CN107889102B - Method and device for encrypting and decrypting information in short message - Google Patents

Method and device for encrypting and decrypting information in short message Download PDF

Info

Publication number
CN107889102B
CN107889102B CN201610873400.2A CN201610873400A CN107889102B CN 107889102 B CN107889102 B CN 107889102B CN 201610873400 A CN201610873400 A CN 201610873400A CN 107889102 B CN107889102 B CN 107889102B
Authority
CN
China
Prior art keywords
short message
mobile terminal
information
encrypted
original
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610873400.2A
Other languages
Chinese (zh)
Other versions
CN107889102A (en
Inventor
张勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201610873400.2A priority Critical patent/CN107889102B/en
Priority to PCT/CN2017/102768 priority patent/WO2018059303A1/en
Publication of CN107889102A publication Critical patent/CN107889102A/en
Application granted granted Critical
Publication of CN107889102B publication Critical patent/CN107889102B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/18Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/18Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
    • H04W4/185Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals by embedding added-value information into content, e.g. geo-tagging

Abstract

The embodiment of the invention discloses a method for encrypting and decrypting information in a short message, which comprises the following steps: the method comprises the steps that a mobile terminal bottom layer receives at least one original short message containing privacy information; when the original short message meets the encryption condition, the bottom layer of the mobile terminal encrypts the privacy information in the original short message to generate an encrypted short message, and the encrypted short message is sent to a short message application of the mobile terminal; and after receiving the encrypted short message, the short message application of the mobile terminal decrypts the encrypted short message. The embodiment of the invention also discloses a device for encrypting and decrypting the information in the short message.

Description

Method and device for encrypting and decrypting information in short message
Technical Field
The invention relates to the technical field of communication, in particular to a method and a device for encrypting and decrypting information in a short message.
Background
With the increasing popularity of mobile terminals, such as mobile phones, tablet computers, smart watches, etc., the mobile terminals have become the most common portable mobile electronic devices in people's lives, and the short message function has long become one of the necessary functions of the mobile terminals as a basic communication service in the mobile terminals. With the endless variety of third-party applications in mobile terminals, many third-party applications apply for the right to read short messages. Some malicious third-party applications may steal the user short message to acquire the personal privacy of the user, so that the information security of the user is threatened. In order to avoid user information leakage, a mobile terminal short message encryption method is often used at present, only a preset short message application carried by a mobile terminal manufacturer is allowed to check real short message content, and other third party applications cannot acquire the real short message content, so that the protection of the user mobile terminal information is realized.
There are two common methods for encrypting short messages: in the first method, a sender mobile terminal encrypts an original short message text, and after the encrypted short message text is transmitted to a receiver mobile terminal, the receiver mobile terminal decrypts the encrypted short message text and displays the decrypted short message text. In the second method, the receiver displays the encrypted short message text after receiving the short message, and the receiver can display the original short message text after the user inputs the password.
However, in the first method, the mobile terminals of the sender and the receiver need to cooperate with each other, and if different types of mobile terminals are used by the sender and the receiver, at least one mobile terminal does not have an encryption function, or the mobile terminals of both parties have different encryption mechanisms, this method cannot be implemented, so that the first method has a great limitation in practicability.
The second method is a method commonly used in the mobile terminal at present, and is mainly used for preventing other people from viewing the short message after taking the mobile terminal, so that the operation of inputting the password is added when viewing the short message. However, many third-party applications installed on the mobile terminal can bypass the encryption mechanism to directly receive or read the short message, and therefore, the second method is also insufficient in practicability.
Disclosure of Invention
In order to solve the technical problem, embodiments of the present invention desirably provide a method and an apparatus for encrypting and decrypting information in a short message, so as to protect important privacy information in a short message of a user, reduce a risk of revealing the important privacy information of the user, ensure information security of the user, and improve user experience.
The technical scheme of the invention is realized as follows:
the embodiment of the invention provides a method for encrypting and decrypting information in a short message, which comprises the following steps:
the method comprises the steps that a mobile terminal bottom layer receives at least one original short message containing privacy information;
when the original short message meets the encryption condition, the bottom layer of the mobile terminal encrypts the privacy information in the original short message to generate an encrypted short message, and the encrypted short message is sent to a short message application of the mobile terminal;
and after receiving the encrypted short message, the short message application of the mobile terminal decrypts the encrypted short message.
In the foregoing solution, the privacy information includes at least one of: numerical combination information, character combination information that is not all numbers.
In the above scheme, when the privacy information includes digital combined information, the encryption condition includes that the length of the digital combined information included in the original short message is greater than or equal to a length threshold;
and when the privacy information comprises character combination information which is not all numbers, the encryption condition comprises that the original short message comprises a character string meeting a set condition.
In the foregoing solution, the encryption condition further includes: and the mobile terminal short message encryption control switch is turned on.
In the above scheme, the method further comprises: and the bottom layer of the mobile terminal sends the original short message to a third party application in a preset third party application list.
In the foregoing solution, the preset third-party application list includes: and the user specifies a trusted third party application in the mobile terminal.
The embodiment of the invention also provides a device for encrypting and decrypting the information in the short message, which comprises a mobile terminal bottom layer and the short message application of the mobile terminal; wherein the content of the first and second substances,
the mobile terminal bottom layer is used for receiving at least one original short message containing privacy information; when the original short message meets an encryption condition, encrypting the privacy information in the original short message to generate an encrypted short message, and sending the encrypted short message to a short message application of the mobile terminal;
and the short message application of the mobile terminal is used for decrypting the encrypted short message after receiving the encrypted short message.
In the foregoing solution, the privacy information includes at least one of: numerical combination information, character combination information that is not all numbers.
In the above scheme, when the privacy information includes digital combined information, the encryption condition includes that the length of the digital combined information included in the original short message is greater than or equal to a length threshold;
and when the privacy information comprises character combination information which is not all numbers, the encryption condition comprises that the original short message comprises a character string meeting a set condition.
In the foregoing solution, the encryption condition further includes: and the mobile terminal short message encryption control switch is turned on.
In the above scheme, the mobile terminal bottom layer is further configured to send the original short message to a third party application in a preset third party application list.
In the foregoing solution, the preset third-party application list includes: and the user specifies a trusted third party application in the mobile terminal.
In the embodiment of the invention, the bottom layer of the mobile terminal receives at least one original short message containing privacy information; when the original short message meets the encryption condition, the bottom layer of the mobile terminal encrypts the privacy information in the original short message to generate an encrypted short message, and the encrypted short message is sent to a short message application of the mobile terminal; after receiving the encrypted short message, the short message application of the mobile terminal decrypts the encrypted short message; therefore, the defect that a sender and a receiver of the mobile terminal need to be matched together in the prior art is overcome, the encryption protection of important privacy information in the short message of the user is realized, the leakage risk of the important privacy information of the user is reduced, the safety of the user information is ensured, and the user experience is improved.
Drawings
FIG. 1 is a flowchart illustrating a method for encrypting and decrypting information in a short message according to a first embodiment of the present invention;
FIG. 2 is a flowchart illustrating a method for encrypting and decrypting information in a short message according to a second embodiment of the present invention;
FIG. 3 is a flowchart illustrating a method for encrypting and decrypting information in a short message according to a third embodiment of the present invention;
fig. 4 is a schematic structural diagram of a device for encrypting and decrypting information in a short message according to an embodiment of the present invention.
Detailed Description
The technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention.
Fig. 1 is a flowchart of a first embodiment of a method for encrypting and decrypting information in a short message according to the present invention, as shown in fig. 1, the method includes:
step 100: the bottom layer of the mobile terminal receives at least one original short message containing privacy information.
Here, the mobile terminal may be a mobile phone, a tablet computer, a smart watch, and the like, and the mobile terminal bottom layer may be a telecommunications framework layer, an Operating System (OS) layer, a driver layer, and the like of an android phone.
The private information includes at least one of: numerical information, character combination information. Specifically, the privacy information includes at least one of: bank card number, password, mobile phone number, email address, web address, etc.
Step 101: and when the original short message meets the encryption condition, the bottom layer of the mobile terminal encrypts the privacy information in the original short message to generate an encrypted short message, and the encrypted short message is sent to the short message application of the mobile terminal.
Preferably, when the privacy information includes digital combined information, the encryption condition includes that the length of the digital combined information included in the original short message is greater than or equal to a length threshold; for example, the original short message includes 2563689 pieces of digital combination information, the set length threshold is 4, and at this time, if the length 7 of the digital combination information is greater than the length threshold 4, the original short message needs to be encrypted.
When the privacy information comprises character combination information which is not all numbers, the encryption condition comprises that the original short message comprises a character string meeting a set condition; the set condition may be that the original short message includes a specified character string identifier, where the specified character string identifier may be a special character string identifier in information such as a mailbox, a website, and the like, for example,. com,. net,. org, @163.com, @ gmail.com, and the like; when the original short message includes a piece of website information www.un.org, the specified string identifier is detected, org, so that it can be determined that the original short message needs to be encrypted.
Further, the encryption condition may further include: and the mobile terminal short message encryption control switch is turned on.
It can be understood that, when the short message encryption control switch is arranged in the mobile terminal, the user can select to turn on or turn off the short message encryption control switch to realize whether the mobile terminal uses the function of encrypting the private information in the short message.
Optionally, after encrypting the privacy information in the original short message to generate an encrypted short message, the bottom layer of the mobile terminal sets a short message encryption flag bit and sends the short message encryption flag bit to a short message application of the mobile terminal; for example, when the short message encryption flag is set to '1', it indicates that the original short message is encrypted, and when the short message encryption flag is set to '0', it indicates that the original short message is not encrypted.
It should be noted that, when the original short message does not satisfy the encryption condition, the bottom layer of the mobile terminal sends the original short message to the short message application of the mobile terminal.
Illustratively, when the private information needing to be encrypted in the short message is digital information, after a short message encryption control switch of the mobile terminal is turned on, whether the digital information in the original short message needs to be encrypted is judged; when the length of the digital information contained in the original short message is more than or equal to a length threshold value, encrypting the digital information in the original short message to generate an encrypted short message, and sending the encrypted short message by the bottom layer of the mobile terminal; and when the length of the digital information contained in the original short message is smaller than a length threshold value, the mobile terminal bottom layer sends the original short message.
Here, the length threshold of the digital information may be set by the user himself. When the length of the digital information in the original short message is smaller than the length threshold, the privacy information is not the number which the user needs to keep secret, for example, the number with the length smaller than 4 digits is generally the date, the time, the money number, the number of people and the like. At present, digital information which needs to be protected by a user is long, such as an identification card number, a mobile phone number, a bank card number and the like, and the most important password information of the user, such as a bank card password, a terminal application login password, a payment password and the like, has the shortest length limit during setting. Therefore, the mobile terminal selectively encrypts the digits in the received original short message, and the information encryption protection efficiency in the short message is improved.
Step 102: and after receiving the encrypted short message, the short message application of the mobile terminal decrypts the encrypted short message.
It can be understood that, before the short message application of the mobile terminal displays the currently received short message, it is also required to determine whether the currently received short message is an encrypted short message.
Optionally, judging whether the short message encryption flag bit is 1, if so, continuously judging that the currently received short message is the encrypted short message, decrypting the encrypted short message by the short message application of the mobile terminal, and displaying the decrypted short message text; if not, the short message application of the mobile terminal directly displays the original short message.
Optionally, if the selected encryption and decryption algorithm does not change the length of the encrypted content or does not change the specified string identifier, it may be determined whether the currently received short message is an encrypted short message by determining whether the currently received short message satisfies the encryption condition.
Here, the mobile terminal may further store the currently received short message to a mobile terminal short message database, including the encrypted short message and the original short message.
It can be understood that, after the original short message is encrypted, the short message text obtained by other third party applications is the encrypted short message except the short message application of the mobile terminal. When other third party applications monitor the mobile terminal short message database and attempt to steal the content of the short message, only the encrypted short message or the original short message which does not need to be encrypted can be obtained; therefore, the third-party application cannot acquire the real short message content, and the information of the user mobile terminal is protected.
Optionally, the mobile terminal may also preset a third-party application list, where the third-party application list includes a trusted third-party application in the mobile terminal specified by the user, so that the trusted third-party application can conveniently extract the privacy information in the short message. And after receiving the original short message, the bottom layer of the mobile terminal sends the original short message to a third party application in a preset third party application list.
By way of example, many third-party applications play an increasingly important role in electronic transactions such as daily payments and money transfers of people, and the high-security third-party applications are greatly trusted by users. When the third-party application trusted by the user is used, the digital verification information in the short message received by the mobile terminal needs to be extracted to complete the operation sometimes, so that the third-party application trusted by the user can be allowed to directly obtain the original short message to automatically extract the correct digital verification information so as to be convenient for the user to use.
In the embodiment of the invention, the bottom layer of the mobile terminal receives at least one original short message containing privacy information; when the original short message meets the encryption condition, the bottom layer of the mobile terminal encrypts the privacy information in the original short message to generate an encrypted short message, and the encrypted short message is sent to a short message application of the mobile terminal; after receiving the encrypted short message, the short message application of the mobile terminal decrypts the encrypted short message; therefore, the defect that a sender and a receiver of the mobile terminal need to be matched together in the prior art is overcome, the encryption protection of important privacy information in the short message of the user is realized, the leakage risk of the important privacy information of the user is reduced, the safety of the user information is ensured, and the user experience is improved.
Second embodiment
In order to further embody the object of the present invention, the mobile terminal takes a mobile phone as an example, and further describes the encryption and decryption of digital information in the mobile phone based on the first embodiment of the present invention.
Fig. 2 is a flowchart of a second embodiment of a method for encrypting and decrypting information in a short message according to the present invention, where the method includes:
step 200: the bottom layer of the mobile phone receives a new short message.
Step 201: judging whether a short message encryption control switch is turned on, if so, executing step 202; if not, go to step 204.
Here, if the short message encryption control switch is not turned on, the bottom layer of the mobile phone directly sends the received new short message to the short message application of the mobile phone.
Step 202: judging whether the length of the number in the new short message is greater than or equal to the length threshold value, if so, executing a step 203; if not, go to step 204.
In the embodiment of the invention, the bottom layer of the mobile phone detects the received new short message text from the beginning character to the ending character in sequence and records the length of the detected digital character string of the continuous digital information. In the case of common space symbols such as spaces, commas, pause numbers, and connectors "-", which exist in the numeric character string, the common space symbols are considered to be input by the user for the convenience of accurate reading or recording, and therefore, the common space symbols may not be included in the calculation of the length of the numeric character string.
For example, if a numeric character string in the new short message is "123456789", the length of the numeric character string is 9; the number string in the new short message is "123-.
Step 203: and encrypting the digital information in the new short message to generate an encrypted short message, marking the position 1 with the encrypted short message, and sending the encrypted short message and the short message encryption marking position to the short message application of the mobile phone.
In the embodiment of the invention, if the length of at least one string of digital information in the new short message is greater than or equal to the length threshold, the original short message needs to be encrypted. Here, at least 2 strings of numeric information separated by kanji characters or other characters may exist in one short message.
Optionally, when the mobile phone bottom layer encrypts the digital information in the new short message, because the first several digits of the commonly used digital information to be encrypted may be regular or public, such as the mobile phone number, the bank card number, and the identification number, when encrypting the digital information, the middle digit may be used as the initial encryption digit, and the digits from the initial encryption digit to the end of the digital information are encrypted, for example, the first 6 digits of the 19-digit bank card number represent the card-issuing bank information, and the 7 th to 10 th digits represent the card-issuing area, so that the last 13 digits may be encrypted, or the last 9 digits may be encrypted.
Here, as the Encryption Algorithm for encrypting the digital information, a currently classical Encryption Algorithm, for example, a Digital Encryption Standard (DES), an International Data Encryption Algorithm (IDEA), a public key Encryption Algorithm (Ron Rivest, Adi Shamir, Leonard Adleman, RSA), or the like can be used.
Some simple encryption algorithms may also be adopted, for example, a mobile phone sets a key number in advance, and adds the key number to the number to be encrypted in the digital information, and then modulo 10 to generate the encrypted digital information. For example, when original digital information in a new received short message is 123456789, the mobile phone sets the initial encryption bit to be 5, the key number to be 3, the 5 th bit number in the digital information 5 plus 3 equals 8, the modulo 10 result is 8, and the 6 th, 7 th and 8 th bits are encrypted according to the same encryption algorithm, so that the obtained encrypted digital information is 123489012.
In another embodiment, multiple key numbers may be provided, such as three key numbers 356, with the 5 th digit 5 of the digital message using the first key number 3, the 6 th digit 6 using the second key number 5, and the 7 th digit 7 using the 3 rd key number 6. If the number of the key numbers is smaller than the length of the digital information to be encrypted, the first key number can be reused for the next number to be encrypted when all the key numbers are used, for example, the 8 th number 8 reuses the 1 st key number 3, the 9 th number 9 continues to use the 2 nd key number 5, and the finally obtained encrypted digital information is 123481314.
It can be seen that, when the simple encryption algorithm is adopted, after the digital information is encrypted, the displayed digital information is still digital, and the situation that a third party application or other people know that the obtained digital information is the encrypted information is avoided.
Step 204: the short message application of the mobile phone receives the current short message.
Step 205: judging whether the short message encryption flag bit is 1, if so, executing step 206; if not, go to step 207.
Here, after receiving the current short message, the short message application of the mobile phone determines whether the encryption flag bit is 1. If the number is 1, the current short message is an encrypted short message; if the number is 0, the current short message is the original short message.
Step 206: and decrypting the digital information in the current short message.
Here, the short message application of the mobile phone decrypts the received encrypted short message, and the decryption algorithm corresponds to the encryption algorithm used by the bottom layer of the mobile phone.
For example, the DES encryption algorithm is used by the bottom layer of the mobile phone, and the preset short message application decrypts the encrypted short message by using the corresponding DES decryption algorithm.
If the handset bottom layer adopts the simple encryption algorithm in step 203, that is, the number of the secret key is 3, and the initial encryption bit is 5. When the short message of the mobile phone applies the received encrypted digital information 123489012, the opposite operation is performed on each bit of encrypted digital information from the 5 th bit, i.e. directly subtracting 3 from the number greater than or equal to 3, adding 10 and subtracting 3 from the number less than 3, and displaying the original digital information 123456789 after decryption.
Step 207: and displaying the current short message.
In this step, the mobile phone displays the received original short message or displays the decrypted encrypted short message.
Third embodiment
To further illustrate the object of the present invention, the encryption and decryption of the personal mailbox in the mobile phone short message are further described on the basis of the first embodiment of the present invention.
Fig. 3 is a flowchart of a third embodiment of a method for encrypting and decrypting information in a short message according to the present invention, where the method includes:
step 300: the bottom layer of the mobile phone receives a new short message.
Step 301: judging whether a short message encryption control switch is turned on, if so, executing step 302; if not, go to step 304.
Step 302: judging whether the new short message contains a character string meeting the set condition, if so, executing step 303; if not, go to step 304.
In the embodiment of the invention, the commonly used mailbox address consists of three parts, namely a first part, a user account; second part, separator @; and in the third part, the domain name of the mail receiving server of the user mailbox is used for identifying the position of the mail receiving server. When the private information is a mailbox address, the special character string identifier may be @ plus the domain name of the mail receiving server of the user mailbox. For example, @ sina.com, @163.com, @ gmail.com, @ hotmail.com, and the like.
Step 303: and encrypting the mailbox information in the new short message to generate an encrypted short message, and sending the encrypted short message to the short message application of the mobile phone.
Illustratively, if the new short message is detected to contain @163.com, at least 4 characters immediately before @ can be encrypted, for example, the American Standard Code for Information exchange (ASCII) Code of each character in the content to be encrypted is added with 2 and then displayed. For example, the hexadecimal ASCII code corresponding to the character 'b' is '62', and the hexadecimal ASCII code '64' after adding 2 is'd'. Here, the encrypted bigbang @163.com is bigdcpi @163.com, and the encrypted short message is sent to the short message application of the mobile phone.
Step 304: the short message application of the mobile phone receives the current short message.
Step 305: judging whether the short message encryption control switch is turned on, if so, executing step 306; if not, go to step 308.
Step 306: judging whether the current short message contains a character string meeting the set condition, if so, executing step 307; if not, go to step 308.
In the embodiment of the invention, the character string identifier '@ 163. com' of the set condition is not changed after the mailbox is encrypted, so that whether the current short message is the encrypted short message or not can be determined by detecting whether the current short message contains the character string identifier '@ 163. com'.
Step 307: and decrypting the mailbox information in the current short message.
Here, the encryption algorithm and the decryption algorithm used by the mobile phone bottom layer and the short message application of the mobile phone respectively are agreed in advance, and the encrypted short message is decrypted by the decryption algorithm after the encrypted short message received by the short message application of the mobile phone.
In this step, after the short message application receives the current short message, the application decrypts the first 4 characters next to @ and subtracts 2 from the ASCII code of each character in the content to be decrypted to obtain the correct character information.
Step 308: and displaying the current short message.
In this step, the mobile phone displays the received original short message or displays the decrypted encrypted short message.
Third embodiment
Aiming at the method of the embodiment of the invention, the embodiment of the invention also provides a device for encrypting and decrypting the information in the short message. Fig. 4 is a schematic structural diagram of a device for encrypting and decrypting information in a short message according to an embodiment of the present invention, and as shown in fig. 4, the device includes a mobile terminal bottom layer 400 and a short message application 401 of a mobile terminal; wherein the content of the first and second substances,
the mobile terminal bottom layer 400 is used for receiving at least one original short message containing privacy information; and when the original short message meets the encryption condition, encrypting the privacy information in the original short message to generate an encrypted short message, and sending the encrypted short message to a short message application of the mobile terminal.
And the short message application 401 of the mobile terminal is configured to decrypt the encrypted short message after receiving the encrypted short message.
The private information includes at least one of: numerical combination information, character combination information that is not all numbers.
When the privacy information comprises digital combined information, the encryption condition comprises that the length of the digital combined information contained in the original short message is more than or equal to a length threshold value;
and when the privacy information comprises character combination information which is not all numbers, the encryption condition comprises that the original short message comprises a character string meeting a set condition.
The encryption condition further includes: and the mobile terminal short message encryption control switch is turned on.
The mobile terminal bottom layer 400 is further configured to send the original short message to a third party application in a preset third party application list.
The preset third-party application list comprises: and the user specifies a trusted third party application in the mobile terminal.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.

Claims (12)

1. A method for encrypting and decrypting information in a short message is characterized by comprising the following steps:
the method comprises the steps that a mobile terminal bottom layer receives at least one original short message containing privacy information;
when the original short message meets the encryption condition, the bottom layer of the mobile terminal encrypts the privacy information in the original short message to generate an encrypted short message, and the encrypted short message is sent to a short message application of the mobile terminal;
and after receiving the encrypted short message, the short message application of the mobile terminal decrypts the encrypted short message.
2. The method of claim 1, wherein the private information comprises at least one of: numerical combination information, character combination information that is not all numbers.
3. The method according to claim 2, wherein when the privacy information includes digital combined information, the encryption condition includes that the length of the digital combined information included in the original short message is greater than or equal to a length threshold;
and when the privacy information comprises character combination information which is not all numbers, the encryption condition comprises that the original short message comprises a character string meeting a set condition.
4. The method of claim 1, wherein the encryption condition further comprises: and the mobile terminal short message encryption control switch is turned on.
5. The method of claim 1, further comprising: and the bottom layer of the mobile terminal sends the original short message to a third party application in a preset third party application list.
6. The method of claim 5, wherein the preset list of third-party applications comprises: and the user specifies a trusted third party application in the mobile terminal.
7. A device for encrypting and decrypting information in a short message is characterized by comprising a mobile terminal bottom layer and a short message application of a mobile terminal; wherein the content of the first and second substances,
the mobile terminal bottom layer is used for receiving at least one original short message containing privacy information; when the original short message meets an encryption condition, encrypting the privacy information in the original short message to generate an encrypted short message, and sending the encrypted short message to a short message application of the mobile terminal;
and the short message application of the mobile terminal is used for decrypting the encrypted short message after receiving the encrypted short message.
8. The apparatus of claim 7, wherein the private information comprises at least one of: numerical combination information, character combination information that is not all numbers.
9. The apparatus according to claim 8, wherein when the privacy information includes digital combination information, the encryption condition includes that the length of the digital combination information included in the original short message is greater than or equal to a length threshold;
and when the privacy information comprises character combination information which is not all numbers, the encryption condition comprises that the original short message comprises a character string meeting a set condition.
10. The apparatus of claim 7, wherein the encryption condition further comprises: and the mobile terminal short message encryption control switch is turned on.
11. The apparatus of claim 7, wherein the mobile terminal infrastructure is further configured to send the original short message to a third party application in a preset third party application list.
12. The apparatus of claim 11, wherein the preset list of third party applications comprises: and the user specifies a trusted third party application in the mobile terminal.
CN201610873400.2A 2016-09-30 2016-09-30 Method and device for encrypting and decrypting information in short message Active CN107889102B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610873400.2A CN107889102B (en) 2016-09-30 2016-09-30 Method and device for encrypting and decrypting information in short message
PCT/CN2017/102768 WO2018059303A1 (en) 2016-09-30 2017-09-21 Method and device for encrypting and decrypting information in short message

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610873400.2A CN107889102B (en) 2016-09-30 2016-09-30 Method and device for encrypting and decrypting information in short message

Publications (2)

Publication Number Publication Date
CN107889102A CN107889102A (en) 2018-04-06
CN107889102B true CN107889102B (en) 2021-04-02

Family

ID=61763686

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610873400.2A Active CN107889102B (en) 2016-09-30 2016-09-30 Method and device for encrypting and decrypting information in short message

Country Status (2)

Country Link
CN (1) CN107889102B (en)
WO (1) WO2018059303A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109274582B (en) * 2018-09-20 2021-12-10 腾讯科技(武汉)有限公司 Instant communication message display method, device, equipment and storage medium
CN112732776B (en) * 2020-12-25 2022-08-26 山东师范大学 Secure approximate pattern matching method and system and electronic equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101795315A (en) * 2009-12-25 2010-08-04 深圳市杰普林数码科技有限公司 System and method for encrypting short messages by using mobile phone terminal
CN102916948A (en) * 2012-09-29 2013-02-06 深圳市易联盛世科技有限公司 Data safety processing method and device, and terminal
CN202818612U (en) * 2012-06-19 2013-03-20 吴振陵 System capable of blocking unauthorized SMS text messages or bulk SMS text messages
US8656157B2 (en) * 2011-05-30 2014-02-18 Netqin Mobile (Beijing) Co., Ltd. Method for sending and receiving an encrypted message and a system thereof
CN104301886A (en) * 2014-10-21 2015-01-21 中国联合网络通信集团有限公司 Short message reading method and system, terminal and wearable device
CN105704690A (en) * 2016-01-20 2016-06-22 福州大学 Short message confidential communication method and system based on cell phone digital fingerprint verification

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101247605A (en) * 2008-03-25 2008-08-20 中兴通讯股份有限公司 Short information enciphering and endorsement method, mobile terminal and short information ciphering system
CN101626567A (en) * 2009-06-29 2010-01-13 深圳华为通信技术有限公司 Short message sending and receiving method, short message sending and receiving device and mobile terminal
US10237253B2 (en) * 2011-09-09 2019-03-19 Kingston Digital, Inc. Private cloud routing server, private network service and smart device client architecture without utilizing a public cloud based routing server
CN104486756B (en) * 2014-12-05 2018-11-16 深圳职业技术学院 A kind of encryption and decryption method and system of close writing paper short message
CN105610770A (en) * 2015-07-27 2016-05-25 宇龙计算机通信科技(深圳)有限公司 Access method, access device, terminal, encryption method, encryption device and terminal
CN106027229B (en) * 2016-07-28 2019-04-23 武汉斗鱼网络科技有限公司 A kind of encryption and decryption method and system based on intelligent terminal compass

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101795315A (en) * 2009-12-25 2010-08-04 深圳市杰普林数码科技有限公司 System and method for encrypting short messages by using mobile phone terminal
US8656157B2 (en) * 2011-05-30 2014-02-18 Netqin Mobile (Beijing) Co., Ltd. Method for sending and receiving an encrypted message and a system thereof
CN202818612U (en) * 2012-06-19 2013-03-20 吴振陵 System capable of blocking unauthorized SMS text messages or bulk SMS text messages
CN102916948A (en) * 2012-09-29 2013-02-06 深圳市易联盛世科技有限公司 Data safety processing method and device, and terminal
CN104301886A (en) * 2014-10-21 2015-01-21 中国联合网络通信集团有限公司 Short message reading method and system, terminal and wearable device
CN105704690A (en) * 2016-01-20 2016-06-22 福州大学 Short message confidential communication method and system based on cell phone digital fingerprint verification

Also Published As

Publication number Publication date
WO2018059303A1 (en) 2018-04-05
CN107889102A (en) 2018-04-06

Similar Documents

Publication Publication Date Title
US9112680B2 (en) Distribution of credentials
EP3220573B1 (en) Method and system for controlling encryption of information and analyzing information as well as terminal
US10089627B2 (en) Cryptographic authentication and identification method using real-time encryption
CN104992119B (en) A kind of safe transmission method and system of sensitive information Anti-theft
CN105005731A (en) Data encryption and decryption methods and mobile terminal
CN105809042A (en) Information protection method and device, information display method and device, and terminal
CN106487659B (en) Information encryption method, information encryption device and terminal
US20180308097A1 (en) Bankcard Password Protection Method and System
CN102419805A (en) Terminal equipment and method for encrypting user information
CN108280356A (en) File encryption-decryption method, device, processing terminal and computer readable storage medium
CN108667784B (en) System and method for protecting internet identity card verification information
CN103036681A (en) Password safety keyboard device and system
CN106648583B (en) Information processing method and terminal
CN110771190A (en) Controlling access to data
CN107889102B (en) Method and device for encrypting and decrypting information in short message
CN113032753B (en) Identity verification method and device
Wang et al. A new personal information protection approach based on RSA cryptography
US9277403B2 (en) Authentication method and device
CN113343255A (en) Data interaction method based on privacy protection
CN112199730A (en) Method and device for processing application data on terminal and electronic equipment
CN102332978B (en) Lottery ticket off-line verification system
CN109525747A (en) Picture upload method, encipher-decipher method, device, system and electronic equipment
CN103514540A (en) USBKEY business realization method and system
CN102316214A (en) Privacy method for personal information and system
CN106357674A (en) Encryption method, terminal, payment system and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant