CN114599032B - Short message transmission method, device, equipment and medium based on salt value encryption - Google Patents

Short message transmission method, device, equipment and medium based on salt value encryption Download PDF

Info

Publication number
CN114599032B
CN114599032B CN202210255011.9A CN202210255011A CN114599032B CN 114599032 B CN114599032 B CN 114599032B CN 202210255011 A CN202210255011 A CN 202210255011A CN 114599032 B CN114599032 B CN 114599032B
Authority
CN
China
Prior art keywords
salt value
short message
salt
identifier
effective
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210255011.9A
Other languages
Chinese (zh)
Other versions
CN114599032A (en
Inventor
范琼鸿
周贝
吴大衡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN202210255011.9A priority Critical patent/CN114599032B/en
Publication of CN114599032A publication Critical patent/CN114599032A/en
Application granted granted Critical
Publication of CN114599032B publication Critical patent/CN114599032B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/61Time-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application relates to the technical field of data security encryption, and provides a short message transmission method and device based on salt value encryption, wherein the method comprises the following steps: the method comprises the steps that a short message service end encrypts a short message to be sent by using an effective salt value, wherein effective salt value information comprises an effective salt value and a salt value identifier, and the effective salt value is effective in a preset effective period; the short message service end sends the customer communication identification, the encrypted short message and the salt value identification to a short message service provider; and the short message service provider acquires the salt value for decrypting the encrypted short message through the salt value identifier to obtain the short message content. According to the scheme of the application, as the salt value has the effective period, once the salt value exceeds the effective period, the salt value is invalid and cannot be used for encryption, so that the security of information encryption is increased, the difficulty of capturing packets of sensitive information of a client in the link transmission process is improved, and as a timing refreshing mechanism of the salt value exists, once the information is decrypted in time, the decryption becomes difficult, and the security of private data of the client is protected.

Description

Short message transmission method, device, equipment and medium based on salt value encryption
Technical Field
The present application relates to the field of data security encryption technology, and in particular, to a method and apparatus for transmitting a short message based on salt value encryption, an electronic device, and a computer readable storage medium.
Background
When an enterprise sms server provides sms for a client, the enterprise sms server needs to be intermodulation with an interface of an external sms service provider to transmit sms contents, where the sms contents often carry some sensitive information, for example: and when the information is transmitted in https mode, the information is easily acquired by capturing the packet, so that the privacy of the client is revealed, and the security of the private data of the client is jeopardized.
Therefore, a short message transmission method capable of preventing client privacy data from being easily acquired is required.
Disclosure of Invention
The embodiment of the application mainly aims to provide a short message transmission method, a device, electronic equipment and a computer readable storage medium based on salt value encryption, so as to solve the problem that customer privacy data is easy to leak in the short message transmission process of a short message service end and an external short message service provider and improve the safety of the customer privacy data.
To achieve the above objective, a first aspect of an embodiment of the present application provides a method for transmitting a short message based on salt encryption, where the method is applied to a short message transmission system, and the short message transmission system includes a short message service end and a short message service provider, and the method includes:
the short message service end judges whether the short message service end locally stores effective salt value information corresponding to the client communication identifier according to the client communication identifier corresponding to the short message to be sent, wherein the effective salt value information comprises an effective salt value and a salt value identifier, the effective salt value and the salt value identifier have a unique corresponding relation, and the effective salt value is effective within a preset effective period;
When the short message service end locally stores effective salt value information corresponding to the client communication identifier, the short message service end encrypts the short message to be sent by utilizing the effective salt value in the effective salt value information to obtain an encrypted short message;
the short message service end sends the customer communication identifier, the encrypted short message and the salt value identifier in the effective salt value information to a short message service provider;
and the short message service provider receives the encrypted short message and the salt value identifier from the short message service end, acquires a salt value for decrypting the encrypted short message according to the salt value identifier, and decrypts the encrypted short message through the acquired salt value to obtain the decrypted short message content.
According to some embodiments of the present application, the short message transmission system further includes a salt value generation server, and the method further includes:
When the short message service end does not locally store effective salt value information corresponding to the client communication identifier, the short message service end sends a first salt value request to the salt value generation service end, wherein the first salt value request carries the client communication identifier;
after the salt value generation server receives the first salt value request, salt value information corresponding to the client communication identifier is generated according to the client communication identifier in the first salt value request, the salt value information is returned to the short message server, the salt value information comprises a salt value and a salt value identifier, and the salt value identifier have unique corresponding relation;
And the short message service end stores the salt value information returned by the salt value generation service end locally, and determines the effective period of the salt value information according to the storage time, wherein the salt value information is effective salt value information within the effective period.
According to some embodiments of the present application, after generating the salt information corresponding to the client communication identifier according to the client communication identifier in the first salt request, the method further includes:
The salt value generation server adds the salt value and the salt value identifier in the salt value information to a preset salt value list, wherein the salt value list is used for recording the salt value corresponding to each salt value identifier.
According to some embodiments of the present application, a method for transmitting a short message based on salt value encryption, where the obtaining a salt value for decrypting the encrypted short message according to the salt value identifier includes:
Judging whether the short message service provider locally stores a salt value corresponding to the salt value identifier;
and when the short message service provider locally stores the salt value, the short message service provider locally acquires the salt value.
According to some embodiments of the present application, after the determining whether the short message service provider locally stores the salt value corresponding to the salt value identifier, the method further includes:
when the short message service provider does not store the salt value locally, the short message service provider sends a second salt value request to the salt value generation server, wherein the second salt value request comprises the salt value identifier;
After the salt value generation server receives the second salt value request, according to the salt value identifier in the second salt value request, searching a salt value corresponding to the salt value identifier from the salt value list, and returning the searched salt value to the short message service provider.
According to some embodiments of the present application, the method for transmitting a short message based on salt value encryption, which encrypts the short message to be sent by using the effective salt value in the effective salt value information, obtains an encrypted short message, includes:
Acquiring a fixed key corresponding to the client communication identifier, and processing the fixed key according to the effective salt value in the effective salt value information to obtain a derivative key;
and encrypting the short message to be sent according to a preset symmetric encryption algorithm and the derivative key to obtain an encrypted short message.
According to some embodiments of the present application, the method for transmitting a short message based on salt value encryption decrypts the encrypted short message by using the obtained salt value to obtain the decrypted short message content, includes:
acquiring a fixed key corresponding to the client communication identifier, and processing the fixed key according to the acquired salt value to obtain a derivative key;
And decrypting the encrypted short message according to a preset symmetric encryption algorithm and the derivative key to obtain the decrypted short message content.
In order to achieve the above object, a second aspect of the embodiments of the present application provides a salt encryption-based short message transmission system, which includes a short message service end and a short message service provider, wherein,
The short message service end comprises:
The first judging module is used for judging whether the short message service end locally stores effective salt value information corresponding to the client communication identifier according to the client communication identifier corresponding to the short message to be sent, wherein the effective salt value information comprises an effective salt value and a salt value identifier, the effective salt value and the salt value identifier have a unique corresponding relation, and the effective salt value is effective within a preset effective period;
the encryption module is used for encrypting the short message to be sent by utilizing the effective salt value in the effective salt value information when the effective salt value information corresponding to the client communication identifier is locally stored in the short message service end, so as to obtain an encrypted short message;
The first sending module is used for sending the client communication identifier, the encrypted short message and the salt value identifier in the effective salt value information to a short message service provider;
the short message service provider includes:
the first receiving module is used for receiving the encrypted short message and the salt value identifier from the short message service end;
and the decryption module is used for obtaining a salt value for decrypting the encrypted short message according to the salt value identifier, and decrypting the encrypted short message through the obtained salt value to obtain the decrypted short message content.
To achieve the above object, a third aspect of an embodiment of the present application provides an electronic device, including:
at least one processor; and
A memory communicatively coupled to the at least one processor; wherein,
The memory stores a computer program which, when executed by the at least one processor, causes the at least one processor to perform the salt value encryption based short message transmission method as described in any one of the embodiments of the first aspect above.
To achieve the above object, a fourth aspect of the embodiments of the present application proposes a computer-readable storage medium storing a computer program, which when executed by a processor implements the method for transmitting a short message based on salt encryption according to any one of the embodiments of the first aspect.
The embodiment of the application provides a short message transmission method, a device, electronic equipment and a computer readable storage medium based on salt value encryption, wherein a short message service end judges whether effective salt value information corresponding to a client communication identifier is locally stored in the short message service end according to the client communication identifier corresponding to a short message to be sent, the effective salt value information comprises an effective salt value and a salt value identifier, the effective salt value and the salt value identifier have a unique corresponding relation, and the effective salt value is effective within a preset effective period; when the short message service end locally stores effective salt value information corresponding to the client communication identifier, the short message service end encrypts the short message to be sent by utilizing the effective salt value in the effective salt value information to obtain an encrypted short message; the short message service end sends the customer communication identifier, the encrypted short message and the salt value identifier in the effective salt value information to a short message service provider; and the short message service provider receives the encrypted short message and the salt value identifier from the short message service end, acquires a salt value for decrypting the encrypted short message according to the salt value identifier, and decrypts the encrypted short message through the acquired salt value to obtain the decrypted short message content. According to the scheme of the embodiment of the application, the short message server encrypts the short message to be sent by using the effective salt value, and the salt value has the effective period, so that the salt value can be invalid and can not be used for encryption once exceeding the effective period, thereby increasing the security of information encryption, improving the difficulty of capturing packets of sensitive information of a client in the link transmission process, and because of the existence of a timing refreshing mechanism of the salt value, decryption becomes difficult once the information is not decrypted timely, and the security of private data of the client is protected.
Drawings
Fig. 1 is a schematic diagram of an interaction process between a short message service end and a short message service provider of a short message transmission system in the related art;
fig. 2 is a schematic flow chart of a method for transmitting a sms message based on salt encryption according to an embodiment of the present application;
Fig. 3 is a flow chart of a method for transmitting a short message based on salt encryption according to another embodiment of the present application;
FIG. 4 is a schematic diagram of the substeps of step S110 in FIG. 2;
FIG. 5 is a schematic diagram of the substeps of step S120 in FIG. 2;
FIG. 6 is a schematic diagram of sub-steps of step S140 in FIG. 2;
FIG. 7 is a schematic diagram of the substeps of step S140 in FIG. 2;
fig. 8 is a schematic structural diagram of a short message transmission system based on salt encryption according to an embodiment of the present application.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
It is to be noted that all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs unless defined otherwise. The terminology used herein is for the purpose of describing embodiments of the application only and is not intended to be limiting of the application.
In order to facilitate understanding of the present application, technical terms and application scenarios related to embodiments of the present application are briefly described herein:
HTTPS: is a transmission protocol for secure communication over a computer network, communicating via HTTP, establishing a full channel using SSL/TLS, encrypting data packets. The main purpose of HTTPS use is to provide authentication of web servers while protecting the privacy and integrity of the exchanged data. It is widely used in security-sensitive communications on the world wide web, such as transaction payments.
Symmetric encryption algorithm: in the symmetric encryption algorithm, a data sender processes plaintext (original data) and an encryption key together through a special encryption algorithm, and then the plaintext (original data) and the encryption key are changed into complex encrypted ciphertext to be sent out. After receiving the ciphertext, the receiver needs to decrypt the ciphertext by using the encryption key and the inverse algorithm of the same algorithm to restore the ciphertext into readable plaintext if the receiver wants to interpret the ciphertext. In the symmetric encryption algorithm, only one key is used, and both the sender and the receiver encrypt and decrypt data by using the key, which requires that the decryption party must know the encryption key in advance.
Salt value: belonging to a random value. At user registration, the system is used to combine the random value generated by the user password, known as salt value, and known as salt value.
The embodiment of the application provides a short message transmission method based on salt value encryption, which is applied to a short message transmission system, wherein the short message transmission system comprises a short message service end, a short message service provider and a client, wherein an HTTPS channel is established between the short message service end and the short message service provider. The short message service access is connected to the enterprise application layer, and the short message service requirement is determined according to the instruction from the enterprise application layer. The SMS provider is a platform of the third-party SMS provider and can provide an interface for calling the SMS for the SMS terminal. The short message service may include, but is not limited to, verification code short message, notification short message, service promotion short message, etc.
Referring to fig. 1, the following describes an interaction process between a short message service end and a short message service provider by taking sending a short message with verification code as an example, and the specific process is as follows:
1, a short message service end receives a verification code request initiated by a user on a client end app/webpage (belonging to an enterprise application layer);
2, the SMS server calls the interface of SMS service provider to generate verification code
3, Sending the verification code short message to the client side of the user through the short message service provider;
4, the short message server receives verification code information returned by the enterprise application layer;
5, the SMS server calls the interface of the SMS service provider to verify the verification code,
And 6, returning the verification result to the short message service end by the short message service provider.
In the above process, the short message service end and the short message service provider interact information through the HTTPS channel, however, the verification code information is easily acquired by capturing the packet when transmitted by using the HTTPS channel, thus causing the privacy of the client to be revealed and jeopardizing the security of the private data of the client. Therefore, a short message transmission method capable of preventing client privacy data from being easily acquired is required.
It should be understood that the short message service end and the short message service provider may be configured as independent physical servers, may be configured as a server cluster or a distributed system formed by a plurality of physical servers, and may be configured as a cloud server for providing cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, CDNs, and basic cloud computing services such as big data and artificial intelligence platforms, but are not limited to the above forms.
The method embodiments provided by the present application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiment of the application mainly aims to provide a short message transmission method, a device, electronic equipment and a computer readable storage medium based on salt value encryption, aiming at solving the problem that customer privacy data is easy to leak in the short message transmission process of a short message service end and an external short message service provider and improving the safety of the customer privacy data.
Referring to fig. 2, fig. 2 shows a flow chart of a method for transmitting a short message based on salt encryption according to an embodiment of the present application. As shown in fig. 2, the short message transmission method provided by the embodiment of the application includes, but is not limited to, the following steps:
step S110, the short message service end judges whether the short message service end locally stores effective salt value information corresponding to the client communication identification according to the client communication identification corresponding to the short message to be sent.
The effective salt value information comprises an effective salt value and a salt value identifier, wherein the effective salt value and the salt value identifier have a unique corresponding relation, and the effective salt value is effective within a preset effective period.
It can be understood that the short message service end determines the short message service requirement according to the instruction of the enterprise application layer and generates the short message to be sent. The instruction of the enterprise application layer is initiated by the client at the client app/webpage, for example, the client performs a login account operation on the client, needs to login in a short message verification code mode, initiates an instruction of requesting the verification code on the client, and generates a short message to be sent corresponding to the client communication identifier of the client after receiving the instruction of requesting the verification code.
The customer communication identifier may be a mobile phone number of the customer, an account number of the customer, or the like.
After the short message server generates the short message to be sent, judging whether the effective salt value information corresponding to the client communication identification is stored locally according to the client communication identification corresponding to the current short message to be sent. It can be understood that the short message service end locally stores salt value information corresponding to a plurality of client communication identifiers, each salt value information has an effective period, the effective salt value information is used in the effective period, and the effective period is not used.
Referring to fig. 3, when the short message service end does not locally store the effective salt value information corresponding to the client communication identifier, the embodiment of the present application further includes the following steps S201 to S203:
in step S201, the short message service end sends a first salt request to the salt generating service end, where the first salt request carries the client communication identifier.
Here, the salt value generation server is a server for generating random salt values.
Step S202, after the salt value generation server receives the first salt value request, salt value information corresponding to the client communication identifier is generated according to the client communication identifier in the first salt value request, the salt value information is returned to the short message server, the salt value information comprises a salt value and a salt value identifier, and the salt value identifier have a unique corresponding relationship.
Here, each time the salt value generation server generates a salt value, a unique salt value identifier is configured for the salt value, and the salt value identifier is used for marking the currently generated identifier.
It may be appreciated that, after the salt generating server in step S202 generates salt information corresponding to the client communication identifier according to the client communication identifier in the first salt request, the method in the embodiment of the present application further includes:
step S301, the salt value generating server adds the salt value and the salt value identifier in the salt value information to a preset salt value list, where the salt value list is used to record the salt values corresponding to the salt value identifiers.
In step S203, the short message service side stores the salt information returned by the salt generating service side locally, and determines the effective period of the salt information according to the storage time, where the salt information is effective salt information within the effective period.
After receiving the salt information returned by the salt generation server, the short message server stores the salt information locally, and then determines the effective period of the salt information according to the storage time. The duration of the expiration date is preset, for example, set to 2 minutes, 5 minutes, or the like. The expiration date corresponding to each salt value may be recorded by a local list.
Referring to fig. 4, the step S110 of determining whether the short message service end locally stores valid salt value information corresponding to the client communication identifier may specifically include the following steps S111-S112:
Step S111, the sms server determines whether the salt information corresponding to the client communication identifier is locally stored, and if yes, step S112 is executed; and if not, determining that the effective salt value information corresponding to the client communication identification is not stored locally.
Step S112, obtaining the effective period of the salt information corresponding to the client communication identifier from the local, and if the effective period indicates that the salt information is within the effective period, determining that the effective salt information corresponding to the client communication identifier is stored locally; and if the effective period indicates that the salt information exceeds the effective period, determining that the effective salt information corresponding to the client communication identifier is not stored locally.
It can be understood that the short message service end encrypts the short message to be sent by using the effective salt value information corresponding to the client communication identifier.
And step S120, when the short message service end locally stores effective salt value information corresponding to the client communication identifier, the short message service end encrypts the short message to be sent by utilizing the effective salt value in the effective salt value information to obtain an encrypted short message.
The embodiment of the application encrypts the short message based on the symmetric encryption algorithm and the salt value. As an example, referring to fig. 5, in step S120, the encrypting the short message to be sent by using the effective salt value in the effective salt value information to obtain an encrypted short message may specifically include the following steps S121-S122:
step S121, a fixed key corresponding to the client communication identifier is obtained, and the fixed key is processed according to the effective salt value in the effective salt value information to obtain a derivative key;
and step S122, encrypting the short message to be sent according to a preset symmetric encryption algorithm and the derivative key to obtain an encrypted short message.
It will be appreciated that in the embodiment of the present application, each client communication identifier has a corresponding fixed key, and then the fixed key is processed by a salt value with a validity period to obtain a derivative key. And then encrypting the short message to be sent according to a preset symmetric encryption algorithm and the derivative key to obtain an encrypted short message. Because the salt value is valid, the salt value can not be reused after the valid period is exceeded, and a new salt value can only be requested to the salt value generation server again, so that the derived keys obtained at different times are different, and the key security of the encrypted short message is greatly improved.
And step S130, the short message service end sends the customer communication identifier, the encrypted short message and the salt value identifier in the effective salt value information to a short message service provider.
It can be understood that after the short message service end completes the encryption of the short message, the encrypted short message is sent to the short message service provider together with the corresponding client communication identifier and the salt value identifier corresponding to the salt value used in the process of encrypting the short message.
And step S140, the short message service provider receives the encrypted short message and the salt value identification from the short message service end, acquires a salt value for decrypting the encrypted short message according to the salt value identification, and decrypts the encrypted short message through the acquired salt value to obtain the decrypted short message content.
Referring to fig. 6, the step S140 of obtaining the salt value for decrypting the encrypted sms according to the salt value identifier may specifically include the following steps S401 to S404:
in step S401, the sms service provider determines whether a salt corresponding to the salt identifier is locally stored.
When the short message service provider locally stores the salt value, the following step S402 is executed:
in step S402, the sms service provider obtains the salt value locally.
When the short message service provider does not store the salt value locally, the following steps S403 to S404 are executed:
step S403, the short message service provider sends a second salt request to the salt generating server, where the second salt request includes the salt identifier;
s404, after receiving the second salt request, the salt generating server searches a salt value corresponding to the salt value identifier from the salt value list according to the salt value identifier in the second salt request, and returns the searched salt value to the short message service provider.
It can be understood that the salt value generation server is locally provided with a salt value list, and each time a salt value is generated, the salt value generation server configures a unique salt value identifier for the salt value, and then adds the salt value and the salt value identifier corresponding to the salt value list, so that the salt value corresponding to each salt value identifier can be found through the salt value list.
Referring to fig. 7, in step S140, the decrypting the encrypted short message through the obtained salt value to obtain the decrypted short message content includes the following steps S501-S502:
step S501, obtaining a fixed key corresponding to the client communication identifier, and processing the fixed key according to the obtained salt value to obtain a derivative key;
And step S502, decrypting the encrypted short message according to a preset symmetric encryption algorithm and the derivative key to obtain decrypted short message content.
It can be appreciated that the embodiment of the application adopts a symmetric encryption algorithm to encrypt the short message, so that the encryption process and the decryption process use the same secret key.
According to the scheme of the embodiment of the application, the short message server encrypts the short message to be sent by using the effective salt value, and the salt value has the effective period, so that the salt value can be invalid and can not be used for encryption once exceeding the effective period, thereby increasing the security of information encryption, improving the difficulty of capturing packets of sensitive information of a client in the link transmission process, and being difficult to decrypt once the information is decrypted in time due to the existence of a timing refreshing mechanism of the salt value. The security of the private data of the clients is protected.
The short message transmission method according to the embodiment of the application is described in detail below by a specific example.
Step S601, the SMS server judges whether the SMS server locally stores effective salt value information corresponding to the client communication identification according to the client communication identification corresponding to the SMS to be sent, if yes, step S606 is executed; if not, executing the steps S602-S605; the effective salt value information comprises an effective salt value and a salt value identifier, wherein the effective salt value and the salt value identifier have a unique corresponding relation, and the effective salt value is effective within a preset effective period.
In step S602, the short message service end sends a first salt request to the salt generating service end, where the first salt request carries the client communication identifier.
Step S603, after the salt value generating server receives the first salt value request, according to a client communication identifier in the first salt value request, salt value information corresponding to the client communication identifier is generated, the salt value information is returned to the short message server, where the salt value information includes a salt value and a salt value identifier, and the salt value identifier have a unique corresponding relationship.
In step S604, the salt value generating server adds the salt value and the salt value identifier in the salt value information to a preset salt value list, where the salt value list is used to record the salt values corresponding to the salt value identifiers.
Step S605, the short message service side stores the salt information returned by the salt generating service side locally, and determines the effective period of the salt information according to the storage time, where the salt information is effective salt information within the effective period.
Step S606, the SMS server encrypts the SMS to be sent by using the effective salt value in the effective salt value information to obtain an encrypted SMS; wherein the encryption process comprises: acquiring a fixed key corresponding to the client communication identifier, and processing the fixed key according to the effective salt value in the effective salt value information to obtain a derivative key; and encrypting the short message to be sent according to a preset symmetric encryption algorithm and the derivative key to obtain an encrypted short message.
In step S607, the sms server sends the customer communication identifier, the encrypted sms, and the salt identifier in the effective salt information to a sms service provider.
Step S608, the sms service provider receives the encrypted sms and the salt identifier from the sms service end, and determines whether the sms service provider locally stores a salt corresponding to the salt identifier, if so;
In step S609, the short message service provider sends a second salt request to the salt generating server, where the second salt request includes the salt identifier.
Step S610, after the salt value generating server receives the second salt value request, according to the salt value identifier in the second salt value request, searching a salt value corresponding to the salt value identifier from the salt value list, and returning the searched salt value to the short message service provider.
In step S611, the short message service provider receives the salt value corresponding to the salt value identifier returned by the salt value generating server, and stores the salt value locally.
Step S612, the SMS service provider obtains the salt value from the local, decrypts the encrypted SMS through the obtained salt value, and obtains the content of the decrypted SMS; wherein the decryption process comprises: acquiring a fixed key corresponding to the client communication identifier, and processing the fixed key according to the acquired salt value to obtain a derivative key; and decrypting the encrypted short message according to a preset symmetric encryption algorithm and the derivative key to obtain the decrypted short message content.
Referring to fig. 8, the embodiment of the application further provides a system for transmitting short messages based on salt encryption, the system comprises a short message service end and a short message service provider, wherein,
The short message service end comprises:
The first judging module is used for judging whether the short message service end locally stores effective salt value information corresponding to the client communication identifier according to the client communication identifier corresponding to the short message to be sent, wherein the effective salt value information comprises an effective salt value and a salt value identifier, the effective salt value and the salt value identifier have a unique corresponding relation, and the effective salt value is effective within a preset effective period;
the encryption module is used for encrypting the short message to be sent by utilizing the effective salt value in the effective salt value information when the effective salt value information corresponding to the client communication identifier is locally stored in the short message service end, so as to obtain an encrypted short message;
The first sending module is used for sending the client communication identifier, the encrypted short message and the salt value identifier in the effective salt value information to a short message service provider;
the short message service provider includes:
the first receiving module is used for receiving the encrypted short message and the salt value identifier from the short message service end;
and the decryption module is used for obtaining a salt value for decrypting the encrypted short message according to the salt value identifier, and decrypting the encrypted short message through the obtained salt value to obtain the decrypted short message content.
It can be understood that the short message transmission system further comprises: and generating a salt value to a service end.
It can be understood that the first sending module of the short message service side is further configured to: and when the short message service end does not locally store the effective salt value information corresponding to the client communication identifier, sending a first salt value request to the salt value generation service end, wherein the first salt value request carries the client communication identifier.
It can be understood that the salt value generation server includes a salt value generation module, where the salt value generation module is configured to: after the first salt value request is received, salt value information corresponding to the client communication identification is generated according to the client communication identification in the first salt value request, the salt value information is returned to the short message service terminal, the salt value information comprises a salt value and a salt value identification, and the salt value identification have unique corresponding relations.
It can be understood that the short message service end further comprises a storage module and a determination module, wherein the storage module is used for: storing the salt information returned by the salt generation server in a local place; the determining module is used for: and determining the effective period of the salt value information according to the storage time, wherein the salt value information is effective salt value information within the effective period.
It can be understood that the salt value generation server further includes a recording module, where the recording module is configured to: and adding the salt value and the salt value identifier in the salt value information into a preset salt value list, wherein the salt value list is used for recording the salt value corresponding to each salt value identifier.
It may be appreciated that the short message service provider further includes a second judging module and an obtaining module, where the second judging module is configured to: and judging whether the short message service provider locally stores the salt value corresponding to the salt value identifier. The acquisition module is used for: and when the short message service provider locally stores the salt value, the salt value is obtained locally.
It may be appreciated that the short message service provider further includes a second sending module, where the second sending module is configured to: and when the short message service provider does not store the salt value locally, the short message service provider sends a second salt value request to the salt value generation server, wherein the second salt value request comprises the salt value identifier.
It can be understood that the salt value generation module of the salt value generation server is further configured to: after the second salt value request is received, searching a salt value corresponding to the salt value identifier from the salt value list according to the salt value identifier in the second salt value request, and returning the searched salt value to the short message service provider.
It can be understood that the encryption module of the short message service end is specifically configured to:
Acquiring a fixed key corresponding to the client communication identifier, and processing the fixed key according to the effective salt value in the effective salt value information to obtain a derivative key;
and encrypting the short message to be sent according to a preset symmetric encryption algorithm and the derivative key to obtain an encrypted short message.
It may be appreciated that the decryption module of the sms service provider is specifically configured to:
acquiring a fixed key corresponding to the client communication identifier, and processing the fixed key according to the acquired salt value to obtain a derivative key;
And decrypting the encrypted short message according to a preset symmetric encryption algorithm and the derivative key to obtain the decrypted short message content.
The embodiment of the application also provides electronic equipment, which comprises:
at least one processor; and
A memory communicatively coupled to the at least one processor; wherein,
The memory stores a computer program which, when executed by the at least one processor, causes the at least one processor to perform the salt value encryption based short message transmission method as described in any one of the embodiments above.
The embodiment of the application also provides a computer readable storage medium which stores a computer program, wherein the computer program realizes the short message transmission method based on the salt encryption according to any one of the embodiments when being executed by a processor.
The embodiments described above may be combined, and modules with the same names may be the same or different between different embodiments.
The foregoing describes certain embodiments of the application, other embodiments being within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in a different order than in the embodiments and still achieve desirable results. Furthermore, the processes depicted in the accompanying drawings do not necessarily have to be in the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
The embodiments of the present application are described in a progressive manner, and the same and similar parts of the embodiments are all referred to each other, and each embodiment is mainly described in the differences from the other embodiments. In particular, for apparatus, devices, computer readable storage medium embodiments, the description is relatively simple as it is substantially similar to method embodiments, with reference to the section of the method embodiments being relevant.
The apparatus, the device, the computer readable storage medium and the method provided by the embodiments of the present application correspond to each other, and therefore, the apparatus, the device, the non-volatile computer storage medium also have similar beneficial technical effects as those of the corresponding method, and since the beneficial technical effects of the method have been described in detail above, the beneficial technical effects of the corresponding apparatus, device, and computer storage medium are not described here again.
In the 90s of the 20 th century, improvements to one technology could clearly be distinguished as improvements in hardware (e.g., improvements to circuit structures such as diodes, transistors, switches, etc.) or software (improvements to the process flow). However, with the development of technology, many improvements of the current method flows can be regarded as direct improvements of hardware circuit structures. Designers almost always obtain corresponding hardware circuit structures by programming improved method flows into hardware circuits. Therefore, an improvement of a method flow cannot be said to be realized by a hardware entity module. For example, a programmable logic device (Programmable Logic Device, PLD) (e.g., field programmable gate array (Field Programmable GATE ARRAY, FPGA)) is an integrated circuit whose logic functions are determined by user programming of the device. A designer programs to "integrate" a digital system onto a PLD without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Moreover, nowadays, instead of manually manufacturing integrated circuit chips, such programming is mostly implemented with "logic compiler (logic compiler)" software, which is similar to the software compiler used in program development and writing, and the original code before being compiled is also written in a specific programming language, which is called hardware description language (Hardware Description Language, HDL), but HDL is not just one, but a plurality of kinds, such as ABEL(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language), and VHDL (Very-High-SPEED INTEGRATED Circuit Hardware Description Language) and Verilog are currently most commonly used. It will also be apparent to those skilled in the art that a hardware circuit implementing the logic method flow can be readily obtained by merely slightly programming the method flow into an integrated circuit using several of the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer readable medium storing computer readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, application SPECIFIC INTEGRATED Circuits (ASICs), programmable logic controllers, and embedded microcontrollers, examples of controllers include, but are not limited to, the following microcontrollers: ARC625D, atmel AT91SAM, microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic of the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller in a pure computer readable program code, it is well possible to implement the same functionality by logically programming the method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers, etc. Such a controller may thus be regarded as a kind of hardware component, and means for performing various functions included therein may also be regarded as structures within the hardware component. Or even means for achieving the various functions may be regarded as either software modules implementing the methods or structures within hardware components.
The system, apparatus, module or unit set forth in the above embodiments may be implemented in particular by a computer chip or entity, or by a product having a certain function. One typical implementation is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being functionally divided into various units, respectively. Of course, the functions of each unit may be implemented in the same piece or pieces of software and/or hardware when implementing the embodiments of the present application.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, embodiments of the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the application may take the form of a computer program product on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
The present description is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Disks (DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
In the embodiments of the present application, "at least one" means one or more, and "a plurality" means two or more. "and/or", describes an association relation of association objects, and indicates that there may be three kinds of relations, for example, a and/or B, and may indicate that a alone exists, a and B together, and B alone exists. Wherein A, B may be singular or plural. The character "/" generally indicates that the context-dependent object is an "or" relationship. "at least one of the following" and the like means any combination of these items, including any combination of single or plural items. For example, at least one of a, b and c may represent: a, b, c, a and b, a and c, b and c or a and b and c, wherein a, b and c can be single or multiple.
Embodiments of the application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Embodiments of the application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments of the present application are described in a progressive manner, and the same and similar parts of the embodiments are all referred to each other, and each embodiment is mainly described in the differences from the other embodiments. In particular, for system embodiments, since they are substantially similar to method embodiments, the description is relatively simple, as relevant to see a section of the description of method embodiments.
The foregoing description is only exemplary embodiments of the application and is not intended to limit the application. Various modifications and variations of the present application will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. which come within the spirit and principles of the application are to be included in the scope of the claims of the present application.

Claims (8)

1. The method is characterized in that the method is applied to a short message transmission system, and the short message transmission system comprises a short message service end, a salt value generation service end and a short message service provider, and comprises the following steps:
the short message service end judges whether the short message service end locally stores effective salt value information corresponding to the client communication identifier according to the client communication identifier corresponding to the short message to be sent, wherein the effective salt value information comprises an effective salt value and a salt value identifier, the effective salt value and the salt value identifier have a unique corresponding relation, and the effective salt value is effective within a preset effective period;
When the short message service end locally stores effective salt value information corresponding to the client communication identifier, the short message service end acquires a fixed key corresponding to the client communication identifier, processes the fixed key according to the effective salt value in the effective salt value information to obtain a derivative key, and encrypts the short message to be sent according to a preset symmetric encryption algorithm and the derivative key to obtain an encrypted short message;
When the short message service end does not locally store effective salt value information corresponding to the client communication identifier, the short message service end sends a first salt value request to the salt value generation service end, wherein the first salt value request carries the client communication identifier;
after the salt value generation server receives the first salt value request, salt value information corresponding to the client communication identifier is generated according to the client communication identifier in the first salt value request, the salt value information is returned to the short message server, the salt value information comprises a salt value and a salt value identifier, and the salt value identifier have unique corresponding relation;
The short message service end stores the salt value information returned by the salt value generation service end locally, and determines the effective period of the salt value information according to the storage time, wherein the salt value information is effective salt value information within the effective period;
the short message service end sends the customer communication identifier, the encrypted short message and the salt value identifier in the effective salt value information to a short message service provider;
and the short message service provider receives the encrypted short message and the salt value identifier from the short message service end, acquires a salt value for decrypting the encrypted short message according to the salt value identifier, and decrypts the encrypted short message through the acquired salt value to obtain the decrypted short message content.
2. The method of claim 1, wherein after generating salt information corresponding to the customer communication identifier according to the customer communication identifier in the first salt request, the method further comprises:
The salt value generation server adds the salt value and the salt value identifier in the salt value information to a preset salt value list, wherein the salt value list is used for recording the salt value corresponding to each salt value identifier.
3. The method according to claim 2, wherein the obtaining the salt value for decrypting the encrypted sms according to the salt value identifier includes:
Judging whether the short message service provider locally stores a salt value corresponding to the salt value identifier;
and when the short message service provider locally stores the salt value, the short message service provider locally acquires the salt value.
4. The method of claim 3, wherein after said determining whether the short message service provider locally stores a salt corresponding to the salt identifier, the method further comprises:
when the short message service provider does not store the salt value locally, the short message service provider sends a second salt value request to the salt value generation server, wherein the second salt value request comprises the salt value identifier;
After the salt value generation server receives the second salt value request, according to the salt value identifier in the second salt value request, searching a salt value corresponding to the salt value identifier from the salt value list, and returning the searched salt value to the short message service provider.
5. The method of claim 1, wherein decrypting the encrypted short message through the obtained salt value to obtain the decrypted short message content comprises:
acquiring a fixed key corresponding to the client communication identifier, and processing the fixed key according to the acquired salt value to obtain a derivative key;
And decrypting the encrypted short message according to a preset symmetric encryption algorithm and the derivative key to obtain the decrypted short message content.
6. A SMS transmission system based on salt value encryption is characterized in that the system comprises a SMS service end, a salt value generation service end and a SMS service provider, wherein,
The short message service end comprises:
The first judging module is used for judging whether the short message service end locally stores effective salt value information corresponding to the client communication identifier according to the client communication identifier corresponding to the short message to be sent, wherein the effective salt value information comprises an effective salt value and a salt value identifier, the effective salt value and the salt value identifier have a unique corresponding relation, and the effective salt value is effective within a preset effective period;
The encryption module is used for obtaining a fixed key corresponding to the client communication identifier when the effective salt value information corresponding to the client communication identifier is locally stored in the short message service end, processing the fixed key according to the effective salt value in the effective salt value information to obtain a derivative key, and encrypting the short message to be sent according to a preset symmetric encryption algorithm and the derivative key to obtain an encrypted short message;
The first sending module is used for sending the client communication identifier, the encrypted short message and the salt value identifier in the effective salt value information to a short message service provider;
The first sending module is further configured to send a first salt request to the salt generation server when the short message server does not locally store effective salt information corresponding to the client communication identifier, where the first salt request carries the client communication identifier;
the storage module is used for storing the salt information returned by the salt generation server in a local place;
The determining module is used for determining the effective period of the salt value information according to the storage time, wherein the salt value information is effective salt value information in the effective period;
the salt value generation server comprises:
The salt value generation module is used for generating salt value information corresponding to the client communication identifier according to the client communication identifier in the first salt value request after receiving the first salt value request, and returning the salt value information to the short message service terminal, wherein the salt value information comprises a salt value and a salt value identifier, and the salt value identifier have a unique corresponding relationship;
the short message service provider includes:
the first receiving module is used for receiving the encrypted short message and the salt value identifier from the short message service end;
and the decryption module is used for obtaining a salt value for decrypting the encrypted short message according to the salt value identifier, and decrypting the encrypted short message through the obtained salt value to obtain the decrypted short message content.
7. An electronic device, comprising:
at least one processor; and
A memory communicatively coupled to the at least one processor; wherein,
The memory stores a computer program which, when executed by the at least one processor, causes the at least one processor to perform the salt-based encrypted short message transmission method as claimed in any one of claims 1 to 5.
8. A computer-readable storage medium storing a computer program, wherein the computer program, when executed by a processor, implements the salt encryption-based short message transmission method of any one of claims 1 to 5.
CN202210255011.9A 2022-03-15 2022-03-15 Short message transmission method, device, equipment and medium based on salt value encryption Active CN114599032B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210255011.9A CN114599032B (en) 2022-03-15 2022-03-15 Short message transmission method, device, equipment and medium based on salt value encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210255011.9A CN114599032B (en) 2022-03-15 2022-03-15 Short message transmission method, device, equipment and medium based on salt value encryption

Publications (2)

Publication Number Publication Date
CN114599032A CN114599032A (en) 2022-06-07
CN114599032B true CN114599032B (en) 2024-06-25

Family

ID=81809438

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210255011.9A Active CN114599032B (en) 2022-03-15 2022-03-15 Short message transmission method, device, equipment and medium based on salt value encryption

Country Status (1)

Country Link
CN (1) CN114599032B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112434339A (en) * 2020-12-01 2021-03-02 北京五八信息技术有限公司 Information processing method and device
CN112861148A (en) * 2021-01-28 2021-05-28 北京深思数盾科技股份有限公司 Data processing method, server, client and encryption machine

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104468095A (en) * 2014-11-28 2015-03-25 华为技术有限公司 Data transmission method and device
CN107733656A (en) * 2017-10-23 2018-02-23 北京深思数盾科技股份有限公司 A kind of cipher authentication method and device
CN114173294A (en) * 2021-12-29 2022-03-11 渔翁信息技术股份有限公司 Non-peer-to-peer short message transmission method, system, equipment and computer storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112434339A (en) * 2020-12-01 2021-03-02 北京五八信息技术有限公司 Information processing method and device
CN112861148A (en) * 2021-01-28 2021-05-28 北京深思数盾科技股份有限公司 Data processing method, server, client and encryption machine

Also Published As

Publication number Publication date
CN114599032A (en) 2022-06-07

Similar Documents

Publication Publication Date Title
US20220014524A1 (en) Secure Communication Using Device-Identity Information Linked To Cloud-Based Certificates
JP2020510329A (en) Login information processing method and device
CN111741028B (en) Service processing method, device, equipment and system
CN112287372A (en) Method and apparatus for protecting clipboard privacy
CN109450620A (en) The method and mobile terminal of security application are shared in a kind of mobile terminal
CN112287376B (en) Method and device for processing privacy data
KR101839048B1 (en) End-to-End Security Platform of Internet of Things
CN112671705A (en) Message processing method and device, electronic equipment and computer readable storage medium
CN113918982B (en) Data processing method and system based on identification information
US11743356B2 (en) Email notification system
EP3456025B1 (en) Technique for authenticating a user device
CN111327634B (en) Website access supervision method, secure socket layer agent device, terminal and system
CN114599032B (en) Short message transmission method, device, equipment and medium based on salt value encryption
CN116346341A (en) Private key protection and server access method, system, equipment and storage medium
CN111698192B (en) Method for monitoring transaction system, transaction device, monitoring device and system
CN114666119B (en) Data processing method, device, electronic equipment and medium
CN115733672A (en) Data processing method, device and equipment
CN117955637B (en) Data encryption method and device, and data decryption method and device
CN113411347B (en) Transaction message processing method and processing device
EP4287553A1 (en) Data processing methods, apparatuses, and devices
CN114553428B (en) Trusted verification system, trusted verification device, trusted verification storage medium and electronic equipment
US11934516B2 (en) Method and system for enabling secure processing of data using untrusted processing application in a trusted execution environment
CN118041548A (en) Account login method and device, storage medium and electronic equipment
CN116614240A (en) Data transmission method
CN117955680A (en) Data processing method and related device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant