CN115022819B - 5G message transmission method, terminal and system - Google Patents

5G message transmission method, terminal and system Download PDF

Info

Publication number
CN115022819B
CN115022819B CN202210610073.7A CN202210610073A CN115022819B CN 115022819 B CN115022819 B CN 115022819B CN 202210610073 A CN202210610073 A CN 202210610073A CN 115022819 B CN115022819 B CN 115022819B
Authority
CN
China
Prior art keywords
message
identity certificate
terminal
sender
signature result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210610073.7A
Other languages
Chinese (zh)
Other versions
CN115022819A (en
Inventor
宗瑞
李子阳
邱振涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Weway Shenzhen Network Technology Co ltd
Original Assignee
Weway Shenzhen Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Weway Shenzhen Network Technology Co ltd filed Critical Weway Shenzhen Network Technology Co ltd
Priority to CN202210610073.7A priority Critical patent/CN115022819B/en
Publication of CN115022819A publication Critical patent/CN115022819A/en
Application granted granted Critical
Publication of CN115022819B publication Critical patent/CN115022819B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Abstract

The application relates to a 5G message transmission method, a terminal and a system. The method comprises the following steps: and acquiring a 5G message edited by a sender user, generating a signature result corresponding to the 5G message based on a key corresponding to an identity certificate of the sender user prestored in the sender terminal, and transmitting the 5G message, the signature result and the identity certificate to a receiver terminal so that the receiver terminal can feed back the 5G message to the receiver user after verifying that the signature result and the identity certificate pass. The application ensures that the anti-tampering processing and signature processing of the 5G message are not based on the operation service provider of the 5G message, and ensures that the message is protected by signature verification from a sender to a receiver, namely reaching an end-to-end level, if the 5G message is modified by an unauthorized party in the propagation process, a receiver terminal can judge that the modification is illegal tampering, thereby improving the safety of 5G message transmission.

Description

5G message transmission method, terminal and system
Technical Field
The present application relates to the field of information security technologies, and in particular, to a method, a terminal, and a system for transmitting a 5G message.
Background
At present, the security of the 5G message in the transmission process should be ensured in the information transmission, storage, calculation and other processes, in particular, the 5G message should be ensured not to be peeped by a third party in the transmission process and the 5G message should be prevented from being tampered in the transmission process.
Since 5G messages are implemented based on IP networks, they are no longer implemented based on traditional operator non-open core network architectures. Therefore, the security technology of the existing internet network can be directly applied to the 5G message, in the existing internet product architecture, both the user data and the password are stored and provided by the service provider, if uncontrollable factors do not occur, the service provider can always provide reliable service, but the security accident of information often does not occur at the technical level, for example, the reason that the client information of a certain service provider leaks is because the computer of a technical staff is controlled by lawless persons during maintenance, so that the client information leaks. The transmission of 5G messages also risks tampering with the information if it relies entirely on authentication verification by the service provider.
Therefore, improving the security of 5G message transmission has become a problem to be solved by those skilled in the art.
Disclosure of Invention
In view of the above, the present application provides a method, a terminal and a system for transmitting 5G messages, which aim to improve the security of 5G message transmission.
In order to achieve the above object, the present application provides a method for transmitting a 5G message, applied to a sender terminal, the method comprising:
acquiring a 5G message edited by a sender user;
generating a signature result corresponding to the 5G message based on a key corresponding to an identity certificate of a sender user pre-stored in the sender terminal;
and transmitting the 5G message, the signature result and the identity certificate to a receiver terminal so that the receiver terminal can feed back the 5G message to a receiver user after verifying that the signature result and the identity certificate pass.
Preferably, the generating the signature result corresponding to the 5G message based on the key corresponding to the identity certificate of the sender user pre-stored in the sender terminal includes:
and reading a private key corresponding to the identity certificate of the sender user, and signing the 5G message, the number of the sender terminal, the number of the receiver terminal and the sending time of the 5G message by using the private key to obtain the signature result.
Preferably, the transmitting the 5G message, the signature result and the identity certificate to a receiver terminal includes:
transmitting the 5G message, the signature result and the identity certificate to a receiver terminal through a first channel based on the number of the receiver terminal;
or transmitting the 5G message and the signature result to the receiver terminal through a first channel based on the number of the receiver terminal, and transmitting the identity certificate to the receiver terminal through a second channel;
or transmitting the 5G message to the receiver terminal through a first channel based on the number of the receiver terminal, and transmitting the signature result and the identity certificate to the receiver terminal through a second channel.
Preferably, the identity certificate and the key are stored in a relevant storage path of the sender terminal, or the identity certificate and the key are stored in a relevant storage path of a SIM card of the sender terminal.
In order to achieve the above object, the present application provides a method for transmitting a 5G message, applied to a receiver terminal, the method comprising:
acquiring an identity certificate of a sender user, a 5G message and a signature result corresponding to the 5G message, which are transmitted by a sender terminal;
verifying whether related fields in the signature result are valid or not, and verifying whether the identity certificate is valid or not;
and feeding back the 5G message to a receiver user when the relevant field in the signature result is verified to be valid and the identity certificate is verified to be valid.
Preferably, said verifying whether the relevant field in the signature result is valid comprises:
acquiring a public key corresponding to the identity certificate, and verifying a relevant field of the signature result by using the public key;
when all the fields of the related fields are verified to be successful, the related fields of the signature result are valid;
when any one of the relevant fields fails to be verified, the relevant field of the signature result is invalid.
Preferably, the method further comprises:
and when the relevant fields in the signature result are verified to be valid and the identity certificate is verified to pass, displaying a verification result on an interactive interface of the receiver terminal.
In order to achieve the above object, the present application provides a sender terminal, where the sender terminal includes a memory and a processor connected to the memory, the memory stores a transmission program of a 5G message running on the processor, and the transmission program of the 5G message when executed by the processor implements the following steps:
acquiring a 5G message edited by a sender user;
generating a signature result corresponding to the 5G message based on a key corresponding to an identity certificate of a sender user pre-stored in the sender terminal;
and transmitting the 5G message, the signature result and the identity certificate to a receiver terminal so that the receiver terminal can feed back the 5G message to a receiver user after verifying that the signature result and the identity certificate pass.
In order to achieve the above object, the present application provides a receiver terminal, where the receiver terminal includes a memory and a processor connected to the memory, the memory stores a transmission program of a 5G message running on the processor, and the transmission program of the 5G message when executed by the processor implements the following steps:
acquiring an identity certificate of a sender user, a 5G message and a signature result corresponding to the 5G message, which are transmitted by a sender terminal;
verifying whether related fields in the signature result are valid or not, and verifying whether the identity certificate is valid or not;
and feeding back the 5G message to a receiver user when the relevant field in the signature result is verified to be valid and the identity certificate is verified to be valid.
In order to achieve the above purpose, the present application further provides a 5G message transmission system, where the 5G message transmission system is deployed with the sender terminal and the receiver terminal.
Compared with the prior art, the technical scheme provided by the embodiment of the application has the following advantages:
the signature operation is carried out on the 5G message at the sender terminal, and the signature processing of the 5G message by the sender terminal is carried out based on the secret key stored in the sender terminal, so that the identity of the sender is further ensured not to be impersonated, the reliability of a signature result is improved, and the 5G message is processed by the signature verification operation mode at the receiver terminal, so that the tamper-proof processing and the signature processing of the 5G message are not based on the operation service provider of the 5G message, the signature verification protection of the message from the sender to the receiver, namely reaching an end-to-end level is ensured, the safety of the 5G message transmission is improved, and if the message is modified by an unauthorized party in the propagation process, the receiver terminal can judge that the modification is illegal tampering.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
In order to more clearly illustrate the embodiments of the application or the technical solutions of the prior art, the drawings which are used in the description of the embodiments or the prior art will be briefly described, and it will be obvious to a person skilled in the art that other drawings can be obtained from these drawings without inventive effort.
FIG. 1 is a flow chart illustrating a method for transmitting 5G messages according to a preferred embodiment of the present application;
FIG. 2 is a flow chart illustrating another preferred embodiment of the method for transmitting 5G messages according to the present application;
FIG. 3 is a diagram of a transmission system for 5G messages according to a preferred embodiment of the present application;
the achievement of the objects, functional features and advantages of the present application will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
It should be noted that, the technical solutions of the embodiments of the present application may be combined with each other, but it is necessary to use those skilled in the art as a basis, and when the technical solutions are contradictory or cannot be implemented, it should be considered that the combination of the technical solutions does not exist and is not within the scope of protection claimed by the present application.
Referring to fig. 1, a method flow diagram of an embodiment of a method for transmitting a 5G message is provided in the present application. The method may be performed by a sender terminal, which may be implemented in software and/or hardware. The transmission method of the 5G message comprises the following steps:
step S110: acquiring a 5G message edited by a sender user;
step S120: generating a signature result corresponding to the 5G message based on a key corresponding to an identity certificate of a sender user pre-stored in the sender terminal;
step S130: and transmitting the 5G message, the signature result and the identity certificate to a receiver terminal so that the receiver terminal can feed back the 5G message to a receiver user after verifying that the signature result and the identity certificate pass.
In this embodiment, the sender user is a holder of the sender terminal, and the sender user may edit a 5G message that needs to be sent to the receiver user through the sender terminal, and input the telephone number of the receiver terminal at the sender terminal when editing the 5G message.
The 5G (5 th Generation Mobile Communication Technology, fifth generation mobile communication technology) message is an enhanced rich media short message, which may include text and pictures, and may also include information such as voice, video, files, geographic location, payment, etc., and may even call applications such as dials, calendars, etc. of the mobile phone. Through the 5G message, rich interactive services can be provided for users.
When a sender user transmits a 5G message, the 5G message can be uniquely identified by, for example, a telephone number ID1 of a sender terminal, a telephone number ID2 of a receiver terminal, a 5G message M, a time stamp T of message transmission, and the like.
Because the 5G message is realized based on the IP network and is not realized based on the traditional carrier non-open core network architecture, in the existing Internet product architecture, the data and the password of the user are stored in the service provider, and because the service provider can cause data leakage due to certain uncontrollable factors, if the 5G message is encrypted and protected at the sender terminal, the message can be further ensured not to be tampered or leaked. Specifically:
after acquiring the 5G message edited by the sender user, the sender terminal generates a signature result corresponding to the 5G message based on a key corresponding to the identity certificate of the sender user pre-stored in the sender terminal. The signature result contains the signature of the key pair 5G message, the telephone number of the sender, the telephone number of the receiver, the time stamp of message transmission and other information of the sender user, and the signature result and the identity certificate can be transmitted to the receiver terminal together with the 5G message.
The sender user can safely store the identity information in the sender terminal, the identity information can be in the form of an identity certificate or other identity certificates, for example, the identity information of the sender user can be a digital identity certificate in the format of X.509 and the like, and can also be other authoritative institutions or other certificates issued by specific public trust institutions, and the identity certificate and the certificates contain the trusted identity and public key information of the sender user so as to ensure that the receiver terminal can verify the signature information in the signing result based on the public key information. The identity information includes identity information of the sender user, for example, a work unit of the sender, a job position of the job, and the like.
The identity certificate of the sender user and the key information corresponding to the identity certificate may be stored in a relevant storage path of the sender terminal, for example, a local storage module of the terminal. The identity certificate and the corresponding key may also be stored in a memory module in the SIM card installed in the sender terminal.
After the 5G message, the signature result and the identity certificate are transmitted to the receiver terminal, the receiver terminal can verify the signature result and the identity certificate, wherein the identity certificate of the sender can be applied for downloading from the server of the identity information by the receiver terminal according to the related information of the signature result.
The receiving terminal verifies the signature result and the identity certificate by using the public key corresponding to the identity certificate of the sending party, and after the signature result and the identity certificate pass the verification, the verification result can be displayed on the receiving terminal, for example, the 'passing of the identity verification of the sending party' is displayed, and a 5G message is fed back to the receiving user, for example, the 5G message is put into an inbox, or the content of the 5G message is displayed on an interactive interface of the receiving terminal. Since both the signature result and the identity certificate are verified, the receiving user can thereby determine that the sender identity of the 5G message has not been spoofed.
When any one of the signature result and the identity certificate fails to pass the verification, the receiving party user can be reminded according to a preset control strategy, for example, 5G information is automatically put into a deleted mailbox, or after the receiving party user is prompted that the verification fails, the 5G information is still normally put into an inbox.
In one embodiment, the sender may not sign the recipient phone number in a particular scenario, provided that the default 5G message channel ensures that no confusion will occur at the recipient terminal. For example: when the sender needs to send the same 5G message to multiple receivers, the sender can sign only the 5G message, the sender number and the sending time, but not the receiver phone number, so that the resource consumption of the sender in the signature result generation process is reduced.
The sender may send only a normal 5G message or may send a 5G message with an identity certificate and a signature result. The sender user can identify whether a 5G message has a corresponding identity certificate and a signature result through a specific field, so that after the receiver receives the 5G message, the receiver can autonomously confirm whether the signature result and the downloading and verifying process of the identity certificate are needed, and the resource consumption of the receiver terminal and the downloading or verifying of the identity certificate and the signature result is reduced.
The signature operation is carried out on the 5G message at the sender terminal, and the sender terminal carries out the signature processing on the 5G message based on the secret key stored in the sender terminal, so that the identity of the sender is further ensured not to be impersonated, the reliability of a signature result is improved, and the 5G message is processed in a mode of carrying out the signature verification operation at the receiver terminal, so that the tamper-proof processing and the signature processing of the 5G message are not based on an operation service provider of the 5G message, thereby ensuring the signature verification protection of the message from the sender to the receiver, namely reaching an end-to-end level, and if the message is modified by an unauthorized party in the transmission process, the receiver terminal can judge that the modification is illegal tampering. The transmission of trusted authentication is provided for 5G messages at the user side level.
In one embodiment, the generating the signature result corresponding to the 5G message based on the key corresponding to the identity certificate of the sender user pre-stored in the sender terminal includes:
and reading a private key corresponding to the identity certificate of the sender user, and signing the 5G message, the number of the sender terminal, the number of the receiver terminal and the sending time of the 5G message by using the private key to obtain the signature result.
The private key corresponding to the identity certificate of the sender user is read, the private key is utilized to sign the 5G message, the number of the sender terminal, the number of the receiver terminal and the sending time of the 5G message, a signature result can be obtained, and the private key used for signature exists in the sender terminal, so that the reliability of signature can be further improved.
In one embodiment, the transmitting the 5G message, the signature result, and the identity certificate to a recipient terminal includes:
transmitting the 5G message, the signature result and the identity certificate to a receiver terminal through a first channel based on the number of the receiver terminal;
or transmitting the 5G message and the signature result to the receiver terminal through a first channel based on the number of the receiver terminal, and transmitting the identity certificate to the receiver terminal through a second channel;
or transmitting the 5G message to the receiver terminal through a first channel based on the number of the receiver terminal, and transmitting the signature result and the identity certificate to the receiver terminal through a second channel.
The first channel may refer to a 5G short message channel, i.e. a communication channel of a telephone operator. The second channel may be an internet channel or a cloud service mode, and when the identity certificate or the signature result is transmitted through the second channel, the receiver terminal needs to apply for downloading the identity certificate or the signature result from the corresponding server.
Referring to fig. 2, a flowchart of another preferred embodiment of the method for transmitting a 5G message according to the present application is shown, which may be performed by a receiving terminal, which may be implemented in software and/or hardware. The transmission method of the 5G message comprises the following steps:
step S210: acquiring an identity certificate of a sender user, a 5G message and a signature result corresponding to the 5G message, which are transmitted by a sender terminal;
step S220: verifying whether related fields in the signature result are valid or not, and verifying whether the identity certificate is valid or not;
step S230: and feeding back the 5G message to a receiver user when the relevant field in the signature result is verified to be valid and the identity certificate is verified to be valid.
In this embodiment, the identity certificate and the signature result acquired by the receiver terminal may be transmitted to the receiver terminal by the sender terminal according to the communication channel of the telephone operator, or the sender terminal may upload the identity certificate and the signature result to the server through a cloud service mode, and the receiver terminal downloads the identity certificate and the signature result from the server, thereby acquiring the identity certificate and the signature result.
After the receiving terminal acquires the identity certificate of the sending user, the 5G message and the signature result corresponding to the 5G message, verifying whether relevant fields in the signature result are valid or not through a public key corresponding to the identity certificate, and verifying whether the identity certificate is valid or not, specifically:
the receiving terminal obtains a Hash value of the identity certificate by utilizing a Hash algorithm pre-agreed by the sending terminal and the receiving terminal, marks the Hash value as Hash1, obtains a public key corresponding to the identity certificate, decrypts the identity certificate by utilizing the public key to obtain Hash2, compares whether the Hash1 and the Hash2 are consistent, and if so, indicates that the identity certificate is a trusted certificate (namely, the identity certificate is valid), otherwise, considers that the identity certificate is not trusted.
And verifying whether the relevant fields in the signature result are valid or not is approximately the same as the method for verifying whether the identity certificate is valid or not, namely, the hash value obtained by verifying the correlation of the signature result through the public key of the identity certificate is compared with the hash value of the signature result obtained by a pre-agreed hash algorithm, when the hash values are consistent, the signature result is valid, and otherwise, the signature result is invalid.
And when the relevant field in the verification signature result is valid and the verification identity certificate is valid, feeding back the 5G message to the user of the receiving party, for example, putting the 5G message into an inbox or displaying the content of the 5G message on an interactive interface of the terminal of the receiving party. Since both the signature result and the identity certificate are verified, the receiving user can thereby determine that the sender identity of the 5G message has not been spoofed. When any one of the signature result and the identity certificate fails to pass verification, it is indicated that the 5G message sent by the sender may be tampered, and at this time, the receiver user may be reminded according to a preset control policy, for example, the 5G message is automatically put into a deleted mailbox, or after the receiver user is prompted that the verification fails, the 5G message is still normally put into an inbox.
Further, the verifying whether the relevant field in the signature result is valid includes:
acquiring a public key corresponding to the identity certificate, and verifying a relevant field of the signature result by using the public key;
when all the fields of the related fields are verified to be successful, the related fields of the signature result are valid;
when any one of the relevant fields fails to be verified, the relevant field of the signature result is invalid.
Because the signature result includes the signature of the key pair 5G message, the sender telephone number, the receiver telephone number, the timestamp of the message transmission, and other information of the sender user, when the signature of the 5G message, the sender telephone number, the receiver telephone number, the timestamp of the message transmission, and other information passes verification, the signature result is considered to pass verification (namely the signature result is valid). When any one of the fields of the 5G message, the sender telephone number, the receiver telephone number and the timestamp of the message transmission fails to verify, the signature result is considered to be not verified (namely, the signature result is invalid).
In one embodiment, the method further comprises:
and when the relevant fields in the signature result are verified to be valid and the identity certificate is verified to pass, displaying a verification result on an interactive interface of the receiver terminal.
After the signature result and the identity certificate pass verification, the verification result may be displayed on the receiver terminal, for example, "sender identity verification pass" is displayed on the interactive interface of the receiver terminal.
Referring to fig. 3, a schematic diagram of a transmission system of a 5G message according to a preferred embodiment of the present application is shown.
The transmission system of the 5G message is configured with the sender terminal 10 and the receiver terminal 20, and the sender terminal 10 and the receiver terminal 20 may be devices capable of automatically performing numerical calculation and/or information processing according to a preset or stored instruction. The sender terminal 10 may include, but is not limited to, a mobile phone, a landline, a computer with a telephone call function, etc., and the receiver terminal 20 may include, but is not limited to, a mobile phone, a landline, a computer with a telephone call function, etc. The network 30 may be a 5G network, or may be a wireless or wired network such as an Intranet (Intranet), the Internet (Internet), a global system for mobile communications (Global System of Mobile communication, GSM), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), bluetooth (Bluetooth), wi-Fi, or a telephone network.
In the present embodiment, the sender terminal 10 may include, but is not limited to, a memory 11, a processor 12, and a network interface 13, which are communicably connected to each other through a system bus, and the memory 11 stores a transmission program of 5G messages executable on the processor 12. It should be noted that fig. 3 only shows the sender terminal 10 with components 11-13, but it should be understood that not all shown components are required to be implemented, and that more or fewer components may be implemented instead.
The receiver terminal 20 may include, but is not limited to, a memory 21, a processor 22, and a network interface 23, which are communicably connected to each other through a system bus, and the memory 21 stores a transmission program of the 5G message executable on the processor 22. It is noted that fig. 3 only shows the receiver terminal 20 with components 21-23, but it is understood that not all shown components are required to be implemented, and that more or fewer components may alternatively be implemented.
Wherein the storage 11 comprises a memory and at least one type of readable storage medium. The readable storage medium may be volatile or nonvolatile. For example, the readable storage medium may be a nonvolatile storage medium such as a flash memory, a hard disk, a multimedia card, a card memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, etc. In some embodiments, the readable storage medium may be an internal storage unit of the sender terminal 10, such as a hard disk of the sender terminal; in other embodiments, the storage medium may also be an external storage device of the sender terminal, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash Card (Flash Card), etc. In this embodiment, the readable storage medium of the memory 11 may be used to store various types of application software, such as program codes for storing a transmission program of a 5G message in the embodiment of the present application. Further, the memory 11 may be used to temporarily store various types of data that have been output or are to be output.
The processor 12 may be a central processing unit (Central Processing Unit, CPU), controller, microcontroller, microprocessor, or other data processing chip in some embodiments. The processor 12 is typically used to control the overall operation of the sender terminal 10, such as performing control and processing related to data interaction or communication with the sender terminal 10. In this embodiment, the processor 12 is configured to execute a program code stored in the memory 11 or process data, such as a transmission program for 5G messages, etc.
The network interface 13 may comprise a wireless network interface or a wired network interface, which network interface 13 is typically used to establish a communication connection between a sender terminal and a receiver terminal or other modules. In this embodiment, the network interface 13 is mainly used to connect the sender terminal with the receiver terminal, and establish a data transmission channel and communication connection between the sender terminal and the receiver terminal.
The transmission program of the 5G message is stored in the memory 11 and includes at least one computer readable instruction stored in the memory 11, the at least one computer readable instruction being executable by the processor 12 to implement the method of the embodiments of the present application; and, the at least one computer readable instruction may be divided into different logic modules, depending on the functionality implemented by the parts thereof.
The memory 21, the processor 22, and the network interface 23 of the receiving terminal are similar to the memory 11, the processor 12, and the network interface 13 of the transmitting terminal, and will not be described here.
In one embodiment, the above-mentioned transmission procedure of the 5G message is implemented by the processor 12 as follows:
acquiring a 5G message edited by a sender user;
generating a signature result corresponding to the 5G message based on a key corresponding to an identity certificate of a sender user pre-stored in the sender terminal;
and transmitting the 5G message, the signature result and the identity certificate to a receiver terminal so that the receiver terminal can feed back the 5G message to a receiver user after verifying that the signature result and the identity certificate pass.
In another embodiment, the above-mentioned transmission procedure of the 5G message is implemented by the processor 22 as follows:
acquiring an identity certificate of a sender user, a 5G message and a signature result corresponding to the 5G message, which are transmitted by a sender terminal;
verifying whether related fields in the signature result are valid or not, and verifying whether the identity certificate is valid or not;
and feeding back the 5G message to a receiver user when the relevant field in the signature result is verified to be valid and the identity certificate is verified to be valid.
For a detailed description of the above steps, please refer to the above description of the flowchart of the embodiment of the transmission method of the 5G message in fig. 1 and 2.
Furthermore, the present application provides a computer-readable storage medium having stored thereon a transmission program of a 5G message, the transmission program of the 5G message realizing the following steps when executed by a processor:
acquiring a 5G message edited by a sender user;
generating a signature result corresponding to the 5G message based on a key corresponding to an identity certificate of a sender user pre-stored in the sender terminal;
and transmitting the 5G message, the signature result and the identity certificate to a receiver terminal so that the receiver terminal can feed back the 5G message to a receiver user after verifying that the signature result and the identity certificate pass.
The specific embodiment of the computer readable storage medium is substantially the same as the specific embodiment of the method for transmitting 5G messages shown in fig. 1, and will not be described herein.
The present application also provides a computer readable storage medium having stored thereon a transmission program of a 5G message, the transmission program of the 5G message realizing the following steps when executed by a processor:
acquiring an identity certificate of a sender user, a 5G message and a signature result corresponding to the 5G message, which are transmitted by a sender terminal;
verifying whether related fields in the signature result are valid or not, and verifying whether the identity certificate is valid or not;
and feeding back the 5G message to a receiver user when the relevant field in the signature result is verified to be valid and the identity certificate is verified to be valid.
The specific embodiment of the computer readable storage medium is substantially the same as the specific embodiment of the transmission method of the 5G message shown in fig. 2, and will not be described herein.
It should be noted that, the foregoing reference numerals of the embodiments of the present application are merely for describing the embodiments, and do not represent the advantages and disadvantages of the embodiments. And the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, apparatus, article or method that comprises the element.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) as described above, comprising instructions for causing a terminal device (which may be a mobile phone, a computer, an electronic device, or a network device, etc.) to perform the method according to the embodiments of the present application.
The foregoing description is only of the preferred embodiments of the present application, and is not intended to limit the scope of the application, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein or in the alternative, which may be employed directly or indirectly in other related arts.

Claims (8)

1. A transmission method of a 5G message, applied to a sender terminal, the method comprising:
acquiring a 5G message edited by a sender user;
generating a signature result corresponding to the 5G message based on a key corresponding to an identity certificate of a sender user pre-stored in the sender terminal;
transmitting the 5G message, the signature result and the identity certificate to a receiver terminal so that the receiver terminal can feed back the 5G message to a receiver user after verifying that the signature result and the identity certificate pass;
the generating a signature result corresponding to the 5G message based on a key corresponding to an identity certificate of a sender user pre-stored in the sender terminal includes:
reading a private key corresponding to the identity certificate of the sender user, and signing the 5G message, the number of the sender terminal, the number of the receiver terminal and the sending time of the 5G message by using the private key to obtain a signature result;
the identity certificate and the secret key are stored in a relevant storage path of the sender terminal, or the identity certificate and the secret key are stored in a relevant storage path of a SIM card of the sender terminal.
2. The method for transmitting a 5G message according to claim 1, wherein transmitting the 5G message, the signature result, and the identity certificate to a receiver terminal comprises:
transmitting the 5G message, the signature result and the identity certificate to a receiver terminal through a first channel based on the number of the receiver terminal;
or transmitting the 5G message and the signature result to the receiver terminal through a first channel based on the number of the receiver terminal, and transmitting the identity certificate to the receiver terminal through a second channel;
or transmitting the 5G message to the receiver terminal through a first channel based on the number of the receiver terminal, and transmitting the signature result and the identity certificate to the receiver terminal through a second channel.
3. A method for transmitting a 5G message, applied to a receiving terminal, the method comprising:
acquiring an identity certificate of a sender user, a 5G message and a signature result corresponding to the 5G message, which are transmitted by a sender terminal;
verifying whether related fields in the signature result are valid or not, and verifying whether the identity certificate is valid or not;
when the relevant fields in the signature result are verified to be valid and the identity certificate is verified to be valid, feeding back the 5G message to a receiver user;
the signature result is obtained by the sender terminal reading a private key corresponding to the identity certificate of the sender user and signing the 5G message, the number of the sender terminal, the number of the receiver terminal and the sending time of the 5G message by using the private key;
the identity certificate and the secret key corresponding to the identity certificate are stored in a relevant storage path of the sender terminal, or the identity certificate and the secret key corresponding to the identity certificate are stored in a relevant storage path of a SIM card of the sender terminal.
4. A method of transmitting a 5G message according to claim 3, wherein said verifying whether the relevant field in the signature result is valid comprises:
acquiring a public key corresponding to the identity certificate, and verifying a relevant field of the signature result by using the public key;
when all the fields of the related fields are verified to be successful, the related fields of the signature result are valid;
when any one of the relevant fields fails to be verified, the relevant field of the signature result is invalid.
5. A method of transmitting a 5G message according to claim 3, further comprising:
and when the relevant fields in the signature result are verified to be valid and the identity certificate is verified to pass, displaying a verification result on an interactive interface of the receiver terminal.
6. A sender terminal, characterized in that the sender terminal comprises a memory and a processor connected to the memory, wherein a transmission program of a 5G message running on the processor is stored in the memory, and the transmission program of the 5G message is executed by the processor to implement the following steps:
acquiring a 5G message edited by a sender user;
generating a signature result corresponding to the 5G message based on a key corresponding to an identity certificate of a sender user pre-stored in the sender terminal;
transmitting the 5G message, the signature result and the identity certificate to a receiver terminal so that the receiver terminal can feed back the 5G message to a receiver user after verifying that the signature result and the identity certificate pass;
the generating a signature result corresponding to the 5G message based on a key corresponding to an identity certificate of a sender user pre-stored in the sender terminal includes:
reading a private key corresponding to the identity certificate of the sender user, and signing the 5G message, the number of the sender terminal, the number of the receiver terminal and the sending time of the 5G message by using the private key to obtain a signature result;
the identity certificate and the secret key are stored in a relevant storage path of the sender terminal, or the identity certificate and the secret key are stored in a relevant storage path of a SIM card of the sender terminal.
7. A receiver terminal, wherein the receiver terminal comprises a memory and a processor connected with the memory, the memory stores a 5G message transmission program running on the processor, and the 5G message transmission program when executed by the processor realizes the following steps:
acquiring an identity certificate of a sender user, a 5G message and a signature result corresponding to the 5G message, which are transmitted by a sender terminal;
verifying whether related fields in the signature result are valid or not, and verifying whether the identity certificate is valid or not;
when the relevant fields in the signature result are verified to be valid and the identity certificate is verified to be valid, feeding back the 5G message to a receiver user;
the signature result is obtained by the sender terminal reading a private key corresponding to the identity certificate of the sender user and signing the 5G message, the number of the sender terminal, the number of the receiver terminal and the sending time of the 5G message by using the private key;
the identity certificate and the secret key corresponding to the identity certificate are stored in a relevant storage path of the sender terminal, or the identity certificate and the secret key corresponding to the identity certificate are stored in a relevant storage path of a SIM card of the sender terminal.
8. A transmission system of 5G messages, characterized in that the transmission system of 5G messages is deployed with a sender terminal according to claim 6 and a receiver terminal according to claim 7.
CN202210610073.7A 2022-05-31 2022-05-31 5G message transmission method, terminal and system Active CN115022819B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210610073.7A CN115022819B (en) 2022-05-31 2022-05-31 5G message transmission method, terminal and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210610073.7A CN115022819B (en) 2022-05-31 2022-05-31 5G message transmission method, terminal and system

Publications (2)

Publication Number Publication Date
CN115022819A CN115022819A (en) 2022-09-06
CN115022819B true CN115022819B (en) 2023-12-05

Family

ID=83070566

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210610073.7A Active CN115022819B (en) 2022-05-31 2022-05-31 5G message transmission method, terminal and system

Country Status (1)

Country Link
CN (1) CN115022819B (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101115226A (en) * 2006-07-28 2008-01-30 明基电通股份有限公司 Cover letter checking system and method
CN101183938A (en) * 2007-10-22 2008-05-21 华中科技大学 Wireless network security transmission method, system and equipment
CN101247605A (en) * 2008-03-25 2008-08-20 中兴通讯股份有限公司 Short information enciphering and endorsement method, mobile terminal and short information ciphering system
WO2009154580A1 (en) * 2008-06-20 2009-12-23 Dallab (S) Pte Ltd Secure short message service
CN101626567A (en) * 2009-06-29 2010-01-13 深圳华为通信技术有限公司 Short message sending and receiving method, short message sending and receiving device and mobile terminal
CN101895847A (en) * 2010-08-02 2010-11-24 刘明晶 Short message service authenticated encryption system and method based on digital certificate
CN102104844A (en) * 2009-12-16 2011-06-22 北京邮电大学 Mobile phone encrypted short message structure and method for transmitting and receiving mobile phone encrypted short message by applying same
CN103139774A (en) * 2011-11-30 2013-06-05 中国联合网络通信集团有限公司 Short message service processing method and short message service processing system
WO2014166519A1 (en) * 2013-04-08 2014-10-16 Bonsignore Antonio Salvatore Piero Vittorio A qualified electronic signature system, method and mobile processing terminal for qualified electronic signature
CN105681340A (en) * 2016-03-07 2016-06-15 吴晓军 Digital certificate use method and apparatus
BR102014031238A2 (en) * 2014-12-12 2016-07-19 Fundação Cpqd Ct De Pesquisa E Desenvolvimento Em Telecomunicações system and method for secure and compact packaging of short sms text messages
CN107566413A (en) * 2017-10-24 2018-01-09 东信和平科技股份有限公司 A kind of intelligent card security authentication method and system based on data SMS technology
WO2019109727A1 (en) * 2017-12-08 2019-06-13 西安中兴新软件有限责任公司 Identity verification method and apparatus

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10659959B2 (en) * 2014-11-12 2020-05-19 Blackberry Limited Enhanced cell broadcast service via secure group broadcast

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101115226A (en) * 2006-07-28 2008-01-30 明基电通股份有限公司 Cover letter checking system and method
CN101183938A (en) * 2007-10-22 2008-05-21 华中科技大学 Wireless network security transmission method, system and equipment
CN101247605A (en) * 2008-03-25 2008-08-20 中兴通讯股份有限公司 Short information enciphering and endorsement method, mobile terminal and short information ciphering system
WO2009154580A1 (en) * 2008-06-20 2009-12-23 Dallab (S) Pte Ltd Secure short message service
CN101626567A (en) * 2009-06-29 2010-01-13 深圳华为通信技术有限公司 Short message sending and receiving method, short message sending and receiving device and mobile terminal
CN102104844A (en) * 2009-12-16 2011-06-22 北京邮电大学 Mobile phone encrypted short message structure and method for transmitting and receiving mobile phone encrypted short message by applying same
CN101895847A (en) * 2010-08-02 2010-11-24 刘明晶 Short message service authenticated encryption system and method based on digital certificate
CN103139774A (en) * 2011-11-30 2013-06-05 中国联合网络通信集团有限公司 Short message service processing method and short message service processing system
WO2014166519A1 (en) * 2013-04-08 2014-10-16 Bonsignore Antonio Salvatore Piero Vittorio A qualified electronic signature system, method and mobile processing terminal for qualified electronic signature
BR102014031238A2 (en) * 2014-12-12 2016-07-19 Fundação Cpqd Ct De Pesquisa E Desenvolvimento Em Telecomunicações system and method for secure and compact packaging of short sms text messages
CN105681340A (en) * 2016-03-07 2016-06-15 吴晓军 Digital certificate use method and apparatus
CN107566413A (en) * 2017-10-24 2018-01-09 东信和平科技股份有限公司 A kind of intelligent card security authentication method and system based on data SMS technology
WO2019109727A1 (en) * 2017-12-08 2019-06-13 西安中兴新软件有限责任公司 Identity verification method and apparatus

Also Published As

Publication number Publication date
CN115022819A (en) 2022-09-06

Similar Documents

Publication Publication Date Title
CN101167388B (en) Limited supply access to mobile terminal features
US9112703B2 (en) Use of certificate authority to control a device's access to services
US10237706B2 (en) Method and apparatus for establishing communication between mobile terminals, incoming communication control and outgoing communication control and system by use thereof
CN106304074B (en) Auth method and system towards mobile subscriber
CN107241339B (en) Identity authentication method, identity authentication device and storage medium
US20100242097A1 (en) System and method for managing application program access to a protected resource residing on a mobile device
CN111355726B (en) Identity authorization login method and device, electronic equipment and storage medium
CN105207774A (en) Key negotiation method and device of verification information
KR20040096264A (en) A method for verificating the integrity of coded contents and authenticating the contents provider
JP2007511122A (en) How to manage application security with security modules
CN101860540A (en) Method and device for identifying legality of website service
US20170286873A1 (en) Electronic ticket management
CN107566413B (en) Smart card security authentication method and system based on data short message technology
EP2717539A1 (en) Method and system for hypertext transfer protocol digest authentication
CN106656992B (en) Information verification method
CN105577619B (en) Client login method, client and system
CN112448930A (en) Account registration method, device, server and computer readable storage medium
CN115002284A (en) Calling information display method, terminal and system based on private conversation
CN111970122B (en) Official APP identification method, mobile terminal and application server
KR20050045970A (en) A method for verificating the integrity of coded contents and authenticating the contents provider
CN115022819B (en) 5G message transmission method, terminal and system
CN111614458A (en) Method, system and storage medium for generating gateway JWT
CN108513272B (en) Short message processing method and device
CN114845301A (en) Number verification method, terminal and system based on super SIM card
CN115022820B (en) Verification method, terminal and system of 5G message

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant