CN114173294A - Non-peer-to-peer short message transmission method, system, equipment and computer storage medium - Google Patents

Non-peer-to-peer short message transmission method, system, equipment and computer storage medium Download PDF

Info

Publication number
CN114173294A
CN114173294A CN202111645698.9A CN202111645698A CN114173294A CN 114173294 A CN114173294 A CN 114173294A CN 202111645698 A CN202111645698 A CN 202111645698A CN 114173294 A CN114173294 A CN 114173294A
Authority
CN
China
Prior art keywords
short message
receiver
public key
target
identification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111645698.9A
Other languages
Chinese (zh)
Inventor
郭经宇
杨海涛
殷秀静
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yuweng Information Technology Co ltd
Original Assignee
Yuweng Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yuweng Information Technology Co ltd filed Critical Yuweng Information Technology Co ltd
Priority to CN202111645698.9A priority Critical patent/CN114173294A/en
Publication of CN114173294A publication Critical patent/CN114173294A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]

Abstract

The application discloses a method, a system, equipment and a computer storage medium for transmitting non-peer short messages, which are applied to a software client in a transmitting terminal to acquire a target short message to be transmitted; acquiring identification information of a receiver corresponding to the target short message; determining a user public key of a receiver, wherein the user public key of the receiver is generated based on the identification information of the receiver and a preset public key base; encrypting the target short message based on the user public key of the receiver to obtain a target encrypted short message; and transmitting the target encrypted short message to a receiving terminal of a receiving party. In the application, the software client in the sending terminal can encrypt the target short message based on the user public key of the receiver to obtain and transmit the target encrypted short message, so that the safety of short message transmission is ensured; in addition, the user public key of the receiver is generated based on the identification information of the receiver and the preset public key base, the whole public key generation process is simple and convenient, the safety is high, and the safety of short message transmission is further ensured.

Description

Non-peer-to-peer short message transmission method, system, equipment and computer storage medium
Technical Field
The present application relates to the field of data security technologies, and in particular, to a method, a system, a device, and a computer storage medium for peer-to-peer short message transmission.
Background
At present, in the process of transmitting short messages, a user has a problem that short message information is leaked due to misoperation, for example, the short message is sent to an incorrect receiver, or the short message information is randomly checked by other users, so that the short message transmission security of the user is low.
In summary, how to improve the security of short message transmission is a problem to be solved urgently by those skilled in the art.
Disclosure of Invention
The application aims to provide an unequal short message transmission method, which can solve the technical problem of improving the safety of short message transmission to a certain extent. The application also provides a non peer-to-peer short message transmission system, equipment and a computer readable storage medium.
In order to achieve the above purpose, the present application provides the following technical solutions:
a transmission method of non-peer-to-peer short messages is applied to a software client in a sending terminal and comprises the following steps:
acquiring a target short message to be sent;
acquiring identification information of a receiver corresponding to the target short message;
determining a user public key of the receiver, wherein the user public key of the receiver is generated based on the identification information of the receiver and a preset public key base;
encrypting the target short message based on the user public key of the receiver to obtain a target encrypted short message;
and transmitting the target encrypted short message to a receiving terminal of the receiving party.
Preferably, the determining the user public key of the receiving party includes:
and generating the user public key of the receiver based on the preset public key base and the identification information of the receiver, which are acquired from the software server in advance.
Preferably, before generating the user public key of the receiver based on the preset public key base and the identification information of the receiver, which are acquired from the software server in advance, the method further includes:
judging whether the identification information of the software server and the preset public key base are stored or not;
and if the identification information of the software server and the preset public key base are not stored, registering an account with the software server, and storing the identification information of the software server and the preset public key base after successful registration and login.
Preferably, the preset public key base includes 8 × 8 public key generating matrices.
A transmission method of non-peer-to-peer short messages is applied to a software client in a receiving terminal and comprises the following steps:
acquiring a target encrypted short message;
determining a user private key of a receiving party corresponding to the receiving terminal, wherein the user private key of the receiving party is generated based on the identification information of the receiving party and a preset private key base;
decrypting the target encrypted short message based on the user private key of the receiver to obtain a target short message;
the target encrypted short message comprises a target encrypted short message obtained by encrypting the target short message based on a user public key of the receiver; and the user public key of the receiver is generated based on the identification information of the receiver and a preset public key base.
Preferably, the determining a user private key of a receiving party corresponding to the receiving terminal includes:
receiving an input target secret password;
generating a target symmetric key based on the target key password through a key derivation algorithm;
and decrypting the pre-encrypted user private key of the receiver based on the target symmetric key to obtain the user private key of the receiver.
Preferably, before determining the user private key of the receiving party corresponding to the receiving terminal, the method further includes:
judging whether the identification information of the software server is stored or not;
if the identification information of the software server is not stored, carrying out account registration on the software server, and storing the identification information of the software server after successful registration and login;
sending the identification information of the receiver to the software server;
and receiving and storing a user private key of the receiving party, which is sent by the software server and generated based on the identification information of the receiving party.
A non-peer-to-peer short message transmission system is applied to a software client in a sending terminal and comprises the following components:
the first acquisition module is used for acquiring a target short message to be sent;
the second acquisition module is used for acquiring the identification information of the receiver corresponding to the target short message;
the first determining module is used for determining a user public key of the receiver, wherein the user public key of the receiver is generated based on the identification information of the receiver and a preset public key base;
the first encryption module is used for encrypting the target short message based on the user public key of the receiver to obtain a target encrypted short message;
and the first transmission module is used for transmitting the target encrypted short message to a receiving terminal of the receiving party.
A non peer-to-peer short message transmission device comprises:
a memory for storing a computer program;
and a processor, configured to implement the steps of any of the above methods for transmitting an unequal short message when executing the computer program.
A computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, implements the steps of the method for non peer-to-peer short message transmission as described above.
The application provides a non-peer-to-peer short message transmission method, which is applied to a software client in a sending terminal to obtain a target short message to be sent; acquiring identification information of a receiver corresponding to the target short message; determining a user public key of a receiver, wherein the user public key of the receiver is generated based on the identification information of the receiver and a preset public key base; encrypting the target short message based on the user public key of the receiver to obtain a target encrypted short message; and transmitting the target encrypted short message to a receiving terminal of a receiving party. In the application, the software client in the sending terminal can encrypt the target short message based on the user public key of the receiver to obtain and transmit the target encrypted short message, so that the safety of short message transmission is ensured; in addition, the user public key of the receiver is generated based on the identification information of the receiver and the preset public key base, the whole public key generation process is simple and convenient, the safety is high, and the safety of short message transmission is further ensured. The non peer-to-peer short message transmission system, the non peer-to-peer short message transmission equipment and the computer readable storage medium solve the corresponding technical problems.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a first flowchart of a method for peer-to-peer message transmission according to an embodiment of the present disclosure;
fig. 2 is a second flowchart of a method for peer-to-peer message transmission according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of an unequal short message transmission system according to an embodiment of the present application;
fig. 4 is another schematic structural diagram of an unequal short message transmission system according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of an unequal short message transmission device according to an embodiment of the present application;
fig. 6 is another schematic structural diagram of an unequal short message transmission device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, fig. 1 is a first flowchart of a method for peer-to-peer short message transmission according to an embodiment of the present disclosure.
The non-peer-to-peer short message transmission method provided by the embodiment of the application is applied to a software client in a sending terminal, and can comprise the following steps:
step S101: and acquiring a target short message to be sent.
In practical application, a software client in the sending terminal may first obtain a target short message to be sent, specifically, the short message information input by the user may be used as the target short message under the operation of the user, and the type and content of the target short message may be determined according to actual needs. In addition, the terminal may be a mobile phone of the user or the like.
Step S102: and acquiring the identification information of the receiver corresponding to the target short message.
In practical application, after acquiring a target short message to be sent, a software client in a sending terminal may acquire identification information of a receiver corresponding to the target short message, for example, after a user clicks on storage information of the receiver stored in the sending terminal, identification information of the receiver and the like may be determined according to the storage information of the receiver clicked by the user, so as to encrypt the target short message based on the identification information of the receiver in the following.
It should be noted that the type of the identification information of the receiving party may be determined according to actual needs, for example, the identification information of the receiving party may be a mobile phone number of the receiving party, a user ID of the receiving party, and the like, and the application is not specifically limited herein.
Step S103: and determining a user public key of the receiver, wherein the user public key of the receiver is generated based on the identification information of the receiver and a preset public key base.
In practical application, after acquiring the identification information of the receiver corresponding to the target short message, the software client in the sending terminal can determine the user public key of the receiver, and in the application, the user public key of the receiver is generated based on the identification information of the receiver and a preset public key base.
It should be noted that, in the process of generating the user public key of the receiver based on the identification information of the receiver and the preset public key base, the identification information of the receiver and the user public key of the receiver generated by the preset public key base may be called by combining a public key identification algorithm, and the like; in addition, the user public key of the receiver is generated based on the identification information of the receiver, so that the user public key of the receiver only belongs to the receiver, and the uniqueness of the user public key of the receiver is ensured.
Step S104: and encrypting the target short message based on the user public key of the receiver to obtain the target encrypted short message.
Step S105: and transmitting the target encrypted short message to a receiving terminal of a receiving party.
In practical application, after determining the user public key of the receiver, the software client in the sending terminal can encrypt the target short message based on the user public key of the receiver to obtain the target encrypted short message, and transmit the target encrypted short message to the receiving terminal of the receiver.
It should be noted that, after the receiving terminal of the receiving party receives the target encrypted short message, the software client in the receiving terminal needs to determine the user private key of the receiving party corresponding to the receiving terminal after detecting that the receiving terminal receives the encrypted short message, and the user private key of the receiving party is generated based on the identification information of the receiving party and the preset private key base; and the target encrypted short message is decrypted based on the user private key of the receiver to obtain the target short message, and then the target short message can be directly displayed, or the target short message can be displayed by means of the short message function of the terminal. That is, in the present application, the user keys (the user private key and the user public key) are generated by the corresponding user identification information and the key bases (the public key base and the private key base). In addition, in a specific embodiment, the key base in the present application may include an 8 × 8 key generation matrix, such as a public key generation matrix with a public key base of 8 × 8, and the like, so that the user key may be generated quickly by using the 8 × 8 key generation matrix.
The application provides a non-peer-to-peer short message transmission method, which is applied to a software client in a sending terminal to obtain a target short message to be sent; acquiring identification information of a receiver corresponding to the target short message; determining a user public key of a receiver, wherein the user public key of the receiver is generated based on the identification information of the receiver and a preset public key base; encrypting the target short message based on the user public key of the receiver to obtain a target encrypted short message; and transmitting the target encrypted short message to a receiving terminal of a receiving party. In the application, the software client in the sending terminal can encrypt the target short message based on the user public key of the receiver to obtain and transmit the target encrypted short message, so that the safety of short message transmission is ensured; in addition, the user public key of the receiver is generated based on the identification information of the receiver and the preset public key base, the whole public key generation process is simple and convenient, the safety is high, and the safety of short message transmission is further ensured.
In the method for transmitting the non-peer short message, the software client in the sending terminal can directly generate the user public key of the receiving party based on the preset public key base and the identification information of the receiving party, which are acquired from the software server in advance, in the process of determining the user public key of the receiving party. That is, in the present application, the preset public key base may be provided by the software server, and correspondingly, the preset private key base may also be provided by the software server.
In a specific application scenario, before a software client in a sending terminal generates a user public key of a receiver based on a preset public key base and identification information of the receiver acquired from a software server in advance, whether the identification information of the software server and the preset public key base are stored can be judged; and if the identification information and the preset public key base of the software server are not stored, registering an account with the software server, and storing the identification information and the preset public key base of the software server after successful registration and login.
That is, in this embodiment, since the software client in the sending terminal needs to obtain the preset public key base from the software server, the software client in the sending terminal needs to perform information interaction with the software server, and in this process, the software client in the sending terminal needs to perform registration, login, and the like on the software server; the user public key of the receiver is generated by the identification information of the receiver and a preset public key base, so that the identification information of the receiver can be directly generated only after the identification information of the receiver is acquired, and in the process, a receiving terminal is not required to install a software client and carry out information interaction with a software server, so that the software client of the sender and the software client of the receiver are not equivalent. However, when the receiving terminal needs to decrypt the target encrypted short message, the receiving terminal needs to obtain the user private key of the corresponding receiving party, and the user private key of the receiving party is provided by the software server, so that the software client of the receiving terminal needs to perform information interaction with the software server in the process of decrypting the target encrypted short message, for example, the software client performs registration and login on the software server, and obtains the user private key generated by the software server for itself, and the like.
It should be understood that, in this embodiment, the software client generates the corresponding user public key based on the public key base acquired from the software server, and in some specific application scenarios, the software server may also directly generate the user public key and send the user public key to the software client for use, and the like, and the present application is not limited specifically herein. It should be noted that, for the user private key, in order to avoid security risk caused by leakage of the private key base, the software client may send the user identifier to the software server, and then the software server generates a corresponding user private key based on the user identifier and the private key base, and finally the software server sends the generated user private key to the software client for use, and so on.
Referring to fig. 2, fig. 2 is a second flowchart of a method for peer-to-peer message transmission according to an embodiment of the present disclosure.
The non-peer-to-peer short message transmission method provided by the embodiment of the application is applied to a software client in a receiving terminal, and can comprise the following steps:
step S201: and acquiring the target encrypted short message.
Step S202: and determining a user private key of a receiving party corresponding to the receiving terminal, wherein the user private key of the receiving party is generated based on the identification private key of the receiving party and the expanded private key of the receiving party, and the user private key of the receiving party is generated based on the identification information of the receiving party and a preset private key base.
In a specific application scenario, after acquiring a user private key of a receiving party, for example, after receiving the user private key of the receiving party generated by a software server, a software client in a receiving terminal may encrypt and store the user private key of the receiving party in advance, for example, an input target secret password may be received first, a key derivation algorithm is used to generate a target symmetric key based on the target secret password, the user private key of the receiving party is decrypted based on the target symmetric key to obtain and store the encrypted user private key of the receiving party, and accordingly, the input target secret password may be received in a process of determining the user private key of the receiving party corresponding to the receiving terminal; generating a target symmetric key based on the target key password through a key derivation algorithm; and decrypting the pre-encrypted user private key of the receiver based on the target symmetric key to obtain the user private key of the receiver. It is understood that when the secret password input by the user in the decryption stage is different from the secret password input in the encryption stage, the generated target symmetric key is different, so that the encrypted user private key of the receiver cannot be decrypted to obtain the user private key of the receiver, that is, the security of the user private key can be protected by means of the secret password.
In addition, in the process that the software client acquires the user private key from the software server, in order to protect the security of the user private key, the software client can generate a first symmetric key, encrypt the first symmetric key by using a system public key of the software server to obtain a first encryption key, and transmit the first encryption key to the software server; after receiving the first encryption key, the software server decrypts the first encryption key by using a system private key of the software server to obtain a first symmetric key, then encrypts a generated user private key by using the first symmetric key to obtain a private key encryption result and transmits the private key encryption result to the software client; the software client side decrypts the encrypted result of the private key by using the first symmetric key to obtain a corresponding user private key, so that the user private key is safely received from the software server.
In a specific application scenario, under the condition that a software client in a receiving terminal needs to acquire a user private key of a receiving party from a software server, the software client needs to establish connection with the software server, so that whether identification information of the software server is stored can be judged before determining the user private key of the receiving party corresponding to the receiving terminal; if the identification information of the software server is not stored, account registration is carried out on the software server, and after the registration is successful and login is carried out, the identification information of the software server is stored; sending the identification information of the receiver to a software server; and receiving and storing a user private key of the receiving party, which is generated based on the identification information of the receiving party and sent by the software server.
Step S203: and decrypting the target encrypted short message based on the user private key of the receiver to obtain the target short message.
For a corresponding description of the short message transmission method applied to the software client in the receiving terminal provided in this embodiment, reference may be made to the above embodiments, which are not described herein again.
Referring to fig. 3, fig. 3 is a schematic structural diagram of a non peer-to-peer short message transmission system according to an embodiment of the present disclosure.
The non-peer short message transmission system provided by the embodiment of the application is applied to a software client in a sending terminal, and can include:
the first obtaining module 11 is configured to obtain a target short message to be sent;
a second obtaining module 12, configured to obtain identification information of a receiver corresponding to the target short message;
the first determining module 13 is configured to determine a user public key of the receiving party, where the user public key of the receiving party is generated based on the identification information of the receiving party and a preset public key base;
the first encryption module 14 is configured to encrypt the target short message based on a user public key of the receiving party to obtain a target encrypted short message;
and the first transmission module 15 is used for transmitting the target encrypted short message to a receiving terminal of a receiving party.
The non-peer short message transmission system provided by the embodiment of the application is applied to a software client in a sending terminal, and the first determining module may include:
and the first generating unit is used for generating the user public key of the receiver based on the preset public key base and the identification information of the receiver, which are acquired from the software server in advance.
The non-peer short message transmission system provided by the embodiment of the application is applied to a software client in a sending terminal, and may further include:
the first judging unit is used for judging whether the identification information of the software server and the preset public key base are stored before the first generating unit generates the user public key of the receiver based on the preset public key base and the identification information of the receiver which are acquired from the software server in advance; and if the identification information and the preset public key base of the software server are not stored, registering an account with the software server, and storing the identification information and the preset public key base of the software server after successful registration and login.
The non-peer short message transmission system provided by the embodiment of the application is applied to a software client in a sending terminal, and the preset public key base comprises a public key generating matrix of 8 x 8.
Referring to fig. 4, fig. 4 is another schematic structural diagram of a non peer-to-peer short message transmission system according to an embodiment of the present disclosure.
The non-peer short message transmission system provided by the embodiment of the application is applied to a software client in a receiving terminal, and can include:
a third obtaining module 21, configured to obtain a target encrypted short message;
the second determining module 22 is configured to determine a user private key of a receiving party corresponding to the receiving terminal, where the user private key of the receiving party is generated based on an identification private key of the receiving party and an extended private key of the receiving party, and the user private key of the receiving party is generated based on identification information of the receiving party and a preset private key base;
the first decryption module 23 is configured to decrypt the target encrypted short message based on a private key of the user of the receiving party, so as to obtain the target short message.
The non-peer short message transmission system provided by the embodiment of the application is applied to a software client in a receiving terminal, and the second determining module may include:
the first receiving unit is used for receiving an input target secret password;
a second generating unit configured to generate a target symmetric key based on the target key password by a key derivation algorithm;
and the first decryption unit is used for decrypting the pre-encrypted user private key of the receiver based on the target symmetric key to obtain the user private key of the receiver.
The non-peer short message transmission system provided by the embodiment of the application is applied to a software client in a receiving terminal, and may further include:
the first judgment module is used for judging whether the identification information of the software server is stored before the second determination module determines the user private key of the receiver corresponding to the receiving terminal; if the identification information of the software server is not stored, account registration is carried out on the software server, and after the registration is successful and login is carried out, the identification information of the software server is stored;
the first sending module is used for sending the identification information of the receiver to the software server;
and the first receiving module is used for receiving and storing a user private key of the receiving party, which is generated based on the identification information of the receiving party and sent by the software server.
The application also provides a non peer-to-peer short message transmission device and a computer readable storage medium, which have the corresponding effects of the non peer-to-peer short message transmission method provided by the embodiment of the application. Referring to fig. 5, fig. 5 is a schematic structural diagram of a non peer-to-peer short message transmission device according to an embodiment of the present disclosure.
The non-peer short message transmission device provided by the embodiment of the application comprises a memory 201 and a processor 202, wherein a computer program is stored in the memory 201, and the processor 202 implements the following steps when executing the computer program:
acquiring a target short message to be sent;
acquiring identification information of a receiver corresponding to the target short message;
determining a user public key of a receiver, wherein the user public key of the receiver is generated based on the identification information of the receiver and a preset public key base;
encrypting the target short message based on the user public key of the receiver to obtain a target encrypted short message;
and transmitting the target encrypted short message to a receiving terminal of a receiving party.
The non-peer short message transmission device provided by the embodiment of the application comprises a memory 201 and a processor 202, wherein a computer program is stored in the memory 201, and the processor 202 implements the following steps when executing the computer program: and generating a user public key of the receiver based on a preset public key base and identification information of the receiver, which are acquired from the software server in advance.
The non-peer short message transmission device provided by the embodiment of the application comprises a memory 201 and a processor 202, wherein a computer program is stored in the memory 201, and the processor 202 implements the following steps when executing the computer program: before generating a user public key of a receiver based on a preset public key base and identification information of the receiver acquired from a software server in advance, judging whether the identification information and the preset public key base of the software server are stored or not; and if the identification information and the preset public key base of the software server are not stored, registering an account with the software server, and storing the identification information and the preset public key base of the software server after successful registration and login.
The non-peer short message transmission device provided by the embodiment of the application comprises a memory 201 and a processor 202, wherein a computer program is stored in the memory 201, and the processor 202 implements the following steps when executing the computer program: the preset public key base comprises 8 × 8 public key generating matrixes.
The non-peer short message transmission device provided by the embodiment of the application comprises a memory 201 and a processor 202, wherein a computer program is stored in the memory 201, and the processor 202 implements the following steps when executing the computer program:
acquiring a target encrypted short message;
determining a user private key of a receiving party corresponding to the receiving terminal, wherein the user private key of the receiving party is generated based on an identification private key of the receiving party and an expansion private key of the receiving party, and the user private key of the receiving party is generated based on identification information of the receiving party and a preset private key base;
decrypting the target encrypted short message based on the user private key of the receiver to obtain a target short message;
the target encrypted short message comprises a target encrypted short message obtained by encrypting the target short message based on a user public key of a receiver; and the user public key of the receiver is generated based on the identification information of the receiver and a preset public key base.
The non-peer short message transmission device provided by the embodiment of the application comprises a memory 201 and a processor 202, wherein a computer program is stored in the memory 201, and the processor 202 implements the following steps when executing the computer program: receiving an input target secret password; generating a target symmetric key based on the target key password through a key derivation algorithm; and decrypting the pre-encrypted user private key of the receiver based on the target symmetric key to obtain the user private key of the receiver.
The non-peer short message transmission device provided by the embodiment of the application comprises a memory 201 and a processor 202, wherein a computer program is stored in the memory 201, and the processor 202 implements the following steps when executing the computer program: before determining a user private key of a receiving party corresponding to a receiving terminal, judging whether identification information of a software server is stored or not; if the identification information of the software server is not stored, account registration is carried out on the software server, and after the registration is successful and login is carried out, the identification information of the software server is stored; sending the identification information of the receiver to a software server; and receiving and storing a user private key of the receiving party, which is generated based on the identification information of the receiving party and sent by the software server.
Referring to fig. 6, another non peer-to-peer short message transmission device provided in the embodiment of the present application may further include: an input port 203 connected to the processor 202, for transmitting externally input commands to the processor 202; a display unit 204 connected to the processor 202, for displaying the processing result of the processor 202 to the outside; and the communication module 205 is connected to the processor 202 and is configured to implement communication between the non peer-to-peer short message transmission device and the outside. The display unit 204 may be a display panel, a laser scanning display, or the like; the communication method adopted by the communication module 205 includes, but is not limited to, mobile high definition link technology (HML), Universal Serial Bus (USB), High Definition Multimedia Interface (HDMI), and wireless connection: wireless fidelity technology (WiFi), bluetooth communication technology, bluetooth low energy communication technology, ieee802.11s based communication technology.
A computer-readable storage medium is provided in an embodiment of the present application, in which a computer program is stored, and when the computer program is executed by a processor, the computer program implements the following steps:
acquiring a target short message to be sent;
acquiring identification information of a receiver corresponding to the target short message;
determining a user public key of a receiver, wherein the user public key of the receiver is generated based on the identification information of the receiver and a preset public key base;
encrypting the target short message based on the user public key of the receiver to obtain a target encrypted short message;
and transmitting the target encrypted short message to a receiving terminal of a receiving party.
A computer-readable storage medium is provided in an embodiment of the present application, in which a computer program is stored, and when the computer program is executed by a processor, the computer program implements the following steps: and generating a user public key of the receiver based on a preset public key base and identification information of the receiver, which are acquired from the software server in advance.
A computer-readable storage medium is provided in an embodiment of the present application, in which a computer program is stored, and when the computer program is executed by a processor, the computer program implements the following steps: before generating a user public key of a receiver based on a preset public key base and identification information of the receiver acquired from a software server in advance, judging whether the identification information and the preset public key base of the software server are stored or not; and if the identification information and the preset public key base of the software server are not stored, registering an account with the software server, and storing the identification information and the preset public key base of the software server after successful registration and login.
A computer-readable storage medium is provided in an embodiment of the present application, in which a computer program is stored, and when the computer program is executed by a processor, the computer program implements the following steps: the preset public key base comprises 8 × 8 public key generating matrixes.
A computer-readable storage medium is provided in an embodiment of the present application, in which a computer program is stored, and when the computer program is executed by a processor, the computer program implements the following steps:
acquiring a target encrypted short message;
determining a user private key of a receiving party corresponding to the receiving terminal, wherein the user private key of the receiving party is generated based on an identification private key of the receiving party and an expansion private key of the receiving party, and the user private key of the receiving party is generated based on identification information of the receiving party and a preset private key base;
decrypting the target encrypted short message based on the user private key of the receiver to obtain a target short message;
the target encrypted short message comprises a target encrypted short message obtained by encrypting the target short message based on a user public key of a receiver; and the user public key of the receiver is generated based on the identification information of the receiver and a preset public key base.
A computer-readable storage medium is provided in an embodiment of the present application, in which a computer program is stored, and when the computer program is executed by a processor, the computer program implements the following steps: receiving an input target secret password; generating a target symmetric key based on the target key password through a key derivation algorithm; and decrypting the pre-encrypted user private key of the receiver based on the target symmetric key to obtain the user private key of the receiver.
A computer-readable storage medium is provided in an embodiment of the present application, in which a computer program is stored, and when the computer program is executed by a processor, the computer program implements the following steps: before determining a user private key of a receiving party corresponding to a receiving terminal, judging whether identification information of a software server is stored or not; if the identification information of the software server is not stored, account registration is carried out on the software server, and after the registration is successful and login is carried out, the identification information of the software server is stored; sending the identification information of the receiver to a software server; and receiving and storing a user private key of the receiving party, which is generated based on the identification information of the receiving party and sent by the software server.
The computer-readable storage media to which this application relates include Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage media known in the art.
For a description of a relevant part in the system, the device and the computer-readable storage medium for transmitting a non peer-to-peer short message provided in the embodiment of the present application, reference is made to detailed descriptions of a corresponding part in the method for transmitting a non peer-to-peer short message provided in the embodiment of the present application, and details are not repeated herein. In addition, parts of the above technical solutions provided in the embodiments of the present application, which are consistent with the implementation principles of corresponding technical solutions in the prior art, are not described in detail so as to avoid redundant description.
It is further noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A transmission method of non-peer-to-peer short messages is characterized in that the method is applied to a software client in a sending terminal and comprises the following steps:
acquiring a target short message to be sent;
acquiring identification information of a receiver corresponding to the target short message;
determining a user public key of the receiver, wherein the user public key of the receiver is generated based on the identification information of the receiver and a preset public key base;
encrypting the target short message based on the user public key of the receiver to obtain a target encrypted short message;
and transmitting the target encrypted short message to a receiving terminal of the receiving party.
2. The method of claim 1, wherein determining the public key of the recipient comprises:
and generating the user public key of the receiver based on the preset public key base and the identification information of the receiver, which are acquired from the software server in advance.
3. The method according to claim 2, wherein before generating the user public key of the receiving party based on the preset public key base and the identification information of the receiving party, which are obtained from the software server in advance, the method further comprises:
judging whether the identification information of the software server and the preset public key base are stored or not;
and if the identification information of the software server and the preset public key base are not stored, registering an account with the software server, and storing the identification information of the software server and the preset public key base after successful registration and login.
4. The method of claim 1, wherein the predetermined public key base comprises an 8 x 8 public key generator matrix.
5. A transmission method of non-peer-to-peer short messages is characterized in that the method is applied to a software client in a receiving terminal and comprises the following steps:
acquiring a target encrypted short message;
determining a user private key of a receiving party corresponding to the receiving terminal, wherein the user private key of the receiving party is generated based on the identification information of the receiving party and a preset private key base;
decrypting the target encrypted short message based on the user private key of the receiver to obtain a target short message;
the target encrypted short message comprises a target encrypted short message obtained by encrypting the target short message based on a user public key of the receiver; and the user public key of the receiver is generated based on the identification information of the receiver and a preset public key base.
6. The method of claim 5, wherein the determining a user private key of a receiving party corresponding to the receiving terminal comprises:
receiving an input target secret password;
generating a target symmetric key based on the target key password through a key derivation algorithm;
and decrypting the pre-encrypted user private key of the receiver based on the target symmetric key to obtain the user private key of the receiver.
7. The method of claim 6, wherein before determining the user private key of the receiving party corresponding to the receiving terminal, the method further comprises:
judging whether the identification information of the software server is stored or not;
if the identification information of the software server is not stored, carrying out account registration on the software server, and storing the identification information of the software server after successful registration and login;
sending the identification information of the receiver to the software server;
and receiving and storing a user private key of the receiving party, which is sent by the software server and generated based on the identification information of the receiving party.
8. A non-peer-to-peer short message transmission system is characterized in that the system is applied to a software client in a sending terminal and comprises the following components:
the first acquisition module is used for acquiring a target short message to be sent;
the second acquisition module is used for acquiring the identification information of the receiver corresponding to the target short message;
the first determining module is used for determining a user public key of the receiver, wherein the user public key of the receiver is generated based on the identification information of the receiver and a preset public key base;
the first encryption module is used for encrypting the target short message based on the user public key of the receiver to obtain a target encrypted short message;
and the first transmission module is used for transmitting the target encrypted short message to a receiving terminal of the receiving party.
9. A non peer-to-peer short message transmission device is characterized by comprising:
a memory for storing a computer program;
a processor for implementing the steps of the method for transmitting a non peer-to-peer short message according to any claim 1 to 7 when executing the computer program.
10. A computer-readable storage medium, in which a computer program is stored, and the computer program, when executed by a processor, implements the steps of the method for transmitting a non peer-to-peer short message according to any one of claims 1 to 7.
CN202111645698.9A 2021-12-29 2021-12-29 Non-peer-to-peer short message transmission method, system, equipment and computer storage medium Pending CN114173294A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111645698.9A CN114173294A (en) 2021-12-29 2021-12-29 Non-peer-to-peer short message transmission method, system, equipment and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111645698.9A CN114173294A (en) 2021-12-29 2021-12-29 Non-peer-to-peer short message transmission method, system, equipment and computer storage medium

Publications (1)

Publication Number Publication Date
CN114173294A true CN114173294A (en) 2022-03-11

Family

ID=80488587

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111645698.9A Pending CN114173294A (en) 2021-12-29 2021-12-29 Non-peer-to-peer short message transmission method, system, equipment and computer storage medium

Country Status (1)

Country Link
CN (1) CN114173294A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115277053A (en) * 2022-06-08 2022-11-01 深圳蜂鸟创新科技服务有限公司 Data processing method and system based on SaaS and Pass platform

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101616142A (en) * 2008-06-24 2009-12-30 香港城市大学 Realize the method and system of information encryption transmission
CN105450395A (en) * 2015-12-30 2016-03-30 中科创达软件股份有限公司 Information encryption and decryption processing method and system
CN108513272A (en) * 2018-07-04 2018-09-07 北京奇安信科技有限公司 Method for processing short messages and device
CN108846296A (en) * 2018-07-12 2018-11-20 深圳市雷赛信息科技有限公司 Data encryption method and device, computer equipment and readable storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101616142A (en) * 2008-06-24 2009-12-30 香港城市大学 Realize the method and system of information encryption transmission
CN105450395A (en) * 2015-12-30 2016-03-30 中科创达软件股份有限公司 Information encryption and decryption processing method and system
CN108513272A (en) * 2018-07-04 2018-09-07 北京奇安信科技有限公司 Method for processing short messages and device
CN108846296A (en) * 2018-07-12 2018-11-20 深圳市雷赛信息科技有限公司 Data encryption method and device, computer equipment and readable storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115277053A (en) * 2022-06-08 2022-11-01 深圳蜂鸟创新科技服务有限公司 Data processing method and system based on SaaS and Pass platform
CN115277053B (en) * 2022-06-08 2024-04-23 深圳蜂鸟创新科技服务有限公司 Data processing method and system based on SaaS and Pass platform

Similar Documents

Publication Publication Date Title
CN109150897B (en) End-to-end communication encryption method and device
EP3537652B1 (en) Method for securely controlling smart home appliance and terminal device
CN113346998B (en) Key updating and file sharing method, device, equipment and computer storage medium
CN112702318A (en) Communication encryption method, decryption method, client and server
CN113067823B (en) Mail user identity authentication and key distribution method, system, device and medium
CN110166489B (en) Data transmission method, system, equipment and computer medium in Internet of things
CN109684129B (en) Data backup recovery method, storage medium, encryption machine, client and server
US20180083935A1 (en) Method and system for secure sms communications
CN104836784A (en) Information processing method, client, and server
CN103701596A (en) Document access method, system and equipment and document access request response method, system and equipment
CN108667784B (en) System and method for protecting internet identity card verification information
CN114499837B (en) Message leakage prevention method, device, system and equipment
JP2020513169A (en) Data encryption method and system using device authentication key
CN114173294A (en) Non-peer-to-peer short message transmission method, system, equipment and computer storage medium
CN114297597B (en) Account management method, system, equipment and computer readable storage medium
CN117041956A (en) Communication authentication method, device, computer equipment and storage medium
CN114785527B (en) Data transmission method, device, equipment and storage medium
CN114222260B (en) Peer-to-peer short message transmission method, system, equipment and computer storage medium
CN104363584B (en) A kind of method, apparatus and terminal of short message Encrypt and Decrypt
CN109787955B (en) Information transmission method, device and storage medium
CN112637140A (en) Password transmission method, terminal, server and readable storage medium
CN114258013A (en) Data encryption method, device and storage medium
CN114338173B (en) Account registration method, system, equipment and computer readable storage medium
CN115119150B (en) Short message encryption and decryption method, device, equipment and storage medium
CN102404119B (en) The method to set up of cryptographic key factors of dynamic tokens, dynamic token and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20220311

RJ01 Rejection of invention patent application after publication