WO2017185872A1 - 短消息处理方法、装置及系统、存储介质 - Google Patents

短消息处理方法、装置及系统、存储介质 Download PDF

Info

Publication number
WO2017185872A1
WO2017185872A1 PCT/CN2017/074775 CN2017074775W WO2017185872A1 WO 2017185872 A1 WO2017185872 A1 WO 2017185872A1 CN 2017074775 W CN2017074775 W CN 2017074775W WO 2017185872 A1 WO2017185872 A1 WO 2017185872A1
Authority
WO
WIPO (PCT)
Prior art keywords
short message
digital signature
data packet
pdu data
pdu
Prior art date
Application number
PCT/CN2017/074775
Other languages
English (en)
French (fr)
Inventor
车晓东
Original Assignee
努比亚技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 努比亚技术有限公司 filed Critical 努比亚技术有限公司
Publication of WO2017185872A1 publication Critical patent/WO2017185872A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/128Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware

Definitions

  • the present invention relates to communication technologies, and more particularly to a short message processing method, apparatus and system, and storage medium.
  • the "pseudo base station” is a fake base station. It is a high-tech instrument that searches for mobile phone card information within a certain radius within a certain radius by means of a short message grouper and other related devices, and forcibly connects the user's mobile phone signal to the pseudo. At the base station, the user cannot connect to the public telecommunication network.
  • the pseudo base station spoofs the user's mobile phone number by masquerading as a base station of the operator, and forcibly sends a short message such as fraud, advertisement promotion, etc. to the user's mobile phone to harass the user and affect the normal mobile phone use of the mobile phone user.
  • the pseudo base station does not have the voice communication resources owned by the normal base station, and once accessed to the pseudo base station, the user will not be able to perform voice communication, which brings inconvenience to the user.
  • the existing pseudo base station detection technology uses the wireless scanning device to actively scan, utilize the short message center number, and utilize the difference between the characteristic parameters of the pseudo base station cell configuration and the normal base station to perform the authentication of the pseudo base station short message.
  • the dominant scanning device has low scanning efficiency, low performance, and short message center number identification method.
  • the pseudo base station can masquerade the short message center number, which makes the method difficult to accurately scan, and the broadcast parameter difference may be due to the configuration of the normal base station. Change and increase the risk of misjudgment.
  • the technical problem to be solved by the embodiments of the present invention is to provide a short message processing method, device, system, and storage medium for the above-mentioned defects of the related art that cannot accurately identify the pseudo base station short message.
  • a short message processing method including:
  • the digital signature is added to the PDU data packet and sent to the receiving terminal, so that the receiving terminal determines whether the received short message is from the legal base station according to the received PDU data packet containing the digital signature.
  • the user information and the reply address in the PDU data packet are calculated by a hash algorithm to obtain a sequence of digests of the preset length.
  • the preset length digest sequence is encrypted using an RSA algorithm to obtain the digital signature.
  • the digital signature is added to the PDU packet in at least one of the following ways: adding the digital signature to a user information field of the PDU packet, and time in the PDU packet The stamp field is replaced with the digital signature, and a field for storing the digital signature is added to the PDU packet.
  • the receiving terminal after receiving the PDU data packet including the data signature, acquires the digital signature in the PDU data packet and decrypts it to obtain a first digest sequence;
  • the receiving terminal performs calculation according to the PDU data packet to obtain a second digest sequence
  • the receiving terminal determines, according to the first digest sequence and the second digest sequence, whether the received short message is from a legal base station.
  • the receiving terminal detects whether a digital signature is included in the received PDU packet to determine whether the received short message is from a legitimate base station.
  • the received short message is a specific type of short message.
  • the second aspect provides a short message processing method, including:
  • the digital signature in the PDU packet is decrypted using a preset public key to obtain the first digest sequence.
  • the first digest sequence is consistent with the second digest sequence, determining that the short message is from the legal base station; if the first digest sequence is inconsistent with the second digest sequence, determining that the short message is from the illegal base station.
  • a short message processing apparatus including:
  • the digital signature module is configured to perform PDU encoding on the received short message, generate a PDU data packet, and encrypt the preset length summary sequence calculated according to the PDU data packet to obtain a digital signature;
  • a sending module configured to add the digital signature to the PDU data packet, and send the signal to the receiving terminal, where the receiving terminal determines, according to the received PDU data packet that includes the digital signature, whether the received short message is from the legal base station.
  • the digital signature module is further configured to calculate the user information and the reply address in the PDU data packet by using a hash algorithm to obtain the sequence of digests of the preset length.
  • the digital signature module is further configured to encrypt the preset length digest sequence using a public key encryption RSA algorithm to obtain the digital signature.
  • the sending module is further configured to add the digital signature to the PDU data packet by adding at least one of: adding the digital signature to a user information field of the PDU data packet. And replacing the timestamp field in the PDU data packet with the digital signature, and adding a field in the PDU data packet configured to store the digital signature.
  • a fourth aspect provides a short message processing apparatus, including:
  • a transceiver configured to receive a short message
  • a processor configured to encode a short message received by the transceiver into a protocol data unit PDU, generate a PDU data packet, and generate a preset length of the summary sequence according to the PDU data packet.
  • the column is encrypted to obtain a digital signature;
  • the processor is further configured to add the digital signature to the PDU data packet, and send the same to the receiving terminal by the transceiver, so that the receiving terminal determines to receive according to the received PDU data packet including the digital signature. Whether the short message arrived is from a legitimate base station.
  • the processor is further configured to calculate the user information and the reply address in the PDU data packet by using a hash algorithm to obtain the sequence of digests of the preset length.
  • the processor is further configured to encrypt the preset length digest sequence using a public key encryption RSA algorithm to obtain the digital signature.
  • a fifth aspect provides a short message processing apparatus, including:
  • a decryption module configured to receive a PDU data packet including a digital signature, obtain a digital signature in the PDU data packet, and decrypt the data to obtain a first digest sequence
  • the summary sequence calculation module is configured to perform calculation according to the PDU data packet to obtain a second digest sequence
  • a determining module configured to determine, according to the first digest sequence and the second digest sequence, whether the received short message is from a legal base station.
  • the digest sequence calculation module is further configured to decrypt the digital signature in the PDU data packet using a preset public key to obtain the first digest sequence.
  • a short message processing apparatus including:
  • the transceiver is configured to receive a protocol data unit PDU data packet including a digital signature
  • the processor is configured to acquire a digital signature in the PDU data packet and decrypt it to obtain a first digest sequence; perform calculation according to the PDU data packet to obtain a second digest sequence; according to the first digest sequence and A second digest sequence determines whether the received short message is from a legitimate base station.
  • the processor is further configured to calculate the user information and the reply address in the PDU data packet by using a hash algorithm to obtain the sequence of digests of the preset length.
  • the processor is further configured to encrypt the preset length digest sequence using a public key encryption RSA algorithm to obtain the digital signature.
  • the processor is further configured to add the digital signature to a PDU data packet by adding at least one of: adding the digital signature to a user information field of a PDU data packet And replacing the timestamp field in the PDU data packet with the digital signature, and adding a field in the PDU data packet configured to store the digital signature.
  • a short message processing system including:
  • a short message service center configured to encode a short message from the transmitting terminal, generate a PDU data packet, and encrypt a preset length summary sequence calculated according to the PDU data packet to obtain a digital signature; and configure the The digital signature is added to the PDU data packet and sent to the receiving terminal;
  • Receiving after receiving the PDU data packet including the data signature, acquiring the digital signature in the PDU data packet and decrypting to obtain a first digest sequence; and performing calculation according to the PDU data packet to obtain a second digest sequence; And determining, according to the first digest sequence and the second digest sequence, whether the received short message is from a legal base station.
  • the eighth aspect provides a storage medium, where the executable medium is stored with executable instructions, and the executable instructions are used to execute the short message processing method provided by the embodiment of the present invention.
  • the short message processing method, device and system, and storage medium embodying the present invention have the following beneficial effects: when a short message from the transmitting terminal arrives at the short message service center, the short message service center performs digital signature processing on the short message, and will include The short message of the digital signature is sent to the receiving terminal; after receiving the short message including the digital signature, the receiving terminal extracts the digital signature and verifies the digital signature, thereby determining whether the short message is from the legal base station, and if it is from the illegal base station, It shields, improves the recognition rate of short messages of illegal base stations, and improves user security and user experience.
  • FIG. 1 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
  • FIG. 2 is a flowchart showing a conventional processing procedure of a short message service according to an embodiment of the present invention
  • FIG. 3 is a schematic flowchart diagram of a short message processing method according to an embodiment of the present invention.
  • FIG. 4 is a schematic structural diagram of a short message processing apparatus according to another embodiment of the present invention.
  • FIG. 5 is a schematic diagram of a format of a PDU data packet according to an embodiment of the present invention.
  • FIG. 6 is a schematic flow chart of a short message processing method according to another embodiment of the present invention.
  • FIG. 7 is a schematic structural diagram of a short message processing apparatus according to another embodiment of the present invention.
  • FIG. 8 is a schematic diagram of a short message processing system according to an embodiment of the present invention.
  • FIG. 9 is a schematic diagram of a short message sending, processing, and receiving process according to an embodiment of the present invention.
  • FIG. 10 is a schematic diagram of a short message data format according to an embodiment of the present invention.
  • FIG. 11 is a schematic flowchart of processing of a receiving terminal according to an embodiment of the present invention.
  • FIG. 12 is a schematic flowchart of processing of a short message service center according to an embodiment of the present invention.
  • FIG. 13 is a schematic flowchart diagram of a short message processing method according to another embodiment of the present invention.
  • FIG. 1 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
  • the terminal 100 of the embodiment of the present invention includes an antenna 101, a transceiver 102, a processor 103, a digital signal processing chip 104, a codec 105, an earpiece 106, and a microphone 107.
  • Digital signal processing chip 104 includes suitable hardware, logic, circuitry, and/or code for audio signal processing, such as echo signal suppression, noise suppression, etc. during audio processing.
  • Codec 105 includes appropriate hardware, logic, circuitry, and/or coding. Used for A/D and D/A conversion.
  • Handset 106 includes suitable hardware, logic, circuitry, and/or code for outputting sound signals.
  • Microphone 107 includes suitable hardware, logic, circuitry, and/or code for acquiring voice signals.
  • the transceiver 102 is responsible for modulating the signal from the processor 103 into the radio frequency band and transmitting it by the antenna 101 after being processed by power amplification or the like.
  • the transceiver 102 is also responsible for transmitting the signal received by the antenna 101 to the processor 103 after low power noise amplification, mixing, and the like.
  • the processor 103 is configured to perform baseband processing functions of the physical layer of the communication protocol stack, including digital joint detection, modulation/demodulation, channel coding/decoding, etc., and is configured to handle complex logical operations and perform task assignment to provide interaction for the user. Interface, the operating system of the terminal, etc. Further, the terminal 100 further includes a memory, a power supply unit, a positioning unit, a display unit, and the like for performing respective functions.
  • Both the transmitting terminal and the receiving terminal in the following embodiments of the present invention can adopt the hardware configuration of the terminal 100 shown in FIG. 1.
  • the base station 200 may specifically refer to a device in the access network that communicates with the terminal 100 through one or more sectors on an air interface.
  • the base station can be configured to convert the received air frame to an Internet Protocol (IP) packet for interworking between the terminal and the rest of the access network, wherein the remainder of the access network can include an IP network.
  • IP Internet Protocol
  • the base station can also coordinate attribute management of the air interface.
  • the cell base station can continuously transmit broadcast messages.
  • the terminal 100 receives the broadcast message in time or receives the broadcast message when needed (for example, periodically receiving or receiving it when performing cell search).
  • the terminal 100 may discover the cell base station according to the received broadcast message, and may determine whether to access the cell base station by selecting.
  • a terminal 100 may receive broadcast messages sent by multiple cell base stations, and may select a suitable cell, such as a cell base station with better signal quality, to reside in the cell base station.
  • the terminal 100 When the terminal 100 resides in the cell base station, it can receive short messages, voices, and Data and other services.
  • the transmitting terminal accesses the Mobile Switching Center (MSC)/Visitor Location Register (VLR), Mobile Switching Center (MSC)/visiting location via the base station.
  • the register (Vistor Location Register, VLR) encrypts the terminal to verify whether the user is a legitimate user.
  • the transmitting terminal edits the short message, determines the called number of the receiving terminal (ie, the short message receiving terminal, for example, MS2 in FIG. 2), presses the send key, and the main/called number, the text, the short message center number, and the requested
  • the message codes and the like are transmitted together through a wireless channel to a registered Mobile Switching Center (MSC)/Visitor Location Register (VLR).
  • MSC Mobile Switching Center
  • VLR Visitor Location Register
  • the Mobile Switching Center (MSC)/Visitor Location Register (VLR) receives the application of the transmitting terminal, and finds the short message service center (SMSC) according to the short message center number, and the called number, text and The message code or the like is sent to the Short Message Service Center (SMSC).
  • MSC Mobile Switching Center
  • VLR Visitor Location Register
  • SMSC Short Message Service Center
  • HLR home location register
  • MSC short message service center
  • a short message from a transmitting terminal arrives at a short message In the service center, the short message service center digitally processes the short message, and sends a short message including the digital signature to the receiving terminal; after receiving the short message including the digital signature, the receiving terminal extracts the digital signature and digitizes The signature is verified to determine if the short message is from a legitimate base station.
  • FIG. 3 is a schematic flowchart of a short message processing method according to an embodiment of the present invention, which can be applied to a short message service center, and the method includes:
  • S31 Perform PDU encoding on the received short message, generate a PDU data packet, and encrypt the preset length summary sequence calculated according to the PDU data packet to obtain a digital signature.
  • FIG. 4 is a schematic diagram of a format of a PDU data packet according to an embodiment of the present invention, including: length of an SMSC address information, an SMSC address format, an SMSC address, a basic parameter, a number of reply address digits, a reply address format, a reply address, Protocol ID, user information encoding method, time stamp, user information length, user information, etc.
  • the format of the PDU data packet of FIG. 4 is merely exemplary, and may also be any other format, for example, including one or more of the data formats shown in FIG. 4, or including FIG. Other fields than the one shown.
  • the invention is not limited thereto.
  • a sequence of digests of a predetermined length may be computed by a hash algorithm based on user information and reply addresses in the PDU packet.
  • the hash algorithm can be MD5 or SHA-1.
  • the sequence of digests is encrypted to obtain a digital signature.
  • the digital signature is obtained using an RSA algorithm.
  • the public key (N, e) can be sent to the receiving terminal in various ways, for example, by means of short messages, by way of data channels, and the like.
  • N, e can be sent to the receiving terminal in various ways, for example, by means of short messages, by way of data channels, and the like.
  • the public key changes a new public key is sent to the receiving terminal in time.
  • S a d modN
  • a is a sequence of digests of preset length.
  • the RSA algorithm is selected for digital signature, mainly because the RSA algorithm is faster in decryption verification and does not affect the processing speed of the receiving terminal.
  • other algorithms may also be employed for digital signatures, such as ECDSA algorithms, DSA algorithms, and the like.
  • the digital signature can be added to the PDU packet in three ways:
  • Method 1 Replace the timestamp in the PDU packet with a digital signature. Since the time stamp is used to record the time when the short message service center receives the short message, replacing the field with the digital signature does not cause inconvenience to the receiving terminal for receiving, identifying, and the like of the short message. In this way, non-important fields in the PDU packet can be efficiently utilized to increase the digital signature.
  • Method 2 Add the digital signature to the user information field in the PDU packet.
  • the user information field is generally used to store the content of the short message, and the length thereof may be 140 bytes, 160 bytes, etc.
  • the field is divided into two parts, one part stores the digital signature, and the other is used for Invisible. The other part stores the short message content. In this way, the modification or extension of the PDU protocol field can be omitted, and the communication procedure of the original network system is changed less and is easy to implement.
  • Method 3 Add a field in the PDU packet to store the digital signature.
  • the added field can be located anywhere in the PDU packet, for example, can be added to the user information field or Before, before or after replying to the address field, and so on.
  • the advantage of this method is that when the key length is long and the digital signature result is long, the user information field is not occupied, so that the short message length of the user is not compressed, and the user experience is better.
  • the PDU packet containing the digital signature is processed (for example, determining the short message priority, storing the short message, etc.) and then forwarding to the receiving terminal.
  • the Short Message Service Center finds a Home Location Register (HLR) to which the receiving terminal belongs according to the called number, and sends a message to the HLR to query the short message service center where the receiving terminal is currently located. (SMSC) address. After obtaining the address, the Short Message Service Center (SMSC) sends a message to the MSC where the receiving terminal is located, and the MSC forwards the short message to the receiving terminal.
  • HLR Home Location Register
  • MSC Short Message Service Center
  • the receiving terminal may confirm whether the received short message is from the legal base station according to the digital signature. For example, in an embodiment, after receiving the PDU data packet including the data signature, the receiving terminal acquires the digital signature in the PDU data packet and decrypts it to obtain a first digest sequence; the receiving terminal performs calculation according to the PDU data packet to obtain a second digest sequence; the receiving terminal determines, according to the first digest sequence and the second digest sequence, whether the received short message is from a legal base station.
  • the receiving terminal may perform the received short message. Shielding and other processing.
  • the receiving terminal can detect whether the received PDU packet contains a digital signature to determine whether the received short message is from a legitimate base station. If the digital signature is included, it can be determined that the short message is from the legal base station. If the digital signature is not included, it is determined that the received short message is from the illegal base station, and can be masked and the like.
  • the embodiment of the present invention further provides a short message processing apparatus.
  • the short message processing apparatus 40 includes:
  • the digital signature module 41 is configured to perform PDU encoding on the received short message, generate a PDU data packet, and encrypt the preset length summary sequence calculated according to the PDU data packet. Get a digital signature;
  • the sending module 42 is configured to add the digital signature to the PDU data packet, and send the digital signature to the receiving terminal, where the receiving terminal determines, according to the received PDU data packet that includes the digital signature, whether the received short message is from a legal Base station.
  • the digital signature module 41 is further configured to calculate the user information and the reply address in the PDU data packet by using a hash algorithm to obtain the preset length summary sequence.
  • the digital signature module 41 is further configured to encrypt the preset length digest sequence by using a public key encryption RSA algorithm to obtain the digital signature.
  • the sending module 42 is further configured to add the digital signature to the PDU data packet by adding at least one of the following ways: adding the digital signature to a user information field of the PDU data packet Medium, replacing the timestamp field in the PDU data packet with the digital signature, and adding a field in the PDU data packet configured to store the digital signature.
  • a short message processing apparatus including:
  • the transceiver 102 is configured to receive a short message.
  • the processor 103 is configured to encode the short message received by the transceiver into a protocol data unit PDU, generate a PDU data packet, and encrypt a preset sequence of the preset length calculated according to the PDU data packet to obtain a digital signature. ;
  • the processor 103 is further configured to add the digital signature to the PDU data packet, and send the same to the receiving terminal by the transceiver, so that the receiving terminal determines, according to the received PDU data packet that includes the digital signature. Whether the received short message comes from a legitimate base station.
  • the processor 103 is further configured to calculate the user information and the reply address in the PDU data packet by using a hash algorithm to obtain the preset length summary sequence.
  • the processor 103 is further configured to encrypt the preset length digest sequence by using a public key encryption RSA algorithm to obtain the digital signature.
  • the short message processing method and device of the embodiment of the present invention by adding a digital signature, the receiving terminal verifies the received short message, so that the terminal can determine whether the short message is from an illegal base station, and can achieve the purpose of protecting the illegal base station garbage short message. And can identify illegal base stations, reduce user losses, and increase user security.
  • a short message processing method is applicable to a short message receiving terminal, and the method includes:
  • S51 Receive a PDU data packet that includes a digital signature, obtain a digital signature in the PDU data packet, and decrypt the data to obtain a first digest sequence.
  • the digital signature can be obtained in a corresponding manner depending on how the digital signature is added to the PDU packet.
  • the content in the timestamp field can be extracted to obtain a digital signature
  • the content in the user information field can be extracted, and the content of the short message is partially removed, and the rest is left.
  • the part is the digital signature
  • the content can be extracted according to the added field position to obtain a digital signature.
  • the digital signature in the PDU data packet can be decrypted by using the preset public key to obtain a first digest sequence.
  • the preset public key is paired with the private key used by the digital signature.
  • the receiving terminal can acquire and store the public key in various ways, for example, by short message reception, by a data service channel, from a specific target device (for example, a base station server, a fixed website, etc.).
  • the same hash algorithm as the short message service center is employed. That is, a sequence of digests of a predetermined length (for example, 128 bits) is calculated by the hash algorithm according to the user information and the reply address in the PDU packet as the second digest sequence.
  • S53 Determine, according to the first digest sequence and the second digest sequence, whether the received short message is from a legal base station.
  • the short message is from a legitimate base station.
  • the receiving terminal can directly block it.
  • the manner of shielding includes but is not limited to: not displaying the received short message, deleting the short message, and the like.
  • the receiving terminal may also output prompt information to prompt the user that the short message is from an unlawful base station/pseudo base station to further improve user security.
  • the manner of prompting includes, but is not limited to, suggesting that the user delete the short message, ignore the short message, or suggest the user to make further confirmation, and the like.
  • the receiving terminal after determining that the base station is an illegal base station, the receiving terminal further sends the information of the receiving base station to the time of receiving the short message, the location information of the current receiving terminal, the frequency of the currently received pilot signal, and the like.
  • a preset server for example, an operator's base station server
  • the operator is provided for the operator to collect information of the illegal base station.
  • the receiving terminal may also add the frequency or LAI of the current receiving base station to the forbiden list, thereby enabling the receiving terminal to access the illegal base station again when the cell is not reselected or registered. .
  • the embodiment of the present invention further provides a short message processing apparatus.
  • the short message processing apparatus 70 includes:
  • the decryption module 71 is configured to receive a PDU data packet including a digital signature, obtain a digital signature in the PDU data packet, and decrypt the data to obtain a first digest sequence;
  • the summary sequence calculation module 72 is configured to perform calculation according to the PDU data packet to obtain a second digest sequence
  • a determining module 73 configured to determine, according to the first digest sequence and the second digest sequence, Whether the received short message comes from a legitimate base station.
  • the digest sequence calculation module 72 is further configured to decrypt the digital signature in the PDU data packet using the preset public key to obtain the first digest sequence.
  • the short message processing apparatus includes: a processor 103 and a transceiver 102;
  • the transceiver 102 is configured to receive a protocol data unit PDU data packet including a digital signature
  • the processor 103 is configured to acquire a digital signature in the PDU data packet and decrypt it to obtain a first digest sequence; perform calculation according to the PDU data packet to obtain a second digest sequence; according to the first digest sequence And a second digest sequence determining whether the received short message is from a legal base station.
  • the processor 103 is further configured to calculate the user information and the reply address in the PDU data packet by using a hash algorithm to obtain the preset length summary sequence.
  • the processor 103 is further configured to encrypt the preset length digest sequence by using a public key encryption RSA algorithm to obtain the digital signature.
  • the processor 103 is further configured to add the digital signature to the PDU data packet by adding at least one of the following: adding the digital signature to a user information field of the PDU data packet Medium, replacing the timestamp field in the PDU data packet with the digital signature, and adding a field in the PDU data packet configured to store the digital signature.
  • the short message processing method and device of the embodiment of the present invention by adding a digital signature to the short message, the receiving terminal verifies the received short message, so that the terminal can determine whether the short message is from an illegal base station, and can reach the illegal base station garbage short.
  • the purpose of message protection and can identify illegal base stations, reduce user losses, and increase user security.
  • the short message processing system of the embodiment of the present invention includes:
  • a short message service center configured to encode a short message from the transmitting terminal, generate a PDU data packet, and encrypt a preset length summary sequence calculated according to the PDU data packet to obtain a digital signature; and configure the The digital signature is added to the PDU data packet and sent to the receiving terminal;
  • Receiving after receiving the PDU data packet including the data signature, acquiring the digital signature in the PDU data packet and decrypting to obtain a first digest sequence; and performing calculation according to the PDU data packet to obtain a second digest sequence; And determining, according to the first digest sequence and the second digest sequence, whether the received short message is from a legal base station.
  • the transmitting terminal sends a short message.
  • the user edits the short message, determines the number of the receiving terminal (ie, the receiving terminal of the short message), and presses the send key, the master/called number, the text, the short message center number, and the requested message code will be passed together.
  • the wireless channel is sent by the base station to the registered Mobile Switching Center (MSC)/Visitor Location Register (VLR).
  • MSC Mobile Switching Center
  • VLR Visitor Location Register
  • a data format of a short message sent by a sending terminal through a wireless channel includes: a short message center address length, a short message center number type, a short message center number, a file header byte, an information reference number, The length of the called number, the type of the called number, the called number, the protocol identifier, the encoding method of the user information, the validity period, the length of the short message, and the content of the short message.
  • the short message data format of FIG. 10 is merely exemplary, and the data format of the short message may also be any other format, for example, including one or more of the data formats shown in FIG. 8, or including Other fields than the fields shown in FIG. The invention is not limited thereto.
  • the short message service center PDUs the short message from the sending terminal to generate a PDU data packet.
  • the format of the PDU packet is as described above with reference to FIG. 5.
  • step S73 the short message center passes the user information and the reply address in the PDU data packet.
  • the hash algorithm calculates a sequence of digests of a preset length.
  • step S74 the digest sequence of the preset length is encrypted to obtain a digital signature.
  • the preset length of the digest is encrypted by the private key, and a string of ciphertext is obtained as a digital signature.
  • the encryption method has been described in detail in the above embodiments, and details are not described herein again.
  • step S75 the obtained digital signature is added to the PDU packet.
  • the digital signature can be added to the PDU packet in at least one of the following ways: adding the digital signature to the user information field of the PDU packet, replacing the timestamp field in the PDU packet with a digital signature, Add a field for storing the digital signature in the PDU packet.
  • the short message service center processes the PDU data packet including the digital signature, and then forwards the PDU data packet to the receiving terminal.
  • the processing here includes determining short message priority, storing short messages, and the like. It should be understood that when the short message service center forwards the PDU data packet (that is, the PDU encoded short message) to the receiving terminal, the home location register (HLR) to which the receiving terminal belongs is found according to the called number, and the message is sent.
  • the HLR queries the address of the short message service center (SMSC) where the receiving terminal is currently located. After obtaining the address, the Short Message Service Center (SMSC) sends a message to the MSC where the receiving terminal is located, and the MSC forwards the short message to the receiving terminal.
  • SMSC Short Message Service Center
  • the receiving terminal After receiving the PDU data packet containing the digital signature, the receiving terminal parses the short message content and the digital signature in the PDU data packet to determine whether the received short message is from the legal base station.
  • the received short message may not include the digital signature. Therefore, if the digital signature is not parsed in the short message received by the receiving terminal, it can be determined that the short message is from the pseudo base station.
  • the receiving terminal can detect whether the received PDU packet contains a digital signature to determine whether the received short message is from a legitimate base station. If the digital signature is included, it can be determined that the short message is from the legal base station. If the digital signature is not included, it is determined that the received short message is from the illegal base station, and can be masked and the like.
  • the illegal base station also performs digital signature processing on the short message, referring to FIG. 11, after receiving the short message, the receiving terminal parses out the short message content and the digital signature in the short message PDU, and then Both are processed separately.
  • a summary sequence is obtained for short message content, and the hash algorithm used is consistent with the hash algorithm used by the short message service center for digital signature.
  • the receiving terminal also decrypts the digital signature using the public key and obtains the decrypted digest sequence.
  • the public key is paired with the private key used by the short message service center for digital signature, and the short message service center can pass the public key in multiple ways (for example, short message service mode, data service mode) And so on) is sent to the receiving terminal, which receives the received public key and extracts it from the storage area when needed.
  • the receiving terminal compares the obtained message digest sequence with the decrypted digest sequence, and if the two are consistent, it is determined that the short message is from the legal base station. Further, the receiving terminal can display the short message content.
  • the short message is determined to be an illegal pseudo base station, for example, a pseudo base station, and the receiving terminal can directly block the short message.
  • the method of shielding includes: not displaying the received short message, deleting the short message, and the like.
  • the receiving terminal may also output prompt information to prompt the user that the short message is from an unlawful base station/pseudo base station to further improve user security.
  • the manner of prompting includes, but is not limited to, suggesting that the user delete the short message, ignore the short message, or suggest the user to confirm, and the like.
  • the receiving terminal after determining the pseudo base station, the receiving terminal further sends the information of the receiving base station to the time when the short message is received, the location information of the current receiving terminal, the frequency of the currently received pilot signal, and the like.
  • the server allows the operator to collect information about the pseudo base station.
  • the receiving terminal verifies the received short message, so that the terminal can determine whether the short message is from the pseudo base station, and can achieve the purpose of the pseudo base station garbage short message protection, and can identify Pseudo base stations, reducing user losses and increasing users safety.
  • the function of the digital signature is implemented in a short message service center, which can deploy a dedicated digital signature server.
  • a short message service center which can deploy a dedicated digital signature server.
  • the short message service center can include a digital signature server and a short message server.
  • the short message arrives at the short message service center, it is forwarded by the short message server to the digital signature server.
  • the signature program in the digital signature server first uses a hash algorithm to calculate a sequence of digests of a predetermined length for the plaintext plaintext (eg, user information and reply address), where the hash algorithm can be MD5 or SHA-1.
  • the signature program encrypts the digest sequence with the private key, and obtains a string of ciphertexts that are digital signatures.
  • the digital signature server sends the result of the signature back to the short message server, and the short message server performs regular processing on the signed short message, such as determining the short message priority and storing. Short messages, etc., finally forward the short message to the receiving terminal.
  • the receiving terminal can verify the received short message by adding a digital signature to the short message, so that the terminal can determine whether the short message is from the illegal base station, and can achieve the protection of the illegal base station garbage short message.
  • the purpose is to identify illegal base stations, reduce user losses, and increase user security.
  • a short message service center may perform digital signature processing only on a specific short message, and the receiving terminal only performs decryption verification on these specific short messages, thereby
  • the short message flow of the above embodiment can be simplified.
  • step S81 After receiving the short message in the short message service center in step S81, it is determined whether the short message is a short message of a specific type, and if so, the short message is subjected to a process of adding a digital signature. If not, the digital signature is not added and directly forwarded to the corresponding receiving terminal, and then processed according to the normal process.
  • a general pseudo base station performs forgery of a transmission number by selecting some publicly known numbers, thereby transmitting a false short message, for example, an operator's service number (10086, 10000, etc.), a bank number, and the like. Therefore, embodiments of the present invention can set a specific type of short message as:
  • the sending terminal number ie, the calling number
  • the preset number may include: an operator's service number, each bank's number, an emergency number (for example, 110), and the like.
  • the short message service center receives the short message, it is determined whether the digital signature is required to be processed by the calling number. If necessary, the digital signature processing is performed according to the processing method of the foregoing embodiment, and details are not described herein again.
  • step S82 if the short message received by the receiving terminal is a short message of a specific type, the verification process of the digital signature is performed. For example, if the calling number of the short message received by the receiving terminal is a preset number, that is, the service number of the operator, the number of each bank, the emergency number (for example, 110), etc., according to FIG. 6 above. The illustrated processing method is verified to determine if the short message is from a legitimate base station.
  • the embodiment of the present invention further provides a computer storage medium, where the computer storage medium stores computer executable instructions, and the computer executable instructions are used for at least one of the foregoing short message processing, for example, FIG. 3 and FIG. 6 At least one of the methods shown in Figures 6, 9, and 13.
  • the computer storage medium according to the embodiment of the present invention may be a storage medium such as an optical disk, a hard disk, or a magnetic disk, and may be a non-transitory storage medium.
  • the short message service center can perform digital signature processing only on a specific short message, and the receiving terminal only performs decryption verification on these specific short messages, thereby simplifying the short message processing flow of the above embodiment.
  • the determination of whether or not the short message related to security is from an illegal base station is reduced, and the processing complexity is reduced, which also increases user security.
  • Both the transmitting terminal and the receiving terminal in the embodiment of the present invention can adopt the hardware structure of the terminal 100 shown in FIG. 1.
  • the transmitting terminal and the receiving terminal may also be referred to as mobile devices, terminals, access terminals, subscriber units, and the like.
  • the transmitting terminal and the receiving terminal may be smart phones, tablet computers, notebook computers, or other devices configured to communicate using a wireless communication protocol such as 2G/3G/4G.
  • Any process or method description in the flowcharts or otherwise described in the embodiments of the invention may be understood to include the inclusion of one or more elements for implementing a particular logical function or process.
  • a module, segment or portion of code of an executable instruction of a step, and the scope of the embodiments of the invention includes additional implementations, which may not be in the order shown or discussed, including in a substantially simultaneous manner depending on the function involved or The functions are performed in the reverse order, which should be understood by those skilled in the art to which the embodiments of the invention are.
  • GSM Global System for Mobile Communications
  • CDMA Code Division Multiple Access
  • TDMA Time Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • FDMA Frequency Division Multiple Access
  • OFDMA Orthogonal Frequency Partition Multiple Access
  • SC-FDMA Single-Carrier Frequency Division Multiple Access
  • GPRS General Packet Radio Service
  • LTE Long Term Evolution
  • the foregoing embodiment method can be implemented by means of software plus a necessary general hardware platform, and of course, can also be through hardware, but in many cases, the former is better.
  • Implementation Based on such understanding, the technical solution of the present invention, which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a storage medium (such as ROM/RAM, disk,
  • the optical disc includes a number of instructions for causing a terminal device (which may be a cell phone, a computer, a server, or a network device, etc.) to perform the methods described in various embodiments of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明公开了一种短消息处理方法、装置及系统、存储介质,所述方法包括:将接收到的短消息进行PDU编码,生成PDU数据包,并将根据PDU数据包计算出的预设长度的摘要序列进行加密以获得一数字签名;将所述数字签名增加到PDU数据包中,并发送给接收终端,以供所述接收终端根据接收到的包含数字签名的PDU数据包确定接收到的短消息是否来自合法基站。实施本发明的有益效果是,短消息服务中心对接收到的短消息进行数字签名处理,并将包含了数字签名的短消息发送给接收终端;接收终端接收到包含了数字签名的短消息后,提取数字签名并对数字签名进行验证。

Description

短消息处理方法、装置及系统、存储介质 技术领域
本发明涉及通信技术,更具体地说,涉及一种短消息处理方法、装置及系统、存储介质。
背景技术
“伪基站”即假基站,是一种高科技仪器,它通过短消息群发器等相关设备搜取以其为中心、一定半径范围内的手机卡信息,并将用户的手机信号强制连接到伪基站上,使用户无法连接到公用电信网络。伪基站通过伪装成运营商的基站,任意冒用他人手机号码强行向用户手机发送诈骗、广告推销等短消息,对用户进行骚扰,影响手机用户的正常手机使用。并且伪基站并无正常基站所拥有的语音通信资源,一旦接入到伪基站,用户将无法进行语音通信,给用户带来不便。
目前,已有的伪基站检测技术有利用无线扫描设备主动扫描、利用短消息中心号码、利用伪基站小区配置的特征参数与正常基站的差异进行伪基站短消息的鉴别。而主导扫描设备扫描效率低,成效不高,短消息中心号码鉴别的方法,伪基站可以对短消息中心号码进行伪装导致该方法难以进行精确扫描、广播参数差异的方案可能由于正常基站的配置的改变而增加误判风险。
发明内容
本发明实施例要解决的技术问题在于,针对相关技术的上述不能准确鉴别伪基站短消息的缺陷,提供一种短消息处理方法、装置及系统、存储介质。
本发明实施例解决其技术问题所采用的技术方案是:
第一方面,提供一种短消息处理方法,包括:
将接收到的短消息进行PDU编码,生成PDU数据包,并将根据PDU数据包计算出的预设长度的摘要序列进行加密以获得一数字签名;
将所述数字签名增加到PDU数据包中,并发送给接收终端,以供所述接收终端根据接收到的包含数字签名的PDU数据包确定接收到的短消息是否来自合法基站。
在一个实施例中,将PDU数据包中的用户信息和回复地址通过哈希算法计算以获取所述预设长度的摘要序列。
在一个实施例中,利用RSA算法对所述预设长度的摘要序列进行加密以得到所述数字签名。
在一个实施例中,采用以下方式中的至少一者,将所述数字签名增加到PDU数据包中:将所述数字签名添加到PDU数据包的用户信息字段中、将PDU数据包中的时间戳字段替换为所述数字签名、在PDU数据包中增加一个用于存放所述数字签名的字段。
在一个实施例中,所述接收终端接收到包含数据签名的PDU数据包后,获取PDU数据包中的数字签名并进行解密以得到一第一摘要序列;
所述接收终端根据PDU数据包进行计算以得到一第二摘要序列;
所述接收终端根据所述第一摘要序列和第二摘要序列,确定接收到的短消息是否来自合法基站。
在一个实施例中,所述接收终端检测接收到的PDU数据包中是否包含数字签名,以确定接收到的短消息是否来自合法基站。
在一个实施例中,所述接收到的短消息为特定类型的短消息。
第二方面,提供一种短消息处理方法,包括:
接收包含数字签名的PDU数据包,获取PDU数据包中的数字签名并进行解密以得到一第一摘要序列;
根据PDU数据包进行计算以得到一第二摘要序列;
根据所述第一摘要序列和第二摘要序列,确定接收到的短消息是否来自合法基站。
在一个实施例中,利用预设的公钥对PDU数据包中的数字签名进行解密以获得所述第一摘要序列。
在一个实施例中,若所述第一摘要序列与第二摘要序列一致,则确定短消息来自合法基站;若所述第一摘要序列与第二摘要序列不一致,则确定短消息来自非法基站。
第三方面,提供一种短消息处理装置,包括:
数字签名模块,配置为将接收到的短消息进行PDU编码,生成PDU数据包,并将根据PDU数据包计算出的预设长度的摘要序列进行加密以获得一数字签名;
发送模块,配置为将所述数字签名增加到PDU数据包中,并发送给接收终端,以供所述接收终端根据接收到的包含数字签名的PDU数据包确定接收到的短消息是否来自合法基站。
在一个实施例中,所述数字签名模块,还配置为将PDU数据包中的用户信息和回复地址通过哈希算法计算以获取所述预设长度的摘要序列。
在一个实施例中,所述数字签名模块,还配置为利用公钥加密RSA算法对所述预设长度的摘要序列进行加密以得到所述数字签名。
在一个实施例中,所述发送模块,还配置为采用以下方式中的至少一者,将所述数字签名增加到PDU数据包中:将所述数字签名添加到PDU数据包的用户信息字段中、将PDU数据包中的时间戳字段替换为所述数字签名、在PDU数据包中增加一个配置为存放所述数字签名的字段。
第四方面,提供一种短消息处理装置,包括:
收发机,配置为接收短消息;
处理器,配置为将所述收发机收到的短消息进行协议数据单元PDU编码,生成PDU数据包,并将根据PDU数据包计算出的预设长度的摘要序 列进行加密以获得一数字签名;
所述处理器,还配置为将所述数字签名增加到PDU数据包中,并通过所述收发机发送给接收终端,以供所述接收终端根据接收到的包含数字签名的PDU数据包确定接收到的短消息是否来自合法基站。
在一个实施例中,所述处理器,还配置为将PDU数据包中的用户信息和回复地址通过哈希算法计算以获取所述预设长度的摘要序列。
在一个实施例中,所述处理器,还配置为利用公钥加密RSA算法对所述预设长度的摘要序列进行加密以得到所述数字签名。
第五方面,提供一种短消息处理装置,包括:
解密模块,配置为接收包含数字签名的PDU数据包,获取PDU数据包中的数字签名并进行解密以得到一第一摘要序列;
摘要序列计算模块,配置为根据PDU数据包进行计算以得到一第二摘要序列;
确定模块,配置为根据所述第一摘要序列和第二摘要序列,确定接收到的短消息是否来自合法基站。
在一个实施例中,所述摘要序列计算模块,还配置为利用预设的公钥对PDU数据包中的数字签名进行解密以获得所述第一摘要序列。
第六方面,提供一种短消息处理装置,包括:
处理器和收发机;
所述收发机,配置为接收包含数字签名的协议数据单元PDU数据包;
所述处理器,配置为获取所述PDU数据包中的数字签名并进行解密以得到一第一摘要序列;根据PDU数据包进行计算以得到一第二摘要序列;根据所述第一摘要序列和第二摘要序列,确定接收到的短消息是否来自合法基站。
在一个实施例中,所述处理器,还配置为将PDU数据包中的用户信息和回复地址通过哈希算法计算以获取所述预设长度的摘要序列。
在一个实施例中,所述处理器,还配置为利用公钥加密RSA算法对所述预设长度的摘要序列进行加密以得到所述数字签名。
在一个实施例中,所述处理器,还配置为采用以下方式中的至少一者,将所述数字签名增加到PDU数据包中:将所述数字签名添加到PDU数据包的用户信息字段中、将PDU数据包中的时间戳字段替换为所述数字签名、在PDU数据包中增加一个配置为存放所述数字签名的字段。
第七方面,提供一种短消息处理系统,包括:
短消息服务中心,配置为将来自发送终端的短消息进行PDU编码,生成PDU数据包,并将根据PDU数据包计算出的预设长度的摘要序列进行加密以获得一数字签名;以及配置为将所述数字签名增加到PDU数据包中,并发送给接收终端;
接收终端,配置为接收到包含数据签名的PDU数据包后,获取PDU数据包中的数字签名并进行解密以得到一第一摘要序列;并根据PDU数据包进行计算以得到一第二摘要序列;以及根据所述第一摘要序列和第二摘要序列,确定接收到的短消息是否来自合法基站。
第八方面,提供一种存储介质,所述存储介质中存储有可执行指令,所述可执行指令用于执行本发明实施例提供的短消息处理方法。
实施本发明的短消息处理方法、装置及系统、存储介质,具有以下有益效果:来自发送终端的短消息到达短消息服务中心时,短消息服务中心对该短消息进行数字签名处理,并将包含了数字签名的短消息发送给接收终端;接收终端接收到包含了数字签名的短消息后,提取数字签名并对数字签名进行验证,从而判断短消息是否来自合法基站,若来自非法基站则可对其进行屏蔽,提高非法基站短消息的识别率,提高用户安全性和用户体验。
附图说明
下面将结合附图及实施例对本发明作进一步说明,附图中:
图1是本发明一实施例的终端的结构示意图;
图2是本发明一实施例的短消息业务的常规处理流程;
图3是本发明一实施例的短消息处理方法的流程示意图;
图4是本发明另一实施例短消息处理装置的结构示意图;
图5是本发明一实施例的PDU数据包的格式示意图;
图6是本发明另一实施例短消息处理方法的流程示意图;
图7是本发明另一实施例短消息处理装置的结构示意图;
图8是本发明一实施例的短消息处理系统的示意图;
图9是本发明一实施例的短消息发送、处理及接收流程示意图;
图10是本发明一实施例的短消息数据格式示意图;
图11是本发明一实施例的接收终端的处理流程示意图;
图12是本发明一实施例的短消息服务中心的处理流程示意图;
图13本发明另一实施例的短消息处理方法的流程示意图。
具体实施方式
为了对本发明的技术特征、目的和效果有更加清楚的理解,现对照附图详细说明本发明的具体实施方式。
参见图1,为本发明一实施例的终端的结构示意图。本发明实施例的终端100包括:天线101、收发机102、处理器103、数字信号处理芯片104、编解码器105、听筒106、麦克风107。
数字信号处理芯片104包括适当的硬件、逻辑器件、电路和/或编码,用于进行音频信号处理,例如,在通话过程中的回声抑制、噪声抑制等音频信号处理。
编解码器(Codec)105包括适当的硬件、逻辑器件、电路和/或编码, 用于进行A/D以及D/A转换。
听筒106包括适当的硬件、逻辑器件、电路和/或编码,用于输出声音信号。
麦克风107包括适当的硬件、逻辑器件、电路和/或编码,用于采集语音信号。
收发机102负责把来自处理器103的信号调制到射频频段,以及经功率放大等处理后由天线101发射出去。收发机102还负责将天线101接收到的信号经过低功率噪声放大、混频等处理后送入处理器103。
处理器103配置为进行通信协议栈物理层的基带处理功能,包括数字联合检测、调制/解调、信道编码/译码等,以及配置为处理复杂的逻辑操作以及进行任务分配,为用户提供交互接口,执行终端的操作系统等。此外,终端100还包括存储器、电源单元、定位单元、显示单元等等用于执行相应的功能。
本发明下述实施例中的发送终端和接收终端均可采用图1所示的终端100的硬件结构。
基站200,具体可以是指接入网中在空中接口上通过一个或多个扇区与终端100通信的设备。基站可以配置为建个接收到的空中帧与网际协议(IP)分组进行相互转换,作为终端与接入网的其余部分之间的路由器,其中接入网的其余部分可包括IP网络。基站还可协调对空中接口的属性管理。
小区基站可持续发送广播消息。终端100及时接收广播消息或在需要时才接收广播消息(例如,周期性接收或者在进行小区搜索时再接收)。终端100可根据接收到的广播消息,发现小区基站,并可以通过选择来确定是否接入小区基站。一个终端100可能会接收多个小区基站发送的广播消息,并可从中选择合适的小区,比如信号质量较好的小区基站等,从而驻留在该小区基站。
当终端100驻留在小区基站后,可接收到来自基站的短消息、语音、 数据等业务。
参见图2,为本发明一实施例的短消息业务(Short Message Service,SMS)的常规处理流程。发送终端(例如,图2中的MS1)经基站接入移动交换中心(Mobile Switching Center,MSC)/拜访位置寄存器(Visitor Location Register,VLR),移动交换中心(Mobile Switching Center,MSC)/拜访位置寄存器(Visitor Location Register,VLR)对终端进行鉴权加密,以验证用户是否是合法用户。
发送终端编辑好短消息,确定接收终端(即短消息接收终端,例如,图2中的MS2)的被叫号码,按发送键,将主/被叫号码、文本、短消息中心号码及请求的消息代码等一起通过无线信道发送给登记的移动交换中心(Mobile Switching Center,MSC)/拜访位置寄存器(Visitor Location Register,VLR)。
移动交换中心(Mobile Switching Center,MSC)/拜访位置寄存器(Visitor Location Register,VLR)接收到发送终端的申请,根据短消息中心号码寻到短消息服务中心(SMSC),将被叫号码、文本及消息代码等发送给短消息服务中心(SMSC)。
短消息服务中心(SMSC)接收后,给MSC/VLR发送确认信号。且短消息服务中心(SMSC)根据被叫号码找到接收终端归属的归属位置寄存器(Home Location Register,HLR),并且发送消息到该HLR查询接收终端当前所在的短消息服务中心(SMSC)的地址。得到该地址后,短消息服务中心(SMSC)发送消息到接收终端所在MSC,由该MSC将短消息转发到该接收终端。接收终端收到短消息后给短消息服务中心(Short Message Service Center,SMSC)回送应答消息。
由于非法基站(例如,伪基站)的短消息是直接发送给接收终端的,与合法基站的短消息发送经过短消息服务中心进行转发的流程存在着本质的区别。由此,在本发明的实施例中,来自发送终端的短消息到达短消息 服务中心时,短消息服务中心对该短消息进行数字签名处理,并将包含了数字签名的短消息发送给接收终端;接收终端接收到包含了数字签名的短消息后,提取数字签名并对数字签名进行验证,从而判断短消息是否来自合法基站。
参见图3,为本发明一实施例的短消息处理方法的流程示意图,其可应用于短消息服务中心,该方法包括:
S31、将接收到的短消息进行PDU编码,生成PDU数据包,并将根据PDU数据包计算出的预设长度的摘要序列进行加密以获得一数字签名。
参见图4,为本发明一实施例的PDU数据包的格式示意图,其包含:SMSC地址信息的长度、SMSC地址格式、SMSC地址、基本参数、回复地址数字个数、回复地址格式、回复地址、协议标识、用户信息编码方式、时间戳、用户信息长度、用户信息等。
应理解,图4的PDU数据包的格式仅为示例性的,其还可为任何其它的格式,例如,包含图4所示的数据格式中的一者或多者,或包括除图4所示的字段之外的其它字段。本发明对此不作限制。
在一个实施例中,可根据PDU数据包中的用户信息和回复地址通过哈希算法计算出一个预设长度的摘要序列(例如,128比特)。哈希算法可以是MD5或者SHA-1等。
得到预设长度的摘要序列后,对该摘要序列进行加密以获得数字签名。在一个实施例中,利用RSA算法获取数字签名。例如:
首先,选择两个不相等的大素数p和q,计算N=p×q和
Figure PCTCN2017074775-appb-000001
Figure PCTCN2017074775-appb-000002
然后,选择一个与
Figure PCTCN2017074775-appb-000003
互质的正整数e,且
Figure PCTCN2017074775-appb-000004
将(N,e)作为公钥。公钥(N,e)可通过多种方式下发给接收终端,例如,通过短消息的方式、通过数据通道的方式等等。当公钥发生变更时,及时下发新的公 钥给接收终端。
根据公式
Figure PCTCN2017074775-appb-000005
计算得到d,将(N,d)作为私钥;
对预设长度的摘要序列加密得到数字签名S,其中S=admodN,a即为预设长度的摘要序列。接收终端对数字签名的解密过程将在后续进行介绍。
本发明的实施例中,选择RSA算法进行数字签名,主要是由于RSA算法在解密验证时速度较快,不会影响接收终端的处理速度。在其它实施例中,也可采用其它的算法进行数字签名,例如,ECDSA算法、DSA算法等等。
S32、将数字签名增加到PDU数据包中,并发送给接收终端,以供接收终端根据接收到的包含数字签名的PDU数据包确定接收到的短消息是否来自合法基站。
在本发明的一些实施例中,可将数字签名通过以下三种方式增加到PDU数据包中:
方式一、将PDU数据包中的时间戳替换为数字签名。由于时间戳的作用是记录短消息服务中心接收到短消息的时间,因此,将该字段替换为数字签名,并不会对接收终端对短消息的接收、识别等造成不便。通过该方式,可高效利用PDU数据包中的非重要字段,实现增加数字签名。
方式二、将数字签名添加到PDU数据包中的用户信息字段中。用户信息字段一般用来存放短消息的内容,其长度可为140字节、160字节等等,在嵌入数字签名后,该字段被分为前后两部分,一部分存放数字签名,其对于用于不可见。另一部分存放短消息内容。通过该方式,可以不用对PDU协议字段进行修改或扩展,对原有网络系统的通信程序改动较少,便于实现。
方式三、在PDU数据包中增加一个字段,用来存放数字签名。增加的字段可位于PDU数据包的任何位置,例如,可增加到用户信息字段之后或 之前、回复地址字段之前或之后等等。该方式的好处是,当密钥长度较长使得数字签名结果较长时,不会占用用户信息字段,从而不会压缩用户短消息长度,用户体验更好。
包含数字签名的PDU数据包被进行相应的处理(例如,确定短消息优先级、存储短消息等处理)后,转发给接收终端。例如,参见上述图2,短消息服务中心(SMSC)根据被叫号码找到接收终端归属的归属位置寄存器(Home Location Register,HLR),并且发送消息到该HLR查询接收终端当前所在的短消息服务中心(SMSC)的地址。得到该地址后,短消息服务中心(SMSC)发送消息到接收终端所在MSC,由该MSC将短消息转发到接收终端。
接收终端接收到包含数字签名的PDU数据包后,可根据数字签名确认接收到的短消息是否来自合法基站。例如,在一个实施例中,接收终端接收到包含数据签名的PDU数据包后,获取PDU数据包中的数字签名并进行解密以得到一第一摘要序列;接收终端根据PDU数据包进行计算以得到一第二摘要序列;接收终端根据所述第一摘要序列和第二摘要序列,确定接收到的短消息是否来自合法基站。若第一摘要序列与第二摘要序列一致,则确定短消息来自合法基站;若第一摘要序列与第二摘要序列不一致,则确定短消息来自非法基站,接收终端可对接收到的短消息进行屏蔽等处理。
在另一个实施例中,接收终端可检测接收到的PDU数据包中是否包含数字签名,以确定接收到的短消息是否来自合法基站。若包含数字签名,则可确定短消息来自合法基站,若不包含数字签名,则确定接收到的短消息来自非法基站,可对其进行屏蔽等处理。
相应的,本发明实施例还提供一种短消息处理装置,参见图4,短消息处理装置40包括:
数字签名模块41,配置为将接收到的短消息进行PDU编码,生成PDU数据包,并将根据PDU数据包计算出的预设长度的摘要序列进行加密以获 得一数字签名;
发送模块42,配置为将所述数字签名增加到PDU数据包中,并发送给接收终端,以供所述接收终端根据接收到的包含数字签名的PDU数据包确定接收到的短消息是否来自合法基站。
在一个实施例中,所述数字签名模块41,还配置为将PDU数据包中的用户信息和回复地址通过哈希算法计算以获取所述预设长度的摘要序列。
在一个实施例中,所述数字签名模块41,还配置为利用公钥加密RSA算法对所述预设长度的摘要序列进行加密以得到所述数字签名。
在一个实施例中,所述发送模块42,还配置为采用以下方式中的至少一者,将所述数字签名增加到PDU数据包中:将所述数字签名添加到PDU数据包的用户信息字段中、将PDU数据包中的时间戳字段替换为所述数字签名、在PDU数据包中增加一个配置为存放所述数字签名的字段。
作为图4示出的短消息处理装置的硬件结构的一个可选的示例,参见图1,提供一种短消息处理装置,包括:
收发机102,配置为接收短消息;
处理器103,配置为将所述收发机收到的短消息进行协议数据单元PDU编码,生成PDU数据包,并将根据PDU数据包计算出的预设长度的摘要序列进行加密以获得一数字签名;
所述处理器103,还配置为将所述数字签名增加到PDU数据包中,并通过所述收发机发送给接收终端,以供所述接收终端根据接收到的包含数字签名的PDU数据包确定接收到的短消息是否来自合法基站。
在一个实施例中,所述处理器103,还配置为将PDU数据包中的用户信息和回复地址通过哈希算法计算以获取所述预设长度的摘要序列。
在一个实施例中,所述处理器103,还配置为利用公钥加密RSA算法对所述预设长度的摘要序列进行加密以得到所述数字签名。
对于图4示出的短消息处理装置的短消息处理的方案,可以结合图3 描述的短消息处理方法的实现细节和原理而理解。
本发明实施例的短消息处理方法及装置,通过增加数字签名,接收终端对接收到的短消息进行验证,从而终端可以判定短消息是否是来自非法基站,可达到非法基站垃圾短消息防护的目的,且可识别出非法基站,减少用户损失,增加用户安全性。
参见图6,为本发明另一实施例短消息处理方法,其可应用于短消息接收终端,该方法包括:
S51、接收包含数字签名的PDU数据包,获取PDU数据包中的数字签名并进行解密以得到一第一摘要序列。
例如,根据数字签名增加到PDU数据包的方式不同,可采用相应的方式获取数字签名。例如,针对第一种方式,可将时间戳字段中的内容提取出来,得到数字签名;针对第二种方式,可将用户信息字段中的内容提取出,并将短消息内容部分去除,剩下的部分即为数字签名;针对第三种方式,可根据增加的字段位置,提取其内容以得到数字签名。
获取到数字签名后,可利用预设的公钥对PDU数据包中的数字签名进行解密以获得一第一摘要序列。该预设的公钥是和数字签名所采用的私钥相配对的。如上所述,接收终端可通过多种方式获取并存储公钥,例如,通过短消息接收、通过数据业务通道从特定的目标装置(例如,基站服务器、固定网址等等)中获取等等。
接收终端进行解密时可根据公式a=SemodN进行,其中,a即为解密出的第一摘要序列,S为数字签名,(N,e)为公钥。
S52、根据PDU数据包进行计算以得到一第二摘要序列。
例如,根据PDU数据包求取第二摘要序列时,采用和短消息服务中心相同的哈希算法。即根据PDU数据包中的用户信息和回复地址通过哈希算法计算出一个预设长度的摘要序列(例如,128比特)作为第二摘要序列。
S53、根据第一摘要序列和第二摘要序列,确定接收到的短消息是否来自合法基站。
例如,若第一摘要序列与第二摘要序列一致,则确定短消息来自合法基站。
若第一摘要序列与第二摘要序列不一致,则确定短消息来自非法基站。接收终端可直接将其屏蔽。屏蔽的方式包括但不限于:不对接收到的短消息进行显示、将短消息进行删除等。
在一个实施例中,接收终端还可输出提示信息,提示用户该短消息是来自非合法基站/伪基站,以进一步提高用户的安全性。例如,提示的方式包括但不限于建议用户删除此短消息、忽略此短消息或建议用户进行进一步的确认等等。
在另一实施例中,判定为非法基站后,接收终端进一步将收到短消息的时间、当前接收终端的位置信息、当前接收的导频信号的频点等等可以标识接收基站的信息发送给预设服务器(例如,运营商的基站服务器),以便运营商采集非法基站的信息。
若判定位非法基站,则接收终端还可将当前接收基站的频点或LAI加入禁止(forbiden)列表,由此,使得接收终端不会再小区重选或注册的时候再次接入到该非法基站。
相应的,本发明实施例还提供一种短消息处理装置,参见图7,短消息处理装置70包括:
解密模块71,配置为接收包含数字签名的PDU数据包,获取PDU数据包中的数字签名并进行解密以得到一第一摘要序列;
摘要序列计算模块72,配置为根据PDU数据包进行计算以得到一第二摘要序列;
确定模块73,配置为根据所述第一摘要序列和第二摘要序列,确定接 收到的短消息是否来自合法基站。
在一个实施例中,所述摘要序列计算模块72,还配置为利用预设的公钥对PDU数据包中的数字签名进行解密以获得所述第一摘要序列。
对于图7示出的短消息处理装置的短消息处理的方案,可以结合图6描述的短消息处理方法的实现细节和原理而理解。
作为图7示出的短消息处理装置的硬件结构的一个可选的示例,短消息处理装置包括:处理器103和收发机102;
所述收发机102,配置为接收包含数字签名的协议数据单元PDU数据包;
所述处理器103,配置为获取所述PDU数据包中的数字签名并进行解密以得到一第一摘要序列;根据PDU数据包进行计算以得到一第二摘要序列;根据所述第一摘要序列和第二摘要序列,确定接收到的短消息是否来自合法基站。
在一个实施例中,所述处理器103,还配置为将PDU数据包中的用户信息和回复地址通过哈希算法计算以获取所述预设长度的摘要序列。
在一个实施例中,所述处理器103,还配置为利用公钥加密RSA算法对所述预设长度的摘要序列进行加密以得到所述数字签名。
在一个实施例中,所述处理器103,还配置为采用以下方式中的至少一者,将所述数字签名增加到PDU数据包中:将所述数字签名添加到PDU数据包的用户信息字段中、将PDU数据包中的时间戳字段替换为所述数字签名、在PDU数据包中增加一个配置为存放所述数字签名的字段。
本发明实施例的短消息处理方法及装置,通过在短消息中增加数字签名,接收终端对接收到的短消息进行验证,从而终端可以判定短消息是否是来自非法基站,可达到非法基站垃圾短消息防护的目的,且可识别出非法基站,减少用户损失,增加用户安全性。
参见图8,本发明一实施例的短消息处理系统的示意图。本发明实施例的短消息处理系统包括:
短消息服务中心,配置为将来自发送终端的短消息进行PDU编码,生成PDU数据包,并将根据PDU数据包计算出的预设长度的摘要序列进行加密以获得一数字签名;以及配置为将所述数字签名增加到PDU数据包中,并发送给接收终端;
接收终端,配置为接收到包含数据签名的PDU数据包后,获取PDU数据包中的数字签名并进行解密以得到一第一摘要序列;并根据PDU数据包进行计算以得到一第二摘要序列;以及根据所述第一摘要序列和第二摘要序列,确定接收到的短消息是否来自合法基站。
参见图9,在步骤S71、发送终端发送一短消息。例如,用户编辑好短消息,确定接收终端(即该短消息的接收终端)的号码,按发送键,则主/被叫号码、文本、短消息中心号码及请求的消息代码等将被一起通过无线信道经基站发送给登记的移动交换中心(Mobile Switching Center,MSC)/拜访位置寄存器(Visitor Location Register,VLR)。
参见图10,在一个实施例中,发送终端通过无线信道发送的短消息的数据格式包括:短消息中心地址长度、短消息中心号码类型、短消息中心号码、文件头字节、信息参考号、被叫号码长度、被叫号码类型、被叫号码、协议标识、用户信息编码方式、有效期、短消息长度、短消息内容。
应理解,图10的短消息数据格式仅为示例性的,短消息的数据格式还可为任何其它的格式,例如,包含图8所示的数据格式中的一者或多者,或包括除图10所示的字段之外的其它字段。本发明对此不作限制。
在步骤S72、发送终端发送的短消息到达短消息服务中心后,短消息服务中心将来自发送终端的短消息进行PDU编码,生成PDU数据包。PDU数据包的格式参照上述图5所述。
在步骤S73、短消息中心根据PDU数据包中的用户信息和回复地址通 过哈希算法计算出一个预设长度的摘要序列。
在步骤S74、对预设长度的摘要序列进行加密,得到数字签名。
例如,利用RSA算法,通过私钥对预设长度的摘要进行加密,得到一串密文即是数字签名。加密方法在上述实施例中已经详细描述,在此不再赘述。
在步骤S75、将得到的数字签名增加到PDU数据包中。例如,可采用以下方式中的至少一者,将数字签名增加到PDU数据包中:将数字签名添加到PDU数据包的用户信息字段中、将PDU数据包中的时间戳字段替换为数字签名、在PDU数据包中增加一个用于存放数字签名的字段。
在步骤S76、短消息服务中心将包含数字签名的PDU数据包进行处理后,转发给接收终端。这里的处理包括:确定短消息优先级、存储短消息等。应理解,短消息服务中心将PDU数据包(即经PDU编码后的短消息)转发给接收终端时,根据被叫号码找到接收终端归属的归属位置寄存器(Home Location Register,HLR),并且发送消息到该HLR查询接收终端当前所在的短消息服务中心(SMSC)的地址。得到该地址后,短消息服务中心(SMSC)发送消息到接收终端所在MSC,由该MSC将短消息转发到接收终端。
在步骤S77、接收终端接收到包含数字签名的PDU数据包后,解析出PDU数据包中的短消息内容和数字签名,以确定接收到的短消息是否来自合法基站。在本发明的一些实施例中,由于伪基站等非法基站的短消息不通过短消息服务中心,因此,其接收到的短消息中可能不包含数字签名。因此,若接收终端接收到的短消息中,没有解析出数字签名,则可以确定短消息是来自伪基站。由此,接收终端可检测接收到的PDU数据包中是否包含数字签名,以确定接收到的短消息是否来自合法基站。若包含数字签名,则可确定短消息来自合法基站,若不包含数字签名,则确定接收到的短消息来自非法基站,可对其进行屏蔽等处理。
在另一些实施例中,若非法基站也对短消息进行了数字签名的处理,则参见图11,接收终端接收到短消息后,解析出短消息PDU中的短消息内容和数字签名后,对两者进行分别处理。
例如,对短消息内容求取摘要序列,所用的哈希算法和短消息服务中心进行数字签名时所使用的哈希算法一致。
接收终端还利用公钥对数字签名进行解密,并获取解密后的摘要序列。在本发明的实施例中,公钥与短消息服务中心进行数字签名所采用的私钥是配对的,短消息服务中心可将公钥通过多种方式(例如,短消息业务方式、数据业务方式等等)发送给接收终端,接收终端将接收到的公钥进行存储,并在需要时从存储区域中提取。
接收终端将求取的消息摘要序列和解密获得的摘要序列进行对比,若两者一致则确定短消息是来自于合法基站。进一步的,接收终端可对短消息内容进行显示。
若两者不一致,则判定该短消息来非合法伪基站,例如,伪基站,接收终端可直接将其屏蔽。屏蔽的方式包括:不对接收到的短消息进行显示、将短消息进行删除等。
在一个实施例中,接收终端还可输出提示信息,提示用户该短消息是来自非合法基站/伪基站,以进一步提高用户的安全性。例如,提示的方式包括但不限于建议用户删除此短消息、忽略此短消息或建议用户进行确认等等。
在另一实施例中,判定为伪基站后,接收终端进一步将收到短消息的时间、当前接收终端的位置信息、当前接收的导频信号的频点等等可以标识接收基站的信息发送给服务器,以便运营商采集伪基站的信息。
本发明实施例通过在短消息中增加数字签名,接收终端对接收到的短消息进行验证,从而终端可以判定短消息是否是来自伪基站,可达到伪基站垃圾短消息防护的目的,且可识别出伪基站,减少用户损失,增加用户 安全性。
在本发明的一实施例中,数字签名的功能在短消息服务中心实现,其可以部署专门的数字签名服务器,参见图12,在短消息到达短消息服务中心后发送给数字签名服务器进行数字签名。例如,短消息服务中心可包括数字签名服务器和短消息服务器。短消息到达短消息服务中心之后,由短消息服务器将其转发给数字签名服务器。数字签名服务器中的签名程序先使用哈希算法对短消息明文(例如,用户信息和回复地址)计算出一个预设长度的摘要序列,这里的哈希算法可以是MD5或者SHA-1。接下来签名程序用私钥对摘要序列进行加密,得到一串密文即是数字签名。签名完成后(即将数字签名增加到PDU数据包中),数字签名服务器将签名的结果发送回短消息服务器,短消息服务器对签名过的短消息进行常规的处理,比如确定短消息优先级、存储短消息等,最后将短消息转发给接收终端。
本发明实施例的短消息处理系统,通过在短消息中增加数字签名,接收终端对接收到的短消息进行验证,从而终端可以判定短消息是否是来自非法基站,可达到非法基站垃圾短消息防护的目的,且可识别出非法基站,减少用户损失,增加用户安全性。
参见图13,本发明另一实施例的短消息处理方法中,短消息服务中心可只对特定的短消息进行数字签名处理,而接收终端也只对这些特定的短消息进行解密验证,从而在可简化上述实施例的短消息流程。例如:
在步骤S81、短消息服务中心接收到短消息后,判断该短消息是否为特定类型的短消息,如果是,则对该短消息进行添加数字签名的处理。若不是,则不添加数字签名,直接转发给相应的接收终端,则按照正常流程进行处理。
例如,一般伪基站为选择一些公众熟知的号码进行发送号码的伪造,从而进行虚假短消息的发送,例如,运营商的服务号码(10086、10000等等)、银行的号码等等。因此,本发明实施例可将特定类型的短消息设定为: 发送终端号码(即主叫号码)为预设号码的短消息。预设号码可包括:运营商的服务号码、各个银行的号码、紧急号码(例如,110)等。当短消息服务中心接收到短消息时,通过主叫号码判断是否需要进行数字签名的处理,若需要,则按照上述实施例的处理方法进行数字签名的处理,在此不再赘述。
在步骤S82、接收终端接收到的短消息若为特定类型的短消息,则进行数字签名的验证处理。例如,若接收终端接收到的短消息的主叫号码为预设号码,即上述所述的运营商的服务号码、各个银行的号码、紧急号码(例如,110)等,则按照上述图6所示的处理方法进行验证,以判定短消息是否来自合法基站。
本发明实施例还提供一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,所述计算机可执行指令用于前述短消息处理的至少其中之一,例如,图3、图6、图6、图9、及图13所示方法的至少其中之一。本发明实施例所述的计算机存储介质可为光盘、硬盘或磁盘等存储介质,可选为非瞬间存储介质。
通过本发明的该实施例,短消息服务中心可只对特定的短消息进行数字签名处理,而接收终端也只对这些特定的短消息进行解密验证,从而在可简化上述实施例短消息处理流程,只对涉及到安全的短消息进行是否来自非法基站的判定,减少处理复杂度,同样可增加用户安全性。
本发明实施例中的发送终端和接收终端均可采用图1所示的终端100的硬件结构。且发送终端和接收终端还可以被称为移动设备、终端、接入终端、用户单元等。发送终端和接收终端可以是智能电话、平板计算机、笔记本电脑、或者被配置为使用2G/3G/4G等无线通信协议进行通信的其它设备。
流程图中或在本发明的实施例中以其他方式描述的任何过程或方法描述可以被理解为,表示包括一个或更多个用于实现特定逻辑功能或过程的 步骤的可执行指令的代码的模块、片段或部分,并且本发明实施方式的范围包括另外的实现,其中可以不按所示出或讨论的顺序,包括根据所涉及的功能按基本同时的方式或按相反的顺序,来执行功能,这应被本发明的实施例所述技术领域的技术人员所理解。
本发明实施例描述的技术可用于各种通信系统,例如第二代移动通信系统(2G),第三代移动通信系统(3G)或第四待移动通信系统(4G)等。还例如,全球移动通信(GSM)系统,码分多址(CDMA)系统,时分多址(TDMA)系统,宽带码分多址(WCDMA)系统,频分多址(FDMA)系统,正交频分多址(OFDMA)系统,单载波频分多址系统(SC-FDMA)系统,通用分组无线业务(GPRS)系统,长期演进(LTE)系统,以及其它类似通信系统。
上述本发明实施例序号仅仅为了描述,不代表实施例的优劣。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,或者网络设备等)执行本发明各个实施例所述的方法。
出于解释的目的,前面的描述使用了特定的术语,以提供对本发明的透彻理解。然而,对本领域的技术人员来说显而易见的是,为了实践本发明并不需要具体的细节。本发明的具体实施例的前述描述是为了图示和说明的目的而呈现。它们并不意在详尽的或将本发明限于所公开的准确形式。鉴于上面的教义,许多修改和变化是可能的。为了最好地解释本发明的原理及其实际应用而示出并描述了这些实施例,从而使本领域的其他技术人员能够最好地利用本发明和具有适于预期的特定使用的各种修改的各种实 施例。意在本发明的范围由随后的权利要求和其等同物来限定。

Claims (20)

  1. 一种短消息处理方法,包括:
    将接收到的短消息进行协议数据单元PDU编码,生成PDU数据包,并将根据PDU数据包计算出的预设长度的摘要序列进行加密以获得一数字签名;
    将所述数字签名增加到PDU数据包中,并发送给接收终端,以供所述接收终端根据接收到的包含数字签名的PDU数据包确定接收到的短消息是否来自合法基站。
  2. 根据权利要求1所述的方法,其中,还包括:将PDU数据包中的用户信息和回复地址通过哈希算法计算以获取所述预设长度的摘要序列。
  3. 根据权利要求2所述的方法,其中,所述将根据PDU数据包计算出的预设长度的摘要序列进行加密以获得一数字签名,包括:
    利用公钥加密RSA算法对所述预设长度的摘要序列进行加密以得到所述数字签名。
  4. 根据权利要求1-3任一项所述的方法,其中,所述将所述数字签名增加到PDU数据包中,包括:
    采用以下方式中的至少一者,将所述数字签名增加到PDU数据包中:将所述数字签名添加到PDU数据包的用户信息字段中、将PDU数据包中的时间戳字段替换为所述数字签名、在PDU数据包中增加一个用于存放所述数字签名的字段。
  5. 根据权利要求1所述的方法,其中,所述接收到的短消息为特定类型的短消息。
  6. 一种短消息处理方法,包括:
    接收包含数字签名的协议数据单元PDU数据包,获取PDU数据包中的数字签名并进行解密以得到一第一摘要序列;
    根据PDU数据包进行计算以得到一第二摘要序列;
    根据所述第一摘要序列和第二摘要序列,确定接收到的短消息是否来自合法基站。
  7. 根据权利要求6所述的方法,其中,所述获取PDU数据包中的数字签名并进行解密以得到一第一摘要序列,包括:
    利用预设的公钥对PDU数据包中的数字签名进行解密以获得所述第一摘要序列。
  8. 根据权利要求6所述的方法,其中,所述根据所述第一摘要序列和第二摘要序列,确定接收到的短消息是否来自合法基站,包括:
    若所述第一摘要序列与第二摘要序列一致,则确定短消息来自合法基站;若所述第一摘要序列与第二摘要序列不一致,则确定短消息来自非法基站。
  9. 一种短消息处理装置,包括:
    数字签名模块,配置为将接收到的短消息进行协议数据单元PDU编码,生成PDU数据包,并将根据PDU数据包计算出的预设长度的摘要序列进行加密以获得一数字签名;
    发送模块,配置为将所述数字签名增加到PDU数据包中,并发送给接收终端,以供所述接收终端根据接收到的包含数字签名的PDU数据包确定接收到的短消息是否来自合法基站。
  10. 根据权利要求9所述的短消息处理装置,其中,
    所述数字签名模块,还配置为将PDU数据包中的用户信息和回复地址通过哈希算法计算以获取所述预设长度的摘要序列。
  11. 根据权利要求9所述的短消息处理装置,其中,
    所述数字签名模块,还配置为利用公钥加密RSA算法对所述预设长度的摘要序列进行加密以得到所述数字签名。
  12. 根据权利要求9所述的短消息处理装置,其中,
    所述发送模块,还配置为采用以下方式中的至少一者,将所述数字签名增加到PDU数据包中:将所述数字签名添加到PDU数据包的用户信息字段中、将PDU数据包中的时间戳字段替换为所述数字签名、在PDU数据包中增加一个配置为存放所述数字签名的字段。
  13. 一种短消息处理装置,包括:
    收发机,配置为接收短消息;
    处理器,配置为将所述收发机收到的短消息进行协议数据单元PDU编码,生成PDU数据包,并将根据PDU数据包计算出的预设长度的摘要序列进行加密以获得一数字签名;
    所述处理器,还配置为将所述数字签名增加到PDU数据包中,并通过所述收发机发送给接收终端,以供所述接收终端根据接收到的包含数字签名的PDU数据包确定接收到的短消息是否来自合法基站。
  14. 根据权利要求13所述的短消息处理装置,其中,
    所述处理器,还配置为将PDU数据包中的用户信息和回复地址通过哈希算法计算以获取所述预设长度的摘要序列。
  15. 根据权利要求14所述的短消息处理装置,其中,
    所述处理器,还配置为利用公钥加密RSA算法对所述预设长度的摘要序列进行加密以得到所述数字签名。
  16. 一种短消息处理装置,包括:
    解密模块,配置为接收包含数字签名的协议数据单元PDU数据包,获取PDU数据包中的数字签名并进行解密以得到一第一摘要序列;
    摘要序列计算模块,配置为根据PDU数据包进行计算以得到一第二摘要序列;
    确定模块,配置为根据所述第一摘要序列和第二摘要序列,确定接收到的短消息是否来自合法基站。
  17. 根据权利要求16所述的短消息处理装置,其中,
    所述摘要序列计算模块,还配置为利用预设的公钥对PDU数据包中的数字签名进行解密以获得所述第一摘要序列。
  18. 一种短消息处理装置,包括:
    处理器和收发机;
    所述收发机,配置为接收包含数字签名的协议数据单元PDU数据包;
    所述处理器,配置为获取所述PDU数据包中的数字签名并进行解密以得到一第一摘要序列;根据PDU数据包进行计算以得到一第二摘要序列;根据所述第一摘要序列和第二摘要序列,确定接收到的短消息是否来自合法基站。
  19. 一种短消息处理系统,包括:
    短消息服务中心,配置为将来自发送终端的短消息进行协议数据单元PDU编码,生成PDU数据包,并将根据PDU数据包计算出的预设长度的摘要序列进行加密以获得一数字签名;以及配置为将所述数字签名增加到PDU数据包中,并发送给接收终端;
    接收终端,配置为接收到包含数据签名的PDU数据包后,获取PDU数据包中的数字签名并进行解密以得到一第一摘要序列;并根据PDU数据包进行计算以得到一第二摘要序列;以及根据所述第一摘要序列和第二摘要序列,确定接收到的短消息是否来自合法基站。
  20. 一种存储介质,所述存储介质中存储有可执行指令,所述可执行指令用于执行权利要求1至7任一项所述的短消息处理方法。
PCT/CN2017/074775 2016-04-28 2017-02-24 短消息处理方法、装置及系统、存储介质 WO2017185872A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610280920.2A CN107333247A (zh) 2016-04-28 2016-04-28 短消息处理方法、装置及系统
CN201610280920.2 2016-04-28

Publications (1)

Publication Number Publication Date
WO2017185872A1 true WO2017185872A1 (zh) 2017-11-02

Family

ID=60161811

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/074775 WO2017185872A1 (zh) 2016-04-28 2017-02-24 短消息处理方法、装置及系统、存储介质

Country Status (2)

Country Link
CN (1) CN107333247A (zh)
WO (1) WO2017185872A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108769933A (zh) * 2018-05-31 2018-11-06 中国联合网络通信集团有限公司 彩信识别方法和彩信识别系统
CN114302403A (zh) * 2021-12-29 2022-04-08 中国建设银行股份有限公司 一种短信验真方法、装置、电子设备及存储介质
CN114979990A (zh) * 2022-06-17 2022-08-30 中国电信股份有限公司 短信过滤方法、装置、电子设备及可读存储介质

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3811649A4 (en) 2018-06-22 2022-01-19 Apple Inc. ENHANCED SECURITY FOR ACCESS STRATUM TRANSMISSION
CN111062721B (zh) * 2019-12-31 2023-12-12 南京金宁汇科技有限公司 一种应用于区块链的签名方法、系统及存储介质
CN113490165B (zh) * 2021-06-21 2022-09-02 广州致远电子股份有限公司 一种嵌入式系统的4g模组短信息收发方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060183489A1 (en) * 2005-02-17 2006-08-17 International Business Machines Corporation Method and system for authenticating messages exchanged in a communications system
CN101030856A (zh) * 2006-07-19 2007-09-05 王李琰 一种基于标识的密码技术的短消息认证及可靠分类传递方法
CN101115226A (zh) * 2006-07-28 2008-01-30 明基电通股份有限公司 简信验证系统及简信验证方法
US20150011186A1 (en) * 2013-07-05 2015-01-08 Electronics And Telecommunications Research Institute Method and apparatus for detecting sms-based malware

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060183489A1 (en) * 2005-02-17 2006-08-17 International Business Machines Corporation Method and system for authenticating messages exchanged in a communications system
CN101030856A (zh) * 2006-07-19 2007-09-05 王李琰 一种基于标识的密码技术的短消息认证及可靠分类传递方法
CN101115226A (zh) * 2006-07-28 2008-01-30 明基电通股份有限公司 简信验证系统及简信验证方法
US20150011186A1 (en) * 2013-07-05 2015-01-08 Electronics And Telecommunications Research Institute Method and apparatus for detecting sms-based malware

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108769933A (zh) * 2018-05-31 2018-11-06 中国联合网络通信集团有限公司 彩信识别方法和彩信识别系统
CN114302403A (zh) * 2021-12-29 2022-04-08 中国建设银行股份有限公司 一种短信验真方法、装置、电子设备及存储介质
CN114979990A (zh) * 2022-06-17 2022-08-30 中国电信股份有限公司 短信过滤方法、装置、电子设备及可读存储介质
CN114979990B (zh) * 2022-06-17 2024-03-26 中国电信股份有限公司 短信过滤方法、装置、电子设备及可读存储介质

Also Published As

Publication number Publication date
CN107333247A (zh) 2017-11-07

Similar Documents

Publication Publication Date Title
WO2017185872A1 (zh) 短消息处理方法、装置及系统、存储介质
US11122428B2 (en) Transmission data protection system, method, and apparatus
EP2868029B1 (en) Key agreement for wireless communication
CN201286113Y (zh) 无线发射/接收单元
KR101916034B1 (ko) 무선통신 시스템에서 단문 데이터의 암호화 방법 및 장치
WO2019034014A1 (zh) 接入认证的方法和装置
AU2013224696A1 (en) An instant communication method and system
CN105430640A (zh) 一种短信加密认证方法、终端及系统
US20140229386A1 (en) Secure mobile payments
JP5739006B2 (ja) セキュアデータおよび非セキュアデータを送受信するための方法および装置
KR20180000220A (ko) 보안 메시지 서비스 제공 방법 및 이를 위한 장치
Saxena et al. SecureSMS: A secure SMS protocol for VAS and other applications
US20050086481A1 (en) Naming of 802.11 group keys to allow support of multiple broadcast and multicast domains
CN109951378B (zh) 一种即时通信中的文件加密传输与共享方法
WO2022083448A1 (zh) 加密方法、解密方法、装置及设备
CA2758425C (en) Securing private key access for cross-component message processing
CN110999215A (zh) 安全设备访问令牌
WO2017197968A1 (zh) 一种数据传输方法及装置
Belvin A secure text messaging protocol
CN114599033B (zh) 一种通信鉴权处理方法及装置
WO2018107398A1 (zh) 验证消息合法性的方法和服务器
CN110830421A (zh) 数据传输方法和设备
Zhao et al. Building secure user-to-user messaging in mobile telecommunication networks
US20210400472A1 (en) Secure beacons
CN105472612A (zh) 使用Wi-Fi热点广播和接收关键字并获取其信息的方法及系统

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17788528

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 17788528

Country of ref document: EP

Kind code of ref document: A1