CN102448033B - Short message security certification method - Google Patents

Short message security certification method Download PDF

Info

Publication number
CN102448033B
CN102448033B CN201110377353.XA CN201110377353A CN102448033B CN 102448033 B CN102448033 B CN 102448033B CN 201110377353 A CN201110377353 A CN 201110377353A CN 102448033 B CN102448033 B CN 102448033B
Authority
CN
China
Prior art keywords
note
receiving equipment
short message
count value
transmitting apparatus
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201110377353.XA
Other languages
Chinese (zh)
Other versions
CN102448033A (en
Inventor
毛维波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHINA FISHINGREEL TECHNOLOGY STANDARDIZATION (BEILUN HAIBO) RESEARCH CENTER
Original Assignee
CHINA FISHINGREEL TECHNOLOGY STANDARDIZATION (BEILUN HAIBO) RESEARCH CENTER
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHINA FISHINGREEL TECHNOLOGY STANDARDIZATION (BEILUN HAIBO) RESEARCH CENTER filed Critical CHINA FISHINGREEL TECHNOLOGY STANDARDIZATION (BEILUN HAIBO) RESEARCH CENTER
Priority to CN201110377353.XA priority Critical patent/CN102448033B/en
Publication of CN102448033A publication Critical patent/CN102448033A/en
Application granted granted Critical
Publication of CN102448033B publication Critical patent/CN102448033B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a short message security certification method that is used by short message reception equipment to carry out security certification on a short message sent by short message sending equipment. The method is characterized in that: an encryption and decryption method between short message reception equipment and authorized short message sending equipment is arranged in advance; the number of the authorized short message sending equipment is stored in the short message reception equipment; after the short message reception equipment receives a short message, it is firstly verify whether the number of short message sending equipment accord with the authorized number; and then according to the decryption method, decryption is carried out on the short message; if the decryption is done successfully and realization of the arranged rule is conformed to, the short message is received. Compared with the prior art, the technology employed in the invention enables the method to have the following advantages that: when the provided method is used to carry out short message security certification, short message reception equipment can effectively verify identity of short message sending equipment that sends the short message; and the short message security certification method is more scientific and secure.

Description

A kind of short message security certification method
Technical field
The present invention relates to a kind of short message security certification method.
Background technology
Along with the development of mobile communication technology, many terminal equipments have mobile communication function in recent years, and note has realization simply, the cheap and widely accepted basis of expense, thereby many terminal equipments can communicate by note.Along with the universal and development of technology, safety problem manifests gradually, but the safety problem of short message communication does not also cause enough attention.
Short message communication safety certifying method between equipment, generally that the transmit leg of note is carried out to identification safety authentication, normal employing is with number, to carry out authentication (from note, to extract the number of transmit leg at present, then compare with the number of the local storage of equipment), but occurred forging the note of phone number now, thereby conventional identification authentication mode is difficult to meet the demands.
Summary of the invention
Technical problem to be solved by this invention is to provide a kind of safer short message security certification method for above-mentioned prior art.
The present invention solves the problems of the technologies described above adopted technical scheme: this short message security certification method, the note of note transmitting apparatus being sent for note receiving equipment is carried out safety certification, it is characterized in that: comprise the steps
Step 1, the time of note receiving equipment and note transmitting apparatus is adjusted into consistent;
Step 2, in note receiving equipment, store to authorize the number of note transmitting apparatus;
Step 3, in note receiving equipment, store key, count value and password produces algorithm, note receiving equipment produces algorithm by the key of its storage, count value and password and sends to and authorize note transmitting apparatus;
Step 4, note transmitting apparatus are when sending note, additional count value in note, note transmitting apparatus produces algorithm according to the key of its preservation, current time and password and produces password, then the short message content that is attached with count value is encrypted, note after encrypting is sent to note receiving equipment, and the count value that short message terminal is preserved adds 1;
Step 5, note receiving equipment receive after note, first check the number of the note transmitting apparatus that sends this note, if this number does not belong to any one, do not authorize note transmitting apparatus number, and note receiving equipment is refused this note; If this number, for authorizing one of note transmitting apparatus number, performs step six;
Step 6, note receiving equipment produce algorithm according to the key of its preservation, current time and password and produce password, then utilize this password to be decrypted short message content, if Decryption failures, note receiving equipment is refused this note, if successful decryption, performs step seven;
Count value after step 7, collection deciphering in short message content, if the count value in note is less than the count value that note receiving equipment is preserved, note receiving equipment is refused this note; If the count value in note equals the count value that note receiving equipment is preserved, perform step eight; If the count value in note is greater than the count value that note receiving equipment is preserved, perform step ten;
If there is no pending note buffer queue in step 8 note receiving equipment, note receiving equipment receives this note, and the count value of note receiving equipment preservation is added to 1, if there is pending note buffer queue in note receiving equipment, perform step nine;
Step 9, judge in pending note buffer queue whether have the note of this count value, if had, just refuse this note, if do not had, this note is added to pending note buffer queue; Then control appliance receives the note in pending note buffer queue from small to large successively according to count value, and adds 1 count value that more new message receiving equipment is preserved by wherein maximum count value;
Step 10, startup timeout mechanism, in timeout mechanism time range, if the note receiving equipment note that successful decryption has new mandate note transmitting apparatus to send is again returned to step 7; If surpass timeout mechanism time range, note receiving equipment does not have to receive and decipher the note that new mandate note transmitting apparatus is sent, and returns to step 9.
Described password produces algorithm and adopts hashing algorithm, and the data that password generation algorithm is used are current time+key+current time.
In described step 4, note transmitting apparatus adopts symmetric cryptographic algorithm to be encrypted short message content.
The key storing in described note receiving equipment and count value are two random numbers that note receiving equipment produces.
Note receiving equipment produces the mode of algorithm by wired connection by the key of its storage, count value and password and sends to and authorize note transmitting apparatus.
Compared with prior art, the invention has the advantages that: first method provided by the invention can compare to the number of note transmitting apparatus, also to authorizing the note of note transmitting apparatus to be encrypted, note receiving equipment can be to authorizing note that short message terminal be sent to match deciphering, after adopting in this way, note receiving equipment can effectively be verified the identity of the note transmitting apparatus of sending note, and short message security certification method is science safety more.
Accompanying drawing explanation
Fig. 1 is that in the embodiment of the present invention, note transmitting apparatus sends note process flow diagram;
Fig. 2 is that in the embodiment of the present invention, note receiving equipment receives note process flow diagram.
Embodiment
Below in conjunction with accompanying drawing, embodiment is described in further detail the present invention.
The invention provides a kind of short message security certification method, the note of note transmitting apparatus being sent for note receiving equipment is carried out safety certification, and it comprises the steps
Step 1, the time of note receiving equipment and note transmitting apparatus is adjusted into consistent, note receiving equipment and note transmitting apparatus can use automatically to time service its both time is consistent;
Step 2, in note receiving equipment, store to authorize the number of note transmitting apparatus;
Step 3, in note receiving equipment, store key, count value and password produces algorithm, note receiving equipment produces algorithm by the key of its storage, count value and password and sends to and authorize note transmitting apparatus; The key storing in described note receiving equipment and count value are two random numbers that note receiving equipment produces, and password produces algorithm employing hashing algorithm, as MD5 or SHA1; In the present embodiment, note receiving equipment produces the mode of algorithm by wired connection by the key of its storage, count value and password and sends to and authorize note transmitting apparatus.
Step 4, note transmitting apparatus are when sending note, additional count value in note, note transmitting apparatus produces algorithm according to the key of its preservation, current time and password and produces password, and the data that password generation algorithm is used are current time+key+current time, then utilize this password to adopt symmetric cryptographic algorithm to be encrypted the short message content that is attached with count value, symmetric cryptographic algorithm is as 3DES or AES, note after encrypting is sent to note receiving equipment, and the count value that short message terminal is preserved adds 1;
Step 5, note receiving equipment receive after note, first check the number of the note transmitting apparatus that sends this note, if this number does not belong to any one, do not authorize note transmitting apparatus number, and note receiving equipment is refused this note; If this number, for authorizing one of note transmitting apparatus number, performs step six;
Step 6, note receiving equipment produce algorithm according to the key of its preservation, current time and password and produce password, then utilize this password to be decrypted short message content, manner of decryption and encryption method pairing are used, if Decryption failures, note receiving equipment is refused this note, if successful decryption, performs step seven;
Count value after step 7, collection deciphering in short message content, if the count value in note is less than the count value that note receiving equipment is preserved, note receiving equipment is refused this note; If the count value in note equals the count value that note receiving equipment is preserved, perform step eight; If the count value in note is greater than the count value that note receiving equipment is preserved, perform step ten;
If there is no pending note buffer queue in step 8 note receiving equipment, note receiving equipment receives this note, and the count value of note receiving equipment preservation is added to 1, if there is pending note buffer queue in note receiving equipment, perform step nine;
Step 9, judge in pending note buffer queue whether have the note of this count value, if had, just refuse this note, if do not had, this note is added to pending note buffer queue; Then control appliance receives the note in pending note buffer queue from small to large successively according to count value, and adds 1 count value that more new message receiving equipment is preserved by wherein maximum count value;
Step 10, startup timeout mechanism, in timeout mechanism time range, if the note receiving equipment note that successful decryption has new mandate note transmitting apparatus to send is again returned to step 7; If surpass timeout mechanism time range, note receiving equipment does not have to receive and decipher the note that new mandate note transmitting apparatus is sent, and returns to step 9.
A concrete example of applying for the present invention below:
10 byte keys of the random generation of note receiving equipment: 0x02 0x32 0xf1 0xfe 0x57 0x40 0x86 0x49 0x53 0x11, an initial count value decimal representation: 9163, hexadecimal representation is 23cb, password produces algorithm and adopts MD5, current time data is added in key two ends, SMS encryption algorithm adopts AES and relevant parameter thereof, and the decipherment algorithm being used in conjunction with is with it also to adopt AES.Note receiving equipment sends note transmitting apparatus to these information, and carries out corresponding stored local with the number of note transmitting apparatus.
The flow process of note transmitting apparatus is, shown in Figure 1:
When 1, note transmitting apparatus is ready for sending note, original short message content: 0x73 0x74 0x61 0x72 0x74 0x20 0x75 0x70, note to be encrypted is that original short message content adds count value 9163, in the present embodiment, by four bytes, represent count value 9163, with 0xcb 0x23 0x00 0x00, represent count value, note so to be encrypted is: 0x73 0x74 0x61 0x72 0x74 0x20 0x75 0x70 0xcb 0x23 0x00 0x00; Current time decimal representation: 13203737, with hexadecimal representation, be c97919;
2, the data of generation password are current time+key+current time, we represent current time by three bytes, be 0x19 0x79 0xc9, the data that produce so password are: 0x19 0x79 0xc9 0x02 0x32 0xf1 0xfe 0x57 0x40 0x86 0x49 0x53 0x11 0x19 0x79 0xc9;
3, utilize these data of 0x19 0x79 0xc9 0x02 0x32 0xf1 0xfe 0x57 0x40 0x86 0x49 0x53 0x11 0x19 0x79 0xc9, adopting the password producing after MD5 algorithm is P:0x27 0x4c 0xba 0xf5 0x13 0x96 0xcb 0xd3 0x15 0x39 0x3d 0x9c 0xca 0xde 0xc8 0x1e;
4, with P, treat Encrypted short message and encrypt, cryptographic algorithm is AES, and after encrypting, note data is A;
5, A is sent, local count value adds 1 and is: 9164
The flow process of note receiving equipment is, shown in Figure 2:
1, note receiving equipment receives note, first checks the number of the note transmitting apparatus that sends this note, if this number does not belong to any one, does not authorize note transmitting apparatus number, and note receiving equipment is refused this note; If this number, for authorizing one of note transmitting apparatus number, obtains note data A;
2, use the data identical with note transmitting apparatus and algorithm to produce password P;
3, with password P, data A is decrypted, decipherment algorithm is also used AES, obtain data 0x73 0x74 0x61 0x72 0x74 0x20 0x75 0x70 0xcb 0x23 0x00 0x00, equate with local count value 9163, do not have note buffer memory just to receive this note, then local count value is added to 1 and be: 9164;
If 4 at this moment first to receive count value be 9164 note, the note buffer memory that is first 9164 count value, in time-out time, receive count value and be 9163 the note note note that then count pick up value is 9164 that first count pick up value is 9163, local count value is changed to: 9165.

Claims (5)

1. a short message security certification method, the note of note transmitting apparatus being sent for note receiving equipment is carried out safety certification, it is characterized in that: comprise the steps
Step 1, the time of note receiving equipment and note transmitting apparatus is adjusted into consistent;
Step 2, in note receiving equipment, store to authorize the number of note transmitting apparatus;
Step 3, in note receiving equipment, store key, count value and password produces algorithm, note receiving equipment produces algorithm by the key of its storage, count value and password and sends to and authorize note transmitting apparatus;
Step 4, note transmitting apparatus are when sending note, additional count value in note, note transmitting apparatus produces algorithm according to the key of its preservation, current time and password and produces password, then the short message content that is attached with count value is encrypted, note after encrypting is sent to note receiving equipment, and the count value that short message terminal is preserved adds 1;
Step 5, note receiving equipment receive after note, first check the number of the note transmitting apparatus that sends this note, if this number does not belong to any one, do not authorize note transmitting apparatus number, and note receiving equipment is refused this note; If this number, for authorizing one of note transmitting apparatus number, performs step six;
Step 6, note receiving equipment produce algorithm according to the key of its preservation, current time and password and produce password, then utilize this password to be decrypted short message content, if Decryption failures, note receiving equipment is refused this note, if successful decryption, performs step seven;
Count value after step 7, collection deciphering in short message content, if the count value in note is less than the count value that note receiving equipment is preserved, note receiving equipment is refused this note; If the count value in note equals the count value that note receiving equipment is preserved, perform step eight; If the count value in note is greater than the count value that note receiving equipment is preserved, perform step ten;
If there is no pending note buffer queue in step 8 note receiving equipment, note receiving equipment receives this note, and the count value of note receiving equipment preservation is added to 1, if there is pending note buffer queue in note receiving equipment, perform step nine;
Step 9, judge in pending note buffer queue whether have the note of this count value, if had, just refuse this note, if do not had, this note is added to pending note buffer queue; Then control appliance receives the note in pending note buffer queue from small to large successively according to count value, and adds 1 count value that more new message receiving equipment is preserved by wherein maximum count value;
Step 10, startup timeout mechanism, in timeout mechanism time range, if the note receiving equipment note that successful decryption has new mandate note transmitting apparatus to send is again returned to step 7; If surpass timeout mechanism time range, note receiving equipment does not have to receive and decipher the note that new mandate note transmitting apparatus is sent, and returns to step 9.
2. short message security certification method according to claim 1, is characterized in that: described password produces algorithm and adopts hashing algorithm.
3. short message security certification method according to claim 1, is characterized in that: in described step 4, note transmitting apparatus adopts symmetric cryptographic algorithm to be encrypted short message content.
4. short message security certification method according to claim 1, is characterized in that: the key storing in described note receiving equipment and count value are two random numbers that note receiving equipment produces.
5. short message security certification method according to claim 1, is characterized in that: note receiving equipment produces the mode of algorithm by wired connection by the key of its storage, count value and password and sends to and authorize note transmitting apparatus.
CN201110377353.XA 2011-11-24 2011-11-24 Short message security certification method Active CN102448033B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110377353.XA CN102448033B (en) 2011-11-24 2011-11-24 Short message security certification method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110377353.XA CN102448033B (en) 2011-11-24 2011-11-24 Short message security certification method

Publications (2)

Publication Number Publication Date
CN102448033A CN102448033A (en) 2012-05-09
CN102448033B true CN102448033B (en) 2014-03-12

Family

ID=46010022

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110377353.XA Active CN102448033B (en) 2011-11-24 2011-11-24 Short message security certification method

Country Status (1)

Country Link
CN (1) CN102448033B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103795524B (en) * 2014-01-24 2017-11-28 闻泰通讯股份有限公司 Dynamic SMS encryption based on 3DES, decryption method

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8131266B2 (en) * 2008-12-18 2012-03-06 Alcatel Lucent Short message service communication security
CN101854594A (en) * 2009-04-03 2010-10-06 北京航空航天大学 Method and device for transmitting information and method and device for receiving information
KR100931986B1 (en) * 2009-04-10 2009-12-15 주식회사 비엔에스웍스 Terminal and method for transmitting message and receiving message
CN101789865B (en) * 2010-03-04 2011-11-30 深圳市华信安创科技有限公司 Dedicated server used for encryption and encryption method
CN102244860A (en) * 2011-07-21 2011-11-16 宇龙计算机通信科技(深圳)有限公司 Method, system and server for preventing communication information of mobile terminal from being monitored

Also Published As

Publication number Publication date
CN102448033A (en) 2012-05-09

Similar Documents

Publication Publication Date Title
CN110177354B (en) Wireless control method and system for vehicle
CN105656941B (en) Identification authentication system and method
EP3460503B1 (en) Secure wireless ranging
CN102571702B (en) Key generation method, system and equipment in Internet of things
CN110062382B (en) Identity verification method, client, relay equipment and server
CN101707767B (en) Data transmission method and devices
CN102196375A (en) Securing out-of-band messages
CN102118392A (en) Encryption/decryption method and system for data transmission
CN101621794A (en) Method for realizing safe authentication of wireless application service system
CN101286849A (en) Authentication system and method of a third party based on engagement arithmetic
CN101820629A (en) Identity authentication method, device and system in wireless local area network (WLAN)
CN103430478A (en) Method and apparatus for encrypting short data in wireless communication system
CN112672342B (en) Data transmission method, device, equipment, system and storage medium
CN105007163A (en) Pre-shared key (PSK) transmitting and acquiring methods and transmitting and acquiring devices
CN111416712B (en) Quantum secret communication identity authentication system and method based on multiple mobile devices
WO2019085659A1 (en) Information interaction method and device
CN101431453B (en) Method for implementing secret communication between communication terminal and wireless access point
KR102219086B1 (en) HMAC-based source authentication and secret key sharing method and system for Unnamed Aerial vehicle systems
CN101854594A (en) Method and device for transmitting information and method and device for receiving information
CN103152326A (en) Distributed authentication method and authentication system
CN102045343A (en) DC (Digital Certificate) based communication encrypting safety method, server and system
CN107104888B (en) Safe instant messaging method
CN103458401A (en) Voice encryption communication system and voice encryption communication method
CN102448033B (en) Short message security certification method
CN103414707A (en) Message access processing method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant