CA3127882C - Short message sending method, device, and computer system - Google Patents

Short message sending method, device, and computer system Download PDF

Info

Publication number
CA3127882C
CA3127882C CA3127882A CA3127882A CA3127882C CA 3127882 C CA3127882 C CA 3127882C CA 3127882 A CA3127882 A CA 3127882A CA 3127882 A CA3127882 A CA 3127882A CA 3127882 C CA3127882 C CA 3127882C
Authority
CA
Canada
Prior art keywords
send
short message
pending
encrypted
contents
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CA3127882A
Other languages
French (fr)
Other versions
CA3127882A1 (en
Inventor
Wei Cheng
Hao Jiang
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
10353744 Canada Ltd
Original Assignee
10353744 Canada Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 10353744 Canada Ltd filed Critical 10353744 Canada Ltd
Publication of CA3127882A1 publication Critical patent/CA3127882A1/en
Application granted granted Critical
Publication of CA3127882C publication Critical patent/CA3127882C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Abstract

Disclosed in the present invention are a short message sending method, device, and computer system. The mentioned method comprises: receiving a short message sending request from a sender, wherein the described short message sending request includes send-pending target user tags; acquiring encrypted send-pending contents corresponding to the described sender; acquiring and encrypting contact information for users corresponding to the described target user tags; and sending the described encrypted contact information and described encrypted send-pending contents to the described target short message service provider, wherein the described target short message service provider decrypts and sends the described send-pending contents to the described users according to the described contact information. Therefore, short message contents from senders will not be accessed by a third party except short message service providers responsible for sending messages to users, wherein senders cannot access user contact information, to prevent message content disclosure and protect user privacy.

Description

SHORT MESSAGE SENDING METHOD, DEVICE, AND COMPUTER SYSTEM
Technical Field 100011 The present invention relates to the field of cloud computing security, in particular, to a method, a device, and a computer system for short message sending.
Background
[0002] With rapid growth of the internet, business retailers commonly send promotion messages to users for advocating services or products. In order to enhance advocating effects, business retailers also purchase the short message sending services from value added ISVs, wherein messages are compiled by the value-added ISVs and sent to target users. However, the value-added ISVs are required to reach target users, indicating that the value-added ISVs should access contact information of target users.
[0003] ISV entered cloud platforms are able to send short messages to users via services provided by the cloud platforms. However, the cloud platforms should not directly reveal user contact information to the value-added ISV, in order to protect the user privacy. On the other hand, the cloud platforms are not supposed to access message contents from the value-added ISVs concerning any possible competitions. As a result, the value-added ISV are not willing to enter cloud platforms, consequently suppressing the development for the cloud platforms.
Summary
[0004] In order to solve the problems due to limitations of the current technologies, the present invention aims at providing a method, a device, and a computer system for short message sending.
[0005] To achieve the forementioned goal, from the first perspective, a short message sending method is provided in the present invention, comprising:
[0006] receiving a short message sending request from a sender, wherein the described short message sending request includes send-pending target user tags;
[0007] acquiring encrypted send-pending contents corresponding to the described sender;
[0008] acquiring and encrypting contact information for users corresponding to the described target user tags; and
[0009] sending the described encrypted contact information and described encrypted send-pending contents to the described target short message service provider, so as to decrypt and send the described send-pending contents to the described users by the described target short message service provider according to the described contact information.

Date Recue/Date Received 2021-10-12
[0010] In some embodiments of the present invention, the described method includes:
[0011] receiving and storing the described encrypted send-pending contents encrypted by a primary shared key from the sender, wherein the described primary shared key is generated from a public key from the described target short message service provider and a private key from the described sender; and
[0012] the procedure of sending the described encrypted contact information and described encrypted send-pending contents to the described target short message service provider, so as to decrypt and send the described send-pending contents to the described users by the described target short message service provider according to the described contact information, consisting of:
[0013] decrypting the described send-pending contents according to the public key from the described sender and the private key from the described target short message service provider by the described target short message service provider, then sending the described send-pending contents.
[0014] In some embodiments of the present invention, the procedure of receiving and storing the described encrypted send-pending contents encrypted by a primary shared key from the sender, wherein the described primary shared key is generated from a public key from the described target short message service provider and a private key from the described sender, comprises:
[0015] verifying that if the described encrypted send-pending contents pass a review; and
[0016] where if the review is not passed, refusing to store the described encrypted send-pending contents.
[0017] In some embodiments of the present invention, the described short message sending request includes a verification information, wherein the procedure of verifying that if the described encrypted send-pending contents pass a review comprises:
[0018] sending the verification code to the sender, so as to generate the verification information according to the verification code where if the described send-pending contents do not include a pre-set keyword; and
[0019] where if the described verification information is correct, the described encrypted send-pending contents is determined to pass the review.
[0020] In some embodiments of the present invention, the described method includes:
[0021] receiving a send-pending content modification request from the described sender;
[0022] sending the described encrypted send-pending contents to the described sender, wherein the described sender uses the described primary shared key to decrypt and modify the described send-pending contents, then return the described send-pending contents encrypted by the described primary shared key;
and
[0023] storing the described returned send-pending contents with modifications from the described sender.

Date Recue/Date Received 2021-10-12
[0024] In some embodiments of the present invention, the described contact information for users corresponding to the described target user tags are acquired and encrypted, by means of:
[0025] encrypting the described contact information with a secondary shared key by a processing terminal, therein the described secondary shared key is generated from a public key from the described target short message service provider and a private key from the described processing terminal;
[0026] decrypting and sending the described send-pending contents to the described users according to the described contact information by the described target short message service provider, comprising:
[0027] decrypting based on the public key from the described processing terminal and a private key from the described target short message service provider and acquiring the described contact information.
[0028] From the second perspective, a short message sending method is provided in the present invention, comprising that:
[0029] the processing terminal receives a short message sending request from a sender, wherein the described short message sending request includes send-pending target user tags;
[0030] the processing terminal acquires encrypted send-pending contents corresponding to the described sender;
100311 the processing terminal acquires and encrypts contact information for users corresponding to the described target user tags;
[0032] the processing terminal sends the described encrypted contact information and described encrypted send-pending contents to the described target short message service provider;
and [0033] the described target short message service provider decrypts and sends the described send-pending contents to the described users according to the described contact information.
[0034] From the third perspective, a short message sending device is provided in the present invention, comprising:
[0035] a receiving module, configured to receive a short message sending request from a sender, wherein the described short message sending request includes send-pending target user tags;
[0036] an acquisition module, configured to acquire encrypted send-pending contents corresponding to the described sender; to acquires and encrypt contact information for users corresponding to the described target user tags; and [0037] a processing module, configured to send the described encrypted contact information and described encrypted send-pending contents to the described target short message service provider, so as to decrypt and send the described send-pending contents to the described users by the described target short message service provider according to the described contact information.
[0038] In some embodiments of the present invention, the described receiving module can also be configured to receive and store the described encrypted send-pending contents encrypted by a primary Date Recue/Date Received 2021-10-12 shared key from the sender, wherein the described primary shared key is generated from a public key from the described target short message service provider and a private key from the described sender; and the described processing module can also be configured to send the described encrypted contact information and the described encrypted send-pending contents to the described target short message service provider, so as to decrypt and acquire the described send-pending contents by the described target short message service provider according to the public key from the described sender and the private key from the described target short message service provider.
[0039] From the fourth perspective, a computer system is provided in the present invention, comprising:
[0040] one or more processors; and [0041] a memory connected to the described one or more processors, wherein the described memory is used to store program commands, for performing the following procedures when the described program commands are executed on the described one or more processors:
[0042] receiving a short message sending request from a sender, wherein the described short message sending request includes send-pending target user tags;
[0043] acquiring encrypted send-pending contents corresponding to the described sender;
[0044] acquiring and encrypting contact information for users corresponding to the described target user tags; and [0045] sending the described encrypted contact information and described encrypted send-pending contents to the described target short message service provider, so as to decrypt and send the described send-pending contents to the described users by the described target short message service provider according to the described contact information.
[0046] The present invention provides benefits of that:
[0047] disclosed in the present invention are a short message sending method, device, and computer system. The mentioned method comprises: receiving a short message sending request from a sender, wherein the described short message sending request includes send-pending target user tags; acquiring encrypted send-pending contents corresponding to the described sender;
acquiring and encrypting contact information for users corresponding to the described target user tags; and sending the described encrypted contact information and described encrypted send-pending contents to the described target short message service provider, wherein the described target short message service provider decrypts and sends the described send-pending contents to the described users according to the described contact information.
Therefore, short message contents from senders will not be accessed by a third party except short message service providers responsible for sending messages to users, wherein senders cannot access user contact information, to prevent message content disclosure and protect user privacy.

Date Recue/Date Received 2021-10-12 [0048] Furthermore, the present invention also provides that by receiving and storing the described encrypted send-pending contents encrypted by a primary shared key from the sender, the described primary shared key is generated from a public key from the described target short message service provider and a private key from the described sender; and the procedure of sending the described encrypted contact information and described encrypted send-pending contents to the described target short message service provider, so as to decrypt and send the described send-pending contents to the described users by the described target short message service provider according to the described contact information, comprises:
decrypting the described send-pending contents according to the public key from the described sender and the private key from the described target short message service provider by the described target short message service provider, then sending the described send-pending contents.
[0049] Products and applications of the present invention do not necessarily carry all the forementioned features.
Brief descriptions of the drawings [0050] In order to make the technical strategies of the present invention clearer, the accompanying drawings for the present invention will be briefly introduced below.
Obviously, the following drawings in the descriptions are only a portion of embodiments of the present invention.
Those skilled in the art are able to generate other configurations according to the provided drawings without requiring any creative works.
[0051] Fig. 1 is a structure diagram of the short message sending system provided in the present invention.
[0052] Fig. 2 is a flow diagram of the short message sending system provided in the present invention.
[0053] Fig. 3 is a schematic diagram of the thread pool scheduling provided in the present invention.
[0054] Fig. 4 is a flow diagram of the method provided in the present invention.
Detailed descriptions [0055] In order to make the objective, the technical scheme, and the advantages of the present invention clearer, the present invention will be explained further in detail precisely below with references to the accompany drawings. Obviously, the embodiments described below are only a portion of embodiments of the present invention and cannot represent all possible embodiments. Based on the embodiments in the present invention, the other applications by those skilled in the art without any creative works are falling within the scope of the present invention.
[0056] As discussed in the background, in order to solve the forementioned problems, a short message sending method is provided in the present invention, as shown in Fig. 1.
Business retailers wanting short message sending services can use value-added services from the value-added ISVs, wherein the tasks of compiling and sending messages are scheduled to the value-added ISVs. Based on the demands of the business retailer, target users of marketing messages are determined, and the marketing messages are compiled by the value-added ISVs. The value-added services include to store available short messages to a Date Recue/Date Received 2021-10-12 short message storage platform. Then, the determined user tags are sent to the marketing platform, wherein the marketing platform returns the marketing messages and contact information of users and the contact information is sent to the short massage platform. The short message platform sends marketing messages and connected information to the value-added ISVs, wherein the value-added ISVs send the marketing message to users.
[0057] The forementioned system for short message sending method comprises:
[0058] Step 1, key initialization.
[0059] As shown in Fig. 1, an independent key generation center (KGC) can be allocated on a third-party server. The described key generating center can use the CPK algorithm to generate a public key for each entity in the system, wherein the public keys are stored in a CPK module. The described key generate center can use any other algorithms to generate public keys, not constrained by the present invention.
[0060] The ISV, the marketing system, and the short message service provider individually upload the identifications (ID) and the device fingerprint IDs (such as the IP address of the major server and the hash value of the MAC address) to the short message platform.
100611 The short message platform generates a verification ID (Appid) for each marketing service provider and a shared key field (Appsecret) between the short message platform and the described marketing service provider.
[0062] The short message platform returns a corresponding verification ID
(Appid) for each marketing platform and a shared key field (Appsecret) between the short message platform and the described marketing platform. The short message platform returns a corresponding verification ID (Appid) for each short message service provider and a shared key field (Appsecret) between the short message platform and the described short message service provider. Preferably, all short message service providers can have the same verification ID (Appid) and the same shared key field (Appsecret).
[0063] The short message platform sends the verification IDs (Appid) of short message service providers to each marketing service provider and the marketing platform.
[0064] The short message platform synchronizes verification IDs (Appid) and shared key field (Appsecret) of all value-added ISV, marketing platforms and short message service providers to the key generation center.
[0065] The key generation center generates a public key and a private key for each ISV, marketing platform and short message service provider, individually, and stores all public keys on the CPK module.
[0066] The key generation acquires a request according to the private keys of the value-added ISVs, marketing platforms and short message service providers, and returns the CPK
module and corresponding private keys.

Date Recue/Date Received 2021-10-12 [0067] The acquired request of each private key is required to include Appid, HMAC (Appsecret, randsMIDI1Appidlltimestamp), rands, ID, and timestamp, wherein the Appid is the Appid of the request sender; the HMAC (Appsecret, randsHIDHAppidlltimestamp) is a verification code generated for applying the HMAC algorithm according to the Appsecret, rands, ID, Appid, and timestamp of the request sender;
the rands is randomly generated fields; and the timestamp is the time stamp.
[0068] The key generation center verifies identification of the message verification code according to acquired Appsecret of the request sender; and [0069] after passing the message verification code identification, the key generation center returns a private key of the request sender and the corresponding CPK module to the request sender, wherein the private key of the request sender is encrypted according to the AES algorithm based on the Appsecret.
[0070] The request sender decrypts with the own Appsecret to acquire the own private key and the CPK
module carrying the public key.
[0071] Step 2, based on retailers' demands, compiling message contents on the short message sending platform and encrypt by the marketing service vendor; and [0072] the short message platform provides a short message editing function, wherein the marketing service provider can edit short messages with the short message editing function. The complied message is reviewed by a pre-set reviewing script on the short message platform, wherein the pre-set reviewing script is used to determine that if a short message contains a pre-set key word, including words related to pornography, gambling, and drug abuse, as well as any illegal contents. During the review, a random token is generated by the short message platform. When no pre-set key word is detected in the review, the review script generates a verification code according to the random token and the Appsecret of the marketing service provider. The marketing service provider generates a primary shared key (sharekey 1) based on the own private key and the public key of the short message service provide stored in the SPK module, wherein the generated primary shared key is used to encrypt the short message. The verification code is appended to the encrypted short message, and the short message platform determines if the short message passes the review according to the verification code. Where if the review is passed, the short message platform stores the encrypted short message contents; and where if the review is not passed, the short message platform refuses to store the encrypted short message contents.
[0073] Preferably, retailers are allowed to not authorize marketing service providers, and to compile short messages on the short message platform by retailers.
[0074] Step 3, based on retailers' demands, determining target user tags for receiving short messages by the marketing service provider;
[0075] the marketing platform has pre-set user tags featuring user properties or demands, wherein one user has one or more user tags carrying contact information of each user, such as cell phone numbers.

Date Recue/Date Received 2021-10-12 [0076] The marketing service provider can choose one or more user tags, and the short message can be sent to all users with the described one or more user tags, or to one of users with the described one or more user tags.
[0077] Preferably, retailers are allowed to not authorize the marketing service provider, to determine target user tags for receiving short messages by retailers.
[0078] Step 4, based on the determined target user tags, acquiring contact information of corresponding users by the marketing service provider;
[0079] Step 5, encrypting user contact information by the marketing service platform, then sending the encrypted contact information and the encrypted short message contents to the short message service provider; and according to the private key of the marketing service platform and the public key of the short message service provider from the CPK module.
[0080] generating a secondary shared key (sharekey2), to encrypt contact information according to the secondary shared key by AES algorithm. After encryption, the marketing service provider sends the encrypted short message contents and encrypted contact information by the marketing service provider to the short message service provider.
[0081] Step 6, decrypting the encrypted short message contents and encrypted contact information by the short message service provider, and sending the short message contents to users according to contact information based on decryption results;
[0082] generating the primary shared key (sharekey 1) by the short message service provider via the ECDH
key negotiation algorithm according to the public key of the marketing service platform and the private key of the short message service provider from the CPK modules, to decrypt the encrypted short message contents based on the primary shared key (sharekey 1), and acquire the send-pending message contents;
[0083] generating the secondary shared key (sharekey2) by the short message service provider via the ECDH key negotiation algorithm according to the public key of the marketing service platform and the private key of the short message service provider from the CPK modules, to decrypt the encrypted contact information based on the secondary shared key (sharekey2), and acquire the send-pending contact information; and [0084] sending message contents to target users according to contact information by the short message service provider.
[0085] The forementioned system prevents irrelevant participants in the system from accessing clear message contents or contact information, wherein message content is secured while the user privacy is prevented from disclosure. In the meanwhile, the short message service provider can use a sender public key and own private key to decrypt received contents, wherein the performance suppression by key negotiation is reduced and the overall system operation efficiency is improved.

Date Recue/Date Received 2021-10-12 [0086] Embodiment two [0087] Corresponding to the forementioned embodiment, as shown in Fig. 2, a short message sending method is provided in the present invention, comprising:
[0088] 210, receiving a short message sending request from a sender, wherein the described short message sending request includes send-pending target user tags;
[0089] 220, acquiring encrypted send-pending contents corresponding to the described sender;
[0090] preferably, the procedure of acquiring and encrypting the described contact information for users corresponding to the described target user tags, by means of 100911 221, encrypting the described contact information with a secondary shared key by a processing terminal, wherein the described secondary shared key is generated from a public key from the described target short message service provider and a private key from the described processing terminal;
[0092] the procedure of decrypting and sending the described send-pending contents to the described users by the described target short message service provider according to the described contact information, consisting of:
[0093] decrypting the described send-pending contents according to the public key from the described sender and the private key from the described target short message service provider by the described target short message service provider, then sending the described send-pending contents.
[0094] 230, acquiring and encrypting contact information for users corresponding to the described target user tags; and [0095] 240, sending the described encrypted contact information and described encrypted send-pending contents to the described target short message service provider, so as to decrypt and send the described send-pending contents to the described users by the described target short message service provider according to the described contact information.
[0096] Preferably, the described method comprises:
[0097] 241, receiving and storing the described encrypted send-pending contents encrypted by a primary shared key from the sender, wherein the described primary shared key is generated from a public key from the described target short message service provider and a private key from the described sender; and [0098] the procedure of sending the described encrypted contact information and described encrypted send-pending contents to the described target short message service provider, so as to decrypt and send the described send-pending contents to the described users by the described target short message service provider according to the described contact information, consisting of:
[0099] 242, decrypting the described send-pending contents according to the public key from the described sender and the private key from the described target short message service provider by the described target short message service provider, then sending the described send-pending contents.

Date Recue/Date Received 2021-10-12 [0100] Preferably, the procedure of receiving and storing the described encrypted send-pending contents encrypted by a primary shared key from the sender, wherein the described primary shared key is generated from a public key from the described target short message service provider and a private key from the described sender, comprises:
[0101] 243, verifying that if the described encrypted send-pending contents pass a review; and [0102] where if the review is not passed, refusing to store the described encrypted send-pending contents.
[0103] Preferably, the described short message sending request includes a verification information, wherein the procedure of verifying that if the described encrypted send-pending contents pass a review comprises:
[0104] 244, sending the verification code to the sender, so as to generate the verification information according to the verification code where if the described send-pending contents do not include a pre-set keyword; and [0105] where if the described verification information is correct, the described encrypted send-pending contents is determined to pass the review.
[0106] Preferably, the described method includes:
[0107] 245, receiving a send-pending content modification request from the described sender;
[0108] sending the described encrypted send-pending contents to the described sender, wherein the described sender uses the described primary shared key to decrypt and modify the described send-pending contents, then return the described send-pending contents encrypted by the described primary shared key;
and [0109] storing the described returned send-pending contents with modifications from the described sender.
[0110] Embodiment three [0111] Corresponding to the forementioned embodiment, as shown in Fig. 3, a short message sending device is provided in the present invention, comprising:
[0112] a receiving module 310, configured to receive a short message sending request from a sender, wherein the described short message sending request includes send-pending target user tags;
[0113] an acquisition module 320, configured to acquire encrypted send-pending contents corresponding to the described sender; to acquires and encrypt contact information for users corresponding to the described target user tags; and [0114] a processing module 330, configured to send the described encrypted contact information and described encrypted send-pending contents to the described target short message service provider, so as to Date Recue/Date Received 2021-10-12 decrypt and send the described send-pending contents to the described users by the described target short message service provider according to the described contact information.
[0115] Preferably, the described receiving module 310 can also be configured to receive and store the described encrypted send-pending contents encrypted by a primary shared key from the sender, wherein the described primary shared key is generated from a public key from the described target short message service provider and a private key from the described sender; and the described processing module 330 can also be configured to send the described encrypted contact information and the described encrypted send-pending contents to the described target short message service provider, so as to decrypt and acquire the described send-pending contents by the described target short message service provider according to the public key from the described sender and the private key from the described target short message service provider.
[0116] Preferably, the described processing module 330 can also be configured to verify that if the described encrypted send-pending contents pass a review; and where if the review is not passed, refusing to store the described encrypted send-pending contents.
[0117] Preferably, the described processing module 330 can also be configured to send the verification code to the sender, so as to generate the verification information according to the verification code where if the described send-pending contents do not include a pre-set keyword; and where if the described verification information is correct, the described encrypted send-pending contents is determined to pass the review.
[0118] Preferably, the described processing module 330 can also be configured to receive a send-pending content modification request from the described sender; send the described encrypted send-pending contents to the described sender, wherein the described sender uses the described primary shared key to decrypt and modify the described send-pending contents, then return the described send-pending contents encrypted by the described primary shared key; and store the described returned send-pending contents with modifications from the described sender.
[0119] Preferably, the described processing module 330 can also be configured to encrypt the described contact information with a secondary shared key by a processing terminal, wherein the described secondary shared key is generated from a public key from the described target short message service provider and a private key from the described processing terminal; and based on the public key from the described processing terminal and a private key from the described target short message service provider, the described contact information is decrypted and acquired.
[0120] Embodiment four Date Recue/Date Received 2021-10-12 [0121] Corresponding to the forementioned method, device, and system, a computer system is provided in the embodiment four of the present invention, comprising: one or more processors; and a memory connected to the described one or more processors, wherein the described memory is used to store program commands, for performing the following procedures when the described program commands are executed on the described one or more processors:
[0122] receiving a short message sending request from a sender, wherein the described short message sending request includes send-pending target user tags;
[0123] acquiring encrypted send-pending contents corresponding to the described sender;
[0124] acquiring and encrypting contact information for users corresponding to the described target user tags; and [0125] sending the described encrypted contact information and described encrypted send-pending contents to the described target short message service provider, so as to decrypt and send the described send-pending contents to the described users by the described target short message service provider according to the described contact information.
[0126] In particular, Fig. 4 illustrates structures of the computer system, comprising a processor 1510, a video display adapter 1511, a disk driver 1512, an input/output connection port 1513, an internet connection port 1514, and a memory 1520. The forementioned processor 1510, video display adapter 1511, disk driver 1512, input/output connection port 1513, and internet connection port 1514 are connected and communicated via the system bus control 1530.
[0127] In particular, the processor 1510 can adopt a universal CPU (central processing unit), a microprocessor, an ASIC (application specific integrated circuit) or the use of one or more integrated circuits. The processor is used for executing associated programmes to achieve the technical strategies provided in the present invention.
[0128] The memory 1520 can adopt a read-only memory (ROM), a random access memory (RAM), a static memory, a dynamic memory, etc. The memory 1520 is used to store the operating system 1521 for controlling the electronic apparatus 1500, and the basic input output system (BIOS) for controlling the low-level operations of the electronic apparatus 1500. In the meanwhile, the memory can also store the internet browser 1523, data storage management system 1524, the device label information processing system 1525, etc. The described device label information processing system 1525 can be a program to achieve the forementioned methods and procedures in the present invention. In summary, when the technical strategies are performed via software or hardware, the codes for associated programs are stored in the memory 1520, then called and executed by the processor 1510. The input/output connection port 1513 is used to connect with the input/output modules for information input and output. The input/output modules can be used as Date Recue/Date Received 2021-10-12 components that are installed in the devices (not included in the drawings), or can be externally connected to the devices to provide the described functionalities. In particular, the input devices may include keyboards, mouse, touch screens, microphones, various types of sensors, etc.
The output devices may include monitors, speakers, vibrators, signal lights, etc.
[0129] The internet connection port 1514 is used to connect with a communication module (not included in the drawings), to achieve the communication and interaction between the described device and other equipment. In particular, the communication module may be connected by wire connection (such as USB
cables or internet cables), or wireless connection (such as mobile data, WIFI, Bluetooth, etc.).
[0130] The system bus control 1530 include a path to transfer data across each component of the device (such as the processor 1510, the video display adapter 1511, the disk driver 1512, the input/output connection port 1513, the internet connection port 1514 and the memory 1520).
[0131] Besides, the described electronic device 1500 can access the collection condition information from the collection condition information database 1541 via a virtual resource object, so as for conditional statements and other purposes.
[0132] To clarify, although the schematic of the forementioned device only includes the processor 1510, the video display adapter 1511, the disk driver 1512, the input/output connection port 1513, the internet connection port 1514, the memory 1520 and the system bus control 1530, the practical applications may include the other necessary components to achieve successful operations. It is comprehensible for those skilled in the art that the structure of the device may comprise of less components than that in the drawings, to achieve successful operations.
[0133] By the forementioned descriptions of the applications and embodiments, those skilled in the art can understand that the present invention can be achieved by combination of software and necessary hardware platforms. Based on this concept, the present invention is considered as providing the technical benefits in the means of software products. The mentioned computer software products are stored in the storage media such as ROM/RAM, magnetic disks, compact disks, etc. The mentioned computer software products also include using several commands to have a computer device (such as a personal computer, a server, or a network device) to perform portions of the methods described in each or some of the embodiments in the present invention.
[0134]
The embodiments in the description of the present invention are explained step-by-step. The similar contents can be referred amongst the embodiments, while the differences amongst the embodiments are emphasized. In particular, the system and the corresponding embodiments have similar contents to the method embodiments. Hence, the system and the corresponding embodiments are described concisely, and the related contents can be referred to the method embodiments. The described system and system embodiments are for demonstration only, where the components that are described separately can be Date Recue/Date Received 2021-10-12 physically separated or not. The components shown in individual units can be physical units or not. In other words, the mentioned components can be at a single location or distributed onto multiple network units. All or portions of the modules can be used to achieve the purposes of embodiments of the present invention based on the practical scenarios. Those skilled in the art can understand and apply the associated strategies without creative works.
[01325] The forementioned contents of preferred embodiments of the present invention shall not limit the applications of the present invention. Therefore, all alterations, modifications, equivalence, improvements of the present invention fall within the scope of the present invention.

Date Recue/Date Received 2021-10-12

Claims (52)

Claims:
1. A computer system for sending a short message, the system comprising:
one or more processors, configured to execute a plurality of program commands, wherein the plurality of program commands includes:
receiving a short message sending request from a sender, wherein the short message sending request includes a plurality of send-pending target user tags;
acquiring encrypted send-pending contents by a primary shared key corresponding to the sender, wherein the encrypted send-pending contents append verification code for a content review, wherein the encrypted send-pending contents are stored after the send-pending contents are passed successfiffly the content review for a plurality of pre-set keywords, wherein the primary shared key is generated from a public key from a target short message service provider and a private key liom the sender;
acquiring and encrypting contact information of users corresponding to the target user tags, wherein each user includes one or more target user tags canying the contact information of each user, wherein the contact infoimation is encrypted by generating a secondary shared key; and sending the encrypted contact information and the encrypted send-pending contents to a target short message service provider, so as to decrypt and send the send-pending contents to the users by the target short message service provider according to the contact information; and a memory connected to the one or more processors, wherein the memory is configured to store the plurality of program commands.
2. The system of claim 1, wherein the plurality of program commands further includes receiving and storing the encrypted send-pending contents encrypted by a primary shared key from the sender.
3. The system of claim 2, wherein the primary shared key is generated from a public key from the target short message service provider and a private key from the sender.
4. The system of any one of claims 1 to 3, wherein the plurality of program commands further includes decrypting the send-pending contents according to the public key from the sender and the private key from the target short message service provider by the target short message service provider, then sending the send-pending contents.
5. The system of claim 2, wherein the plurality of program commands further includes verifying that if the encrypted send-pending contents pass a review.
6. The system of claim 5, wherein the plurality of program commands further includes, where if the review is not passed, refusing to store the encrypted send-pending contents.
7. The system of any one of claims 5 to 6, wherein the plurality of program commands further includes sending a verification code to a sender, so as to generate a verification information according to the verification code where if the send-pending contents do not include a pre-set keyword.
8. The system of claim 7, where if the verification information is correct, wherein an encrypted send-pending contents is determined to pass a review.
9. The system of any one of claims 7 and 8, wherein the verification information is attached on the encrypted send-pending contents.
10. The system of any one of claims 2 to 7, wherein the plurality of program commands further includes:
receiving a send-pending content modification request from the sender;
sending the encrypted send-pending contents to the sender, wherein the sender uses the primary shared key to decrypt and modify the send-pending contents, then return the send-pending contents encrypted by the primary shared key; and storing the returned send-pending contents with modifications from the sender.
11. The system of any one of claims 1 to 10, wherein the plurality of program commands further includes:

encrypting the contact information with a secondary shared key by a processing terminal, wherein the secondary shared key is generated from a public key from the target short message service provider and a private key from the processing terminal; and decrypting and sending the send-pending contents to the users according to the contact information by the target short message service provider, further includes:
decrypting based on the public key from the processing terminal and a private key from the target short message service provider and acquiring the contact information.
12. The system of any one of claims 1 to 11, wherein the public key for each party is generated by an independent key generation center on a third-party server.
13. The system of any one of claims 1 to 11, wherein the private key for each party is generated by an independent key generation center on a third-party server.
14. A short message sending method, the method comprising:
receiving a short message sending request from a sender, wherein the short message sending request includes a plurality of send-pending target user tags;
acquiring encrypted send-pending contents by a primary shared key corresponding to the sender, wherein the encrypted send-pending contents append verification code for a content review, wherein the encrypted send-pending contents are stored after the send-pending contents are passed successfully the content review for a plurality of pre-set keywords, wherein the primary shared key is generated from a public key from a target short message service provider and a private key from the sender;
acquiring and encrypting contact information of users corresponding to the target user tags, wherein each user includes one or more target user tags canying the contact information of each user, wherein the contact information is encrypted by generating a secondary shared key; and sending the encrypted contact information and the encrypted send-pending contents to a target short message service provider, so as to decrypt and send the send-pending contents to the users by the target short message service provider according to the contact information.
15. The method of claim 14, further includes receiving and storing the encrypted send-pending contents encrypted by a primary shared key from the sender.
16. The method of claim 15, wherein the primary shared key is generated from a public key from the target short message service provider and a private key from the sender.
17. The method of any one of claims 14 to 16, further includes decrypting the send-pending contents according to the public key from the sender and the private key from the target short message service provider by the target short message service provider, then sending the send-pending contents.
18. The method of claim 15, further includes verifying that if the encrypted send-pending contents pass a review.
19. The method of claim 18, further includes, where if the review is not passed, refiising to store the encrypted send-pending contents.
20. The method of any one of claims 18 to 19, further includes sending a verification code to a sender, so as to generate a verification information according to the verification code where if the send-pending contents do not include a pre-set keyword.
21. The method of claim 20, further includes, where if the verification information is correct, wherein an encrypted send-pending contents is determined to pass a review.
22. The method of any one of claims 20 and 21, wherein the verification information is attached on the encrypted send-pending contents.
23. The method of any one of claims 15 to 19, further includes:
receiving a send-pending content modification request from the sender;

sending the encrypted send-pending contents to the sender, wherein the sender uses the primary shared key to decrypt and modify the send-pending contents, then return the send-pending contents encrypted by the primary shared key; and storing the returned send-pending contents with modifications from the sender.
24. The method of any one of claims 14 to 23, further includes:
encrypting the contact information with a secondary shared key by a processing terminal, wherein the secondary shared key is generated from a public key from the target short message service provider and a private key from the processing terminal; and decrypting and sending the send-pending contents to the users according to the contact information by the target short message service provider, further includes:
decrypting based on the public key from the processing terminal and a private key from the target short message service provider and acquiring the contact information.
25. The method of any one of claims 14 to 24, wherein the public key for each party is generated by an independent key generation center on a third-party server.
26. The method of any one of claims 14 to 24, wherein the private key for each party is generated by an independent key generation center on a third-party server.
27. A short message sending method comprising:
a processing terminal receives a short message sending request from a sender, wherein the short message sending request includes a plurality of send-pending target user tags;
the processing terminal acquires encrypted send-pending contents by a primary shared key corresponding to the sender, wherein the encrypted send-pending contents append verification code for a content review, wherein the encrypted send-pending contents are stored after the send-pending contents are passed successfully the content review for a plurality of pre-set keywords, wherein the primary shared key is generated from a public key from a target short message service provider and a private key from the sender;
the processing terminal acquires and encrypts contact information for users corresponding to the target user tags, wherein each user includes one or more target user tags carrying the contact information of each user, wherein the contact information is encrypted by generating a secondary shared key; and the processing terminal sends the encrypted contact information and the encrypted send-pending contents to a target short message service provider, so as to decrypt and send the send-pending contents to the users by the target short message service provider according to the contact information.
28. The method of claim 27, further includes the processing terminal receives and stores the encrypted send-pending contents encrypted by a primary shared key from the sender.
29. The method of claim 28, wherein the primary shared key is generated from a public key from the target short message service provider and a private key from the sender.
30. The method of any one of claims 27 to 29, further includes the processing terminal decrypts the send-pending contents according to the public key from the sender and the private key from the target short message service provider by the target short message service provider, then sends the send-pending contents.
31. The method of claim 30, further includes the processing terminal verifies that if the encrypted send-pending contents pass a review.
32. The method of claim 31, further includes, where if the review is not passed, the processing terminal refuses to store the encrypted send-pending contents.
33. The method of any one of claims 31 to 32, further includes the processing terminal sends a verification code to a sender, so as to generate a verification information according to the verification code where if the send-pending contents do not include a pre-set keyword.
34. The method of claim 33, where if the verification information is correct, wherein an encrypted send-pending contents is determined to pass a review.
35. The method of any one of claims 33 and 34, wherein the verification information is attached on the encrypted send-pending contents.
36. The method of any one of claims 28 to 32, further includes:
the processing terminal receives a send-pending content modification request from the sender;
the processing terminal sends the encrypted send-pending contents to the sender, wherein the sender uses the primary shared key to decrypt and modify the send-pending contents, then return the send-pending contents encrypted by the primary shared key; and the processing terminal stores the returned send-pending contents with modifications from the sender.
37. The method of any one of claims 27 to 36, further includes:
the processing terminal encrypts the contact information with a secondary shared key by a processing terminal, wherein the secondary shared key is generated from a public key from the target short message service provider and a private key from the processing terminal; and the processing terminal decrypts and sends the send-pending contents to the users according to the contact information by the target short message service provider, further includes:
the processing terminal decrypts based on the public key from the processing terminal and a private key from the target short message service provider and acquires the contact information.
38. The method of any one of claims 27 to 37, wherein the public key for each party is generated by an independent key generation center on a third-party server.
39. The method of any one of claims 27 to 37, wherein the private key for each party is generated by an independent key generation center on a third-party server.
40. A short message sending device comprising:
a receiving module, configured to receive a short message sending request from a sender, wherein the short message sending request includes a plurality of send-pending target user tags;
an acquisition module, configured to acquire encrypted send-pending contents by a primary shared key corresponding to the sender, and acquire and encrypt contact information for users corresponding to the target user tags, wherein the contact information is encrypted by generating a secondary shared key, wherein the encrypted send-pending contents append verification code for a content review, wherein the encrypted send-pending contents are stored after the send-pend contents are passed successfully the content review for a plurality of pre-set keywords, wherein each user includes one or more target user tags carrying the contact information of each user; and a processing module, configured to send the encrypted contact information and the encrypted send-pending contents to a target short message service provider, so as to decrypt and send the send-pending contents to the users by the target short message service provider according to the contact information.
41. The device of claim 40, wherein the receiving module is further configured to receive and store the encrypted send-pending contents encrypted by a primary shared key from the sender.
42. The device of claim 41, wherein the primary shared key is generated from a public key from the target short message service provider and a private key from the sender.
43. The device of claim 40, wherein the processing module is further configured to decrypt the send-pending contents according to a public key from the sender and a private key from the target short message service provider by the target short message service provider, then send the send-pending contents.
44. The device of claim 40, wherein the processing module is further configured to verify that if the encrypted send-pending contents pass a review.
45. The device of claim 44, wherein the processing module is further configured to where if the review is not passed, refusing to store the encrypted send-pending contents.
46. The device of any one of claims 44 to 45, wherein the processing module is further configured to send a verification code to a sender, so as to generate a verification information according to the verification code where if the send-pending contents do not include a pre-set keyword.
47. The device of claim 46, where if the verification information is correct, wherein an encrypted send-pending contents is determined to pass a review.
48. The device of any one of claims 46 and 47, wherein the verification information is attached on the encrypted send-pending contents.
49. The device of any one of claims 40 to 48, wherein the processing module is further configured to:
receive a send-pending content modification request from the sender;
send the encrypted send-pending contents to the sender, wherein the sender uses the primary shared key to decrypt and modify the send-pending contents, then return the send-pending contents encrypted by the primary shared key; and store the returned send-pending contents with modifications from the sender.
50. The device of any one of claims 40 to 49, wherein the processing module is further configured to encrypt the contact information with a secondary shared key by a processing terminal, wherein the secondary shared key is generated from a public key from the target short message service provider and a private key from the processing terminal; and decrypt and send the send-pending contents to the users according to the contact information by the target short message service provider, further configured to:
decrypt based on the public key from the processing terminal and a private key from the target short message service provider and acquiring the contact information.
51. The device of claim 43, wherein the public key for each party is generated by an independent key generation center on a third-party server.
52. The device of claim 43, wherein the private key for each party is generated by an independent key generation center on a third-party server.
CA3127882A 2020-08-14 2021-08-12 Short message sending method, device, and computer system Active CA3127882C (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010817242.5 2020-08-14
CN202010817242.5A CN112004201A (en) 2020-08-14 2020-08-14 Short message sending method and device and computer system

Publications (2)

Publication Number Publication Date
CA3127882A1 CA3127882A1 (en) 2022-02-14
CA3127882C true CA3127882C (en) 2024-01-09

Family

ID=73473265

Family Applications (1)

Application Number Title Priority Date Filing Date
CA3127882A Active CA3127882C (en) 2020-08-14 2021-08-12 Short message sending method, device, and computer system

Country Status (2)

Country Link
CN (1) CN112004201A (en)
CA (1) CA3127882C (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113490167B (en) * 2021-08-10 2022-09-13 贵州科库科技有限公司 Short message sending method and system based on CRM system data set and storage medium
CN114339630B (en) * 2021-11-30 2023-07-21 度小满科技(北京)有限公司 Method and device for protecting short message
CN115150172B (en) * 2022-07-01 2023-08-11 北京百度网讯科技有限公司 Data processing method, device, equipment and medium

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101304589A (en) * 2008-04-14 2008-11-12 中国联合通信有限公司 Method and system for monitoring and filtering garbage short message transmitted by short message gateway
US8131266B2 (en) * 2008-12-18 2012-03-06 Alcatel Lucent Short message service communication security
CN102083019A (en) * 2009-11-30 2011-06-01 徐克林 Method for encrypting mobile phone short message
CN102547621B (en) * 2010-12-23 2015-04-22 中国移动通信集团公司 System and device as well as method for monitoring and processing junk short messages
CN103108290A (en) * 2011-11-09 2013-05-15 北京华中融合科技有限公司 Short message handling method and device
CN103179530A (en) * 2011-12-26 2013-06-26 中国移动通信集团设计院有限公司 Method and device for intercepting short messages
CN103763687B (en) * 2014-01-13 2017-01-25 国家电网公司 Intelligent information receiving and sending method and system special for electric power with encryption function
CN104602208B (en) * 2015-01-29 2018-02-27 成都三零瑞通移动通信有限公司 A kind of SMS encryption communication means based on mobile network
CN107801165B (en) * 2017-10-31 2020-02-18 平安科技(深圳)有限公司 Business short message pushing method and device, computer equipment and storage medium
CN109996193B (en) * 2017-12-29 2021-08-10 中国移动通信集团北京有限公司 Short message sending method, device, system and equipment based on intelligent communication platform
CN108966158B (en) * 2018-08-21 2022-04-12 平安科技(深圳)有限公司 Short message sending method, system, computer equipment and storage medium
CN111246407B (en) * 2020-01-10 2022-09-02 北京智信通联信息技术有限公司 Data encryption and decryption method and device for short message transmission

Also Published As

Publication number Publication date
CN112004201A (en) 2020-11-27
CA3127882A1 (en) 2022-02-14

Similar Documents

Publication Publication Date Title
CA3127882C (en) Short message sending method, device, and computer system
US9853957B2 (en) DRM protected video streaming on game console with secret-less application
US8850216B1 (en) Client device and media client authentication mechanism
CN104581214B (en) Multimedia content guard method based on ARM TrustZone systems and device
US7610632B2 (en) Software use permission method and system
JP2018152077A (en) Methods and apparatus for protected distribution of applications and media content
CN108429719B (en) Key protection method and device
US9117055B2 (en) Method and apparatus for downloading DRM module
CN112507291B (en) Method and device for generating unique identifier of Android device
CN109558739B (en) Program running method and device, terminal and readable medium
CN105871805A (en) Anti-stealing-link method and device
CN104199657A (en) Call method and device for open platform
CN107196907A (en) A kind of guard method of Android SO files and device
CN112399392A (en) Communication connection method, device, equipment and storage medium of home care terminal
CN115514578B (en) Block chain based data authorization method and device, electronic equipment and storage medium
CN110290097B (en) Data processing method and device, storage medium and electronic device
CN112165381B (en) Key management system and method
CN114124440B (en) Secure transmission method, apparatus, computer device and storage medium
CN111182010A (en) Local service providing method and device
US11722295B2 (en) Methods, apparatus, and articles of manufacture to securely audit communications
JP7191999B2 (en) Mini-program package transmission method, apparatus, electronics computer readable medium and computer program product
CN112528239B (en) Method and device for automatic authorization of software
CN110457959B (en) Information transmission method and device based on Trust application
CN108259490B (en) Client verification method and device
CN111475844A (en) Data sharing method, device, equipment and computer readable storage medium