CN113392281A - 5G message storage and verification method, device and system - Google Patents

5G message storage and verification method, device and system Download PDF

Info

Publication number
CN113392281A
CN113392281A CN202110659608.5A CN202110659608A CN113392281A CN 113392281 A CN113392281 A CN 113392281A CN 202110659608 A CN202110659608 A CN 202110659608A CN 113392281 A CN113392281 A CN 113392281A
Authority
CN
China
Prior art keywords
message
encrypted
storage
verification
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110659608.5A
Other languages
Chinese (zh)
Inventor
孟凡玥
孙建建
赵中芳
汪亦伦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202110659608.5A priority Critical patent/CN113392281A/en
Publication of CN113392281A publication Critical patent/CN113392281A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/901Indexing; Data structures therefor; Storage structures
    • G06F16/9014Indexing; Data structures therefor; Storage structures hash tables
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention provides a 5G message storage and verification method, a device and a system, which can be used in the technical field of 5G, wherein the method comprises the following steps: determining the message type of a 5G message sent by a user, performing partition storage on the 5G message according to the message type and determining the importance level; encrypting the 5G message and the message body to obtain an encrypted message; and transmitting the encrypted message to a message receiver through a 5G link so that the message receiver decrypts the encrypted message and verifies the message main body obtained by decryption, and if the encrypted message does not pass the verification, deleting the 5G message.

Description

5G message storage and verification method, device and system
Technical Field
The present invention relates to the field of message communication technologies, and in particular, to the field of 5G technologies, and in particular, to a method, an apparatus, and a system for storing and verifying a 5G message.
Background
With the upgrading of the basic short message service technology of operators, each operator adopts 5G message service to replace the traditional short message mode to serve users, and because the 5G message is different from the traditional short message service only transmitting characters, the transmission of information such as characters, pictures, audio, video, positions and the like is realized, even a service and consultation is realized, in the continuously developing process, each enterprise and platform provide services for the users by using the 5G message service provided by the operator, and the users also communicate by using a rich medium of the 5G message.
The 5G message transmission can improve the user experience and facilitate the communication of users, and the 5G message has the following functional characteristics: the users can initiate group sending and group chatting at any time without adding friends; the user can directly enjoy the service provided by the enterprise without downloading App and logging in by an account number. But while being convenient for users, there are some problems: 1. the message return type is rich, the data space is large, the resource consumption is high, and the storage cost is high; 2. in a complex business scene, because real-name authentication is lacked, whether a transmission channel is normal or not and whether transmission information is reliable or not are difficult to effectively judge, and particularly, potential safety hazards exist when money transfer and remittance are carried out through third-party service in the financial field; 3. under the condition of message transmission failure or error transmission, how to retransmit or effectively withdraw the message, the privacy security such as protecting a user account number and the like lacks a complete mechanism.
Disclosure of Invention
The invention aims to provide a 5G message storage and verification method, which is used for automatically storing 5G messages in a layered mode and authenticating the 5G messages, greatly improves the information storage efficiency of the 5G messages and provides a 5G message application environment with efficient and effective messages and case transmission. Another object of the present invention is to provide a message sender apparatus. It is yet another object of the present invention to provide a message recipient apparatus. Still another object of the present invention is to provide a 5G message storage and verification system. It is a further object of the present invention to provide a computer apparatus. It is a further object of this invention to provide such a readable medium.
In order to achieve the above object, the present invention discloses a 5G message storage and verification method on one hand, which includes:
determining the message type of a 5G message sent by a user, performing partition storage on the 5G message according to the message type and determining the importance level;
encrypting the 5G message and the message body to obtain an encrypted message;
and transmitting the encrypted message to a message receiver through a 5G link so that the message receiver decrypts the encrypted message, verifies the decrypted message body, and deletes the 5G message if the verification fails.
Preferably, the determining the message type of the received 5G message sent by the message sender and performing the partitioned storage on the 5G message according to the message type specifically includes:
determining the message type and the importance level of the 5G message according to the message type suffix;
and packaging the 5G message by a Bayesian algorithm according to the message type and the importance level, and then storing the packaged 5G message in a partitioned manner.
Preferably, the method further comprises the following steps:
and dynamically expanding and uniformly storing the bottom storage nodes for storing the 5G messages in the partitions by expanding hash codes.
Preferably, the encrypting the 5G message and the message body to obtain the encrypted message specifically includes:
forming a session key and encrypting the 5G message;
and encrypting a message body corresponding to the 5G message through the session key, wherein the message body comprises a message subject, a user uniform identifier, operation time and a message signature.
Preferably, the method further comprises the step of pre-forming the user unified identifier:
acquiring equipment information of the mobile equipment and acquiring biological characteristic information of a user through the mobile equipment;
transmitting the biological characteristic information to a mobile equipment server so that the mobile equipment server matches the biological characteristic information, and receiving prestored equipment information and prestored user information returned by the mobile equipment server if matching is successful;
acquiring user information from an SIM card of mobile equipment, verifying the equipment information and the user information of the mobile equipment according to the pre-stored equipment information and the pre-stored user information, and if the verification is passed, forming a user unified identifier according to the biological characteristic information and the user information.
The invention also discloses a 5G message storage and verification method, which comprises the following steps:
receiving an encrypted message transmitted by a message sender through a 5G link, wherein the encrypted message is obtained by determining the message type of a 5G message sent by a user for the message sender, performing partition storage on the 5G message according to the message type, determining the importance level and encrypting the 5G message and a message body;
and decrypting the encrypted message, verifying the message body obtained by decryption, and deleting the 5G message if the verification fails.
Preferably, the method further comprises the following steps:
if the verification is passed, acquiring the current state information of the message receiver;
and matching and judging the current state information with the pre-acquired historical state information of the message receiver, and deleting the 5G message if the judgment is failed.
Preferably, the method further comprises the following steps:
after the 5G message is deleted, sending a resending request to the message sender so that the message sender resends the encrypted message;
and receiving the encrypted message sent again by the message sender, decrypting the encrypted message, and verifying the message body obtained by decryption until the received encrypted message passes verification.
Preferably, the verifying the message body obtained by decryption specifically includes:
and performing message content authentication, message source and sink authentication and message operation time authentication on the message body.
Preferably, the authenticating the message content, the authenticating the source and the destination of the message, and the authenticating the message operation time of the message body specifically include:
obtaining a message theme, a user unified identifier, operation time and a message signature according to the message body;
determining a consistency parameter of the message body, an integrity parameter of the user unified identifier and an importance level of the 5G message;
and obtaining a message authentication value according to the consistency parameter, the integrity parameter, the importance level and the operation time, and if the message authentication value is lower than a preset threshold value, the verification is failed.
The invention also discloses a message sender device, which comprises:
the message storage module is used for determining the message type of the 5G message sent by the user, carrying out partition storage on the 5G message according to the message type and determining the importance level;
the message encryption module is used for encrypting the 5G message and the message body to obtain an encrypted message;
and the message sending module is used for transmitting the encrypted message to a message receiver through a 5G link so that the message receiver can decrypt the encrypted message, and verify the decrypted message body, and if the encrypted message does not pass the verification, deleting the 5G message.
The invention also discloses a message receiver device, which comprises:
the system comprises a message receiving module, a message sending module and a message sending module, wherein the message receiving module is used for receiving an encrypted message transmitted by a message sending party through a 5G link, the encrypted message is obtained by determining the message type of the 5G message sent by a user for the message sending party, carrying out partition storage on the 5G message according to the message type, determining the importance level and encrypting the 5G message and a message main body;
and the message decryption and verification module is used for decrypting the encrypted message, verifying the message body obtained by decryption, and deleting the 5G message if the verification fails.
The invention also discloses a 5G message storage and verification system, which comprises a message sender and a message receiver;
the message sender is used for determining the message type of a 5G message sent by a user, carrying out partition storage on the 5G message according to the message type, determining the importance level, encrypting the 5G message and a message body to obtain an encrypted message, and transmitting the encrypted message to a message receiver through a 5G link;
and the message receiver is used for decrypting the encrypted message, verifying the message body obtained by decryption, and deleting the 5G message if the verification fails.
The invention also discloses a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor,
the processor, when executing the program, implements the method as described above.
The invention also discloses a computer-readable medium, having stored thereon a computer program,
which when executed by a processor implements the method as described above.
The 5G message storage and verification method comprises the steps of determining the message type of a 5G message after the 5G message transmitted by a user is received, carrying out partition storage on the 5G message according to the message type and determining the importance level, encrypting the 5G message and a message main body to obtain an encrypted message, transmitting the encrypted message to a message receiving party through a 5G link so that the message receiving party can decrypt the encrypted message, verifying the decrypted message main body, and deleting the 5G message if the encrypted message does not pass the verification. Therefore, the invention carries out automatic layered storage on the 5G message and carries out authentication on the 5G message, thereby greatly improving the information storage efficiency of the 5G message and providing a 5G message application environment with efficient and effective message and case transmission.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic structural diagram of a 5G message storage and verification system according to an embodiment of the present invention;
FIG. 2 is a flow chart illustrating an embodiment of a 5G message storage and verification method (message sender) of the present invention;
FIG. 3 is a flow chart of a specific embodiment S100 of the 5G message storage and verification method of the present invention;
FIG. 4 is a flowchart of a specific embodiment S200 of a 5G message storage and verification method according to the present invention;
FIG. 5 is a flow chart of a specific embodiment S000 of the 5G message storage and verification method of the present invention;
FIG. 6 is a flow chart illustrating a specific example of a 5G message storage and verification method of the present invention;
FIG. 7 is a flow chart illustrating an embodiment of a 5G message storage and verification method (message recipient) of the present invention;
FIG. 8 is a flowchart of a specific embodiment S600 of a 5G message storage and verification method according to the present invention;
FIG. 9 is a flowchart of a specific embodiment S700 of a 5G message storage and verification method according to the present invention;
fig. 10 is a flowchart of a specific embodiment S521 of a 5G message storage and verification method according to the present invention;
fig. 11 is a schematic structural diagram of a specific embodiment of a message sender apparatus according to the present invention;
FIG. 12 is a block diagram illustrating an exemplary embodiment of a message recipient apparatus;
FIG. 13 shows a schematic block diagram of a computer device suitable for use in implementing embodiments of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the method, the apparatus, and the system for storing and verifying the 5G message disclosed in the present application can be used in the 5G technical field, and can also be used in any field other than the 5G technical field.
In order to facilitate understanding of the technical solutions provided in the present application, the following first describes relevant contents of the technical solutions in the present application. Fig. 1 is a schematic structural diagram of a 5G message storage and verification system according to an embodiment of the present invention, and as shown in fig. 1, the 5G message storage and verification system according to the embodiment of the present invention includes a message sender device 1 and a message receiver device 2.
The method comprises the steps that a message sender device 1 determines the message type of a 5G message sent by a user, performs partition storage on the 5G message according to the message type and determines the importance level; encrypting the 5G message and the message body to obtain an encrypted message; the encrypted message is transmitted over the 5G link to the message recipient 2.
And the message receiver 2 decrypts the encrypted message, verifies the message body obtained by decryption, and deletes the 5G message if verification fails.
The following describes an implementation process of the 5G message storage and verification method provided in the embodiment of the present invention, taking the message sender apparatus 1 as an execution subject. It can be understood that the executing body of the 5G message storage and verification method provided by the embodiment of the present invention includes, but is not limited to, the message sender apparatus 1.
According to one aspect of the invention, the embodiment discloses a 5G message storage and verification method. As shown in fig. 2, in this embodiment, the method includes:
s100: the method comprises the steps of determining the message type of the 5G message sent by a user, carrying out partition storage on the 5G message according to the message type and determining the importance level.
S200: and encrypting the 5G message and the message body to obtain an encrypted message.
S300: and transmitting the encrypted message to a message receiver through a 5G link so that the message receiver decrypts the encrypted message, verifies the decrypted message body, and deletes the 5G message if the verification fails.
The 5G message storage and verification method comprises the steps of determining the message type of a 5G message after the 5G message transmitted by a user is received, carrying out partition storage on the 5G message according to the message type and determining the importance level, encrypting the 5G message and a message main body to obtain an encrypted message, transmitting the encrypted message to a message receiving party through a 5G link so that the message receiving party can decrypt the encrypted message, verifying the decrypted message main body, and deleting the 5G message if the encrypted message does not pass the verification. Therefore, the invention carries out automatic layered storage on the 5G message and carries out authentication on the 5G message, thereby greatly improving the information storage efficiency of the 5G message and providing a 5G message application environment with efficient and effective message and case transmission.
In a preferred embodiment, as shown in fig. 3, the determining, by the S100, a message type of a received 5G message sent by a message sender, and performing partition storage on the 5G message according to the message type specifically includes:
s110: and determining the message type and the importance level of the 5G message according to the message type suffix.
S120: and packaging the 5G message by a Bayesian algorithm according to the message type and the importance level, and then storing the packaged 5G message in a partitioned manner.
Specifically, in the preferred embodiment, the message type of the 5G message may be determined from a message type suffix of the 5G message. The 5G message is a rich media, and thus, the message type of the 5G message may include at least one of a type of text, a picture, audio, video, and a location. As known to those skilled in the art, for different message types, different message type suffixes are correspondingly set in the 5G message, and the message type of the 5G message can be determined according to the preset correspondence between the message type and the message type suffix and the message type of the received 5G message.
In the preferred embodiment, the importance of the 5G messages of different message types is different, so that different importance levels can be set for different message types in advance, the 5G messages are stored according to the importance levels of the 5G messages, the hierarchical storage of the 5G messages can be realized, the storage mode of the 5G messages is optimized, and the 5G messages with low importance levels can be compressed, so that the storage pressure of the whole 5G message storage system is reduced, and the data amount required to be stored is reduced. Specifically, a Bayesian algorithm can be adopted according to the message types and the importance levels to perform encapsulation and then store the encapsulated message in a partitioned manner, so that the classified management of the 5G messages of different message types can be realized.
In a preferred embodiment, the method further comprises:
s400: and dynamically expanding and uniformly storing the bottom storage nodes for storing the 5G messages in the partitions by expanding hash codes.
Specifically, in the preferred embodiment, the 5G message may be stored in a plurality of bottom storage nodes, and the 5G message bottom storage nodes of the mass data may be dynamically expanded and uniformly stored by using an expanded hash coding method, so that the mass data may be hierarchically stored, and the storage efficiency may be improved. It should be noted that, those skilled in the art may implement flexible dynamic expansion and uniform storage of the bottom storage node of the 5G message by using an extended hash encoding method according to actual requirements, which is not described herein again.
In a preferred embodiment, as shown in fig. 4, the encrypting the 5G message and the message body by S200 to obtain the encrypted message may specifically include:
s210: a session key is formed and the 5G message is encrypted.
S220: and encrypting a message body corresponding to the 5G message through the session key, wherein the message body comprises a message subject, a user uniform identifier, operation time and a message signature.
Specifically, in the preferred embodiment, in order to ensure the security of 5G message transmission and prevent the 5G message from being tampered, encryption, decryption and verification processes need to be performed on both the message sender and the message receiver to ensure the security of the message sender, the message receiver and the message during transmission. Thus, in the preferred embodiment, in order to ensure the security of 5G message transmission and prevent the 5G message from being tampered, at the message sender, a KDF may be used to generate a session key SK and encrypt the 5G message with the session key SK. More preferably, in the financial field, since the 5G message may relate to sensitive data related to finance, a counter triggering mode may be adopted to generate the session key according to the limited session key encryption times. The highest level of security may be applied to sensitive data, setting the session key to one complete data transmission and one change.
The message body is obtained from the 5G message and needs to be sent to the message recipient together with the 5G message. Therefore, a message body corresponding to the 5G message needs to be encrypted through the session key, where the message body includes a message subject T, a user uniform identifier UUID, an operation time T, and a message signature sig. In the preferred embodiment, the UUID also serves as both a public key for verifying the signature information and an identification of the importance level of the 5G message. The message encryption adopts AES symmetric encryption, and the encryption key is a pre-generated session key SK. In other embodiments, the 5G message and the message body may be encrypted by other keys, which is not limited by the present invention.
In a preferred embodiment, as shown in fig. 5, the method further includes a step S000 of pre-forming the user unified identifier:
s010: device information of a mobile device is acquired and biometric information of a user is acquired via the mobile device.
S020: and transmitting the biological characteristic information to a mobile equipment server so that the mobile equipment server matches the biological characteristic information, and receiving pre-stored equipment information and pre-stored user information returned by the mobile equipment server if matching is successful.
S030: acquiring user information from an SIM card of mobile equipment, verifying the equipment information and the user information of the mobile equipment according to the pre-stored equipment information and the pre-stored user information, and if the verification is passed, forming a user unified identifier according to the biological characteristic information and the user information.
It can be understood that the formation of the UUID needs to interact with the mobile device server and the mobile device, and the function of the UUID is to integrate the user device information and the user information. The biological characteristic information of the user can be collected in advance and stored in the mobile equipment server, and the equipment information and the user information of the mobile equipment of the user can be collected at the same time to form preset equipment information and prestored user information which are stored in the mobile equipment server and are associated with the biological characteristic information of the user, so that the subsequent association matching of the biological characteristic information transmitted by a message sender is facilitated. The biometric information may be user unique biometric information such as a user fingerprint, and is used to mark the user identity.
Specifically, the user fingerprint can be acquired through the mobile device serving as the message sender, uploaded to the mobile device server, and returned to the device id (device information) and the user id (user information) if the verification of the user fingerprint and the pre-stored fingerprint information of the device is successful. The subscriber information may then be obtained from the mobile device SIM card information and double checked against the received subscriber id transmitted by the server. If the verification is passed, the equipment information and the user information can be packaged to form the UUID. In other embodiments, the user information and the device information can be directly acquired without passing or failing to acquire the fingerprint, but the validity rating of the UUID is lowered because the fingerprint is not checked again, and subsequent processing and alarming of the message are affected.
In a preferred embodiment, the message receiver is further configured to obtain current status information of the message receiver if the check is passed. And matching and judging the current state information with the pre-acquired historical state information of the message receiver, and deleting the 5G message if the judgment is failed.
Specifically, in order to ensure the security of the operating environment of the message receiver, the state of the message receiver needs to be checked after the encrypted message is received, and if the operating state of the message receiver is abnormal, the decrypted 5G message is deleted, so that the problems of leakage and the like of the 5G message are prevented. Specifically, before the encrypted message is sent to the message receiver through the 5G link, the state information of the message receiver may be recorded to obtain and store the historical state information, and this operation may be implemented by the message receiver, or may be implemented by the message sender or other devices, which is not limited in this invention. And after the message receiver receives the encrypted message sent by the message sender, acquiring the real-time state information of the message receiver, determining whether the running states of the message receiver are consistent or not according to the historical state information and the real-time state information, and if not, deleting the 5G message in time.
In a preferred embodiment, the message receiver further sends a resending request to the message sender after deleting the 5G message, so that the message sender resends the encrypted message, receives and decrypts the encrypted message sent again by the message sender, and verifies a message body obtained by decryption until the received encrypted message passes verification.
Specifically, when the content of the encrypted message or the operating state of the message receiver is abnormal, the resending request can be resent to the message sender, and the message sender can resend the encrypted message to the message receiver through the 5G link after receiving the resending request, so that the message receiver can perform verification again. If the verification still fails, the steps can be repeated until the verification passes.
The verification of the decrypted message body may include performing message content authentication, source and sink authentication of the message, and message operation time authentication on the message body. The safety and the integrity of the received encrypted message are ensured through various authentication modes.
In a preferred embodiment, the authenticating the message content, the authenticating the source and the sink of the message, and the authenticating the message operation time of the message body specifically include: obtaining a message theme, a user unified identifier, operation time and a message signature according to the message body; determining a consistency parameter of the message body, an integrity parameter of the user unified identifier and an importance level of the 5G message; and obtaining a message authentication value according to the consistency parameter, the integrity parameter, the importance level and the operation time, and if the message authentication value is lower than a preset threshold value, the verification is failed.
Specifically, the decrypted message body is verified, a consistency parameter a of the message body is determined according to the content of the message body, an integrity parameter u of the user uniform identifier is determined according to the user uniform identifier, an importance level E of the 5G message is determined according to the user uniform identifier, and a message authentication value is obtained according to the received consistency parameter a, the integrity parameter u, the importance level E and the operation time t of the message body according to an authentication value calculation rule. Further, a threshold value can be preset, and when the message authentication value is lower than the preset threshold value, it indicates that the message body is missing or wrong, and the verification fails. It should be noted that, those skilled in the art may determine the authentication value calculation rule and the preset threshold according to actual requirements, and the present invention is not limited thereto.
In a preferred embodiment, before the encrypted message is not transmitted to the message receiver, the message sender can withdraw the encrypted message according to preset conditions and correct the problems of sending errors and the like.
In a preferred embodiment, the 5G message storage and verification method may further include: the method comprises the steps of obtaining information of a message sender, information of a message receiver and 5G messages at regular time, monitoring the running states of the message sender and the message receiver according to the information of the message sender and the information of the message receiver, monitoring and counting the information of the message sender, the information of the message receiver and the 5G messages, and giving an alarm to a user when the information of the message sender, the information of the message receiver and the 5G messages are abnormal. The abnormality includes the abnormal operation state of the message sender and the message receiver, and also includes the abnormal conditions of the content and the sending frequency of the 5G message.
The 5G message storage and verification method described in this embodiment can be applied to at least the following two scenarios: 1. and 5G message communication and exchange are carried out among users. 2. The user utilizes the 5G message service provided by the enterprise platform to consult or transact business. The invention will be further illustrated by means of a specific example. As shown in fig. 6, in this specific example, the 5G message storage and verification method includes:
step 1: the method comprises the steps of carrying out data hierarchical storage on original 5G messages sent by users, automatically packaging a Bayesian algorithm, carrying out partition storage according to message types, and grading the importance level of the data at the moment, such as E { E1, E2 and E3 }. Go to Step 2.
Step 2: and 5G messages arrive at the message buffer queue and are sent after the message authentication processing, and the Step is carried out to Step 3.
Step 3: and forming and encrypting a session key SK for the 5G message, wherein the KDF is used for generating the session key SK to encrypt the message, and the 5G message relates to finance-related sensitive data, and the key is generated by adopting a counter triggering mode according to the limited session key encryption times. The highest level of security may be applied to sensitive data, setting the session key to one complete data transmission and one change. Go to Step 4.
Step 4: authenticating and encrypting a message signature, wherein the message body is { T, UUID, T, sig }, and T is a theme corresponding to the published data; the UUID is a unified identification of the user information, and the device can acquire the UUID through the fingerprint information prestored in the equipment and the information of the built-in SIM card. The UUID also serves as a public key of signature information of the verification device and a key parameter of rating; t is the timestamp and sig is the message signature. The message encryption adopts AES symmetric encryption, and the encryption key is a session key SK pre-generated by a publisher. Go to Step 5.
Step 5: and acquiring and recording the state of the message receiver for later judgment and use. Go to Step 6.
Step 6: and sending the encrypted message obtained by encapsulating the encryption processing through a 5G link of the operator, and turning to Step 7.
Step 7: the pre-received encrypted message is stored in the buffer queue of the message receiving party for verification, and the Step8 is carried out.
Step 8: and the message receiver decrypts the message main body and performs AES decryption on the encrypted message main body by using the decrypted SK to obtain the message main body. Go to Step 9.
Step 9: and judging the decrypted message body, namely judging the consistency a of the timestamp t and the message body, obtaining an authentication value according to the message importance E classified by the UUID of the message body and the data integrity u of the UUID of the user, and if the authentication value is lower than a preset threshold value W, alarming, and informing a message sender of message retransmission, and discarding the message, namely deleting the 5G message. Go to Step 10.
Step 10: if the state of the receiver before sending the message is recorded by the message monitoring module, whether the state of the message receiver is consistent with the previous state is judged, if not, the message processing module informs the sender to resend the message, and the message is discarded. Go to Step 11.
Step 11: if the encrypted message is consistent with the encrypted message, the encrypted message is successfully received by the message receiver, and the information communication is ended. Go to Step 12.
Step 12: monitoring and recording information of a message sender and information of a message receiver, simultaneously sampling and monitoring and counting the 5G messages, displaying the sending and receiving states of data, automatically generating a test report by a timer, and monitoring whether the message sender, the message receiver and the 5G messages are abnormal or not.
In summary, the invention provides a 5G message storage and verification method, which automatically stores 5G messages in a layered manner through a Bayesian algorithm and a Hash code, verifies the messages in real time by using message encryption and decryption, confirms whether a message sender is safe in attribute or not by using message authentication (message authentication), cleans and filters the messages, and retransmits or withdraws the messages if necessary. The method is suitable for a rich media message transmission scene, can greatly improve the data storage efficiency, and provides an environment for efficient, effective and safe transmission of messages.
Based on the same principle, the embodiment also discloses a 5G message storage and verification method. As shown in fig. 7, in this embodiment, the method includes:
s510: and receiving an encrypted message transmitted by a message sender through a 5G link, wherein the encrypted message is obtained by determining the message type of the 5G message sent by a user for the message sender, performing partition storage on the 5G message according to the message type, determining the importance level and encrypting the 5G message and a message body.
S520: and decrypting the encrypted message, verifying the message body obtained by decryption, and deleting the 5G message if the verification fails.
In a preferred embodiment, as shown in fig. 8, the method further includes S600:
s610: and if the verification is passed, acquiring the current state information of the message receiver.
S620: and matching and judging the current state information with the pre-acquired historical state information of the message receiver, and deleting the 5G message if the judgment is failed.
In a preferred embodiment, as shown in fig. 9, the method further includes S700:
s710: and after the 5G message is deleted, sending a resending request to the message sender so that the message sender resends the encrypted message.
S720: and receiving the encrypted message sent again by the message sender, decrypting the encrypted message, and verifying the message body obtained by decryption until the received encrypted message passes verification.
In a preferred embodiment, the step of S520 and verifying the message body obtained by decryption specifically includes:
s521: and performing message content authentication, message source and sink authentication and message operation time authentication on the message body.
In a preferred embodiment, as shown in fig. 10, the authenticating the message content, the authenticating the source and the sink of the message, and the authenticating the message operation time by the S521 for the message body may specifically include:
s5211: and obtaining a message subject, a user unified identification, operation time and a message signature according to the message body.
S5212: and determining the consistency parameter of the message body, the integrity parameter of the user uniform identification and the importance level of the 5G message.
S5213: and obtaining a message authentication value according to the consistency parameter, the integrity parameter, the importance level and the operation time, and if the message authentication value is lower than a preset threshold value, the verification is failed.
Because the principle of solving the problems by the method is similar to that of the method, the implementation of the method can be referred to the implementation of the method, and details are not repeated herein.
Based on the same principle, the embodiment also discloses a message sender device. As shown in fig. 11, in the present embodiment, the apparatus includes a message storage module 11, a message encryption module 12, and a message transmission module 13.
The message storage module 11 is configured to determine a message type of a 5G message sent by a user, perform partition storage on the 5G message according to the message type, and determine an importance level.
The message encryption module 12 is configured to encrypt the 5G message and the message body to obtain an encrypted message.
The message sending module 13 is configured to transmit the encrypted message to a message receiving party through a 5G link, so that the message receiving party decrypts the encrypted message, and verifies a message body obtained by decryption, and if the message body does not pass verification, deletes the 5G message.
Since the principle of the device for solving the problems is similar to the method, the implementation of the device can refer to the implementation of the method, and the detailed description is omitted here.
Based on the same principle, the embodiment also discloses a message receiver device. As shown in fig. 12, in this embodiment, the apparatus includes a message receiving module 21 and a message decrypting and verifying module 22.
The message receiving module 21 is configured to receive an encrypted message transmitted by a message sender through a 5G link, where the encrypted message is obtained by determining a message type of a 5G message sent by a user for the message sender, performing partition storage on the 5G message according to the message type, determining an importance level, and encrypting the 5G message and a message body.
The message decryption and verification module 22 is configured to decrypt the encrypted message, verify a message body obtained by decryption, and delete the 5G message if verification fails.
Since the principle of the device for solving the problems is similar to the method, the implementation of the device can refer to the implementation of the method, and the detailed description is omitted here.
Based on the same principle, the embodiment also discloses a 5G message storage and verification system. The system comprises a message sender and a message receiver.
The message sending party is used for determining the message type of a 5G message sent by a user, carrying out partition storage on the 5G message according to the message type, determining the importance level, encrypting the 5G message and a message body to obtain an encrypted message, and transmitting the encrypted message to a message receiving party through a 5G link;
and the message receiver is used for decrypting the encrypted message, verifying the message body obtained by decryption, and deleting the 5G message if the verification fails.
Since the principle of the system for solving the problem is similar to the above method, the implementation of the system can refer to the implementation of the method, and the detailed description is omitted here.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. A typical implementation device is a computer device, which may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
In a typical example, the computer device specifically comprises a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method performed by the client as described above when executing the program, or the processor implementing the method performed by the server as described above when executing the program.
Referring now to FIG. 13, shown is a schematic block diagram of a computer device 600 suitable for use in implementing embodiments of the present application.
As shown in fig. 13, the computer apparatus 600 includes a Central Processing Unit (CPU)601 which can perform various appropriate works and processes according to a program stored in a Read Only Memory (ROM)602 or a program loaded from a storage section 608 into a Random Access Memory (RAM)) 603. In the RAM603, various programs and data necessary for the operation of the system 600 are also stored. The CPU601, ROM602, and RAM603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
The following components are connected to the I/O interface 605: an input portion 606 including a keyboard, a mouse, and the like; an output section 607 including a Cathode Ray Tube (CRT), a liquid crystal feedback (LCD), and the like, and a speaker and the like; a storage section 608 including a hard disk and the like; and a communication section 609 including a network interface card such as a LAN card, a modem, or the like. The communication section 609 performs communication processing via a network such as the internet. The driver 610 is also connected to the I/O interface 606 as needed. A removable medium 611 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 610 as necessary, so that a computer program read out therefrom is mounted as necessary on the storage section 608.
In particular, according to an embodiment of the present invention, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the invention include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 609, and/or installed from the removable medium 611.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the units may be implemented in one or more software and/or hardware when implementing the present application.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (15)

1. A5G message storage and verification method is characterized by comprising the following steps:
determining the message type of a 5G message sent by a user, performing partition storage on the 5G message according to the message type and determining the importance level;
encrypting the 5G message and the message body to obtain an encrypted message;
and transmitting the encrypted message to a message receiver through a 5G link so that the message receiver decrypts the encrypted message, verifies the decrypted message body, and deletes the 5G message if the verification fails.
2. The 5G message storage and verification method according to claim 1, wherein the determining a message type of a 5G message sent by a received message sender and performing partition storage on the 5G message according to the message type specifically comprises:
determining the message type and the importance level of the 5G message according to the message type suffix;
and packaging the 5G message by a Bayesian algorithm according to the message type and the importance level, and then storing the packaged 5G message in a partitioned manner.
3. The 5G message storage and verification method of claim 2, further comprising:
and dynamically expanding and uniformly storing the bottom storage nodes for storing the 5G messages in the partitions by expanding hash codes.
4. The 5G message storage and verification method of claim 1, wherein the encrypting the 5G message and the message body to obtain an encrypted message specifically comprises:
forming a session key and encrypting the 5G message;
and encrypting a message body corresponding to the 5G message through the session key, wherein the message body comprises a message subject, a user uniform identifier, operation time and a message signature.
5. The 5G message storage and verification method of claim 1, further comprising the step of pre-forming the user uniform identity:
acquiring equipment information of the mobile equipment and acquiring biological characteristic information of a user through the mobile equipment;
transmitting the biological characteristic information to a mobile equipment server so that the mobile equipment server matches the biological characteristic information, and receiving prestored equipment information and prestored user information returned by the mobile equipment server if matching is successful;
acquiring user information from an SIM card of mobile equipment, verifying the equipment information and the user information of the mobile equipment according to the pre-stored equipment information and the pre-stored user information, and if the verification is passed, forming a user unified identifier according to the biological characteristic information and the user information.
6. A5G message storage and verification method is characterized by comprising the following steps:
receiving an encrypted message transmitted by a message sender through a 5G link, wherein the encrypted message is obtained by determining the message type of a 5G message sent by a user for the message sender, performing partition storage on the 5G message according to the message type, determining the importance level and encrypting the 5G message and a message body;
and decrypting the encrypted message, verifying the message body obtained by decryption, and deleting the 5G message if the verification fails.
7. The 5G message storage and verification method of claim 6, further comprising:
if the verification is passed, acquiring the current state information of the message receiver;
and matching and judging the current state information with the pre-acquired historical state information of the message receiver, and deleting the 5G message if the judgment is failed.
8. The 5G message storage and verification method of claim 6 or 7, further comprising:
after the 5G message is deleted, sending a resending request to the message sender so that the message sender resends the encrypted message;
and receiving the encrypted message sent again by the message sender, decrypting the encrypted message, and verifying the message body obtained by decryption until the received encrypted message passes verification.
9. The 5G message storage and verification method of claim 6, wherein the verifying the decrypted message body specifically comprises:
and performing message content authentication, message source and sink authentication and message operation time authentication on the message body.
10. The 5G message storage and verification method of claim 9, wherein the authenticating the message body for message content, source and sink authentication of messages, and message operation time specifically comprises:
obtaining a message theme, a user unified identifier, operation time and a message signature according to the message body;
determining a consistency parameter of the message body, an integrity parameter of the user unified identifier and an importance level of the 5G message;
and obtaining a message authentication value according to the consistency parameter, the integrity parameter, the importance level and the operation time, and if the message authentication value is lower than a preset threshold value, the verification is failed.
11. A message sender apparatus, comprising:
the message storage module is used for determining the message type of the 5G message sent by the user, carrying out partition storage on the 5G message according to the message type and determining the importance level;
the message encryption module is used for encrypting the 5G message and the message body to obtain an encrypted message;
and the message sending module is used for transmitting the encrypted message to a message receiver through a 5G link so that the message receiver can decrypt the encrypted message, and verify the decrypted message body, and if the encrypted message does not pass the verification, deleting the 5G message.
12. A message recipient apparatus, comprising:
the system comprises a message receiving module, a message sending module and a message sending module, wherein the message receiving module is used for receiving an encrypted message transmitted by a message sending party through a 5G link, the encrypted message is obtained by determining the message type of the 5G message sent by a user for the message sending party, carrying out partition storage on the 5G message according to the message type, determining the importance level and encrypting the 5G message and a message main body;
and the message decryption and verification module is used for decrypting the encrypted message, verifying the message body obtained by decryption, and deleting the 5G message if the verification fails.
13. A5G message storage and verification system is characterized by comprising a message sender and a message receiver;
the message sender is used for determining the message type of a 5G message sent by a user, carrying out partition storage on the 5G message according to the message type, determining the importance level, encrypting the 5G message and a message body to obtain an encrypted message, and transmitting the encrypted message to a message receiver through a 5G link;
and the message receiver is used for decrypting the encrypted message, verifying the message body obtained by decryption, and deleting the 5G message if the verification fails.
14. A computer device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor,
the processor, when executing the program, implements the method of any of claims 1-10.
15. A computer-readable medium, having stored thereon a computer program,
the program when executed by a processor implementing the method according to any one of claims 1-10.
CN202110659608.5A 2021-06-15 2021-06-15 5G message storage and verification method, device and system Pending CN113392281A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110659608.5A CN113392281A (en) 2021-06-15 2021-06-15 5G message storage and verification method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110659608.5A CN113392281A (en) 2021-06-15 2021-06-15 5G message storage and verification method, device and system

Publications (1)

Publication Number Publication Date
CN113392281A true CN113392281A (en) 2021-09-14

Family

ID=77621028

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110659608.5A Pending CN113392281A (en) 2021-06-15 2021-06-15 5G message storage and verification method, device and system

Country Status (1)

Country Link
CN (1) CN113392281A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107395560A (en) * 2017-06-05 2017-11-24 努比亚技术有限公司 Safety check and its initiation, management method, equipment, server and storage medium
CN108683712A (en) * 2018-04-25 2018-10-19 咪咕文化科技有限公司 Method and device for generating application program verification and verification key and storage medium
CN110225046A (en) * 2019-06-18 2019-09-10 北京大豪科技股份有限公司 Data transmission method, device, electronic equipment and storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107395560A (en) * 2017-06-05 2017-11-24 努比亚技术有限公司 Safety check and its initiation, management method, equipment, server and storage medium
CN108683712A (en) * 2018-04-25 2018-10-19 咪咕文化科技有限公司 Method and device for generating application program verification and verification key and storage medium
CN110225046A (en) * 2019-06-18 2019-09-10 北京大豪科技股份有限公司 Data transmission method, device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US20220014524A1 (en) Secure Communication Using Device-Identity Information Linked To Cloud-Based Certificates
CN107948736A (en) A kind of audio and video preservation of evidence method and system
CN106878016A (en) Data is activation, method of reseptance and device
CN109302369B (en) Data transmission method and device based on key verification
CN107612889B (en) Method for preventing user information leakage
US20050120203A1 (en) Methods, systems and computer program products for automatic rekeying in an authentication environment
KR20160135724A (en) Method for validating messages
CN111294203B (en) Information transmission method
US11303453B2 (en) Method for securing communication without management of states
CN111355684B (en) Internet of things data transmission method, device and system, electronic equipment and medium
CN104753674A (en) Application identity authentication method and device
CN111914291A (en) Message processing method, device, equipment and storage medium
CN112118245B (en) Key management method, system and equipment
CN108319857B (en) Trusted application locking and unlocking method and system
CN109729000B (en) Instant messaging method and device
CN115021932A (en) Authentication method for handshake process of TLCP protocol
CN109391473B (en) Electronic signature method, device and storage medium
CN114143117A (en) Data processing method and device
CN106161224B (en) Method for interchanging data, device and equipment
CN114142995B (en) Key security distribution method and device for block chain relay communication network
CN113472722A (en) Data transmission method, storage medium, electronic device and automatic ticket selling and checking system
CN116781292A (en) Data processing method, device, equipment and readable storage medium
CN112839328B (en) Close-contact data verification method, client, server and storage medium
CN116455572A (en) Data encryption method, device and equipment
CN113392281A (en) 5G message storage and verification method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination