CN115022819A - 5G message transmission method, terminal and system - Google Patents

5G message transmission method, terminal and system Download PDF

Info

Publication number
CN115022819A
CN115022819A CN202210610073.7A CN202210610073A CN115022819A CN 115022819 A CN115022819 A CN 115022819A CN 202210610073 A CN202210610073 A CN 202210610073A CN 115022819 A CN115022819 A CN 115022819A
Authority
CN
China
Prior art keywords
message
terminal
identity certificate
signature result
sender
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210610073.7A
Other languages
Chinese (zh)
Other versions
CN115022819B (en
Inventor
宗瑞
李子阳
邱振涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Weway Shenzhen Network Technology Co ltd
Original Assignee
Weway Shenzhen Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Weway Shenzhen Network Technology Co ltd filed Critical Weway Shenzhen Network Technology Co ltd
Priority to CN202210610073.7A priority Critical patent/CN115022819B/en
Publication of CN115022819A publication Critical patent/CN115022819A/en
Application granted granted Critical
Publication of CN115022819B publication Critical patent/CN115022819B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application relates to a 5G message transmission method, a terminal and a system. The method comprises the following steps: the method comprises the steps of obtaining a 5G message edited by a sender user, generating a signature result corresponding to the 5G message based on a secret key corresponding to an identity certificate of the sender user pre-stored in a sender terminal, and transmitting the 5G message, the signature result and the identity certificate to a receiver terminal, so that the receiver terminal feeds back the 5G message to the receiver user after verifying that the signature result and the identity certificate pass. According to the method and the system, the tamper-proof processing and the signature processing of the 5G message are not based on an operation service provider of the 5G message, the message is guaranteed to reach end-to-end level signature verification protection from a sender to a receiver, if the 5G message is modified by an unauthorized party in the transmission process, the receiver terminal can judge that the modification is illegal tampering, and the transmission safety of the 5G message is improved.

Description

5G message transmission method, terminal and system
Technical Field
The present application relates to the field of information security technologies, and in particular, to a method, a terminal, and a system for transmitting a 5G message.
Background
At present, in the transmission process of the 5G message, security in the processes of information transmission, storage, calculation and the like should be ensured, specifically, it should be ensured that the 5G message is not peeped by a third party in the transmission process, and it should be ensured that the 5G message is not tampered in the transmission process.
Since the 5G message is implemented based on the IP network, it is no longer implemented based on the traditional operator non-open core network architecture. Therefore, the security technology of the existing internet network can be directly applied to 5G messages, in the existing internet product architecture, both the data and password of the user are stored and provided for the service provider, and if uncontrollable factors do not occur, the service provider can always provide reliable service, but the security accident of the information often does not occur at the technical level, for example, the reason of the information leakage of the client of a certain service provider is that the information leakage of the client is caused because the computer of a technical staff is controlled by a lawbreaker during maintenance. The transmission of 5G messages also risks tampering if it relies entirely on the authentication verification of the service provider.
Therefore, improving the security of 5G message transmission has become an urgent problem to be solved by those skilled in the art.
Disclosure of Invention
In view of the above, the present application provides a method, a terminal and a system for transmitting a 5G message, which aims to improve the security of 5G message transmission.
In order to achieve the above object, the present invention provides a method for transmitting a 5G message, which is applied to a sender terminal, and the method includes:
acquiring a 5G message edited by a sender user;
generating a signature result corresponding to the 5G message based on a secret key corresponding to an identity certificate of a sender user pre-stored in the sender terminal;
and transmitting the 5G message, the signature result and the identity certificate to a receiver terminal, so that the receiver terminal feeds back the 5G message to a receiver user after verifying the signature result and the identity certificate.
Preferably, the generating a signature result corresponding to the 5G message based on a key corresponding to an identity certificate of a sender user pre-stored in the sender terminal includes:
and reading a private key corresponding to the identity certificate of the sender user, and signing the 5G message, the number of the sender terminal, the number of the receiver terminal and the sending time of the 5G message by using the private key to obtain the signature result.
Preferably, the transmitting the 5G message, the signature result, and the identity certificate to a receiving terminal includes:
transmitting the 5G message, the signature result and the identity certificate to a receiver terminal through a first channel based on the number of the receiver terminal;
or, the 5G message and the signature result are transmitted to the receiver terminal through a first channel based on the number of the receiver terminal, and the identity certificate is transmitted to the receiver terminal through a second channel;
or, the 5G message is transmitted to the receiver terminal through a first channel based on the number of the receiver terminal, and the signature result and the identity certificate are transmitted to the receiver terminal through a second channel.
Preferably, the identity certificate and the secret key are stored in a storage path related to the sender terminal, or the identity certificate and the secret key are stored in a storage path related to a SIM card of the sender terminal.
In order to achieve the above object, the present invention provides a method for transmitting a 5G message, which is applied to a receiving terminal, and the method includes:
acquiring an identity certificate of a sender user, a 5G message and a signature result corresponding to the 5G message, which are transmitted by a sender terminal;
verifying whether the relevant fields in the signature result are valid or not and verifying whether the identity certificate is valid or not;
and when the relevant fields in the signature result are verified to be valid and the identity certificate is verified to be valid, feeding back the 5G message to the user of the receiving party.
Preferably, the verifying whether the relevant field in the signature result is valid includes:
acquiring a public key corresponding to the identity certificate, and verifying a relevant field of the signature result by using the public key;
when all fields of the related fields are verified to be successful, the related fields of the signature result are valid;
and when any field of the related fields fails to be verified, the related field of the signature result is invalid.
Preferably, the method further comprises:
and when the relevant fields in the signature result are verified to be valid and the identity certificate is verified to pass, displaying the verification result on an interactive interface of the receiver terminal.
In order to achieve the above object, the present invention provides a sender terminal, where the sender terminal includes a memory and a processor connected to the memory, the memory stores a transmission program of a 5G message running on the processor, and the transmission program of the 5G message, when executed by the processor, implements the following steps:
acquiring a 5G message edited by a sender user;
generating a signature result corresponding to the 5G message based on a secret key corresponding to an identity certificate of a sender user pre-stored in the sender terminal;
and transmitting the 5G message, the signature result and the identity certificate to a receiver terminal, so that the receiver terminal feeds back the 5G message to a receiver user after verifying the signature result and the identity certificate.
In order to achieve the above object, the present invention provides a receiver terminal, where the receiver terminal includes a memory and a processor connected to the memory, the memory stores a transmission program of a 5G message running on the processor, and the transmission program of the 5G message, when executed by the processor, implements the following steps:
acquiring an identity certificate of a sender user, a 5G message and a signature result corresponding to the 5G message, which are transmitted by a sender terminal;
verifying whether the relevant fields in the signature result are valid or not and verifying whether the identity certificate is valid or not;
and when the relevant fields in the signature result are verified to be valid and the identity certificate is verified to be valid, feeding back the 5G message to the user of the receiving party.
In order to achieve the above object, the present invention further provides a transmission system for 5G messages, where the transmission system for 5G messages is deployed with the sender terminal and the receiver terminal.
Compared with the prior art, the technical scheme provided by the embodiment of the application has the following advantages:
the 5G message is signed by the sender terminal, the signature processing of the 5G message by the sender terminal is operated based on the secret key stored in the sender terminal, so that the identity of the sender can be further ensured not to be falsely identified, the reliability of the signature result is improved, the 5G message is processed in a signature verification operation mode of the receiver terminal, the anti-tampering processing and the signature processing of the 5G message are not based on an operation service provider of the 5G message, the end-to-end level signature verification protection of the message from the sender to the receiver is ensured, the transmission safety of the 5G message is improved, and if the message is modified by an unauthorized party in a transmission process, the receiver terminal can judge that the message is modified into illegal tampering.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
FIG. 1 is a schematic flow chart diagram illustrating a method for transmitting a 5G message according to a preferred embodiment of the present invention;
FIG. 2 is a flow chart of another preferred embodiment of a method for transmitting a 5G message according to the present application;
FIG. 3 is a diagram of a preferred embodiment of a system for transmitting 5G messages according to the present invention;
the implementation, functional features and advantages of the objectives of the present application will be further explained with reference to the accompanying drawings.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of and not restrictive on the broad application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the technical solutions in the embodiments of the present application may be combined with each other, but it must be based on the realization of those skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination of the technical solutions should be considered to be absent and not within the protection scope of the present invention.
Referring to fig. 1, a schematic method flow diagram of an embodiment of a method for transmitting a 5G message is provided. The method may be performed by a sender terminal, which may be implemented by software and/or hardware. The transmission method of the 5G message comprises the following steps:
step S110: acquiring a 5G message edited by a sender user;
step S120: generating a signature result corresponding to the 5G message based on a secret key corresponding to an identity certificate of a sender user pre-stored in the sender terminal;
step S130: and transmitting the 5G message, the signature result and the identity certificate to a receiver terminal, so that the receiver terminal feeds back the 5G message to a receiver user after verifying the signature result and the identity certificate.
In this embodiment, the sender user is a holder of the sender terminal, and the sender user can edit the 5G message that needs to be sent to the receiver user through the sender terminal, and input the phone number of the receiver terminal at the sender terminal when editing the 5G message.
Among them, the 5G (5th Generation Mobile Communication Technology, fifth Generation Mobile Communication Technology) message is an enhanced rich media short message, which may include text and pictures, may also include information such as voice, video, file, geographic location, payment, and may even call applications such as a dial plate and a calendar of a Mobile phone. Through the 5G message, rich interactive services can be provided for users.
When the sender user sends a 5G message, the 5G message may be uniquely identified by, for example, the phone number ID1 of the sender terminal, the phone number ID2 of the receiver terminal, the 5G message M, the timestamp T of the message transmission, and the like.
Because the 5G message is realized based on the IP network, the 5G message is not realized based on the traditional operator non-open core network architecture any more, therefore, in the existing Internet product architecture, the data and password of the user are both stored in the service provider, and because the service provider may cause data leakage due to some uncontrollable factors, if the sender terminal performs encryption protection on the 5G message, the message can be further ensured not to be tampered or leaked. Specifically, the method comprises the following steps:
after the 5G message edited by the sender user is obtained, the sender terminal generates a signature result corresponding to the 5G message based on a secret key corresponding to the identity certificate of the sender user pre-stored in the sender terminal. The signature result contains the signature of the key pair 5G message of the sender user, the telephone number of the sender, the telephone number of the receiver, the timestamp of message sending and the like, and the signature result and the identity certificate can be sent to the terminal of the receiver together with the 5G message.
The sender user can safely store the identity information in the sender terminal, the form of the identity information can be an identity certificate or other identity certificates, for example, the identity information of the sender user can be a digital identity certificate in a format of x.509 and the like, and can also be other certificates issued by other authorities or specific public communication mechanisms, and the identity certificate and the certificates contain the trusted identity and the public key information of the sender user, so that the receiver terminal can verify the signature information in the signature result based on the public key information. The identity information includes identity information of the user of the sender, such as a work unit and a job position of the sender.
The identity certificate of the sender user and the key information corresponding to the identity certificate may be stored in a relevant storage path of the sender terminal, for example, a local storage module of the terminal. The identity certificate and the corresponding key can also be stored in a storage module of the SIM card installed in the sender terminal.
After the 5G message, the signature result and the identity certificate are transmitted to the receiver terminal, the receiver terminal can verify the signature result and the identity certificate, wherein the identity certificate of the sender can also be applied for downloading from a server of the identity information by the receiver terminal according to the related information of the signature result.
And the receiver terminal verifies the signature result and the identity certificate by using the public key corresponding to the sender identity certificate, and after the signature result and the identity certificate pass verification, the receiver terminal can display the verification result, for example, display that the sender identity passes verification, and feed back the 5G message to the receiver user, for example, put the 5G message into an inbox, or display the content of the 5G message on an interactive interface of the receiver terminal. Since the signature result and the identity certificate are both verified, the receiving user can determine that the identity of the sending party of the 5G message is not spoofed.
When any one of the signature result and the identity certificate is not verified, the receiver user can be reminded according to a preset control strategy, for example, the 5G message is automatically put into a deleted mailbox, or the receiver user is prompted that the 5G message is normally put into an inbox after verification fails.
In one embodiment, the sender may not sign the recipient phone number in certain scenarios, in case the default 5G message channel can ensure that the recipient terminal is not confused. For example: when a sender needs to send the same 5G message to a plurality of receivers, only the 5G message, the sender number and the sending time can be signed, and the receiver telephone number is not signed, so that the resource consumption of the sender in the process of generating the signature result is reduced.
The sender may send only a normal 5G message or may send a 5G message with an identity certificate and a signature result. The user of the sending party can identify whether one 5G message has the corresponding identity certificate and signature result through the specific field, so that the receiving party can independently confirm whether the downloading and verification process of the signature result and the identity certificate is needed or not after receiving the 5G message, and the resource consumption of the terminal of the receiving party and the downloading or verification of the identity certificate and the signature result is reduced.
According to the method, the sender terminal performs signature operation on the 5G message, the signature processing of the sender terminal on the 5G message is operated based on the secret key stored in the sender terminal, the identity of the sender can be further ensured not to be spoofed, the reliability of a signature result is improved, the 5G message is processed in a manner of performing signature verification operation on the receiver terminal, the anti-tampering processing and the signature processing of the 5G message are not based on an operation service provider of the 5G message, and therefore the end-to-end level signature verification protection of the message from the sender to the receiver is ensured, and if the message is modified by an unauthorized party in a transmission process, the receiver terminal can judge that the message is modified into illegal tampering. The transmission of trusted certificates is provided for 5G messages at the user side level.
In one embodiment, the generating a signature result corresponding to the 5G message based on a key corresponding to an identity certificate pre-stored in the sender terminal of a sender user includes:
and reading a private key corresponding to the identity certificate of the sender user, and signing the 5G message, the number of the sender terminal, the number of the receiver terminal and the sending time of the 5G message by using the private key to obtain the signature result.
The private key corresponding to the identity certificate of the sender user is read, the private key is used for signing the 5G message, the number of the sender terminal, the number of the receiver terminal and the sending time of the 5G message, a signing result can be obtained, and the private key for signing exists in the sender terminal, so that the reliability of signing can be further improved.
In one embodiment, the transmitting the 5G message, the signature result, and the identity certificate to a recipient terminal includes:
transmitting the 5G message, the signature result and the identity certificate to a receiver terminal through a first channel based on the number of the receiver terminal;
or, the 5G message and the signature result are transmitted to the receiver terminal through a first channel based on the number of the receiver terminal, and the identity certificate is transmitted to the receiver terminal through a second channel;
or, the 5G message is transmitted to the receiver terminal through a first channel based on the number of the receiver terminal, and the signature result and the identity certificate are transmitted to the receiver terminal through a second channel.
The first channel may refer to a 5G short message channel, i.e., a communication channel of a telephone carrier. The second channel may be an internet channel or a cloud service mode, and when the identity certificate or the signature result is transmitted through the second channel, the receiving terminal needs to apply for downloading the identity certificate or the signature result from the corresponding server.
Referring to fig. 2, a flow chart of another preferred embodiment of the method for transmitting the 5G message according to the present application is shown, where the method can be executed by a receiving terminal, and the receiving terminal can be implemented by software and/or hardware. The transmission method of the 5G message comprises the following steps:
step S210: acquiring an identity certificate of a sender user, a 5G message and a signature result corresponding to the 5G message, which are transmitted by a sender terminal;
step S220: verifying whether the relevant fields in the signature result are valid or not and verifying whether the identity certificate is valid or not;
step S230: and when the relevant fields in the signature result are verified to be valid and the identity certificate is verified to be valid, feeding back the 5G message to the user of the receiving party.
In this embodiment, the identity certificate and the signature result obtained by the receiver terminal may be transmitted to the receiver terminal by the sender terminal according to a communication channel of a telephone operator, or the identity certificate and the signature result may be uploaded to the server by the sender terminal in a cloud service manner, and the receiver terminal downloads the identity certificate and the signature result from the server, so as to obtain the identity certificate and the signature result.
After the receiving party terminal acquires the identity certificate, the 5G message and the signature result corresponding to the 5G message of the sending party user, verifying whether the relevant fields in the signature result are valid through the public key corresponding to the identity certificate and verifying whether the identity certificate is valid, specifically:
the terminal of the receiving party obtains the Hash value of the identity certificate by using a Hash algorithm agreed by the terminal of the sending party and the terminal of the receiving party in advance and records the Hash value as Hash1, obtains a public key corresponding to the identity certificate, decrypts the identity certificate by using the public key to obtain Hash2, compares whether the Hash1 is consistent with the Hash2, if so, indicates that the identity certificate is a trustable certificate (namely, the identity certificate is valid), otherwise, the identity certificate is considered to be not trustable.
Whether the relevant fields in the signature result are valid or not is verified, the method is approximately the same as the method for verifying whether the identity certificate is valid or not, the hash values obtained by verifying the relevant signatures of the signature result through the public key of the identity certificate are compared with the hash values of the signature result obtained by the pre-agreed hash algorithm, when the hash values are consistent, the signature result is valid, otherwise, the signature result is considered invalid.
And when the relevant fields in the verification signature result are valid and the verification identity certificate is valid, feeding back the 5G message to the receiver user, for example, putting the 5G message into an inbox, or displaying the content of the 5G message on an interactive interface of the receiver terminal. Since the signature result and the identity certificate are both verified, the receiving user can determine that the identity of the sending party of the 5G message is not spoofed. When any one of the signature result and the identity certificate is not verified, it indicates that the 5G message sent by the sender may be tampered, and at this time, the receiver user may be reminded according to a preset control policy, for example, the 5G message is automatically put into a "deleted" mailbox, or the receiver user is reminded that the verification fails, and then the 5G message is still normally put into an inbox.
Further, the verifying whether the relevant field in the signature result is valid includes:
acquiring a public key corresponding to the identity certificate, and verifying a relevant field of the signature result by using the public key;
when all fields of the related fields are verified successfully, the related fields of the signature result are valid;
and when any field of the related fields fails to be verified, the related field of the signature result is invalid.
Since the signature result includes the signature of the key pair of the sender user on the information such as the 5G message, the sender phone number, the receiver phone number, the timestamp of message sending, etc., when the signatures of the information such as the 5G message, the sender phone number, the receiver phone number, the timestamp of message sending, etc., pass the verification, the signature result is considered to pass the verification (i.e., the signature result is valid). And when any field of the 5G message, the telephone number of the sender, the telephone number of the receiver and the timestamp of message sending fails to be verified, the signature result is considered to be not verified (namely the signature result is invalid).
In one embodiment, the method further comprises:
and when the relevant fields in the signature result are verified to be valid and the identity certificate is verified to pass, displaying the verification result on an interactive interface of the receiver terminal.
After the signature result and the identity certificate are verified, the verification result may be displayed at the receiving terminal, for example, the "sender identity verification passed" may be displayed on the interactive interface of the receiving terminal.
Fig. 3 is a schematic diagram of a transmission system of the 5G message according to the preferred embodiment of the present application.
The transmission system of the 5G message is disposed with a sender terminal 10 and a receiver terminal 20, and the sender terminal 10 and the receiver terminal 20 may be devices capable of automatically performing numerical calculation and/or information processing according to a preset or stored instruction. The sender terminal 10 may include, but is not limited to, a mobile phone, a landline, a computer having a telephone call function, etc., and the receiver terminal 20 may include, but is not limited to, a mobile phone, a landline, a computer having a telephone call function, etc. The network 30 may be a 5G network, or a wireless or wired network such as a Global System for Mobile communications (GSM), Wideband Code Division Multiple Access (WCDMA), Bluetooth (Bluetooth), Wi-Fi, or a telephone network.
In the present embodiment, the sender terminal 10 may include, but is not limited to, a memory 11, a processor 12, and a network interface 13, which may be communicatively connected to each other through a system bus, and the memory 11 stores a transmission program of a 5G message that may be executed on the processor 12. It is noted that fig. 3 only shows the sender terminal 10 with components 11-13, but it is to be understood that not all shown components are required to be implemented, and that more or less components may be implemented instead.
The receiving terminal 20 may include, but is not limited to, a memory 21, a processor 22, and a network interface 23, which may be communicatively connected to each other through a system bus, wherein the memory 21 stores a transmission program of the 5G message that may be executed on the processor 22. It is noted that fig. 3 only shows the receiver terminal 20 with components 21-23, but it is to be understood that not all of the shown components are required to be implemented, and that more or fewer components may be implemented instead.
The storage 11 includes a memory and at least one type of readable storage medium. The readable storage medium may be volatile or nonvolatile. For example, the readable storage medium may be a non-volatile storage medium such as a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, etc. In some embodiments, the readable storage medium may be an internal storage unit of the sender terminal 10, such as a hard disk of the sender terminal; in other embodiments, the storage medium may also be an external storage device of the sender terminal, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), or the like. In this embodiment, the readable storage medium of the memory 11 may be used to store various application software, for example, program codes of a transmission program of a 5G message in the embodiment of the present invention, and the like. Further, the memory 11 may also be used to temporarily store various types of data that have been output or are to be output.
The processor 12 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor, or other data Processing chip in some embodiments. The processor 12 is generally configured to control the overall operation of the sender terminal 10, such as performing control and processing related to data interaction or communication with the sender terminal 10. In this embodiment, the processor 12 is configured to run a program code stored in the memory 11 or process data, for example, run a transmission program of a 5G message.
The network interface 13 may include a wireless network interface or a wired network interface, and the network interface 13 is generally used for establishing a communication connection between a sender terminal and a receiver terminal or other modules. In this embodiment, the network interface 13 is mainly used to connect the sender terminal and the receiver terminal, and establish a data transmission channel and a communication connection between the sender terminal and the receiver terminal.
A transmission program of the 5G message is stored in the memory 11, and includes at least one computer readable instruction stored in the memory 11, which is executable by the processor 12 to implement the method of the embodiments of the present application; and the at least one computer readable instruction may be divided into different logic blocks depending on the functions implemented by the respective portions.
In addition, the memory 21, the processor 22 and the network interface 23 of the receiving terminal are similar to the memory 11, the processor 12 and the network interface 13 of the sending terminal, and are not described herein again.
In one embodiment, the above-mentioned transmission procedure of the 5G message is implemented by the processor 12 to implement the following steps:
acquiring a 5G message edited by a sender user;
generating a signature result corresponding to the 5G message based on a secret key corresponding to an identity certificate of a sender user pre-stored in the sender terminal;
and transmitting the 5G message, the signature result and the identity certificate to a receiver terminal, so that the receiver terminal feeds back the 5G message to a receiver user after verifying the signature result and the identity certificate.
In another embodiment, the above-mentioned transmission procedure of the 5G message is implemented by the processor 22 to implement the following steps:
acquiring an identity certificate of a sender user, a 5G message and a signature result corresponding to the 5G message, which are transmitted by a sender terminal;
verifying whether the relevant fields in the signature result are valid or not and verifying whether the identity certificate is valid or not;
and when the relevant fields in the signature result are verified to be valid and the identity certificate is verified to be valid, feeding back the 5G message to the user of the receiving party.
For detailed description of the above steps, please refer to the above description of fig. 1 and fig. 2 regarding the flow chart of the embodiment of the transmission method of the 5G message.
Furthermore, the present invention provides a computer-readable storage medium, on which a transmission program of a 5G message is stored, the transmission program of the 5G message realizing the following steps when executed by a processor:
acquiring a 5G message edited by a sender user;
generating a signature result corresponding to the 5G message based on a secret key corresponding to an identity certificate of a sender user pre-stored in the sender terminal;
and transmitting the 5G message, the signature result and the identity certificate to a receiver terminal, so that the receiver terminal feeds back the 5G message to a receiver user after verifying the signature result and the identity certificate.
The specific implementation of the computer-readable storage medium is substantially the same as the specific implementation of the transmission method of the 5G message shown in fig. 1, and is not described herein again.
The present invention also provides a computer-readable storage medium, on which a transmission program of a 5G message is stored, the transmission program of the 5G message, when executed by a processor, implementing the steps of:
acquiring an identity certificate of a sender user, a 5G message and a signature result corresponding to the 5G message, which are transmitted by a sender terminal;
verifying whether the relevant fields in the signature result are valid or not and verifying whether the identity certificate is valid or not;
and when the relevant fields in the signature result are verified to be valid and the identity certificate is verified to be valid, feeding back the 5G message to the user of the receiving party.
The specific implementation of the computer-readable storage medium is substantially the same as the specific implementation of the transmission method of the 5G message shown in fig. 2, and is not described herein again.
It should be noted that the above-mentioned serial numbers of the embodiments of the present application are merely for description, and do not represent the merits of the embodiments. And the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, apparatus, article, or method that includes the element.
Through the description of the foregoing embodiments, it is clear to those skilled in the art that the method of the foregoing embodiments may be implemented by software plus a necessary general hardware platform, and certainly may also be implemented by hardware, but in many cases, the former is a better implementation. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, an electronic device, or a network device) to execute the method according to the embodiments of the present application.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application, or which are directly or indirectly applied to other related technical fields, are included in the scope of the present application.

Claims (10)

1. A transmission method of 5G message is applied to a sender terminal, and is characterized in that the method comprises the following steps:
acquiring a 5G message edited by a sender user;
generating a signature result corresponding to the 5G message based on a secret key corresponding to an identity certificate of a sender user pre-stored in the sender terminal;
and transmitting the 5G message, the signature result and the identity certificate to a receiver terminal, so that the receiver terminal feeds back the 5G message to a receiver user after verifying that the signature result and the identity certificate pass.
2. The method for transmitting the 5G message according to claim 1, wherein the generating the signature result corresponding to the 5G message based on the key corresponding to the identity certificate of the sender user pre-stored in the sender terminal comprises:
and reading a private key corresponding to the identity certificate of the sender user, and signing the 5G message, the number of the sender terminal, the number of the receiver terminal and the sending time of the 5G message by using the private key to obtain the signature result.
3. The method for transmitting the 5G message according to claim 1 or 2, wherein the transmitting the 5G message, the signature result and the identity certificate to a receiving terminal comprises:
transmitting the 5G message, the signature result and the identity certificate to a receiver terminal through a first channel based on the number of the receiver terminal;
or, the 5G message and the signature result are transmitted to the receiver terminal through a first channel based on the number of the receiver terminal, and the identity certificate is transmitted to the receiver terminal through a second channel;
or, the 5G message is transmitted to the receiver terminal through a first channel based on the number of the receiver terminal, and the signature result and the identity certificate are transmitted to the receiver terminal through a second channel.
4. The method of claim 1, wherein the identity certificate and the secret key are stored in a storage path associated with the sender terminal, or the identity certificate and the secret key are stored in a storage path associated with a SIM card of the sender terminal.
5. A transmission method of 5G message is applied to a receiving terminal, and is characterized in that the method comprises the following steps:
acquiring an identity certificate of a sender user, a 5G message and a signature result corresponding to the 5G message, which are transmitted by a sender terminal;
verifying whether the relevant fields in the signature result are valid or not and verifying whether the identity certificate is valid or not;
and when the relevant fields in the signature result are verified to be valid and the identity certificate is verified to be valid, feeding back the 5G message to a receiver user.
6. The method of claim 5G message transmission, wherein the verifying whether the relevant field in the signature result is valid comprises:
acquiring a public key corresponding to the identity certificate, and verifying a relevant field of the signature result by using the public key;
when all fields of the related fields are verified to be successful, the related fields of the signature result are valid;
and when any field of the related fields fails to be verified, the related field of the signature result is invalid.
7. The method for transmitting 5G messages according to claim 5, further comprising:
and when the relevant fields in the signature result are verified to be valid and the identity certificate is verified to pass, displaying the verification result on an interactive interface of the receiver terminal.
8. A sender terminal, characterized in that the sender terminal comprises a memory and a processor connected to the memory, the memory stores a transmission program of a 5G message running on the processor, and when executed by the processor, the transmission program of the 5G message implements the following steps:
acquiring a 5G message edited by a sender user;
generating a signature result corresponding to the 5G message based on a secret key corresponding to an identity certificate of a sender user pre-stored in the sender terminal;
and transmitting the 5G message, the signature result and the identity certificate to a receiver terminal, so that the receiver terminal feeds back the 5G message to a receiver user after verifying the signature result and the identity certificate.
9. A receiving terminal, comprising a memory and a processor connected to the memory, wherein the memory stores a transmission program of a 5G message running on the processor, and the transmission program of the 5G message realizes the following steps when executed by the processor:
acquiring an identity certificate of a sender user, a 5G message and a signature result corresponding to the 5G message, which are transmitted by a sender terminal;
verifying whether the relevant fields in the signature result are valid or not and verifying whether the identity certificate is valid or not;
and when the relevant fields in the signature result are verified to be valid and the identity certificate is verified to be valid, feeding back the 5G message to the user of the receiving party.
10. A transmission system for 5G messages, characterized in that the transmission system for 5G messages is deployed with a sender terminal according to claim 8 and a receiver terminal according to claim 9.
CN202210610073.7A 2022-05-31 2022-05-31 5G message transmission method, terminal and system Active CN115022819B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210610073.7A CN115022819B (en) 2022-05-31 2022-05-31 5G message transmission method, terminal and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210610073.7A CN115022819B (en) 2022-05-31 2022-05-31 5G message transmission method, terminal and system

Publications (2)

Publication Number Publication Date
CN115022819A true CN115022819A (en) 2022-09-06
CN115022819B CN115022819B (en) 2023-12-05

Family

ID=83070566

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210610073.7A Active CN115022819B (en) 2022-05-31 2022-05-31 5G message transmission method, terminal and system

Country Status (1)

Country Link
CN (1) CN115022819B (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101115226A (en) * 2006-07-28 2008-01-30 明基电通股份有限公司 Cover letter checking system and method
CN101183938A (en) * 2007-10-22 2008-05-21 华中科技大学 Wireless network security transmission method, system and equipment
CN101247605A (en) * 2008-03-25 2008-08-20 中兴通讯股份有限公司 Short information enciphering and endorsement method, mobile terminal and short information ciphering system
WO2009154580A1 (en) * 2008-06-20 2009-12-23 Dallab (S) Pte Ltd Secure short message service
CN101626567A (en) * 2009-06-29 2010-01-13 深圳华为通信技术有限公司 Short message sending and receiving method, short message sending and receiving device and mobile terminal
CN101895847A (en) * 2010-08-02 2010-11-24 刘明晶 Short message service authenticated encryption system and method based on digital certificate
CN102104844A (en) * 2009-12-16 2011-06-22 北京邮电大学 Mobile phone encrypted short message structure and method for transmitting and receiving mobile phone encrypted short message by applying same
CN103139774A (en) * 2011-11-30 2013-06-05 中国联合网络通信集团有限公司 Short message service processing method and short message service processing system
WO2014166519A1 (en) * 2013-04-08 2014-10-16 Bonsignore Antonio Salvatore Piero Vittorio A qualified electronic signature system, method and mobile processing terminal for qualified electronic signature
US20160135042A1 (en) * 2014-11-12 2016-05-12 Blackberry Limited Enhanced cell broadcast service via secure group broadcast
CN105681340A (en) * 2016-03-07 2016-06-15 吴晓军 Digital certificate use method and apparatus
BR102014031238A2 (en) * 2014-12-12 2016-07-19 Fundação Cpqd Ct De Pesquisa E Desenvolvimento Em Telecomunicações system and method for secure and compact packaging of short sms text messages
CN107566413A (en) * 2017-10-24 2018-01-09 东信和平科技股份有限公司 A kind of intelligent card security authentication method and system based on data SMS technology
WO2019109727A1 (en) * 2017-12-08 2019-06-13 西安中兴新软件有限责任公司 Identity verification method and apparatus

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101115226A (en) * 2006-07-28 2008-01-30 明基电通股份有限公司 Cover letter checking system and method
CN101183938A (en) * 2007-10-22 2008-05-21 华中科技大学 Wireless network security transmission method, system and equipment
CN101247605A (en) * 2008-03-25 2008-08-20 中兴通讯股份有限公司 Short information enciphering and endorsement method, mobile terminal and short information ciphering system
WO2009154580A1 (en) * 2008-06-20 2009-12-23 Dallab (S) Pte Ltd Secure short message service
CN101626567A (en) * 2009-06-29 2010-01-13 深圳华为通信技术有限公司 Short message sending and receiving method, short message sending and receiving device and mobile terminal
CN102104844A (en) * 2009-12-16 2011-06-22 北京邮电大学 Mobile phone encrypted short message structure and method for transmitting and receiving mobile phone encrypted short message by applying same
CN101895847A (en) * 2010-08-02 2010-11-24 刘明晶 Short message service authenticated encryption system and method based on digital certificate
CN103139774A (en) * 2011-11-30 2013-06-05 中国联合网络通信集团有限公司 Short message service processing method and short message service processing system
WO2014166519A1 (en) * 2013-04-08 2014-10-16 Bonsignore Antonio Salvatore Piero Vittorio A qualified electronic signature system, method and mobile processing terminal for qualified electronic signature
US20160135042A1 (en) * 2014-11-12 2016-05-12 Blackberry Limited Enhanced cell broadcast service via secure group broadcast
BR102014031238A2 (en) * 2014-12-12 2016-07-19 Fundação Cpqd Ct De Pesquisa E Desenvolvimento Em Telecomunicações system and method for secure and compact packaging of short sms text messages
CN105681340A (en) * 2016-03-07 2016-06-15 吴晓军 Digital certificate use method and apparatus
CN107566413A (en) * 2017-10-24 2018-01-09 东信和平科技股份有限公司 A kind of intelligent card security authentication method and system based on data SMS technology
WO2019109727A1 (en) * 2017-12-08 2019-06-13 西安中兴新软件有限责任公司 Identity verification method and apparatus

Also Published As

Publication number Publication date
CN115022819B (en) 2023-12-05

Similar Documents

Publication Publication Date Title
CN101167388B (en) Limited supply access to mobile terminal features
US9112703B2 (en) Use of certificate authority to control a device's access to services
CN108600222B (en) Communication method, system and terminal of client application and trusted application
CN111404696B (en) Collaborative signature method, security service middleware, related platform and system
US20080003980A1 (en) Subsidy-controlled handset device via a sim card using asymmetric verification and method thereof
US11483155B2 (en) Access control using proof-of-possession token
US20170286873A1 (en) Electronic ticket management
CN107566413B (en) Smart card security authentication method and system based on data short message technology
CN106656992B (en) Information verification method
CN113541970B (en) Method and system for using distributed identifier
CN109409034A (en) Verification method, platform, terminal, system, medium and the equipment of application program
CN110247897B (en) System login method, device, gateway and computer readable storage medium
CN109660353A (en) A kind of application program installation method and device
CN107465504A (en) A kind of method and device for improving key safety
CN114845301A (en) Number verification method, terminal and system based on super SIM card
CN115002284A (en) Calling information display method, terminal and system based on private conversation
CN109391473B (en) Electronic signature method, device and storage medium
CN113868713B (en) Data verification method and device, electronic equipment and storage medium
CN111970122B (en) Official APP identification method, mobile terminal and application server
CN113890738A (en) Electronic signature method and device
CN114900577A (en) Calling subscriber identity display method, terminal and system based on super SIM card
CN115022819B (en) 5G message transmission method, terminal and system
CN102547661B (en) Method and device for establishing communication between Android system and telecommunications smart card
CN114640467A (en) Service-based digital certificate query method and system
CN110399714B (en) Method for verifying authenticity of trusted user interface of terminal and system thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant