CN102448033B - Short message security certification method - Google Patents
Short message security certification method Download PDFInfo
- Publication number
- CN102448033B CN102448033B CN201110377353.XA CN201110377353A CN102448033B CN 102448033 B CN102448033 B CN 102448033B CN 201110377353 A CN201110377353 A CN 201110377353A CN 102448033 B CN102448033 B CN 102448033B
- Authority
- CN
- China
- Prior art keywords
- note
- receiving equipment
- short message
- count value
- transmitting apparatus
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to a short message security certification method that is used by short message reception equipment to carry out security certification on a short message sent by short message sending equipment. The method is characterized in that: an encryption and decryption method between short message reception equipment and authorized short message sending equipment is arranged in advance; the number of the authorized short message sending equipment is stored in the short message reception equipment; after the short message reception equipment receives a short message, it is firstly verify whether the number of short message sending equipment accord with the authorized number; and then according to the decryption method, decryption is carried out on the short message; if the decryption is done successfully and realization of the arranged rule is conformed to, the short message is received. Compared with the prior art, the technology employed in the invention enables the method to have the following advantages that: when the provided method is used to carry out short message security certification, short message reception equipment can effectively verify identity of short message sending equipment that sends the short message; and the short message security certification method is more scientific and secure.
Description
Technical field
The present invention relates to a kind of short message security certification method.
Background technology
Along with the development of mobile communication technology, many terminal equipments have mobile communication function in recent years, and note has realization simply, the cheap and widely accepted basis of expense, thereby many terminal equipments can communicate by note.Along with the universal and development of technology, safety problem manifests gradually, but the safety problem of short message communication does not also cause enough attention.
Short message communication safety certifying method between equipment, generally that the transmit leg of note is carried out to identification safety authentication, normal employing is with number, to carry out authentication (from note, to extract the number of transmit leg at present, then compare with the number of the local storage of equipment), but occurred forging the note of phone number now, thereby conventional identification authentication mode is difficult to meet the demands.
Summary of the invention
Technical problem to be solved by this invention is to provide a kind of safer short message security certification method for above-mentioned prior art.
The present invention solves the problems of the technologies described above adopted technical scheme: this short message security certification method, the note of note transmitting apparatus being sent for note receiving equipment is carried out safety certification, it is characterized in that: comprise the steps
Step 1, the time of note receiving equipment and note transmitting apparatus is adjusted into consistent;
Step 2, in note receiving equipment, store to authorize the number of note transmitting apparatus;
Step 3, in note receiving equipment, store key, count value and password produces algorithm, note receiving equipment produces algorithm by the key of its storage, count value and password and sends to and authorize note transmitting apparatus;
Step 4, note transmitting apparatus are when sending note, additional count value in note, note transmitting apparatus produces algorithm according to the key of its preservation, current time and password and produces password, then the short message content that is attached with count value is encrypted, note after encrypting is sent to note receiving equipment, and the count value that short message terminal is preserved adds 1;
Step 5, note receiving equipment receive after note, first check the number of the note transmitting apparatus that sends this note, if this number does not belong to any one, do not authorize note transmitting apparatus number, and note receiving equipment is refused this note; If this number, for authorizing one of note transmitting apparatus number, performs step six;
Step 6, note receiving equipment produce algorithm according to the key of its preservation, current time and password and produce password, then utilize this password to be decrypted short message content, if Decryption failures, note receiving equipment is refused this note, if successful decryption, performs step seven;
Count value after step 7, collection deciphering in short message content, if the count value in note is less than the count value that note receiving equipment is preserved, note receiving equipment is refused this note; If the count value in note equals the count value that note receiving equipment is preserved, perform step eight; If the count value in note is greater than the count value that note receiving equipment is preserved, perform step ten;
If there is no pending note buffer queue in step 8 note receiving equipment, note receiving equipment receives this note, and the count value of note receiving equipment preservation is added to 1, if there is pending note buffer queue in note receiving equipment, perform step nine;
Step 9, judge in pending note buffer queue whether have the note of this count value, if had, just refuse this note, if do not had, this note is added to pending note buffer queue; Then control appliance receives the note in pending note buffer queue from small to large successively according to count value, and adds 1 count value that more new message receiving equipment is preserved by wherein maximum count value;
Step 10, startup timeout mechanism, in timeout mechanism time range, if the note receiving equipment note that successful decryption has new mandate note transmitting apparatus to send is again returned to step 7; If surpass timeout mechanism time range, note receiving equipment does not have to receive and decipher the note that new mandate note transmitting apparatus is sent, and returns to step 9.
Described password produces algorithm and adopts hashing algorithm, and the data that password generation algorithm is used are current time+key+current time.
In described step 4, note transmitting apparatus adopts symmetric cryptographic algorithm to be encrypted short message content.
The key storing in described note receiving equipment and count value are two random numbers that note receiving equipment produces.
Note receiving equipment produces the mode of algorithm by wired connection by the key of its storage, count value and password and sends to and authorize note transmitting apparatus.
Compared with prior art, the invention has the advantages that: first method provided by the invention can compare to the number of note transmitting apparatus, also to authorizing the note of note transmitting apparatus to be encrypted, note receiving equipment can be to authorizing note that short message terminal be sent to match deciphering, after adopting in this way, note receiving equipment can effectively be verified the identity of the note transmitting apparatus of sending note, and short message security certification method is science safety more.
Accompanying drawing explanation
Fig. 1 is that in the embodiment of the present invention, note transmitting apparatus sends note process flow diagram;
Fig. 2 is that in the embodiment of the present invention, note receiving equipment receives note process flow diagram.
Embodiment
Below in conjunction with accompanying drawing, embodiment is described in further detail the present invention.
The invention provides a kind of short message security certification method, the note of note transmitting apparatus being sent for note receiving equipment is carried out safety certification, and it comprises the steps
Step 1, the time of note receiving equipment and note transmitting apparatus is adjusted into consistent, note receiving equipment and note transmitting apparatus can use automatically to time service its both time is consistent;
Step 2, in note receiving equipment, store to authorize the number of note transmitting apparatus;
Step 3, in note receiving equipment, store key, count value and password produces algorithm, note receiving equipment produces algorithm by the key of its storage, count value and password and sends to and authorize note transmitting apparatus; The key storing in described note receiving equipment and count value are two random numbers that note receiving equipment produces, and password produces algorithm employing hashing algorithm, as MD5 or SHA1; In the present embodiment, note receiving equipment produces the mode of algorithm by wired connection by the key of its storage, count value and password and sends to and authorize note transmitting apparatus.
Step 4, note transmitting apparatus are when sending note, additional count value in note, note transmitting apparatus produces algorithm according to the key of its preservation, current time and password and produces password, and the data that password generation algorithm is used are current time+key+current time, then utilize this password to adopt symmetric cryptographic algorithm to be encrypted the short message content that is attached with count value, symmetric cryptographic algorithm is as 3DES or AES, note after encrypting is sent to note receiving equipment, and the count value that short message terminal is preserved adds 1;
Step 5, note receiving equipment receive after note, first check the number of the note transmitting apparatus that sends this note, if this number does not belong to any one, do not authorize note transmitting apparatus number, and note receiving equipment is refused this note; If this number, for authorizing one of note transmitting apparatus number, performs step six;
Step 6, note receiving equipment produce algorithm according to the key of its preservation, current time and password and produce password, then utilize this password to be decrypted short message content, manner of decryption and encryption method pairing are used, if Decryption failures, note receiving equipment is refused this note, if successful decryption, performs step seven;
Count value after step 7, collection deciphering in short message content, if the count value in note is less than the count value that note receiving equipment is preserved, note receiving equipment is refused this note; If the count value in note equals the count value that note receiving equipment is preserved, perform step eight; If the count value in note is greater than the count value that note receiving equipment is preserved, perform step ten;
If there is no pending note buffer queue in step 8 note receiving equipment, note receiving equipment receives this note, and the count value of note receiving equipment preservation is added to 1, if there is pending note buffer queue in note receiving equipment, perform step nine;
Step 9, judge in pending note buffer queue whether have the note of this count value, if had, just refuse this note, if do not had, this note is added to pending note buffer queue; Then control appliance receives the note in pending note buffer queue from small to large successively according to count value, and adds 1 count value that more new message receiving equipment is preserved by wherein maximum count value;
Step 10, startup timeout mechanism, in timeout mechanism time range, if the note receiving equipment note that successful decryption has new mandate note transmitting apparatus to send is again returned to step 7; If surpass timeout mechanism time range, note receiving equipment does not have to receive and decipher the note that new mandate note transmitting apparatus is sent, and returns to step 9.
A concrete example of applying for the present invention below:
10 byte keys of the random generation of note receiving equipment: 0x02 0x32 0xf1 0xfe 0x57 0x40 0x86 0x49 0x53 0x11, an initial count value decimal representation: 9163, hexadecimal representation is 23cb, password produces algorithm and adopts MD5, current time data is added in key two ends, SMS encryption algorithm adopts AES and relevant parameter thereof, and the decipherment algorithm being used in conjunction with is with it also to adopt AES.Note receiving equipment sends note transmitting apparatus to these information, and carries out corresponding stored local with the number of note transmitting apparatus.
The flow process of note transmitting apparatus is, shown in Figure 1:
When 1, note transmitting apparatus is ready for sending note, original short message content: 0x73 0x74 0x61 0x72 0x74 0x20 0x75 0x70, note to be encrypted is that original short message content adds count value 9163, in the present embodiment, by four bytes, represent count value 9163, with 0xcb 0x23 0x00 0x00, represent count value, note so to be encrypted is: 0x73 0x74 0x61 0x72 0x74 0x20 0x75 0x70 0xcb 0x23 0x00 0x00; Current time decimal representation: 13203737, with hexadecimal representation, be c97919;
2, the data of generation password are current time+key+current time, we represent current time by three bytes, be 0x19 0x79 0xc9, the data that produce so password are: 0x19 0x79 0xc9 0x02 0x32 0xf1 0xfe 0x57 0x40 0x86 0x49 0x53 0x11 0x19 0x79 0xc9;
3, utilize these data of 0x19 0x79 0xc9 0x02 0x32 0xf1 0xfe 0x57 0x40 0x86 0x49 0x53 0x11 0x19 0x79 0xc9, adopting the password producing after MD5 algorithm is P:0x27 0x4c 0xba 0xf5 0x13 0x96 0xcb 0xd3 0x15 0x39 0x3d 0x9c 0xca 0xde 0xc8 0x1e;
4, with P, treat Encrypted short message and encrypt, cryptographic algorithm is AES, and after encrypting, note data is A;
5, A is sent, local count value adds 1 and is: 9164
The flow process of note receiving equipment is, shown in Figure 2:
1, note receiving equipment receives note, first checks the number of the note transmitting apparatus that sends this note, if this number does not belong to any one, does not authorize note transmitting apparatus number, and note receiving equipment is refused this note; If this number, for authorizing one of note transmitting apparatus number, obtains note data A;
2, use the data identical with note transmitting apparatus and algorithm to produce password P;
3, with password P, data A is decrypted, decipherment algorithm is also used AES, obtain data 0x73 0x74 0x61 0x72 0x74 0x20 0x75 0x70 0xcb 0x23 0x00 0x00, equate with local count value 9163, do not have note buffer memory just to receive this note, then local count value is added to 1 and be: 9164;
If 4 at this moment first to receive count value be 9164 note, the note buffer memory that is first 9164 count value, in time-out time, receive count value and be 9163 the note note note that then count pick up value is 9164 that first count pick up value is 9163, local count value is changed to: 9165.
Claims (5)
1. a short message security certification method, the note of note transmitting apparatus being sent for note receiving equipment is carried out safety certification, it is characterized in that: comprise the steps
Step 1, the time of note receiving equipment and note transmitting apparatus is adjusted into consistent;
Step 2, in note receiving equipment, store to authorize the number of note transmitting apparatus;
Step 3, in note receiving equipment, store key, count value and password produces algorithm, note receiving equipment produces algorithm by the key of its storage, count value and password and sends to and authorize note transmitting apparatus;
Step 4, note transmitting apparatus are when sending note, additional count value in note, note transmitting apparatus produces algorithm according to the key of its preservation, current time and password and produces password, then the short message content that is attached with count value is encrypted, note after encrypting is sent to note receiving equipment, and the count value that short message terminal is preserved adds 1;
Step 5, note receiving equipment receive after note, first check the number of the note transmitting apparatus that sends this note, if this number does not belong to any one, do not authorize note transmitting apparatus number, and note receiving equipment is refused this note; If this number, for authorizing one of note transmitting apparatus number, performs step six;
Step 6, note receiving equipment produce algorithm according to the key of its preservation, current time and password and produce password, then utilize this password to be decrypted short message content, if Decryption failures, note receiving equipment is refused this note, if successful decryption, performs step seven;
Count value after step 7, collection deciphering in short message content, if the count value in note is less than the count value that note receiving equipment is preserved, note receiving equipment is refused this note; If the count value in note equals the count value that note receiving equipment is preserved, perform step eight; If the count value in note is greater than the count value that note receiving equipment is preserved, perform step ten;
If there is no pending note buffer queue in step 8 note receiving equipment, note receiving equipment receives this note, and the count value of note receiving equipment preservation is added to 1, if there is pending note buffer queue in note receiving equipment, perform step nine;
Step 9, judge in pending note buffer queue whether have the note of this count value, if had, just refuse this note, if do not had, this note is added to pending note buffer queue; Then control appliance receives the note in pending note buffer queue from small to large successively according to count value, and adds 1 count value that more new message receiving equipment is preserved by wherein maximum count value;
Step 10, startup timeout mechanism, in timeout mechanism time range, if the note receiving equipment note that successful decryption has new mandate note transmitting apparatus to send is again returned to step 7; If surpass timeout mechanism time range, note receiving equipment does not have to receive and decipher the note that new mandate note transmitting apparatus is sent, and returns to step 9.
2. short message security certification method according to claim 1, is characterized in that: described password produces algorithm and adopts hashing algorithm.
3. short message security certification method according to claim 1, is characterized in that: in described step 4, note transmitting apparatus adopts symmetric cryptographic algorithm to be encrypted short message content.
4. short message security certification method according to claim 1, is characterized in that: the key storing in described note receiving equipment and count value are two random numbers that note receiving equipment produces.
5. short message security certification method according to claim 1, is characterized in that: note receiving equipment produces the mode of algorithm by wired connection by the key of its storage, count value and password and sends to and authorize note transmitting apparatus.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110377353.XA CN102448033B (en) | 2011-11-24 | 2011-11-24 | Short message security certification method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110377353.XA CN102448033B (en) | 2011-11-24 | 2011-11-24 | Short message security certification method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102448033A CN102448033A (en) | 2012-05-09 |
CN102448033B true CN102448033B (en) | 2014-03-12 |
Family
ID=46010022
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110377353.XA Active CN102448033B (en) | 2011-11-24 | 2011-11-24 | Short message security certification method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102448033B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103795524B (en) * | 2014-01-24 | 2017-11-28 | 闻泰通讯股份有限公司 | Dynamic SMS encryption based on 3DES, decryption method |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8131266B2 (en) * | 2008-12-18 | 2012-03-06 | Alcatel Lucent | Short message service communication security |
CN101854594A (en) * | 2009-04-03 | 2010-10-06 | 北京航空航天大学 | Method and device for transmitting information and method and device for receiving information |
KR100931986B1 (en) * | 2009-04-10 | 2009-12-15 | 주식회사 비엔에스웍스 | Terminal and method for transmitting message and receiving message |
CN101789865B (en) * | 2010-03-04 | 2011-11-30 | 深圳市华信安创科技有限公司 | Dedicated server used for encryption and encryption method |
CN102244860A (en) * | 2011-07-21 | 2011-11-16 | 宇龙计算机通信科技(深圳)有限公司 | Method, system and server for preventing communication information of mobile terminal from being monitored |
-
2011
- 2011-11-24 CN CN201110377353.XA patent/CN102448033B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN102448033A (en) | 2012-05-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110177354B (en) | Wireless control method and system for vehicle | |
CN105656941B (en) | Identification authentication system and method | |
EP3460503B1 (en) | Secure wireless ranging | |
CN102571702B (en) | Key generation method, system and equipment in Internet of things | |
CN110062382B (en) | Identity verification method, client, relay equipment and server | |
CN101707767B (en) | Data transmission method and devices | |
CN102196375A (en) | Securing out-of-band messages | |
CN102118392A (en) | Encryption/decryption method and system for data transmission | |
CN101621794A (en) | Method for realizing safe authentication of wireless application service system | |
CN101286849A (en) | Authentication system and method of a third party based on engagement arithmetic | |
CN101820629A (en) | Identity authentication method, device and system in wireless local area network (WLAN) | |
CN103430478A (en) | Method and apparatus for encrypting short data in wireless communication system | |
CN112672342B (en) | Data transmission method, device, equipment, system and storage medium | |
CN105007163A (en) | Pre-shared key (PSK) transmitting and acquiring methods and transmitting and acquiring devices | |
CN111416712B (en) | Quantum secret communication identity authentication system and method based on multiple mobile devices | |
WO2019085659A1 (en) | Information interaction method and device | |
CN101431453B (en) | Method for implementing secret communication between communication terminal and wireless access point | |
KR102219086B1 (en) | HMAC-based source authentication and secret key sharing method and system for Unnamed Aerial vehicle systems | |
CN101854594A (en) | Method and device for transmitting information and method and device for receiving information | |
CN103152326A (en) | Distributed authentication method and authentication system | |
CN102045343A (en) | DC (Digital Certificate) based communication encrypting safety method, server and system | |
CN107104888B (en) | Safe instant messaging method | |
CN103458401A (en) | Voice encryption communication system and voice encryption communication method | |
CN102448033B (en) | Short message security certification method | |
CN103414707A (en) | Message access processing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |