CN108513272B - Short message processing method and device - Google Patents
Short message processing method and device Download PDFInfo
- Publication number
- CN108513272B CN108513272B CN201810725093.2A CN201810725093A CN108513272B CN 108513272 B CN108513272 B CN 108513272B CN 201810725093 A CN201810725093 A CN 201810725093A CN 108513272 B CN108513272 B CN 108513272B
- Authority
- CN
- China
- Prior art keywords
- short message
- public key
- receiving end
- identification number
- sending
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 23
- 238000000034 method Methods 0.000 claims abstract description 71
- 238000012545 processing Methods 0.000 claims abstract description 15
- 238000004590 computer program Methods 0.000 claims description 18
- 230000005540 biological transmission Effects 0.000 description 12
- 238000004891 communication Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 6
- 238000012544 monitoring process Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012806 monitoring device Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the invention provides a short message processing method and a short message processing device. The method is applied to a transmitting end and comprises the following steps: when the sending operation of sending a short message to a receiving end is detected, a first public key corresponding to the receiving end is obtained according to a first identification number of the receiving end; the first public key is sent to the sending end by the server according to the first identification number; and encrypting the short message according to a first preset algorithm and the first public key, and sending the encrypted ciphertext to the receiving terminal. The whole sending process of the embodiment of the invention is simple, information such as account number and the like does not need to be verified, software limitations such as an operating system and the like do not exist for the sending end and the receiving end, and the convenience of the encryption process is improved while the safety of the short message is ensured.
Description
Technical Field
The embodiment of the invention relates to the technical field of communication, in particular to a short message processing method and a short message processing device.
Background
With the rapid development of mobile internet technology, various mobile internet-based instant messaging tools, such as smart phones, appear in the market, and the rise of instant messaging has led to the trend that traditional short messages are gradually eliminated.
However, in many scenarios, the short message still has irreplaceable advantages, such as in the case of no internet connection, in the scenario where the internet is shielded and monitored, or in the scenario of only a 2G network, etc., in which the short message still plays an important role in transferring information, on the other hand, the short message verification code is commonly used in the scenarios of user authentication, bank transaction, etc., and the status thereof cannot be replaced.
The problem of short message security is also a problem that cannot be ignored. Such as some illegal monitoring devices, may monitor short messages of the controlled operator's number. In addition, the popularization of the smart phone enables some malicious application programs to take advantage of the opportunity, and the malicious application programs can intercept short messages even before the users collect the short messages by reading the personal important short messages.
In order to improve the security of short messages, in the prior art, there are two common short message encryption schemes: one is a soft encryption scheme based on a mobile terminal account system; another hard encryption scheme is based on hardware such as flash memory cards.
However, both of the above schemes have certain limitations.
In the first scheme, the account number is needed for starting the encrypted short message function, and the account number needs to be verified again for checking the encrypted short message, so that the convenience of using the short message is reduced. And mobile terminals of different brands and account systems are usually different, and the function can be normally used only when the same account system is supported and opened by both the transmitting side and the receiving side.
In the second scheme, when the user uses the encrypted short message for the first time, the encrypted flash memory card needs to be inserted into the mobile terminal, and the user relies on the flash memory card as hardware, so that the use threshold is improved, and the popularization is poor; and at present, the mobile terminal gradually develops towards a direction that does not support the expansion of the flash memory card, so that the adaptability of the scheme is poor.
Disclosure of Invention
The embodiment of the invention provides a short message processing method and a short message processing device, which are used for solving the problem of limitation of a short message encryption scheme in the prior art.
In one aspect, an embodiment of the present invention provides a short message processing method applied to a sending end, where the method includes:
when the sending operation of sending a short message to a receiving end is detected, a first public key corresponding to the receiving end is obtained according to a first identification number of the receiving end; the first public key is sent to the sending end by the server according to the first identification number;
and encrypting the short message according to a first preset algorithm and the first public key, and sending the encrypted ciphertext to the receiving terminal.
On the other hand, an embodiment of the present invention provides a short message processing method, which is applied to a receiving end, and the method includes:
receiving a ciphertext of a short message sent by a sending end; the cipher text of the short message is obtained by encrypting the short message by the sending end according to a first preset algorithm and a first public key, and the first public key is sent to the sending end by the server according to a first identification number of the receiving end;
and decrypting the ciphertext of the short message according to a pre-stored decryption algorithm of the first preset algorithm and a first private key corresponding to the first public key to obtain the plaintext of the short message.
On the other hand, an embodiment of the present invention provides a short message processing method, which is applied to a server, and the method includes:
and sending a first public key corresponding to a receiving end to a sending end of the short message according to a first identification number of the receiving end of the short message, so that the sending end encrypts the short message according to a first preset algorithm and the first public key and sends an encrypted ciphertext to the receiving end.
In another aspect, an embodiment of the present invention provides a short message processing apparatus, which is applied to a sending end, and the apparatus includes:
the public key acquisition module is used for acquiring a first public key corresponding to a receiving end according to a first identification number of the receiving end when the sending operation of sending a short message to the receiving end is detected; the first public key is sent to the sending end by the server according to the first identification number;
and the ciphertext sending module is used for encrypting the short message according to a first preset algorithm and the first public key and sending the encrypted ciphertext to the receiving end.
In another aspect, an embodiment of the present invention provides a short message processing apparatus, which is applied to a receiving end, and the apparatus includes:
the ciphertext receiving module is used for receiving a ciphertext of a short message sent by the sending end; the cipher text of the short message is obtained by encrypting the short message by the sending end according to a first preset algorithm and a first public key, and the first public key is sent to the sending end by the server according to a first identification number of the receiving end;
and the information decryption module is used for decrypting the ciphertext of the short message according to a pre-stored decryption algorithm of the first preset algorithm and a first private key corresponding to the first public key to obtain the plaintext of the short message.
In another aspect, an embodiment of the present invention provides a short message processing apparatus, which is applied to a server, and the apparatus includes:
the public key distribution module is used for sending a first public key corresponding to a receiving end to a sending end of a short message according to a first identification number of the receiving end of the short message, so that the sending end encrypts the short message according to a first preset algorithm and the first public key and sends an encrypted ciphertext to the receiving end.
In another aspect, an embodiment of the present invention further provides an electronic device, which includes a memory, a processor, a bus, and a computer program stored in the memory and executable on the processor, where the processor implements the steps in the short message processing method when executing the computer program.
In still another aspect, an embodiment of the present invention further provides a non-transitory computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps in the short message processing method.
According to the short message processing method and the short message processing device, when a sending operation of sending a short message to a receiving end is detected, a first public key corresponding to the receiving end is obtained according to a first identification number of the receiving end, the short message is encrypted according to a first preset algorithm and the first public key, and an encrypted ciphertext is sent to the receiving end, so that the encryption of the short message is realized; the first public key corresponding to the receiving end is obtained through the first identification number of the receiving end, the short message is encrypted through the first public key, the encryption process does not depend on hardware equipment of the sending end or the receiving end, and the applicability is high; the whole sending process is simple, information such as account numbers does not need to be verified, software limitations such as system account numbers do not exist for the sending end and the receiving end, and convenience in the encryption process is improved while safety of short messages is guaranteed.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a schematic flow chart of a short message processing method according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a first exemplary scenario in accordance with an embodiment of the present invention;
fig. 3 is a second schematic flowchart of a short message processing method according to an embodiment of the present invention;
FIG. 4 is a schematic flow chart diagram of a second example of an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a short message processing apparatus according to an embodiment of the present invention;
fig. 6 is a second schematic structural diagram of a short message processing apparatus according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a flowchart illustrating a short message processing method according to an embodiment of the present invention.
As shown in fig. 1, a short message processing method provided in an embodiment of the present invention is applied to a sending end, and the method includes:
The receiving terminal is a receiving terminal of a short message to be sent, and the sending terminal acquires a first identification number of the receiving terminal when detecting that a user triggers sending operation or the sending terminal automatically executes the sending operation.
Preferably, the first Identification number is a Subscriber Identity Module (SIM) card number of the receiving end; the sending terminal acquires a first public key corresponding to the receiving terminal according to the SIM card number, wherein the first public key is sent by a server in communication connection with the sending terminal; the first public key is a preset public key corresponding to the first identification number, and it can be understood that the first public key has uniqueness.
Optionally, the first public key may be obtained by the sender actively requesting the server, or may be sent by the server to the sender according to a scene requirement.
Referring to fig. 2, a manner in which a sending end sends a public key obtaining request to a server to obtain a first public key is taken as a first example, and in fig. 2, an SIM card number is taken as a first identification number, the sending end first performs step 1, sends the public key obtaining request to the server, and carries the SIM card number of the receiving end in the public key obtaining request. And the server executes the step 2, and feeds back the first public key of the receiving end to the sending end, namely the sending end receives the first public key.
And 102, encrypting the short message according to a first preset algorithm and the first public key, and sending an encrypted ciphertext to the receiving terminal.
The first preset algorithm is a known algorithm or an encryption algorithm agreed with the receiving end in advance, namely, the receiving end can acquire a decryption algorithm corresponding to the first preset algorithm; and the sending end encrypts the short message by combining the first public key according to a first preset algorithm and sends the ciphertext to the receiving end, so that the receiving end decrypts the ciphertext according to the decryption algorithm and a preset private key corresponding to the first public key to obtain the plaintext of the short message. Because the ciphertext is sent, illegal monitoring equipment without a private key, malicious application programs and the like cannot decrypt the ciphertext, and the safe transmission of the short message is guaranteed.
Continuing to refer to fig. 2, after the sending end receives the first public key, firstly, step 3 is executed to encrypt the short message; and then executing the step 4 to send the ciphertext to the receiving end.
In the above embodiment of the present invention, when a sending operation of sending a short message to a receiving end is detected, a first public key corresponding to the receiving end is obtained according to a first identification number of the receiving end, the short message is encrypted according to a first preset algorithm and the first public key, and an encrypted ciphertext is sent to the receiving end, so as to encrypt the short message; the first public key corresponding to the receiving end is obtained through the first identification number of the receiving end, the short message is encrypted through the first public key, the encryption process does not depend on hardware equipment of the sending end or the receiving end, and the applicability is high; the whole sending process is simple, information such as account numbers does not need to be verified, software limitations such as an operating system do not exist for the sending end and the receiving end, and convenience in the encryption process is improved while safety of short messages is guaranteed. The invention solves the problem of limitation of the short message encryption scheme in the prior art.
Optionally, in this embodiment of the present invention, the step of obtaining, according to the first identifier of the receiving end, the first public key corresponding to the receiving end includes:
when the sending end is in a non-network connection state, acquiring a public key which is pre-stored by the sending end and corresponds to a first identification number of the receiving end, wherein the public key corresponding to the first identification number of the receiving end is a first public key corresponding to the receiving end;
and/or
And when the sending end is in a network connection state, requesting a first public key corresponding to the receiving end from a server according to the first identification number of the receiving end.
Specifically, if the sending end is currently in a non-network connection state and cannot perform instant communication with the server, a first public key locally stored in advance at the sending end is searched; the searching process is summarized according to the first identification number. It can be understood that the first public key locally pre-stored by the sending end is sent by the server to the sending end when the first public key of the receiving end is sent last time the server is requested by the sending end. The first public key is stored locally at the sending end, so that the short message can be sent normally under the condition of no network connection.
When the terminal is in the network connection state, step 1 in the first example is executed, and a public key acquisition request is sent to the server, where the public key acquisition request carries the first identification number of the receiving end.
Further, in the embodiment of the present invention, when the sending end is in the network connection state,
the step of requesting a server for a first public key corresponding to the receiving end according to the first identification number of the receiving end includes:
sending a first acquisition request carrying a first identification number of the receiving end to a server;
receiving a first public key fed back by the server for the first acquisition request; the first public key is the public key corresponding to the first identification number, which is determined by the server according to the pre-established first corresponding relation between the identification number and the public key.
When the terminal is in a network connection state, sending a first acquisition request to the server, wherein the first acquisition request carries a first identification number of a receiving end; after receiving the first acquisition request and extracting the first identification number, the server determines a public key corresponding to the first identification number, namely a first public key, according to a first correspondence relationship between the identification number and the public key, which is established in advance, and feeds the first public key back to the sending end.
In the above embodiment of the present invention, when a sending operation of sending a short message to a receiving end is detected, a first public key corresponding to the receiving end is obtained according to a first identification number of the receiving end, the short message is encrypted according to a first preset algorithm and the first public key, and an encrypted ciphertext is sent to the receiving end, so as to encrypt the short message; the first public key corresponding to the receiving end is obtained through the first identification number of the receiving end, the short message is encrypted through the first public key, the encryption process does not depend on hardware equipment of the sending end or the receiving end, the applicability is strong, and the sending end feeds back the sent first public key in the local cache server, so that the sending end can also normally send the short message under the condition of no network connection; the whole sending process is simple, information such as account numbers does not need to be verified, software limitations such as system account numbers do not exist for the sending end and the receiving end, and convenience in the encryption process is improved while safety of short messages is guaranteed.
Fig. 3 is a flowchart illustrating a short message processing method according to another embodiment of the present invention.
As shown in fig. 3, the short message processing method provided in the embodiment of the present invention is applied to a receiving end, and the method includes:
The sending terminal is a sending terminal of the short message, the receiving terminal receives the short message in a ciphertext form, and the ciphertext is obtained by encrypting the short message by the sending terminal according to a first preset algorithm and a first public key. The first preset algorithm is a known algorithm or an encryption algorithm agreed with the sending end in advance, namely a decryption algorithm corresponding to the first preset algorithm is known by the receiving end; and the sending end encrypts the short message by combining the first public key according to a first preset algorithm and sends the ciphertext to the receiving end.
Preferably, the first identification number is a receiving terminal SIM card number, and the first public key is sent by a server in communication connection with the receiving terminal; the first public key is a preset public key corresponding to the first identification number, and it can be understood that the first public key has uniqueness.
And the receiving terminal decrypts the short message by combining a first private key corresponding to the first public key according to a pre-stored decryption algorithm of the first preset algorithm to obtain a plaintext of the short message. Because the ciphertext is sent in the sending process of the short message, illegal monitoring equipment without a private key, malicious application programs and the like cannot decrypt the ciphertext, and the safe transmission of the short message is guaranteed.
With continued reference to fig. 2, after the sending end executes step 4 and sends the ciphertext to the receiving end, the receiving end executes step 5 to decrypt the ciphertext.
In the embodiment of the present invention, after receiving a ciphertext of a short message sent by a sending end, according to a pre-stored decryption algorithm of the first preset algorithm and a first private key corresponding to the first public key, the ciphertext of the short message is decrypted to obtain a plaintext of the short message, so as to implement encrypted transmission of the short message; the sending end encrypts the short message according to the first public key of the receiving end, and the encryption process does not depend on hardware equipment of the sending end or the receiving end, so that the applicability is high; the whole sending process is simple, information such as account numbers does not need to be verified, software limitations such as system account numbers do not exist for the sending end and the receiving end, and convenience in the encryption process is improved while safety of short messages is guaranteed. The invention solves the problem of limitation of the short message encryption scheme in the prior art.
Optionally, in the embodiment of the present invention, before the step of receiving the ciphertext of the short message sent by the sending end, the method includes:
the method comprises the steps of firstly, generating a feature code of the receiving end according to a second preset algorithm, and generating a first public key of the receiving end according to a third preset algorithm.
And secondly, sending a first request message carrying the feature code to a short message gateway server, so that the short message gateway server determines a first identification number of the receiving end and sends a second corresponding relation between the first identification number and the feature code to the server.
And thirdly, sending a registration request carrying a third corresponding relation between the feature code and the first public key to the server.
Before receiving the short message in the form of ciphertext, the receiving end needs to register with the server, and the registering process at least comprises the three steps. The method comprises the steps that firstly, a receiving end generates a feature code of the receiving end according to a second preset algorithm, the feature code has uniqueness, the feature code can be a Universal Unique Identifier (UUID), and a first public key of the receiving end is generated according to a third preset algorithm.
And secondly, the receiving end sends a first request message to the short message gateway server, and the feature code is carried in the first request message. The first request message is used for requesting or indicating the short message gateway server to determine a first identification number of the receiving end, determining a second corresponding relation between the first identification number and the feature code, and sending the second corresponding relation to the server; if the first identification number is the SIM card number, the short message gateway server can determine the SIM card number of the receiving terminal by itself.
As a second example, referring to fig. 4, the receiving end performs step 1 to send a first request message to the short message gateway server. And (3) the short message gateway server executes the step (2) and sends the second corresponding relation to the server.
And thirdly, the receiving end carries the third corresponding relation between the feature code and the first public key in the registration request and sends the registration request to the server.
With continued reference to fig. 4, the receiving end performs step 3 to send a registration request to the server.
Optionally, in this embodiment of the present invention, the step of generating the first public key of the receiving end according to a third preset algorithm includes:
and generating a first public key of the receiving end and a first private key corresponding to the first public key according to a third preset algorithm.
The receiving terminal generates a first public key of the receiving terminal and a first private key corresponding to the first public key according to a third preset algorithm, so that after a short message in a ciphertext form is received, a ciphertext of the short message is decrypted, and a plaintext of the short message is obtained.
In the embodiment of the present invention, after receiving a ciphertext of a short message sent by a sending end, according to a pre-stored decryption algorithm of the first preset algorithm and a first private key corresponding to the first public key, the ciphertext of the short message is decrypted to obtain a plaintext of the short message, so as to implement encrypted transmission of the short message; the sending end encrypts the short message according to the first public key of the receiving end, and the encryption process does not depend on hardware equipment of the sending end or the receiving end, so that the applicability is high; the whole sending process is simple, information such as account numbers does not need to be verified, software limitations such as system account numbers do not exist for the sending end and the receiving end, and convenience in the encryption process is improved while safety of short messages is guaranteed.
Another embodiment of the present invention further provides a short message processing method applied to a server, where the method includes:
and sending a first public key corresponding to a receiving end to a sending end of the short message according to a first identification number of the receiving end of the short message, so that the sending end encrypts the short message according to a first preset algorithm and the first public key and sends an encrypted ciphertext to the receiving end.
The first identification number is the SIM card number of the receiving terminal; when the server receives a first identification number of a short message receiving end, a first public key of the corresponding receiving end is searched according to the first identification number, and the first public key is sent to a sending end of the short message, so that the sending end encrypts the short message according to a first preset algorithm and the first public key, and sends an encrypted ciphertext to the receiving end; the first preset algorithm is a known algorithm or an encryption algorithm agreed with the receiving end in advance, namely, the receiving end can acquire a decryption algorithm corresponding to the first preset algorithm; and the receiving terminal decrypts the ciphertext according to the decryption algorithm corresponding to the first preset algorithm and the private key corresponding to the first public key to obtain the plaintext of the short message, and the encryption transmission process of the short message is completed.
Referring to fig. 2, the server performs step 2 to feed back the first public key of the receiving end to the sending end.
In the above embodiment of the present invention, when receiving the first identification number of a short message receiving end, the server sends the first public key corresponding to the receiving end to the sending end of the short message, so that the sending end encrypts the short message according to the first preset algorithm and the first public key, sends the encrypted ciphertext to the receiving end, and the receiving end decrypts the short message according to the first private key corresponding to the first public key. The invention realizes the encryption transmission process of the short message, the encryption process does not depend on hardware equipment of a sending end or a receiving end, and the applicability is stronger; the whole sending process is simple, information such as account numbers does not need to be verified, software limitations such as system account numbers do not exist for the sending end and the receiving end, and convenience in the encryption process is improved while safety of short messages is guaranteed.
Optionally, in this embodiment of the present invention, the step of sending, to a sending end of a short message, a first public key corresponding to a receiving end according to a first identification number of the receiving end of the short message includes:
receiving a first acquisition request sent by a short message sending end, wherein the first acquisition request carries a first identification number of a receiving end of the short message;
and determining a first public key corresponding to the first identification number according to a first corresponding relation between the pre-established identification number and the public key.
When the server receives a first acquisition request of the sending end, after a first identification number is extracted, a public key corresponding to the first identification number, namely a first public key, is determined according to a first corresponding relation between the identification number and the public key which is established in advance, and the first public key is fed back to the sending end.
Further, in the embodiment of the present invention, before the step of receiving the first obtaining request sent by the short message sending end, the method includes:
establishing a first corresponding relation between the identification number and the public key;
the step of establishing the first corresponding relationship between the identification number and the public key includes:
receiving a second corresponding relation between the first identification number and a feature code sent by a short message gateway server, wherein the feature code is generated by the receiving end according to a second preset algorithm;
receiving a third corresponding relation which is sent by the receiving end and carries the feature code and the first public key;
and establishing a first corresponding relation between the identification number and the public key according to the second corresponding relation and the third corresponding relation.
In the registration process of the receiving end, the server establishes a first corresponding relation between the identification number and the public key in advance. The server receives a second corresponding relation sent by the short message gateway server, namely the corresponding relation between the first identification number and the feature code; receiving a third corresponding relation sent by the receiving end, namely the corresponding relation between the feature code and the first public key, wherein optionally, the third corresponding relation is carried in a registration request of the receiving end; and finally, integrating the first corresponding relation between the identification number and the public key according to the second corresponding relation and the third corresponding relation.
Continuing with the second example, referring to fig. 4, the server performs step 4, establishing a first correspondence between the identification number and the public key; and step 5, feeding back the registration result to the receiving end.
Specifically, when the third corresponding relationship is carried in the registration request sent by the receiving end,
after the step of establishing the first corresponding relationship between the identification number and the public key, the method further includes:
and feeding back the success of the registration to the receiving end.
And when the third corresponding relation is carried in the registration request sent by the receiving end, the server feeds back the success of registration to the receiving end after establishing the first corresponding relation.
In the foregoing embodiment of the present invention, when the server receives the first identification number of a short message receiving end, the server sends the first public key corresponding to the receiving end to the sending end of the short message, so that the sending end encrypts the short message according to a first preset algorithm and the first public key, sends an encrypted ciphertext to the receiving end, and the receiving end decrypts the short message according to a first private key corresponding to the first public key. The invention realizes the encryption transmission process of the short message, the encryption process does not depend on hardware equipment of a sending end or a receiving end, and the applicability is stronger; the whole sending process is simple, information such as account numbers does not need to be verified, software limitations such as an operating system do not exist for the sending end and the receiving end, and convenience in the encryption process is improved while safety of short messages is guaranteed.
The short message processing method according to the embodiment of the present invention is described above, and the short message processing apparatus according to the embodiment of the present invention is described below with reference to the accompanying drawings.
Referring to fig. 5, an embodiment of the present invention provides a short message processing apparatus, which is applied to a sending end, and the apparatus includes:
a public key obtaining module 501, configured to obtain a first public key corresponding to a receiving end according to a first identification number of the receiving end when a sending operation of sending a short message to the receiving end is detected; and the first public key is sent to the sending end by the server according to the first identification number.
Preferably, the first identification number is a Subscriber Identity Module (SIM) card number of the receiving end; the sending terminal acquires a first public key corresponding to the receiving terminal according to the SIM card number, wherein the first public key is sent by a server in communication connection with the sending terminal; the first public key is a preset public key corresponding to the first identification number, and it can be understood that the first public key has uniqueness.
Referring to fig. 2, a manner in which a sending end sends a public key obtaining request to a server to obtain a first public key is taken as a first example, and in fig. 2, an SIM card number is taken as a first identification number, the sending end first performs step 1, sends the public key obtaining request to the server, and carries the SIM card number of the receiving end in the public key obtaining request. And the server executes the step 2, and feeds back the first public key of the receiving end to the sending end, namely the sending end receives the first public key.
The first preset algorithm is a known algorithm or an encryption algorithm agreed with the receiving end in advance, namely, the receiving end can acquire a decryption algorithm corresponding to the first preset algorithm; and the sending end encrypts the short message by combining the first public key according to a first preset algorithm and sends the ciphertext to the receiving end, so that the receiving end decrypts the ciphertext according to the decryption algorithm and a preset private key corresponding to the first public key to obtain the plaintext of the short message. Because the ciphertext is sent, illegal monitoring equipment without a private key, malicious application programs and the like cannot decrypt the ciphertext, and the safe transmission of the short message is guaranteed.
Continuing to refer to fig. 2, after the sending end receives the first public key, firstly, step 3 is executed to encrypt the short message; and then executing the step 4 to send the ciphertext to the receiving end.
The ciphertext sending module 502 is configured to encrypt the short message according to a first preset algorithm and the first public key, and send the encrypted ciphertext to the receiving end.
Optionally, in this embodiment of the present invention, the public key obtaining module 501 includes:
the first obtaining submodule is used for obtaining a public key which is stored in advance by the sending end and corresponds to a first identification number of the receiving end when the sending end is in a non-network connection state, and the public key corresponding to the first identification number of the receiving end is a first public key corresponding to the receiving end;
and/or
And the second obtaining submodule is used for requesting a first public key corresponding to the receiving end from the server according to the first identification number of the receiving end when the sending end is in a network connection state.
Optionally, in this embodiment of the present invention, when the sending end is in a network connection state,
the second obtaining sub-module is configured to:
sending a first acquisition request carrying a first identification number of the receiving end to a server;
receiving a first public key fed back by the server for the first acquisition request; the first public key is the public key corresponding to the first identification number, which is determined by the server according to the pre-established first corresponding relation between the identification number and the public key.
In the above embodiment of the present invention, when the public key obtaining module 501 detects a sending operation of sending a short message to a receiving end, a first public key corresponding to the receiving end is obtained according to a first identification number of the receiving end, and the ciphertext sending module 502 encrypts the short message according to a first preset algorithm and the first public key, and sends the encrypted ciphertext to the receiving end, so as to encrypt the short message; the first public key corresponding to the receiving end is obtained through the first identification number of the receiving end, the short message is encrypted through the first public key, the encryption process does not depend on hardware equipment of the sending end or the receiving end, and the applicability is high; the whole sending process is simple, information such as account numbers does not need to be verified, software limitations such as an operating system do not exist for the sending end and the receiving end, and convenience in the encryption process is improved while safety of short messages is guaranteed.
Referring to fig. 6, another embodiment of the present invention provides a short message processing apparatus, including:
the ciphertext receiving module 601 is configured to receive a ciphertext of a short message sent by a sending end; the cipher text of the short message is obtained by encrypting the short message by the sending end according to a first preset algorithm and a first public key, and the first public key is sent to the sending end by the server according to a first identification number of the receiving end.
The sending terminal is a sending terminal of the short message, the receiving terminal receives the short message in a ciphertext form, and the ciphertext is obtained by encrypting the short message by the sending terminal according to a first preset algorithm and a first public key. The first preset algorithm is a known algorithm or an encryption algorithm agreed with the sending end in advance, namely a decryption algorithm corresponding to the first preset algorithm is known by the receiving end; and the sending end encrypts the short message by combining the first public key according to a first preset algorithm and sends the ciphertext to the receiving end.
Preferably, the first identification number is a receiving terminal SIM card number, and the first public key is sent by a server in communication connection with the receiving terminal; the first public key is a preset public key corresponding to the first identification number, and it can be understood that the first public key has uniqueness.
The information decryption module 602 is configured to decrypt the ciphertext of the short message according to a pre-stored decryption algorithm of the first preset algorithm and a first private key corresponding to the first public key, so as to obtain a plaintext of the short message.
And the receiving terminal decrypts the short message by combining a first private key corresponding to the first public key according to a pre-stored decryption algorithm of the first preset algorithm to obtain a plaintext of the short message. Because the ciphertext is sent in the sending process of the short message, illegal monitoring equipment without a private key, malicious application programs and the like cannot decrypt the ciphertext, and the safe transmission of the short message is guaranteed.
With continued reference to fig. 2, after the sending end executes step 4 and sends the ciphertext to the receiving end, the receiving end executes step 5 to decrypt the ciphertext.
Optionally, in an embodiment of the present invention, the apparatus includes:
the public key generating module is used for generating the feature code of the receiving end according to a second preset algorithm and generating a first public key of the receiving end according to a third preset algorithm;
the request sending module is used for sending a first request message carrying the feature code to a short message gateway server, so that the short message gateway server determines a first identification number of the receiving end and sends a second corresponding relation between the first identification number and the feature code to the server;
and the registration module is used for sending a registration request carrying the third corresponding relation between the feature code and the first public key to the server.
Optionally, in this embodiment of the present invention, the public key generating module is configured to:
and generating a first public key of the receiving end and a first private key corresponding to the first public key according to a third preset algorithm.
In the above embodiment of the present invention, after the ciphertext receiving module 601 receives a ciphertext of a short message sent by the sending end, the information decrypting module 602 decrypts the ciphertext of the short message according to the pre-stored decryption algorithm of the first preset algorithm and the first private key corresponding to the first public key, so as to obtain a plaintext of the short message, and implement encryption transmission of the short message; the sending end encrypts the short message according to the first public key of the receiving end, and the encryption process does not depend on hardware equipment of the sending end or the receiving end, so that the applicability is high; the whole sending process is simple, information such as account numbers does not need to be verified, software limitations such as an operating system do not exist for the sending end and the receiving end, and convenience in the encryption process is improved while safety of short messages is guaranteed.
Another embodiment of the present invention provides a short message processing apparatus applied to a server, where the apparatus includes:
the public key distribution module is used for sending a first public key corresponding to a receiving end to a sending end of a short message according to a first identification number of the receiving end of the short message, so that the sending end encrypts the short message according to a first preset algorithm and the first public key and sends an encrypted ciphertext to the receiving end.
The first identification number is the SIM card number of the receiving terminal; when the server receives a first identification number of a short message receiving end, a first public key of the corresponding receiving end is searched according to the first identification number, and the first public key is sent to a sending end of the short message, so that the sending end encrypts the short message according to a first preset algorithm and the first public key, and sends an encrypted ciphertext to the receiving end; the first preset algorithm is a known algorithm or an encryption algorithm agreed with the receiving end in advance, namely, the receiving end can acquire a decryption algorithm corresponding to the first preset algorithm; and the receiving terminal decrypts the ciphertext according to the decryption algorithm corresponding to the first preset algorithm and the private key corresponding to the first public key to obtain the plaintext of the short message, and the encryption transmission process of the short message is completed.
Referring to fig. 2, the server performs step 2 to feed back the first public key of the receiving end to the sending end.
Optionally, in this embodiment of the present invention, the public key distribution module includes:
the request receiving submodule is used for receiving a first acquisition request sent by a short message sending end, wherein the first acquisition request carries a first identification number of a receiving end of the short message;
and the determining submodule is used for determining a first public key corresponding to the first identification number according to a first corresponding relation between the pre-established identification number and the public key.
Optionally, in an embodiment of the present invention, the apparatus includes:
the establishing module is used for establishing a first corresponding relation between the identification number and the public key;
the establishing module comprises:
the first receiving submodule is used for receiving a second corresponding relation between the first identification number and a feature code sent by the short message gateway server, wherein the feature code is generated by the receiving terminal according to a second preset algorithm;
the second receiving submodule is used for receiving a third corresponding relation which is sent by the receiving terminal and carries the feature code and the first public key;
and the establishing submodule is used for establishing a first corresponding relation between the identification number and the public key according to the second corresponding relation and the third corresponding relation.
Optionally, in this embodiment of the present invention, when the third corresponding relationship is carried in the registration request sent by the receiving end,
the device further comprises:
and the registration feedback module is used for feeding back the success of registration to the receiving end.
In the above embodiment of the present invention, when receiving a first identification number of a short message receiving end, the public key distribution module sends a first public key corresponding to the receiving end to a sending end of the short message, so that the sending end encrypts the short message according to a first preset algorithm and the first public key, sends an encrypted ciphertext to the receiving end, and the receiving end decrypts the short message according to a first private key corresponding to the first public key. The invention realizes the encryption transmission process of the short message, the encryption process does not depend on hardware equipment of a sending end or a receiving end, and the applicability is stronger; the whole sending process is simple, information such as account numbers does not need to be verified, software limitations such as an operating system do not exist for the sending end and the receiving end, and convenience in the encryption process is improved while safety of short messages is guaranteed.
Fig. 7 is a schematic structural diagram of an electronic device according to yet another embodiment of the present invention.
Referring to fig. 7, an embodiment of the present invention provides an electronic device, which includes a memory (memory)71, a processor (processor)72, a bus 73, and a computer program stored in the memory 71 and running on the processor. The memory 71 and the processor 72 complete communication with each other through the bus 73.
The processor 72 is adapted to call program instructions in the memory 71 to implement the method of fig. 1 when executing the computer program.
In another embodiment, the processor, when executing the computer program, implements the method of:
when the sending operation of sending a short message to a receiving end is detected, a first public key corresponding to the receiving end is obtained according to a first identification number of the receiving end; the first public key is sent to the sending end by the server according to the first identification number;
and encrypting the short message according to a first preset algorithm and the first public key, and sending the encrypted ciphertext to the receiving terminal.
The electronic device provided in the embodiment of the present invention may be configured to execute a program corresponding to the method in the foregoing method embodiment, and details of this implementation are not described again.
In the electronic device provided by the embodiment of the present invention, when the processor executes the computer program and detects a sending operation of sending a short message to a receiving end, a first public key corresponding to the receiving end is obtained according to a first identification number of the receiving end, the short message is encrypted according to a first preset algorithm and the first public key, and an encrypted ciphertext is sent to the receiving end, so that the encryption of the short message is realized; the first public key corresponding to the receiving end is obtained through the first identification number of the receiving end, the short message is encrypted through the first public key, the encryption process does not depend on hardware equipment of the sending end or the receiving end, and the applicability is high; the whole sending process is simple, information such as account numbers does not need to be verified, software limitations such as an operating system do not exist for the sending end and the receiving end, and convenience in the encryption process is improved while safety of short messages is guaranteed.
A non-transitory computer readable storage medium is provided according to a further embodiment of the present invention, having a computer program stored thereon, which when executed by a processor implements the steps of fig. 1.
In another embodiment, the computer program when executed by a processor implements a method comprising:
when the sending operation of sending a short message to a receiving end is detected, a first public key corresponding to the receiving end is obtained according to a first identification number of the receiving end; the first public key is sent to the sending end by the server according to the first identification number;
and encrypting the short message according to a first preset algorithm and the first public key, and sending the encrypted ciphertext to the receiving terminal.
In the non-transitory computer-readable storage medium provided in the embodiment of the present invention, when the computer program is executed by the processor, the method in the foregoing method embodiment is implemented, and details of this implementation are not described again.
When detecting a sending operation of sending a short message to a receiving end, the non-transitory computer-readable storage medium according to the embodiment of the present invention obtains a first public key corresponding to the receiving end according to a first identification number of the receiving end, encrypts the short message according to a first preset algorithm and the first public key, and sends an encrypted ciphertext to the receiving end, thereby encrypting the short message; the first public key corresponding to the receiving end is obtained through the first identification number of the receiving end, the short message is encrypted through the first public key, the encryption process does not depend on hardware equipment of the sending end or the receiving end, and the applicability is high; the whole sending process is simple, information such as account numbers does not need to be verified, software limitations such as an operating system do not exist for the sending end and the receiving end, and convenience in the encryption process is improved while safety of short messages is guaranteed.
Yet another embodiment of the present invention discloses a computer program product comprising a computer program stored on a non-transitory computer-readable storage medium, the computer program comprising program instructions which, when executed by a computer, enable the computer to perform the methods provided by the above-mentioned method embodiments, for example, comprising:
when the sending operation of sending a short message to a receiving end is detected, a first public key corresponding to the receiving end is obtained according to a first identification number of the receiving end; the first public key is sent to the sending end by the server according to the first identification number;
and encrypting the short message according to a first preset algorithm and the first public key, and sending the encrypted ciphertext to the receiving terminal.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.
Claims (8)
1. A short message processing method is applied to a receiving end, and is characterized by comprising the following steps:
generating a feature code of the receiving end according to a second preset algorithm, and generating a first public key of the receiving end according to a third preset algorithm; sending a first request message carrying the feature code to a short message gateway server, so that the short message gateway server determines a first identification number of the receiving end and sends a second corresponding relation between the first identification number and the feature code to a server; sending a registration request carrying a third corresponding relation between the feature code and the first public key to the server;
receiving a ciphertext of a short message sent by a sending end; the cipher text of the short message is obtained by encrypting the short message by the sending end according to a first preset algorithm and a first public key, and the first public key is sent to the sending end by the server according to a first identification number of the receiving end;
and decrypting the ciphertext of the short message according to a pre-stored decryption algorithm of the first preset algorithm and a first private key corresponding to the first public key to obtain the plaintext of the short message.
2. The method according to claim 1, wherein the step of generating the first public key of the receiving end according to a third preset algorithm comprises:
and generating a first public key of the receiving end and a first private key corresponding to the first public key according to a third preset algorithm.
3. A short message processing method is applied to a server, and is characterized by comprising the following steps:
according to a first identification number of a short message receiving terminal, a first public key corresponding to the receiving terminal is sent to the sending terminal of the short message, and the method comprises the following steps: receiving a first acquisition request sent by a short message sending end, wherein the first acquisition request carries a first identification number of a receiving end of the short message; determining a first public key corresponding to the first identification number according to a first corresponding relation between a pre-established identification number and the public key, so that the sending end encrypts the short message according to a first preset algorithm and the first public key and sends an encrypted ciphertext to the receiving end;
before the step of receiving the first acquisition request sent by the short message sending end, the method comprises the following steps: establishing a first corresponding relation between the identification number and the public key; the step of establishing the first corresponding relationship between the identification number and the public key includes: receiving a second corresponding relation between the first identification number and a feature code sent by a short message gateway server, wherein the feature code is generated by the receiving end according to a second preset algorithm; receiving a third corresponding relation which is sent by the receiving end and carries the feature code and the first public key; and establishing a first corresponding relation between the identification number and the public key according to the second corresponding relation and the third corresponding relation.
4. The method according to claim 3, wherein when the third corresponding relation is carried in a registration request sent by the receiving end,
after the step of establishing the first corresponding relationship between the identification number and the public key, the method further includes:
and feeding back the success of the registration to the receiving end.
5. A short message processing apparatus applied to a receiving end, the apparatus comprising:
the ciphertext receiving module is used for receiving a ciphertext of a short message sent by the sending end; the cipher text of the short message is obtained by encrypting the short message by the sending end according to a first preset algorithm and a first public key, and the first public key is sent to the sending end by the server according to a first identification number of the receiving end; the public key generating device is further used for generating a feature code of the receiving end according to a second preset algorithm and generating a first public key of the receiving end according to a third preset algorithm; sending a first request message carrying the feature code to a short message gateway server, so that the short message gateway server determines a first identification number of the receiving end and sends a second corresponding relation between the first identification number and the feature code to a server; sending a registration request carrying a third corresponding relation between the feature code and the first public key to the server;
and the information decryption module is used for decrypting the ciphertext of the short message according to a pre-stored decryption algorithm of the first preset algorithm and a first private key corresponding to the first public key to obtain the plaintext of the short message.
6. A short message processing device applied to a server is characterized by comprising:
the public key distribution module is used for sending a first public key corresponding to a receiving end to the sending end of the short message according to a first identification number of the receiving end of the short message, so that the sending end encrypts the short message according to a first preset algorithm and the first public key and sends an encrypted ciphertext to the receiving end; the first acquisition request is further used for receiving a first acquisition request sent by a short message sending end, and the first acquisition request carries a first identification number of a receiving end of the short message; determining a first public key corresponding to the first identification number according to a first corresponding relation between the pre-established identification number and the public key;
before the step of receiving the first acquisition request sent by the short message sending end, the method comprises the following steps: establishing a first corresponding relation between the identification number and the public key; the step of establishing the first corresponding relationship between the identification number and the public key includes: receiving a second corresponding relation between the first identification number and a feature code sent by a short message gateway server, wherein the feature code is generated by the receiving end according to a second preset algorithm; receiving a third corresponding relation which is sent by the receiving end and carries the feature code and the first public key; and establishing a first corresponding relation between the identification number and the public key according to the second corresponding relation and the third corresponding relation.
7. An electronic device comprising a memory, a processor, a bus and a computer program stored on the memory and executable on the processor, wherein the processor executes the computer program to implement the steps of the short message processing method according to any one of claims 1 to 4.
8. A non-transitory computer-readable storage medium having stored thereon a computer program, characterized in that: the computer program, when being executed by a processor, performs the steps of the short message processing method according to any one of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810725093.2A CN108513272B (en) | 2018-07-04 | 2018-07-04 | Short message processing method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810725093.2A CN108513272B (en) | 2018-07-04 | 2018-07-04 | Short message processing method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108513272A CN108513272A (en) | 2018-09-07 |
CN108513272B true CN108513272B (en) | 2021-10-01 |
Family
ID=63404238
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810725093.2A Active CN108513272B (en) | 2018-07-04 | 2018-07-04 | Short message processing method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108513272B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111787495A (en) * | 2020-08-05 | 2020-10-16 | 童晓渝 | System and method for realizing RCS enhanced short message encryption |
CN114173294A (en) * | 2021-12-29 | 2022-03-11 | 渔翁信息技术股份有限公司 | Non-peer-to-peer short message transmission method, system, equipment and computer storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101247605A (en) * | 2008-03-25 | 2008-08-20 | 中兴通讯股份有限公司 | Short information enciphering and endorsement method, mobile terminal and short information ciphering system |
CN103067897A (en) * | 2013-01-18 | 2013-04-24 | 浙江长天信息技术有限公司 | Asymmetrical mobile phone short message encryption method |
CN105207774A (en) * | 2014-05-30 | 2015-12-30 | 北京奇虎科技有限公司 | Key negotiation method and device of verification information |
CN106330862A (en) * | 2016-08-10 | 2017-01-11 | 武汉信安珞珈科技有限公司 | Secure transmission method and system for dynamic password |
-
2018
- 2018-07-04 CN CN201810725093.2A patent/CN108513272B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101247605A (en) * | 2008-03-25 | 2008-08-20 | 中兴通讯股份有限公司 | Short information enciphering and endorsement method, mobile terminal and short information ciphering system |
CN103067897A (en) * | 2013-01-18 | 2013-04-24 | 浙江长天信息技术有限公司 | Asymmetrical mobile phone short message encryption method |
CN105207774A (en) * | 2014-05-30 | 2015-12-30 | 北京奇虎科技有限公司 | Key negotiation method and device of verification information |
CN106330862A (en) * | 2016-08-10 | 2017-01-11 | 武汉信安珞珈科技有限公司 | Secure transmission method and system for dynamic password |
Also Published As
Publication number | Publication date |
---|---|
CN108513272A (en) | 2018-09-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107801165B (en) | Business short message pushing method and device, computer equipment and storage medium | |
CN108111497B (en) | Mutual authentication method and device for camera and server | |
CN109150897B (en) | End-to-end communication encryption method and device | |
CN105634737B (en) | Data transmission method, terminal and system | |
CN109145628B (en) | Data acquisition method and system based on trusted execution environment | |
CN112823503B (en) | Data access method, data access device and mobile terminal | |
CN111178884A (en) | Information processing method, device, equipment and readable storage medium | |
CN111914291A (en) | Message processing method, device, equipment and storage medium | |
CN105516135A (en) | Method and device used for account login | |
CN115225672B (en) | End-to-end data transmission method, equipment and medium | |
CN109729000B (en) | Instant messaging method and device | |
CN105407467A (en) | Short message encryption methods, devices and system | |
CN106685897B (en) | Safe input method, device and system | |
CN114257562B (en) | Instant messaging method, device, electronic equipment and computer readable storage medium | |
CN108513272B (en) | Short message processing method and device | |
CN114944921A (en) | Login authentication method and device, electronic equipment and storage medium | |
CN110719292A (en) | Connection authentication method and system for edge computing equipment and central cloud platform | |
CN117879894A (en) | Mail encryption transmission method, system, electronic equipment and storage medium | |
CN110636503B (en) | Data encryption method, device, equipment and computer readable storage medium | |
CN103997730A (en) | Method for decrypting, copying and pasting encrypted data | |
CN114554485B (en) | Asynchronous session key negotiation and application method, system, electronic equipment and medium | |
CN112769759B (en) | Information processing method, information gateway, server and medium | |
US20230023665A1 (en) | Privacy information transmission method, apparatus, computer device and computer-readable medium | |
CN112769783A (en) | Data transmission method, cloud server, receiving end and sending end | |
CN114595465A (en) | Data encryption processing method and device and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: Room 332, 3 / F, Building 102, 28 xinjiekouwei street, Xicheng District, Beijing 100088 Applicant after: QAX Technology Group Inc. Address before: 100015 15, 17 floor 1701-26, 3 building, 10 Jiuxianqiao Road, Chaoyang District, Beijing. Applicant before: BEIJING QIANXIN TECHNOLOGY Co.,Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |