable storage apparatus

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0910897D0 (en) * 2009-06-24 2009-08-05 Vierfire Software Ltd Authentication method and system
US8458788B2 (en) * 2010-05-04 2013-06-04 Synaptics Incorporated System and method for authentication of input devices

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1503504A (en) * 2002-10-31 2004-06-09 ���µ�����ҵ��ʽ���� Communication device, communication system and algorithm selection method
CN101147377A (en) * 2005-02-04 2008-03-19 高通股份有限公司 Secure Self-Startup for Wireless Communications
CN101281495A (en) * 2007-04-02 2008-10-08 北京华旗资讯数码科技有限公司 Method for ciphering file using movable storage apparatus
CN101123495A (en) * 2007-09-07 2008-02-13 农革 A data encryption, decryption system and method

Also Published As

Publication number Publication date
CN102752270A (en) 2012-10-24

Similar Documents

Publication Publication Date Title
CN109951489B (en) Digital identity authentication method, equipment, device, system and storage medium
US10491379B2 (en) System, device, and method of secure entry and handling of passwords
CN112425114B (en) Password manager protected by public key-private key pair
CN105516104B (en) A TEE-based dynamic password authentication method and system
US9722794B2 (en) System and method for remote access, remote digital signature
US9191811B2 (en) Method and system for managing information on mobile devices
EP2798777A1 (en) Method and system for distributed off-line logon using one-time passwords
TWI724684B (en) Method, system and device for performing cryptographic operations subject to identity verification
CN107395589A (en) Finger print information acquisition methods and terminal
TW201223225A (en) Method for personal identity authentication utilizing a personal cryptographic device
KR101570773B1 (en) Cloud authentication method for securing mobile service
TWI428752B (en) Electronic file delivering system, portable communication apparatus with decryption functionality, and related computer program product
CN101059858B (en) Method and device for inquiring conveniently electronic transaction history record
CN104009851B (en) A kind of bank net one-time pad two-way authentication secure log technology
JPWO2011058629A1 (en) Information management system
CN102752270B (en) Electronic document transfer system, mobile communication device and related decryption device
CN114329510B (en) A digital authorization method, device, terminal equipment and storage medium
US20220278974A1 (en) System, device and methods for secure exchange of text messages
CN117834242A (en) Verification method, device, equipment, storage medium and program product
CN119484079A (en) Data transmission method, device, electronic device and readable storage medium
KR20100120835A (en) Security device and method using security input device
JP2013038552A (en) Information transmission and reception system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20151111

CF01 Termination of patent right due to non-payment of annual fee