WO2012071846A1 - 一种加密短消息实现的方法和系统 - Google Patents
一种加密短消息实现的方法和系统 Download PDFInfo
- Publication number
- WO2012071846A1 WO2012071846A1 PCT/CN2011/073192 CN2011073192W WO2012071846A1 WO 2012071846 A1 WO2012071846 A1 WO 2012071846A1 CN 2011073192 W CN2011073192 W CN 2011073192W WO 2012071846 A1 WO2012071846 A1 WO 2012071846A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- short message
- encryption
- sender
- decryption
- receiving
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0471—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying encryption by an intermediary, e.g. receiving clear information at the intermediary and encrypting the received information at the intermediary before forwarding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0464—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
Definitions
- the present invention relates to the field of mobile communications, and in particular, to a method and system for implementing an encrypted short message.
- SMS short message services
- PDU Protocol Data Unit
- the existing short message encryption protection methods mainly include the following:
- (1) (2) (3) are all protected by mobile phone, and (4) (5) are protected on the wireless side and the network side.
- the wireless side and network side protection methods are more important than the mobile side protection method.
- mobile phones are usually in their own hands, and we are paying more attention to the security of SMS in wireless transmission and network transmission.
- the technical problem to be solved by the present invention is to propose a method and system for implementing an encrypted short message to ensure secure transmission of SMS short messages.
- the present invention provides a method for implementing an encrypted short message, comprising: a mobile terminal (MS) of a sender uses an encryption key (CK) of a sender as an encryption factor, and encrypts and transmits a short message to be sent. Go out
- the mobile switching center (MSC) to which the sender's MS belongs uses the sender's CK as a decryption factor, decrypts the short message, and sends the short message through the Internet Information Service Center (IWMSC). Center (SC);
- IWMSC Internet Information Service Center
- the MSC of the receiving party's MS After receiving the short message sent by the SC through the gateway mobile switching center (GMSC), the MSC of the receiving party's MS receives the CK as the encryption factor, encrypts the short message, and sends the short message to the receiver's MS. ;
- the MS of the receiver After receiving the short message, the MS of the receiver uses the CK of the receiver as a decryption factor to decrypt the short message, thereby restoring the content of the short message.
- the above method further has the following features:
- the sender's MS uses the sender's CK as an encryption factor, and the step of encrypting and transmitting the short message to be sent includes: the sender's MS uses the sender's CK as an encryption factor, and sends the message through its own encryption and decryption module.
- the user data part (UD) of the protocol data unit (PDU) of the short message is encrypted, and an encryption identifier is set in the PDU of the short message to be sent, and the short message is sent out;
- the MSC to which the sender's MS belongs After receiving the short message, the MSC to which the sender's MS belongs receives the CK of the sender as a decryption factor, and the step of decrypting the short message includes: the MSC to which the sender's MS belongs receives the short message. Then, if it is determined to be an encrypted short message according to the encrypted identifier therein, the CK of the short message is used by the encryption and decryption module of the sender as the decryption factor.
- the receiving MSC of the receiving MS uses the CK of the receiving party as an encryption factor, and the step of encrypting the short message includes: receiving, by the MSC to which the MS of the receiving party belongs After the short message, if the short message needs to be encrypted according to the encrypted identifier, the CK of the short message is encrypted by using the CK of the receiving party as the encryption factor;
- the MS of the receiving party uses the CK of the receiving party as a decryption factor, and the step of decrypting the short message includes: after the receiving MS receives the short message, if If it is determined that the encrypted short message is based on the encrypted identifier, the CK of the PDU of the short message is decrypted by its own encryption and decryption module using the CK of the receiver as a decryption factor.
- the above method further has the following features:
- the UD of the PDU of the short message is encrypted by the encryption and decryption module of the short message, and then the UD of the short message is encrypted by the MSC.
- the MSC to which the MS of the receiver receives the short message needs to be encrypted according to the encrypted identifier therein, first uses the receiver user identifier as a decryption factor, and uses its own encryption and decryption module to The UD of the short message PDU is decrypted, and then the CK of the short message is encrypted using the CK of the receiver as an encryption factor.
- the above method further has the following features:
- the CK is a random value generated by the MS and the MSC during the authentication process of the party to which it belongs.
- the above method further has the following features:
- the recipient user identifier is the recipient's mobile subscriber number (MSISDN) or the International Mobile Subscriber Identity (IMSI).
- MSISDN mobile subscriber number
- IMSI International Mobile Subscriber Identity
- the above method further has the following features:
- the MS Before the sender's MS encrypts the short message to be sent, the MS provides an interface to the sender user to select whether to send the short message to be sent. If the sender user selects to encrypt, the sender's MS pair The short message to be sent is encrypted.
- the present invention provides a method for transmitting an encrypted short message, comprising: a mobile terminal (MS) of a sender uses an encryption key (CK) of a sender as an encryption factor, and encrypts and transmits a short message to be sent. Go out
- the mobile switching center (MSC) to which the sender's MS belongs uses the sender's CK as a decryption factor, decrypts the short message, and sends the short message through the Internet Information Service Center (IWMSC). Center (SC).
- IWMSC Internet Information Service Center
- the above method further has the following features:
- the sender's MS uses the sender's CK as an encryption factor, and the step of encrypting and transmitting the short message to be sent includes: the sender's MS uses the sender's CK as an encryption factor, and sends the message through its own encryption and decryption module.
- the user data part (UD) of the protocol data unit (PDU) of the short message is encrypted, and an encryption identifier is set in the PDU of the short message to be sent, and the short message is sent out;
- the MSC to which the sender's MS belongs After receiving the short message, the MSC to which the sender's MS belongs receives the CK of the sender as a decryption factor, and the step of decrypting the short message includes: the MSC to which the sender's MS belongs receives the short message. Then, if it is determined to be an encrypted short message according to the encrypted identifier therein, the CK of the PDU of the short message is decrypted by its own encryption and decryption module using the CK of the sender as a decryption factor.
- the above method further has the following features:
- the UD of the PDU of the short message is encrypted by the encryption and decryption module of the short message, and then passed through the encryption and decryption module of the short message.
- the IWMSC is sent to the SC.
- the present invention provides a method for receiving an encrypted short message, comprising: receiving, by a mobile switching center (MSC) to which a mobile terminal (MS) of a receiving end, receives a short message center (SC) through a gateway mobile switching center (GMSC) After the short message is sent, the recipient's encryption key (CK) is used as an encryption factor, and the short message is encrypted and then sent to the recipient's MS;
- MSC mobile switching center
- GMSC gateway mobile switching center
- the MS of the receiver After receiving the short message, the MS of the receiver uses the CK of the receiver as a decryption factor to decrypt the short message, thereby restoring the content of the short message.
- the above method further has the following features:
- the receiving MSC of the receiving MS uses the CK of the receiving party as an encryption factor, and the step of encrypting the short message includes: receiving, by the MSC to which the MS of the receiving party belongs After the short message, if the short message needs to be encrypted according to the encrypted identifier, the CK of the short message is encrypted by using the CK of the receiving party as the encryption factor;
- the MS of the receiving party uses the CK of the receiving party as a decryption factor, and the step of decrypting the short message includes: after the receiving MS receives the short message, if If it is determined that the encrypted short message is based on the encrypted identifier, the CK of the PDU of the short message is decrypted by its own encryption and decryption module using the CK of the receiver as a decryption factor.
- the above method further has the following features:
- the MSC to which the MS of the receiver receives the short message needs to be encrypted according to the encrypted identifier therein, first uses the receiver user identifier as a decryption factor, and passes its own encryption and decryption module.
- the UD of the PDU of the short message is decrypted, and then the UD of the PDU of the short message is encrypted by using the CK of the receiver as an encryption factor.
- the present invention provides a system for implementing an encrypted short message, including an MS of a sender, an MSC to which the sender's MS belongs, an MSC to which the receiver's MS belongs, and an MS of the receiver, the sender
- the MS and the MSC and the MS and the MSC of the receiver are both configured with an encryption and decryption module.
- the sender's MS is set to: Use the sender's CK as the encryption factor, encrypt and send the short message to be sent through its own encryption and decryption module;
- the MSC to which the sender belongs is set to: after receiving the short message, use the CK of the sender as a decryption factor, decrypt the short message through its own encryption and decryption module, and then pass through the Internet Information Service Center (IWMSC). Send to the short message center (SC);
- IWMSC Internet Information Service Center
- the MSC to which the receiver belongs is set to: after receiving the short message sent by the SC through the GMSC, using the CK of the receiver as an encryption factor, encrypting the short message by its own encryption and decryption module, and then transmitting the short message to the receiver.
- the MS of the receiver is configured to: after receiving the short message, use the CK of the receiver as a decryption factor, and decrypt the short message by using its own encryption and decryption module, thereby restoring the content of the short message.
- the present invention provides a mobile terminal (MS), which includes a transmitting module and a receiving module, and further includes an encryption and decryption module, where the encryption and decryption module includes an encryption submodule and a decryption submodule, wherein
- the encryption sub-module is configured to: use the current CK as an encryption factor, encrypt the short message to be sent, and send it through the sending module;
- the decryption sub-module is configured to: decrypt the short message received by the receiving module by using the current CK as a decryption factor, thereby restoring the content of the short message.
- the above MS also has the following characteristics:
- the MS also includes an interface module,
- the interface module is configured to: provide an interface for the user to select whether to encrypt the short message to be sent, and if the encryption is selected, notify the encryption module, so that the encryption module encrypts the short message to be sent.
- the present invention provides an MSC, including a sending module and a receiving module, and further includes an encryption and decryption module, where the encryption and decryption module includes an encryption submodule and a decryption submodule, wherein the decryption submodule is set as:
- the receiving module decrypts the short message by using the sender's CK as a decryption factor, and sends the short message to the short message center (SC) through the sending module;
- the encryption submodule is configured to: when the receiving module receives the short message sent from the SC, use the CK of the receiver as an encryption factor, encrypt the short message, and send the signal to the MS of the receiver through the sending module.
- the MSC has the following features:
- the encryption sub-module is further configured to: after the decryption sub-module uses the sender's CK as a decryption factor, after decrypting the short message, using the receiver user identifier as an encryption factor, encrypting the short message, And then sent to the SC through the sending module;
- the decryption sub-module is further configured to: when the receiving module receives the short message sent from the SC, The short message is decrypted first by using the recipient user identifier as a decryption factor, and the short message is encrypted by the encryption sub-module using the CK of the receiver as an encryption factor.
- the present invention adds a corresponding encryption and decryption module to the MS (Mobile Station, mobile terminal, mobile terminal) and MSC (Mobile Switching Center), using RAND (random Value) Variable CK (Cipher Key)
- Encryption and decryption SMS short message is implemented as an encryption and decryption factor, and the key is highly protected throughout the process, and is not shared between the receiving and transmitting ends, making the encrypted SMS short.
- the message is highly confidential.
- the encryption and decryption module can be provided by a third party, embedded in the terminal and the network device, and the algorithm can be replaced as needed, and is responsible for encrypting and decrypting the short message content data of the SMS.
- the encryption factor is different each time in the solution of the present invention, and the difficulty of cracking from the wireless transmission environment is further increased.
- the security of the entire transmission environment is achieved through an optional configuration.
- FIG. 1 is a schematic structural diagram of an encrypted SMS short message system according to an embodiment of the present invention.
- FIG. 3 is a flow chart of the MS receiving encrypted SMS short message according to the present invention.
- Figure 5 is a flow chart of the short message center SC of the present invention transmitting an encrypted SMS short message to a receiver.
- the basic idea of the present invention is: By configuring an encryption and decryption module in the MS and the MSC, the encryption and decryption module encrypts and decrypts the user data portion (UD User Data) of the SMS short message by using CK (Cipher Key) as an encryption factor, thereby enhancing The security of SMS short messages in a wireless transmission environment.
- CK Cipher Key
- the security of the SMS short message transmission in the subsequent network environment can be implemented by appropriate configuration to achieve the security of the entire transmission environment.
- the method for implementing the encrypted short message in the embodiment of the present invention includes the following steps: Step 1: The sender's MS (which may be referred to as MS A) uses the sender's CK as an encryption factor, encrypts the UD of the short message PDU to be sent by its own encryption and decryption module, and is in the short message to be sent. Setting an encryption identifier in the PDU, and sending the short message;
- Step 1 The sender's MS (which may be referred to as MS A) uses the sender's CK as an encryption factor, encrypts the UD of the short message PDU to be sent by its own encryption and decryption module, and is in the short message to be sent. Setting an encryption identifier in the PDU, and sending the short message;
- Step 2 The short message arrives at the MSC to which the MS A belongs via a BSS (Base Station Subsystem, a base station subsystem, including a BTS (Base Transceiver Station) and a BSC (Base Station Controller), and the MSC receives the short message.
- BSS Base Station Subsystem
- a base station subsystem including a BTS (Base Transceiver Station) and a BSC (Base Station Controller)
- the MSC receives the short message.
- the short message is determined, if it is determined to be an encrypted short message according to the encrypted identifier, the CK of the short message is decrypted by the cryptographic module of the sender, and then the UD of the short message is decrypted by the cryptographic module of the sender.
- the IWMSC Interworking Message Service Center
- SC Service Center, Short Message Center
- Step 3 After receiving the short message sent by the SC through the GMSC (Gateway Mobile Switching Center), the MSC of the receiver's MS is determined to use the encrypted identifier to determine that the short message needs to be encrypted.
- the CK of the receiver is used as an encryption factor, and the UD of the PDU of the short message is encrypted by its own encryption and decryption module, and then sent to the MS of the receiver by the BTS and the BSC to which the receiver's MS belongs (referred to as MS B). ) ;
- Step 4 After receiving the short message, the MS B determines that the encrypted short message is used according to the encrypted identifier, and uses the CK of the receiver as the decryption factor, and the UD of the short message PDU by using the encryption and decryption module of the short message. Decryption is performed to restore the content of the short message.
- steps 1 and 2 are the process of sending the encrypted short message
- steps 3 and 4 are the processes of receiving the encrypted short message.
- step 2 the sender's MS belongs to After decrypting the UD of the short message PDU, the MSC encrypts the UD of the short message by using the encryption and decryption module of the receiver, and then sends the UD of the short message to the SC through the IWMSC;
- step 3 after receiving the short message sent by the SC through the GMSC, the MSC that the MS of the receiver receives, after determining the short message needs to be encrypted according to the encrypted identifier therein, first uses the receiver user identifier as the decryption factor. Decrypting the UD of the short message by its own encryption and decryption module, and using the CK of the receiver as an encryption factor, the PDU of the short message The UD is encrypted.
- steps 2 and 3 above need to exist simultaneously or not at the same time in the entire system to ensure uniformity of the entire system.
- the receiver user identifier is the MSISDN (Mobile Subscriber International ISDN/PSTN number) or the IMSI (International Mobile Subscriber Identification Number) of the receiver.
- MSISDN Mobile Subscriber International ISDN/PSTN number
- IMSI International Mobile Subscriber Identification Number
- the above encryption and decryption module is not limited to the software encryption and decryption module, but may be a hardware encryption and decryption module, and may be a hardware encryption and decryption module capable of updating the encryption algorithm.
- the CK is calculated by the random value ( RAND ) generated by the MS and MSC authentication authentication process and the user's root key ( Ki ) by a specific algorithm (such as the A8 algorithm used in the GSM system).
- RAND is sent to the MS random number during the authentication process of the network to the user during the establishment of the signaling connection.
- Ki is a USIM (Universal Subscriber Identity Module) and the home network's HLR/AUC (Home Location Memory/Authentication Center) shares a security key (128bit).
- the encrypted identifier can be implemented by using a reserved bit of the PDU or by extending the field.
- the MS may provide an interface to the sender user to select whether to encrypt the short message to be sent, and if the encryption is selected, the UD of the PDU to be sent the short message is encrypted.
- the system of the embodiment of the present invention includes the MS of the sender as described above, and the MS of the sender belongs to
- MSC the MSC to which the receiver's MS belongs, and the MS of the receiver.
- the modification is only that the mobile terminal MS and the mobile switching center MSC are configured with an encryption and decryption module, and the inherent flow of other SMS short messages has not been changed.
- FIG. 2 is a flow chart of an MS transmitting an encrypted SMS short message, which depicts an encryption process of a short message.
- the MS uses its own CK (sender CK) as the encryption factor of the encryption and decryption module to the short message PDU user data. Partially encrypt, then set the short message as the encryption short
- the identifier is finally sent through the air interface.
- the reserved bits Bit3 and Bit2 in the DSC data coding standard of the PDU are optionally used as the encryption identifier (the current 11 combination is temporarily unused). This step ensures high security of wireless transmission.
- the normal process is sent directly through the air interface.
- the subsequent description only describes the processing flow for decrypting the short message, because the non-encrypted short message uses the normal flow.
- FIG. 3 is a flow diagram of the MS receiving an encrypted SMS short message, which depicts how the MS receives the encrypted short message.
- the MS When the MS receives a short message, it determines whether the encryption identifier is in the encryption mode. If it is the encryption mode, it uses its own CK (receiver CK) as the decryption factor of the encryption and decryption module to decrypt the short message PDU user data portion to recover. Short message content.
- Figure 4 is a flow chart of sending an encrypted SMS short message to the short message center SC, which shows how the encrypted short message sent by the MS is transmitted to the short message center SC.
- the dotted line unit is an optional step.
- the MSC When the encrypted short message sent by the MS is received by the BSS, it is sent to the MSC for further forwarding.
- the MSC needs to determine whether the short message is an encrypted short message. If yes, it needs to use the sender to share.
- the same CK is decrypted as the decryption factor of the encryption and decryption module decryption algorithm.
- the reason why the decryption is needed is because the short message is performed using the store-and-forward mechanism, and the CK receiver of the sender's authentication acquisition cannot obtain it, so it must be decrypted here. Even if we decrypt here, our approach in the previous process has ensured the high security of the MS to the entire link of the MSC.
- FIG. 5 is a flow of a short message center SC transmitting an encrypted SMS short message to a receiver, which depicts how the SC securely transmits the received short message to the recipient MS.
- the dashed line unit is an optional step, which coexists with the dashed line unit in FIG.
- the SC When the SC receives the short message, the work is further stored and forwarded to the receiver.
- the SC first delivers the full message to the GMSC gateway. After the GMSC, it searches for the MSC to which the multiple receiver belongs to hand the short message to the MSC. After the recipient MS is successfully authenticated, the short message will be forwarded to the receiver MS through the BSS. Before the MSC forwards the short message, it needs to determine whether it has the encrypted short message identifier. If there is no encrypted identifier, it is sent as a normal short message; otherwise, if there is an encrypted identifier, when the optional module is configured in the whole system, the identifier of the receiver is first used as the decryption factor of the encryption and decryption module to decrypt the PDU user data.
- No optional module is the decrypted content itself, no need to perform the decryption operation, and then encrypt the PDU user data by using the CK of the receiver as the encryption factor of the encryption and decryption module for the decrypted content, and then encrypting the short message through the BSS system. Send to the recipient.
- the optional modules must be configured uniformly, which has the advantage of avoiding the transmission of the key and the convenience of updating the encryption and decryption module algorithm.
- the MS of the embodiment of the present invention includes a sending module, a receiving module, and an encryption and decryption module, where the encryption and decryption module includes an encryption submodule and a decryption submodule, where
- the encryption sub-module is configured to: use the current CK as an encryption factor, encrypt the short message to be sent, and send it through the sending module;
- the decryption sub-module is configured to: decrypt the short message received by the receiving module by using the current CK as a decryption factor, thereby restoring the content of the short message.
- the MS further includes an interface module,
- the interface module is configured to: provide an interface for the user to select whether to encrypt the short message to be sent, and if the encryption is selected, notify the encryption module, so that the encryption module encrypts the short message to be sent.
- the MSC of the embodiment of the present invention includes a sending module, a receiving module, and an encryption and decryption module, where the encryption and decryption module includes an encryption submodule and a decryption submodule, where
- the decryption sub-module is configured to: when the receiving module receives the short message sent by the sender's MS, use the sender's CK as a decryption factor, decrypt the short message, and send The module is sent to the sc;
- the encryption submodule is configured to: when the receiving module receives the short message sent from the SC, use the CK of the receiver as an encryption factor, encrypt the short message, and send the signal to the MS of the receiver through the sending module.
- the encryption submodule is further configured to: after the decryption submodule uses the sender's CK as a decryption factor, after decrypting the short message, using the receiver user identifier as an encryption factor, for the short
- the message is encrypted and sent to the SC through the sending module.
- the decrypting sub-module is further configured to: when the receiving module receives the short message sent from the SC, first use the receiver user identifier as a decryption factor to perform the short message. Decrypting, and encrypting the short message by using the CK of the receiver as an encryption factor by the encryption sub-module.
- each module/unit in the foregoing embodiment may be implemented in the form of hardware, or may use software functions.
- the form of the module is implemented. The invention is not limited to any specific form of combination of hardware and software.
- the invention proposes a method and a system for implementing an encrypted short message, by adding a corresponding encryption and decryption module in the MS and the MSC, and using the CK (random value) variable CK as an encryption and decryption factor to implement encryption and decryption SMS short message.
- CK random value
- the encryption factor is different each time, and the difficulty of cracking from the wireless transmission environment is further increased.
- the security of the entire transmission environment is achieved through an optional configuration.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Description
一种加密短消息实现的方法和系统
技术领域
本发明涉及移动通讯领域,尤其涉及一种加密短消息实现的方法和系统。
背景技术
随着手机终端的日益普及, SMS ( short message services, 短消息) 已经 在人们日常生活中扮演者越来越重要的角色, 短消息已经成为人们的一种重 要沟通方式。 正是由于短消息的普及, 短消息的安全问题就变得越来越重要。 因为, 很多时候短消息会传送重要信息, 一旦信息被截获, 可能会给当事人 带来很大损失。 由于目前短消息固有的机制, 消息内容都是使用明文存放在 PDU ( Protocol Data Unit, 协议数据单元)结构中。 如何保证短消息的安全传 输就变成了一个很重要的问题。
现有的短消息加密保护方式主要有以下几种:
( 1 )通过对手机短消息模块添加访问权限以便保护已经收发的短消息不 被非法访问;
( 2 )通过对单条短消息进行特别的权限设置来保护短消息的合法访问;
( 3 )通过加密短消息的内容并通过密钥或密码访问保护短消息;
( 4 )通过扩展短消息 PDU, 增加安全字段和安全内容并以密文方式来 实现短消息的安全传输, 接收方则要解析安全字段去解密最终的短消息;
( 5 )通过协商方式先确定加密信息, 然后进行短消息的发送。
其中, (1 ) ( 2 ) ( 3 )均^^于手机测的保护方法, (4 ) ( 5 )则^^ 于无线侧和网络侧的保护方法。
通常来说无线侧和网络侧的保护方法比手机侧的保护方法更重要, 毕竟 手机通常都在自己手里,我们在这里更加关注无线传输和网络传输中 SMS的 安全性。
已有的在无线侧和网络侧的保护方法通常要扩充或改造短消息 PDU格
式, 另外还要进行加密算法的协商和密钥的传输。 其中密钥和加密算法的传 输本身就是一种不太安全的做法。
发明内容
本发明要解决的技术问题就是提出一种加密短消息实现的方法和系统, 以保证 SMS短消息的安全传输。
为了解决上述问题, 本发明提供一种加密短消息实现的方法, 包括: 发送方的移动终端(MS )使用发送方的加密密钥 (CK )作为加密因子, 对待发送的短消息进行加密再发送出去;
发送方的 MS归属的移动交换中心 (MSC )接收到所述短消息后, 使用 发送方的 CK作为解密因子, 对所述短消息进行解密, 再通过互联信息服务 中心 (IWMSC )发送到短消息中心 (SC ) ;
接收方的 MS 归属的 MSC 接收到所述 SC 通过网关移动交换中心 ( GMSC )发送的短消息后, 使用接收方的 CK作为加密因子, 对所述短消 息进行加密, 再发送给接收方的 MS;
所述接收方的 MS接收到所述短消息后, 则使用接收方的 CK作为解密 因子, 对所述短消息进行解密, 从而恢复所述短消息的内容。
优选地, 上述方法还具有以下特点:
所述发送方的 MS使用发送方的 CK作为加密因子, 对待发送的短消息 进行加密再发送出去的步骤包括: 发送方的 MS使用发送方的 CK作为加密 因子, 通过自身的加解密模块对待发送的短消息的协议数据单元(PDU ) 的 用户数据部分(UD )进行加密, 并在所述待发送短消息的 PDU中设置加密 标识, 将所述短消息发送出去;
所述发送方的 MS归属的 MSC接收到所述短消息后, 使用发送方的 CK 作为解密因子,对所述短消息进行解密的步骤包括:发送方的 MS归属的 MSC 接收到所述短消息后, 若根据其中的加密标识判断为加密短消息, 则使用发 送方的 CK作为解密因子, 通过自身的加解密模块对所述短消息的 PDU的
UD进行解密;
所述接收方的 MS归属的 MSC接收到所述短消息后, 使用接收方的 CK 作为加密因子, 对所述短消息进行加密的步骤包括: 所述接收方的 MS归属 的 MSC接收到所述短消息后,若根据其中的加密标识判断所述短消息需要加 密, 则使用接收方的 CK作为加密因子, 通过自身的加解密模块对所述短消 息的 PDU的 UD进行加密;
所述接收方的 MS接收到所述短消息后, 则使用接收方的 CK作为解密 因子, 对所述短消息进行解密的步骤包括: 所述接收方的 MS接收到所述短 消息后, 若根据其中的加密标识判断为加密短消息, 则使用接收方的 CK作 为解密因子, 通过自身的加解密模块对所述短消息的 PDU的 UD进行解密。
优选地, 上述方法还具有以下特点:
发送方的 MS归属的 MSC对所述短消息的 PDU的 UD进行解密后, 使 用接收方用户标识作为加密因子, 通过自身的加解密模块对所述短消息的 PDU的 UD进行加密, 再通过 IWMSC发送到 SC;
接收方的 MS归属的 MSC接收到 SC通过 GMSC发送的短消息后,若根 据其中的加密标识判断所述短消息需要加密, 先使用接收方用户标识作为解 密因子, 通过自身的加解密模块对所述短消息的 PDU的 UD进行解密, 之后 再使用接收方的 CK作为加密因子, 对所述短消息的 PDU的 UD进行加密。
优选地, 上述方法还具有以下特点:
所述 CK是其所属方的由 MS 和 MSC鉴权认证过程中产生的随机值
( RAND )和用户的根密钥 (Ki )通过特定算法计算获得。
优选地, 上述方法还具有以下特点:
所述接收方用户标识为接收方的移动用户号码(MSISDN )或是国际移 动用户识别码(IMSI ) 。
优选地, 上述方法还具有以下特点:
所述发送方的 MS对待发送的短消息进行加密之前, 所述 MS提供界面 给发送方用户选择是否对待发送的短消息进行加密, 若所述发送方用户选择 加密, 所述发送方的 MS对所述待发送的短消息进行加密。
为了解决上述问题, 本发明提供一种加密短消息发送的方法, 包括: 发送方的移动终端(MS )使用发送方的加密密钥 (CK )作为加密因子, 对待发送的短消息进行加密再发送出去;
发送方的 MS归属的移动交换中心 (MSC )接收到所述短消息后, 使用 发送方的 CK作为解密因子, 对所述短消息进行解密, 再通过互联信息服务 中心 (IWMSC )发送到短消息中心 (SC ) 。
优选地, 上述方法还具有以下特点:
所述发送方的 MS使用发送方的 CK作为加密因子, 对待发送的短消息 进行加密再发送出去的步骤包括: 发送方的 MS使用发送方的 CK作为加密 因子, 通过自身的加解密模块对待发送的短消息的协议数据单元( PDU ) 的 用户数据部分(UD )进行加密, 并在所述待发送短消息的 PDU中设置加密 标识, 将所述短消息发送出去;
所述发送方的 MS归属的 MSC接收到所述短消息后, 使用发送方的 CK 作为解密因子,对所述短消息进行解密的步骤包括:发送方的 MS归属的 MSC 接收到所述短消息后, 若根据其中的加密标识判断为加密短消息, 则使用发 送方的 CK作为解密因子, 通过自身的加解密模块对所述短消息的 PDU的 UD进行解密。
优选地, 上述方法还具有以下特点:
发送方的 MS归属的 MSC对所述短消息的 PDU的 UD进行解密后, 使 用接收方用户标识作为加密因子, 通过自身的加解密模块对所述短消息的 PDU的 UD进行加密, 之后再通过 IWMSC发送到 SC。
为了解决上述问题, 本发明提供一种加密短消息接收的方法, 包括: 接收方的移动终端(MS )归属的移动交换中心(MSC )接收到短消息中 心 ( SC )通过网关移动交换中心 (GMSC )发送的短消息后, 使用接收方的 加密密钥(CK )作为加密因子, 对所述短消息进行加密, 再发送给接收方的 MS;
所述接收方的 MS接收到所述短消息后, 则使用接收方的 CK作为解密 因子, 对所述短消息进行解密, 从而恢复所述短消息的内容。
优选地, 上述方法还具有以下特点:
所述接收方的 MS归属的 MSC接收到所述短消息后, 使用接收方的 CK 作为加密因子, 对所述短消息进行加密的步骤包括: 所述接收方的 MS归属 的 MSC接收到所述短消息后,若根据其中的加密标识判断所述短消息需要加 密, 则使用接收方的 CK作为加密因子, 通过自身的加解密模块对所述短消 息的 PDU的 UD进行加密;
所述接收方的 MS接收到所述短消息后, 则使用接收方的 CK作为解密 因子, 对所述短消息进行解密的步骤包括: 所述接收方的 MS接收到所述短 消息后, 若根据其中的加密标识判断为加密短消息, 则使用接收方的 CK作 为解密因子, 通过自身的加解密模块对所述短消息的 PDU的 UD进行解密。
优选地, 上述方法还具有以下特点:
所述接收方的 MS归属的 MSC接收到 SC通过 GMSC发送的短消息后, 若根据其中的加密标识判断所述短消息需要加密, 先使用接收方用户标识作 为解密因子, 通过自身的加解密模块对所述短消息的 PDU的 UD进行解密, 之后再使用接收方的 CK作为加密因子, 对所述短消息的 PDU的 UD进行加 密。
为了解决上述问题, 本发明提供一种加密短消息实现的系统, 包括发送 方的 MS、 发送方的 MS归属的 MSC、 接收方的 MS归属的 MSC、 所述接收 方的 MS, 所述发送方的 MS和 MSC以及所述接收方的 MS和 MSC均配置 有加解密模块,
发送方的 MS设置为: 使用发送方的 CK作为加密因子, 通过自身的加 解密模块对待发送的短消息进行加密再发送出去;
发送方的 MS归属的 MSC设置为: 接收到所述短消息后,使用发送方的 CK作为解密因子,通过自身的加解密模块对所述短消息进行解密,再通过互 联信息服务中心 (IWMSC )发送到短消息中心 (SC ) ;
接收方的 MS归属的 MSC设置为:接收到 SC通过 GMSC发送的短消息 后, 使用接收方的 CK作为加密因子, 通过自身的加解密模块对所述短消息 进行加密, 再发送给接收方的 MS;
所述接收方的 MS设置为: 接收到所述短消息后, 使用接收方的 CK作 为解密因子, 通过自身的加解密模块对所述短消息进行解密, 从而恢复所述 短消息的内容。
为了解决上述问题, 本发明提供一种移动终端(MS ) , 包括发送模块和 接收模块, 还包括加解密模块, 所述加解密模块包括加密子模块和解密子模 块, 其中,
所述加密子模块设置为: 使用当前的 CK作为加密因子, 对待发送的短 消息进行加密, 通过所述发送模块发送出去;
所述解密子模块设置为: 使用当前的 CK作为解密因子, 对所述接收模 块接收到的短消息进行解密, 从而恢复所述短消息的内容。
优选地, 上述 MS还具有以下特点:
所述 MS还包括界面模块,
所述界面模块设置为: 提供界面给用户选择是否对待发送的短消息进行 加密, 若选择加密, 则告知所述加密模块, 使加密模块对所述待发送的短消 息进行加密。
为了解决上述问题, 本发明提供一种 MSC, 包括发送模块和接收模块, 还包括加解密模块, 所述加解密模块包括加密子模块和解密子模块, 其中, 所述解密子模块设置为: 当接收模块接收到从发送方的 MS发来的短消 息时, 使用发送方的 CK作为解密因子, 对所述短消息进行解密, 通过发送 模块发送给短消息中心 ( SC ) ;
所述加密子模块设置为: 当接收模块接收到从 SC发来的短消息时, 使 用接收方的 CK作为加密因子, 对所述短消息进行加密, 通过发送模块发送 给接收方的 MS。
优选地, 上述 MSC还具有以下特点:
所述加密子模块还设置为: 在所述解密子模块使用发送方的 CK作为解 密因子, 对所述短消息进行解密之后, 使用接收方用户标识作为加密因子, 对所述短消息进行加密, 再通过发送模块发送给 SC;
所述解密子模块还设置为: 当接收模块接收到从 SC发来的短消息时,
先使用接收方用户标识作为解密因子对所述短消息进行解密, 再通过加密子 模块使用接收方的 CK作为加密因子, 对所述短消息进行加密。
与现有技术相比较, 本发明通过在 MS ( Mobile Station , 移动台, 即移 动终端 )和 MSC ( Mobile Switching Center, 移动交换中心 ) 中添力 P相应的加 解密模块, 利用随着 RAND (随机值 )可变的 CK ( Cipher Key, 加密密钥 ) 作为加解密因子实现加解密 SMS短消息, 且整个过程中密钥被高度保护起 来, 在接收和发送端之间不共享, 使得加密 SMS短消息具有高度机密性。 并 且加解密模块可以由第三方提供, 嵌入终端及网络设备中, 设置可根据需要 更换算法, 负责对 SMS短消息内容数据进行加解密运算。 这样即使网络, 终 端设备商和运营商都无法对加密 SMS短消息进行窃取。且本发明的方案中加 密因子每次都不同, 更加大了从无线传输环境中进行破解难度。 另外, 通过 可选配置可实现整个传输环境的安全性。
附图概述
图 1 是本发明实施例的加密 SMS短消息系统结构示意图;
图 2 是本发明 MS发送加密 SMS短消息流程;
图 3 是本发明 MS接收加密 SMS短消息流程;
图 4 是本发明加密 SMS短消息发送到短消息中心 SC流程;
图 5 是本发明短消息中心 SC发送加密 SMS短消息到接收方流程。
本发明的较佳实施方式
本发明的基本思想是: 通过在 MS、 MSC配置加解密模块, 加解密模块 使用 CK(Cipher Key 密钥)作为加密因子对 SMS短消息的用户数据部分(UD User Data )进行加解密, 从而加强 SMS短消息在无线传输环境的安全性。 可 选的,还可以通过适当配置实现 SMS短消息在后续网络环境中传输的安全性 以便实现整个传输环境的安全性。
本发明实施例的加密短消息实现方法包括如下步骤:
步骤 1 , 发送方的 MS (可称为 MS A )使用发送方的 CK作为加密因子, 通过自身的加解密模块对待发送的短消息的 PDU的 UD进行加密,并在所述 待发送短消息的 PDU中设置加密标识, 将所述短消息发送出去;
步骤 2, 所述短消息经 BSS ( Base Station Subsystem, 基站子系统, 包括 BTS ( Base Transceiver Station, 基站收发台 )和 BSC ( Base Station Controller, 基站控制器)到达 MS A归属的 MSC, 该 MSC接收到所述短消息后, 若根 据其中的加密标识判断为加密短消息, 则使用发送方的 CK作为解密因子, 通过自身的加解密模块对所述短消息的 PDU的 UD进行解密,再通过短消息 中心的关口局 IWMSC ( Interworking Message Service Center,互联信息服务中 心)发送到 SC ( Service Center , 短消息中心) ;
步骤 3 ,接收方的 MS归属的 MSC接收到所述 SC通过 GMSC ( Gateway Mobile Switching Center , 网关移动交换中心)发送的短消息后, 若根据其中 的加密标识判断所述短消息需要加密, 则使用接收方的 CK作为加密因子, 通过自身的加解密模块对所述短消息的 PDU的 UD进行加密,再经接收方的 MS归属的 BTS和 BSC, 发送给接收方的 MS (可称为 MS B ) ;
步骤 4, MS B接收到所述短消息后, 若根据其中的加密标识判断为加密 短消息, 则使用接收方的 CK作为解密因子, 通过自身的加解密模块对所述 短消息的 PDU的 UD进行解密, 从而恢复所述短消息的内容。
其中, 上述步骤 1和 2为发送加密短消息的流程, 步骤 3和 4为接收加 密短消息的流程。
上述步骤可以保证无线链路以及 MS到 MSC之间 SMS短消息的安全传 输, 为了保证 MSC-IWMSCSC-GMSC-MSC链路的安全传输, 可选地, 在步 骤 2中,发送方的 MS归属的 MSC对所述短消息的 PDU的 UD进行解密后, 使用接收方用户标识作为加密因子, 通过自身的加解密模块对所述短消息的 PDU的 UD进行加密, 再通过 IWMSC发送到 SC;
相应地, 在步骤 3中, 接收方的 MS归属的 MSC接收到 SC通过 GMSC 发送的短消息后, 若根据其中的加密标识判断所述短消息需要加密, 先使用 接收方用户标识作为解密因子, 通过自身的加解密模块对所述短消息的 PDU 的 UD进行解密, 再使用接收方的 CK作为加密因子, 对所述短消息的 PDU
的 UD进行加密。
上述步骤 2和步骤 3的可选步骤(使用接收方用户标识作为加密因子进 行加解密 )需要在整个系统中同时存在或同时不存在以保证整个系统的统一。
上述接收方用户标识为接收方的 MSISDN( Mobile Subscriber International ISDN/PSTN number, 移动用户号码)或 IMSI ( International Mobile Subscriber Identification Number , 是国际移动用户识别码) 。
上述加解密模块不仅限于软件加解密模块,而且可以是硬件加解密模块, 更可以是能够更新加密算法的硬件加解密模块。
所述 CK是由 MS和 MSC鉴权认证过程中产生的随机值 ( RAND )和用 户的根密钥( Ki )通过特定算法(如在 GSM系统中使用 A8算法)计算获得。 RAND是在信令连接建立过程中网络对用户的鉴权认证过程中发给 MS随机 数。 Ki是 USIM ( Universal Subscriber Identity Module, 全球用户识别卡)和 归属网络的 HLR/AUC (归属位置存储器 /鉴权中心) 共享一个安全密钥 ( 128bit ) 。
所述加密标识可以使用 PDU的保留 Bit位或者通过扩充字段实现等方式 实现。
另外, 步骤 1中, 可选地, MS可提供界面给发送方用户选择是否对待发 送的短消息进行加密, 若选择加密, 才对待发送的短消息的 PDU的 UD进行 加密。
本发明实施例的系统包括如上所述的发送方的 MS、发送方的 MS归属的
MSC、 接收方的 MS归属的 MSC、 接收方的 MS。
本发明为了更加安全的传输加密短消息, 所做的改动仅仅是在移动终端 MS和移动交换中心 MSC配置了加解密模块, 其他 SMS短消息的固有流程 并没有做任何改变。
图 2是 MS发送加密 SMS短消息流程, 该图描述了短消息的加密过程。 当用户编辑完短消息并组织好短消息 PDU数据准备发送前,如果用户选 择的是加密短消息, 则 MS使用自己的 CK (发送方 CK )作为加解密模块的 加密因子对短消息 PDU用户数据部分进行加密,然后设置短消息为加密短消
息标识, 最后通过空口发送。 作为具体实施, 可选使用 PDU的 DSC数据编 码标准中的保留位 Bit3和 Bit2为 11来作为加密标识(目前 11组合暂未使用)。 该步骤可以保证无线传输的高安全性。 如果用户选择的是非加密短消息, 则 走正常流程直接通过空口发送。 为了简化说明, 后续描述只描述解密短消息 的处理流程, 因为, 非加密短消息都是使用正常流程。
图 3是 MS接收加密 SMS短消息流程, 该图描述了 MS如何接收加密短 消息。
当 MS收到一条短消息时, 判断加密标识是否为加密模式, 如果是加密 模式, 则使用自己的 CK (接收方 CK )作为加解密模块的解密因子对短消息 PDU用户数据部分进行解密从而恢复短消息内容。
图 4是加密 SMS短消息发送到短消息中心 SC流程, 该图描述了 MS发 出的加密短消息是如何传输到短消息中心 SC。其中,虚线单元为可选的步骤。
当 MS发送的加密短消息被 BSS接收后会被送到 MSC进行进一步的转 发, MSC在收到短消息 PDU时需要判断该短消息是否是加密短消息, 如果 是, 则需要使用发送方共享的同样的 CK作为加解密模块解密算法的解密因 子对齐进行解密。 这里说明一点, 之所以需要解密是因为短消息是使用存储 转发机制进行的, 发送方的鉴权获取的 CK接收方是无法获得的, 所以这里 必须解密。即使在这里解密,我们在之前的过程中的做法已经保证 MS到 MSC 整个链路的高安全性。 为了保证 MSC到 SC之间的链路的高安全性, 我们可 以可选的进行进一步的加密操作, 为了保证加密的操作可被正确解密, 我们 选择接收方的标识(作为示例, 可选 MSISDN号)作为加密因子对刚解密的 短消息进行加密操作。 之后, 加密的短消息在传递到 IWMSC以及最终到达 SC是均是被加密存储的。 从而保证了 MSC到 SC之间的链路的安全性。 这 里只要保证加解密算法的安全即可保证整个链路的安全。 当然, 图中的可选 部分可以不使用, 那么后续传送的就是只有加密标识的明文短消息, MSC到 SC链路安全性会受到一定的损失。
图 5是短消息中心 SC发送加密 SMS短消息到接收方流程, 该图描述了 SC如何将收到的短消息安全传输到接收方 MS。其中,虚线单元为可选步骤, 与图 4中的虚线单元同时存在。
当 SC收到短消息后的工作就是进一步的存储转发给接收方, SC首先将 全消息交给 GMSC关口局, GMSC之后会查找多接收方所属的 MSC把短消 息进一步交给 MSC, MSC寻呼到接收方 MS并成功鉴权认证后,将会把短消 息通过 BSS转发给接收方 MS。在 MSC转发短消息前, 需要判断是否是具有 加密短消息标识。 如果没有加密标识, 做把它作为正常短消息发送; 否则, 如果有加密标识, 在整个系统配置可选模块时首先是由接收方的标识作为加 解密模块的解密因子对 PDU用户数据进行解密,没有可选模块是本身就是解 密的内容, 无需进行解密操作, 之后对解密的内容使用接收方的 CK作为加 解密模块的加密因子完成对 PDU用户数据进行加密, 之后通过 BSS系统将 加密的短消息发送给接收方。 这里需要说明的是, 可选模块必须整个统一配 置, 好处就是避免了密钥的传输, 以及后续更新加解密模块算法的便利。
相应的, 本发明实施例的 MS, 包括发送模块、 接收模块和加解密模块, 所述加解密模块包括加密子模块和解密子模块, 其中,
所述加密子模块设置为: 使用当前的 CK作为加密因子, 对待发送的短 消息进行加密, 通过所述发送模块发送出去;
所述解密子模块设置为: 使用当前的 CK作为解密因子, 对所述接收模 块接收到的短消息进行解密, 从而恢复所述短消息的内容。
可选地, 所述 MS还包括界面模块,
所述界面模块设置为: 提供界面给用户选择是否对待发送的短消息进行 加密, 若选择加密, 则告知所述加密模块, 使加密模块对所述待发送的短消 息进行加密。
相应的,本发明实施例的 MSC, 包括发送模块、接收模块和加解密模块, 所述加解密模块包括加密子模块和解密子模块, 其中,
所述解密子模块设置为: 当接收模块接收到从发送方的 MS发来的短消 息时, 使用发送方的 CK作为解密因子, 对所述短消息进行解密, 通过发送
模块发送给 sc;
所述加密子模块设置为: 当接收模块接收到从 SC发来的短消息时, 使 用接收方的 CK作为加密因子, 对所述短消息进行加密, 通过发送模块发送 给接收方的 MS。
可选地, 所述加密子模块进一步设置为: 在所述解密子模块使用发送方 的 CK作为解密因子, 对所述短消息进行解密之后, 使用接收方用户标识作 为加密因子, 对所述短消息进行加密, 再通过发送模块发送给 SC; 所述解密 子模块进一步设置为: 当接收模块接收到从 SC发来的短消息时, 先使用接 收方用户标识作为解密因子对所述短消息进行解密, 再通过加密子模块使用 接收方的 CK作为加密因子, 对所述短消息进行加密。
本领域普通技术人员可以理解上述方法中的全部或部分步骤可通过程序 来指令相关硬件完成, 所述程序可以存储于计算机可读存储介质中, 如只读 存储器、 磁盘或光盘等。 可选地, 上述实施例的全部或部分步骤也可以使用 一个或多个集成电路来实现, 相应地, 上述实施例中的各模块 /单元可以釆用 硬件的形式实现, 也可以釆用软件功能模块的形式实现。 本发明不限制于任 何特定形式的硬件和软件的结合。
以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本 领域的技术人员来说, 本发明可以有各种更改和变化。 凡在本发明的精神和 原则之内, 所作的任何修改、 等同替换、 改进等, 均应包含在本发明的保护 范围之内。
工业实用性
本发明要提出一种加密短消息实现的方法和系统,通过在 MS和 MSC中 添加相应的加解密模块, 利用随着 RAND (随机值 )可变的 CK作为加解密 因子实现加解密 SMS短消息, 以保证网络, 终端设备商和运营商都无法对加 密 SMS短消息进行窃取, 保证 SMS短消息的安全传输。 本发明的方案中加 密因子每次都不同, 更加大了从无线传输环境中进行破解难度。 另外, 通过 可选配置可实现整个传输环境的安全性。
Claims
1、 一种加密短消息实现的方法, 包括:
发送方的移动终端 (MS )使用所述发送方的加密密钥 (CK )作为加密 因子, 对待发送的短消息进行加密后发送出去;
所述发送方的 MS归属的移动交换中心 (MSC )接收到所述短消息后, 使用所述发送方的 CK作为解密因子, 对所述短消息进行解密, 再通过互联 信息服务中心 (IWMSC )发送到短消息中心 (SC ) ;
接收方的 MS 归属的 MSC 接收到所述 SC 通过网关移动交换中心 ( GMSC )发送的短消息后, 使用所述接收方的 CK作为加密因子, 对所述 短消息进行加密, 再发送给所述接收方的 MS;
所述接收方的 MS接收到所述短消息后, 则使用所述接收方的 CK作为 解密因子, 对所述短消息进行解密, 从而恢复所述短消息的内容。
2、 如权利要求 1所述的方法, 其中,
所述发送方的 MS使用发送方的 CK作为加密因子, 对待发送的短消息 进行加密后发送出去的步骤包括: 所述发送方的 MS使用所述发送方的 CK 作为加密因子, 通过自身的加解密模块对待发送的短消息的协议数据单元 ( PDU ) 的用户数据部分(UD )进行加密, 并在所述待发送短消息的 PDU 中设置加密标识, 将所述短消息发送出去;
所述发送方的 MS归属的 MSC接收到所述短消息后,使用所述发送方的 CK作为解密因子,对所述短消息进行解密的步骤包括: 所述发送方的 MS归 属的 MSC接收到所述短消息后,若根据其中的所述加密标识判断所述短消息 为加密短消息, 则使用所述发送方的 CK作为解密因子, 通过自身的加解密 模块对所述短消息的 PDU的 UD进行解密;
所述接收方的 MS归属的 MSC接收到所述短消息后,使用所述接收方的 CK作为加密因子,对所述短消息进行加密的步骤包括: 所述接收方的 MS归 属的 MSC接收到所述短消息后,若根据其中的加密标识判断所述短消息需要 加密, 则使用接收方的 CK作为加密因子, 通过自身的加解密模块对所述短 消息的 PDU的 UD进行加密; 所述接收方的 MS接收到所述短消息后, 则使用所述接收方的 CK作为 解密因子, 对所述短消息进行解密的步骤包括: 所述接收方的 MS接收到所 述短消息后, 若根据其中的加密标识判断所述短消息为加密短消息, 则使用 所述接收方的 CK作为解密因子, 通过自身的加解密模块对所述短消息的 PDU的 UD进行解密。
3、 如权利要求 2所述的方法, 其还包括:
所述发送方的 MS归属的 MSC对所述短消息的 PDU的 UD进行解密后, 使用所述接收方用户标识作为加密因子, 通过自身的加解密模块对所述短消 息的 PDU的 UD进行加密, 再通过所述 IWMSC发送到 SC;
所述接收方的 MS归属的 MSC接收到 SC通过 GMSC发送的短消息后, 若根据其中的加密标识判断所述短消息需要加密, 先使用所述接收方用户标 识作为解密因子,通过自身的加解密模块对所述短消息的 PDU的 UD进行解 密, 之后再使用所述接收方的 CK作为加密因子, 对所述短消息的 PDU的 UD进行力口密。
4、 如权利要求 1所述的方法, 其中,
所述 CK是由其所属方的 MS 和 MSC鉴权认证过程中产生的随机值 ( RAND )和用户的根密钥 (Ki )通过特定算法计算获得。
5、 如权利要求 3所述的方法, 其中,
所述接收方用户标识为接收方的移动用户号码(MSISDN )或是国际移 动用户识别码(IMSI ) 。
6、 如权利要求 1 ~ 5中任意一项所述的方法, 其还包括:
所述发送方的 MS对所述待发送的短消息进行加密之前, 所述 MS提供 界面给所述发送方用户选择是否对所述待发送的短消息进行加密, 若所述发 送方用户选择加密, 所述发送方的 MS对所述待发送的短消息进行加密。
7、 一种加密短消息发送的方法, 包括:
发送方的移动终端(MS )使用发送方的加密密钥 (CK )作为加密因子, 对待发送的短消息进行加密后发送出去;
所述发送方的 MS归属的移动交换中心 (MSC )接收到所述短消息后, 使用所述发送方的 CK作为解密因子, 对所述短消息进行解密, 再通过互联 信息服务中心 (IWMSC )发送到短消息中心 (SC ) 。
8、 如权利要求 7所述的方法, 其中,
所述发送方的 MS使用所述发送方的 CK作为加密因子, 对待发送的短 消息进行加密后发送出去的步骤包括: 所述发送方的 MS使用所述发送方的 CK作为加密因子,通过自身的加解密模块对所述待发送的短消息的协议数据 单元 (PDU ) 的用户数据部分(UD )进行加密, 并在所述待发送短消息的 PDU中设置加密标识, 将所述短消息发送出去;
所述发送方的 MS归属的 MSC接收到所述短消息后,使用所述发送方的 CK作为解密因子,对所述短消息进行解密的步骤包括: 所述发送方的 MS归 属的 MSC接收到所述短消息后,若根据其中的加密标识判断所述短消息为加 密短消息, 则使用所述发送方的 CK作为解密因子, 通过自身的加解密模块 对所述短消息的 PDU的 UD进行解密。
9、 如权利要求 8所述的方法, 其还包括:
所述发送方的 MS归属的 MSC对所述短消息的 PDU的 UD进行解密后, 使用所述接收方用户标识作为加密因子, 通过自身的加解密模块对所述短消 息的 PDU的 UD进行加密, 之后再通过所述 IWMSC发送到所述 SC。
10、 一种加密短消息接收的方法, 包括:
接收方的移动终端(MS )归属的移动交换中心(MSC )接收到短消息中 心 ( SC )通过网关移动交换中心 (GMSC )发送的短消息后, 使用所述接收 方的加密密钥(CK )作为加密因子, 对所述短消息进行加密, 再发送给所述 接收方的 MS;
所述接收方的 MS接收到所述短消息后, 则使用所述接收方的 CK作为 解密因子, 对所述短消息进行解密, 从而恢复所述短消息的内容。
11、 如权利要求 10所述的方法, 其中,
所述接收方的 MS归属的 MSC接收到所述短消息后,使用所述接收方的 CK作为加密因子,对所述短消息进行加密的步骤包括: 所述接收方的 MS归 属的 MSC接收到所述短消息后,若根据其中的加密标识判断所述短消息需要 加密, 则使用所述接收方的 CK作为加密因子, 通过自身的加解密模块对所 述短消息的 PDU的 UD进行加密;
所述接收方的 MS接收到所述短消息后, 则使用所述接收方的 CK作为 解密因子, 对所述短消息进行解密的步骤包括: 所述接收方的 MS接收到所 述短消息后, 若根据其中的加密标识判断所述短消息为加密短消息, 则使用 所述接收方的 CK作为解密因子, 通过自身的加解密模块对所述短消息的 PDU的 UD进行解密。
12、 如权利要求 11所述的方法, 其还包括:
所述接收方的 MS归属的 MSC接收到 SC通过 GMSC发送的短消息后, 若根据其中的加密标识判断所述短消息为需要加密, 先使用所述接收方用户 标识作为解密因子,通过自身的加解密模块对所述短消息的 PDU的 UD进行 解密, 之后再使用所述接收方的 CK作为加密因子, 对所述短消息的 PDU的 UD进行力口密。
13、 一种加密短消息实现的系统, 包括发送方的移动终端(MS ) 、 所述 发送方的 MS归属的移动交换中心(MSC ) 、 接收方的 MS归属的 MSC、 所 述接收方的 MS, 所述发送方的 MS和 MSC以及所述接收方的 MS和 MSC 均配置有加解密模块, 其中,
所述发送方的 MS设置为: 使用所述发送方的加密密钥(CK )作为加密 因子, 通过自身的加解密模块对待发送的短消息进行加密再发送出去;
所述发送方的 MS归属的 MSC设置为: 接收到所述短消息后,使用所述 发送方的 CK作为解密因子, 通过自身的加解密模块对所述短消息进行解密, 再通过互联信息服务中心 (IWMSC )发送到短消息中心 (SC ) ;
所述接收方的 MS归属的 MSC设置为: 接收到所述 SC通过网关移动交 换中心 (GMSC )发送的短消息后, 使用所述接收方的 CK作为加密因子, 通过自身的加解密模块对所述短消息进行加密, 再发送给所述接收方的 MS;
所述接收方的 MS用于接收到所述短消息后, 使用所述接收方的 CK作 为解密因子, 通过自身的加解密模块对所述短消息进行解密, 从而恢复所述 短消息的内容。
14、 一种移动终端(MS ) , 包括发送模块、 接收模块和加解密模块, 其 中所述加解密模块包括加密子模块和解密子模块, 其中,
所述加密子模块设置为: 使用当前的加密密钥(CK )作为加密因子, 对 待发送的短消息进行加密, 通过所述发送模块发送出去;
所述解密子模块设置为: 使用当前的 CK作为解密因子, 对所述接收模 块接收到的短消息进行解密, 从而恢复所述短消息的内容。
15、 如权利要求 14所述的 MS, 其还包括界面模块,
所述界面模块设置为: 提供界面给用户选择是否对所述待发送的短消息 进行加密, 若所述用户选择加密, 则通知所述加密模块对所述待发送的短消 息进行加密。
16、 一种移动交换中心 (MSC ) , 包括发送模块、 接收模块和加解密模 块, 其中所述加解密模块包括加密子模块和解密子模块, 其中,
所述解密子模块设置为: 当所述接收模块接收到从发送方的移动终端 ( MS )发来的短消息时, 使用所述发送方的加密密钥 (CK )作为解密因子, 对所述短消息进行解密, 通过所述发送模块发送给短消息中心 ( SC ) ;
所述加密子模块设置为: 当所述接收模块接收到从所述 SC发来的短消 息时, 使用接收方的 CK作为加密因子, 对所述短消息进行加密, 通过所述 发送模块发送给所述接收方的 MS。
17、 如权利要求 16所述的 MSC, 其中,
所述加密子模块还设置为: 在所述解密子模块使用所述发送方的 CK作 为解密因子, 对所述短消息进行解密之后, 使用所述接收方用户标识作为加 密因子, 对所述短消息进行加密, 再通过所述发送模块发送给 SC;
所述解密子模块还设置为: 当所述接收模块接收到从 SC发来的短消息 时, 先使用所述接收方用户标识作为解密因子对所述短消息进行解密, 再通 过所述加密子模块使用所述接收方的 CK作为加密因子, 对所述短消息进行 加密。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/641,517 US20130238891A1 (en) | 2010-12-01 | 2011-04-22 | Method and System for Encrypting Short Message |
EP11844921.4A EP2549778B1 (en) | 2010-12-01 | 2011-04-22 | Method and system for encrypting short message |
ES11844921.4T ES2589681T3 (es) | 2010-12-01 | 2011-04-22 | Procedimiento y sistema para cifrar mensajes cortos |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010568985.X | 2010-12-01 | ||
CN201010568985XA CN102045669A (zh) | 2010-12-01 | 2010-12-01 | 一种加密短消息实现的方法和系统 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2012071846A1 true WO2012071846A1 (zh) | 2012-06-07 |
Family
ID=43911337
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2011/073192 WO2012071846A1 (zh) | 2010-12-01 | 2011-04-22 | 一种加密短消息实现的方法和系统 |
Country Status (5)
Country | Link |
---|---|
US (1) | US20130238891A1 (zh) |
EP (1) | EP2549778B1 (zh) |
CN (1) | CN102045669A (zh) |
ES (1) | ES2589681T3 (zh) |
WO (1) | WO2012071846A1 (zh) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102932781B (zh) * | 2011-08-09 | 2018-01-05 | 中兴通讯股份有限公司 | 一种usim卡短信加密处理方法 |
DE102013101611B3 (de) * | 2013-02-19 | 2014-07-10 | HvS-Consulting AG | Verschlüsselungsverfahren für e-mails |
CN103945348A (zh) * | 2014-04-25 | 2014-07-23 | 长沙市梦马软件有限公司 | 一种非对称密钥短信加密方法和系统 |
CN104955091B (zh) * | 2015-04-29 | 2016-10-19 | 努比亚技术有限公司 | 测试的方法及装置 |
CN106658487B (zh) * | 2016-09-26 | 2020-07-14 | 惠州Tcl移动通信有限公司 | 一种基于混沌算法的短消息保密通信方法及系统 |
CN106453526A (zh) * | 2016-09-27 | 2017-02-22 | 北京奇虎科技有限公司 | 移动终端以及保密短信的方法和装置 |
CN107509181A (zh) * | 2017-10-11 | 2017-12-22 | 杨传杰 | 一种手机短信的加密方法 |
CN111460473A (zh) * | 2020-03-23 | 2020-07-28 | 深圳市中易通安全芯科技有限公司 | 数据加密和解密方法、插件、数据安全系统及介质 |
CN114727238B (zh) * | 2022-04-11 | 2024-01-30 | 中国电信股份有限公司 | 消息传输方法、消息传输装置、介质及设备 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101056176A (zh) * | 2007-05-31 | 2007-10-17 | 北京网秦天下科技有限公司 | 对手机传送的消息进行端到端加密的方法和控制装置 |
CN101188496A (zh) * | 2007-12-10 | 2008-05-28 | 中兴通讯股份有限公司 | 一种短信加密传输方法 |
CN101478733A (zh) * | 2008-12-30 | 2009-07-08 | 华为技术有限公司 | 一种短消息传送的方法、网络设备、移动终端和网络系统 |
CN101616142A (zh) * | 2008-06-24 | 2009-12-30 | 香港城市大学 | 实现信息加密传输的方法和系统 |
CN101720071A (zh) * | 2009-12-01 | 2010-06-02 | 郑州信大捷安信息技术有限公司 | 基于安全sim卡的短消息两阶段加密传输和安全存储方法 |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6373946B1 (en) * | 1996-05-31 | 2002-04-16 | Ico Services Ltd. | Communication security |
FI108827B (fi) * | 1998-01-08 | 2002-03-28 | Nokia Corp | Menetelmä yhteyden suojauksen toteuttamiseksi langattomassa verkossa |
JP2003188981A (ja) * | 2001-12-17 | 2003-07-04 | Toshiba Corp | 移動通信端末 |
US20050108171A1 (en) * | 2003-11-19 | 2005-05-19 | Bajikar Sundeep M. | Method and apparatus for implementing subscriber identity module (SIM) capabilities in an open platform |
WO2006007879A1 (en) * | 2004-07-22 | 2006-01-26 | Telecom Italia S.P.A. | Method and system for improving robustness of secure messaging in a mobile communications network |
US20070149176A1 (en) * | 2005-12-28 | 2007-06-28 | Motorola, Inc. | Method and system to communicate a voice mail indication in a loosely coupled environment |
WO2009121046A1 (en) * | 2008-03-28 | 2009-10-01 | Celltrust Corporation | Systems and methods for secure short messaging service and multimedia messaging service |
FR2932639B1 (fr) * | 2008-06-12 | 2010-08-20 | Alcatel Lucent | Detection d'anomalie de trafic emis par un terminal mobile dans un reseau de radiocommunication |
US20100020972A1 (en) * | 2008-07-22 | 2010-01-28 | Ernest Samuel Baugher | Wireless mobile device that permits toggling of whether to transmit information contained in SMS messages as encrypted or clear text |
US8675863B2 (en) * | 2009-12-22 | 2014-03-18 | Trueposition, Inc. | Passive system for recovering cryptography keys |
-
2010
- 2010-12-01 CN CN201010568985XA patent/CN102045669A/zh active Pending
-
2011
- 2011-04-22 WO PCT/CN2011/073192 patent/WO2012071846A1/zh active Application Filing
- 2011-04-22 US US13/641,517 patent/US20130238891A1/en not_active Abandoned
- 2011-04-22 ES ES11844921.4T patent/ES2589681T3/es active Active
- 2011-04-22 EP EP11844921.4A patent/EP2549778B1/en not_active Not-in-force
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101056176A (zh) * | 2007-05-31 | 2007-10-17 | 北京网秦天下科技有限公司 | 对手机传送的消息进行端到端加密的方法和控制装置 |
CN101188496A (zh) * | 2007-12-10 | 2008-05-28 | 中兴通讯股份有限公司 | 一种短信加密传输方法 |
CN101616142A (zh) * | 2008-06-24 | 2009-12-30 | 香港城市大学 | 实现信息加密传输的方法和系统 |
CN101478733A (zh) * | 2008-12-30 | 2009-07-08 | 华为技术有限公司 | 一种短消息传送的方法、网络设备、移动终端和网络系统 |
CN101720071A (zh) * | 2009-12-01 | 2010-06-02 | 郑州信大捷安信息技术有限公司 | 基于安全sim卡的短消息两阶段加密传输和安全存储方法 |
Non-Patent Citations (1)
Title |
---|
See also references of EP2549778A4 * |
Also Published As
Publication number | Publication date |
---|---|
EP2549778B1 (en) | 2016-06-15 |
EP2549778A4 (en) | 2014-01-01 |
EP2549778A1 (en) | 2013-01-23 |
CN102045669A (zh) | 2011-05-04 |
ES2589681T3 (es) | 2016-11-15 |
US20130238891A1 (en) | 2013-09-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2033479B1 (en) | Method and apparatus for security protection of an original user identity in an initial signaling message | |
WO2012071846A1 (zh) | 一种加密短消息实现的方法和系统 | |
CN101203025B (zh) | 安全的移动信息发送和接收方法 | |
JP5855127B2 (ja) | 無線通信システムにおける短文データの暗号化方法及び装置 | |
WO2012024906A1 (zh) | 一种移动通信系统及其语音通话加密的方法 | |
JP2013502782A (ja) | 暗号化情報をネゴシエートするための方法、デバイス、およびネットワークシステム | |
JP2011139457A (ja) | 無線通信装置とサーバとの間でデータを安全にトランザクション処理する方法及びシステム | |
JP2012110009A (ja) | エンティティの認証と暗号化キー生成の機密保護されたリンクのための方法と構成 | |
WO2012024903A1 (zh) | 移动通讯网中加密语音通话的方法和系统、终端及网络侧 | |
WO2006050200A2 (en) | Method and apparatus for authentication of mobile devices | |
US8230218B2 (en) | Mobile station authentication in tetra networks | |
WO2010078755A1 (zh) | 电子邮件的传送方法、系统及wapi终端 | |
CN1977559B (zh) | 保护在用户之间进行通信期间交换的信息的方法和系统 | |
EP2377288B1 (en) | Method and apparatus for transmitting and receiving secure and non-secure data | |
CN101820629A (zh) | 一种无线局域网中身份认证的方法、装置及系统 | |
TWI469610B (zh) | 用於傳送和接收安全和非安全資料的方法和裝置 | |
TW200537959A (en) | Method and apparatus for authentication in wireless communications | |
WO2012024905A1 (zh) | 一种移动通讯网中数据加解密方法、终端和ggsn | |
WO2014180390A2 (zh) | 集群通信公共安全的实现方法及装置 | |
WO2012075761A1 (zh) | 一种加密mms的方法及系统 | |
CN110896683A (zh) | 数据保护方法、装置以及系统 | |
WO2010069102A1 (zh) | 移动终端及其密钥传输、解密方法、保密通信的实现方法 | |
WO2010094185A1 (zh) | 安全切换方法及系统 | |
KR20020072240A (ko) | 무선통신 시스템에서 단문메시지의 보안 서비스 방법 | |
Chen et al. | Authentication and Privacy. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11844921 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2011844921 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13641517 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |