WO2018059303A1 - Method and device for encrypting and decrypting information in short message - Google Patents

Method and device for encrypting and decrypting information in short message Download PDF

Info

Publication number
WO2018059303A1
WO2018059303A1 PCT/CN2017/102768 CN2017102768W WO2018059303A1 WO 2018059303 A1 WO2018059303 A1 WO 2018059303A1 CN 2017102768 W CN2017102768 W CN 2017102768W WO 2018059303 A1 WO2018059303 A1 WO 2018059303A1
Authority
WO
WIPO (PCT)
Prior art keywords
short message
mobile terminal
information
encrypted
original
Prior art date
Application number
PCT/CN2017/102768
Other languages
French (fr)
Chinese (zh)
Inventor
张勇
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2018059303A1 publication Critical patent/WO2018059303A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/18Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/18Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
    • H04W4/185Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals by embedding added-value information into content, e.g. geo-tagging

Definitions

  • the present disclosure relates to, but is not limited to, the field of communication technologies, and in particular, to a method and apparatus for encrypting and decrypting information in a short message.
  • mobile terminals such as mobile phones, tablets, smart watches, etc.
  • mobile terminals have become portable mobile electronic devices commonly used in people's lives.
  • the short message function has already been used.
  • third-party applications have applied for permission to read short messages. Some malicious third-party applications may steal the user's text messages to gain the user's personal privacy and threaten the user's information security.
  • the mobile terminal short message encryption method is often used, and only the preset short message application provided by the mobile terminal manufacturer is allowed to view the real short message content, and other third party applications cannot obtain the real short message content, thereby realizing the information about the user mobile terminal. protection of.
  • the short message encryption method may include: the first method, the sender mobile terminal encrypts the original short message text, and after transmitting the encrypted short message text to the receiving mobile terminal, the receiving mobile terminal decrypts the encrypted short message text, and The decrypted text message is displayed.
  • the second method after receiving the short message, the receiving party displays the encrypted short message text, and the receiving party can display the original short message text after the user inputs the password.
  • the mobile terminal of the sender and the receiver is required to cooperate. If the sender and the receiver use different types of mobile terminals, at least one of the mobile terminals does not have an encryption function, or both mobile terminals. With different encryption mechanisms, this method cannot be implemented. Now, therefore, the first method has great limitations in terms of practicality.
  • the second method it is roughly to prevent other people from viewing the short message after receiving the mobile terminal, so the operation of inputting the password is added when viewing the short message.
  • many third-party applications installed on mobile terminals can bypass this encryption mechanism and directly receive or read short messages. Therefore, the second method is also insufficient in practicality.
  • This paper provides a method and device for encrypting and decrypting information in a short message, which realizes the protection of important private information in the short message of the user, reduces the risk of leakage of important private information of the user, ensures the security of the user information, and improves the user experience.
  • An embodiment of the present disclosure provides a method for encrypting and decrypting information in a short message, including:
  • the bottom layer of the mobile terminal receives at least one original short message containing private information
  • the mobile terminal bottom layer encrypts the private information in the original short message to generate an encrypted short message, and sends the encrypted short message to the short message application of the mobile terminal;
  • the short message application of the mobile terminal After receiving the encrypted short message, the short message application of the mobile terminal decrypts the encrypted short message.
  • the privacy information includes at least one of the following: digital combination information, and character combination information that is not all numbers.
  • the encryption condition when the private information includes digital combination information, the encryption condition includes that the length of the digital combination information included in the original short message is greater than or equal to a length threshold;
  • the encryption condition includes that the original short message includes a character string that satisfies the setting condition.
  • the encryption condition further includes: the mobile terminal short message encryption control switch is turned on.
  • the method further includes: the mobile terminal bottom layer transmitting the original short message to a third party application in a preset third party application list.
  • the preset third-party application list includes: a third-party application trusted by the user in the mobile terminal.
  • An embodiment of the present disclosure further provides an apparatus for encrypting and decrypting information in a short message, where the apparatus includes a bottom message of a mobile terminal and a short message application of the mobile terminal;
  • the bottom layer of the mobile terminal is configured to: receive at least one original short message including the private information; and when the original short message satisfies the encryption condition, encrypt the private information in the original short message to generate an encrypted short message, to the mobile terminal
  • the short message application sends the encrypted short message
  • the short message application of the mobile terminal is configured to: after receiving the encrypted short message, decrypt the encrypted short message.
  • the privacy information includes at least one of the following: digital combination information, and character combination information that is not all numbers.
  • the encryption condition when the private information includes digital combination information, the encryption condition includes that the length of the digital combination information included in the original short message is greater than or equal to a length threshold;
  • the encryption condition includes that the original short message includes a character string that satisfies the setting condition.
  • the encryption condition further includes: the mobile terminal short message encryption control switch is turned on.
  • the mobile terminal bottom layer is further configured to: send the original short message to a third-party application in a preset third-party application list.
  • the preset third-party application list includes: a third-party application trusted by the user in the mobile terminal.
  • Embodiments of the present disclosure also provide a computer readable storage medium storing computer executable instructions, the method of implementing encryption and decryption of information in the short message when the computer executable instructions are executed.
  • the mobile terminal bottom layer receives at least one original short message including the private information; when the original short message satisfies the encryption condition, the mobile terminal bottom layer encrypts the private information in the original short message to generate an encrypted short message.
  • 1 is a flow chart of a method for encrypting and decrypting information in a short message
  • FIG. 2 is a flow chart of another method for encrypting and decrypting information in a short message
  • 3 is a flow chart of another method for encrypting and decrypting information in a short message
  • FIG. 4 is a schematic structural diagram of an apparatus for encrypting and decrypting information in a short message.
  • FIG. 1 is a flowchart of a method for encrypting and decrypting information in a short message. As shown in FIG. 1, the method includes:
  • Step 100 The mobile terminal bottom layer receives at least one original short message including private information.
  • the mobile terminal may be a mobile phone, a tablet computer, a smart watch, etc.
  • the bottom layer of the mobile terminal may be a telecommunication framework layer of an Android mobile phone, an operating system (OS) layer, a driver layer, and the like.
  • OS operating system
  • the privacy information may include at least one of the following: digital information, character combination information.
  • the private information may include at least one of the following: a bank card number, a password, a mobile phone number, an email address, a web address, and the like.
  • Step 101 When the original short message satisfies the encryption condition, the mobile terminal bottom layer encrypts the private information in the original short message to generate an encrypted short message, and sends the encrypted short message to the short message application of the mobile terminal.
  • the encryption condition may include that the length of the digital combination information included in the original short message is greater than or equal to a length threshold; for example, the original short message includes a digital combination information of 2,563,689.
  • the set length threshold is 4.
  • the length 7 of the digital combination information is greater than the length threshold 4, the original short message needs to be encrypted.
  • the encryption condition may include: the original short message includes a character string that satisfies the setting condition; and the setting condition may be that the original short message includes the specified string identifier.
  • the specified string identifier may be a special string identifier in a mailbox, a web address, etc., for example, .com, .net, .org, @163.com, @gmail.com, etc.;
  • the original short message contains a web address information www.un.org
  • the specified string identifier .org is detected at this time, and it can be determined that the original short message needs to be encrypted.
  • the encryption condition may further include: the mobile terminal short message encryption control switch is turned on.
  • the user can select to enable or disable the SMS encryption control switch to implement whether the mobile terminal uses the privacy information encryption function in the short message.
  • the short message encryption flag bit may be set at the same time and the short message encryption flag bit is sent to the short message application of the mobile terminal; for example, When the SMS encryption flag is set to '1', the original SMS has been encrypted. When the SMS encryption flag is set to '0', the original SMS is not encrypted.
  • the mobile terminal bottom layer can send the original short message to the short message application of the mobile terminal.
  • the private information to be encrypted in the short message is digital information
  • the mobile terminal short message encryption control switch when the private information to be encrypted in the short message is digital information, after the mobile terminal short message encryption control switch is turned on, it can be determined whether the digital information in the original short message needs to be encrypted; when the original short message contains digital information length greater than When the length is equal to the length threshold, the digital information in the original short message may be encrypted to generate an encrypted short message, and the mobile terminal may send the encrypted short message; when the length of the digital information included in the original short message is less than a length threshold, The original message can be sent by the bottom layer of the mobile terminal.
  • the length threshold of the above digital information can be set by the user.
  • the private information may not be a number that the user needs to keep secret.
  • the number of digits less than 4 digits is generally the date, time, amount of money, number of people, and the like.
  • the digital information that the user needs to protect can be long, such as the ID number, the mobile phone number, the bank card number, etc., and the password information important to the user, such as the bank card password, the terminal application login password, the payment password, etc., has the shortest length when set. limit. Therefore, the mobile terminal can selectively encrypt the received digital short message and improve the information encryption protection efficiency in the short message.
  • Step 102 After receiving the encrypted short message, the short message application of the mobile terminal decrypts the encrypted short message.
  • the short message application of the mobile terminal can also determine whether the currently received short message is an encrypted short message before displaying the currently received short message.
  • the short message encryption flag is 1, and if yes, it may continue to determine that the currently received short message is the encrypted short message, and the short message application of the mobile terminal may decrypt the encrypted short message and display the decrypted short message text. If not, the short message application of the mobile terminal can directly display the original short message.
  • the short message application of the mobile terminal may determine whether the short message encryption flag is 1, and if yes, determine that the currently received short message is the encrypted short message, and then the decrypted message may be decrypted. Encrypt the short message and display the decrypted short message text; if not, it can be determined that the currently received short message is an unencrypted original short message, and then the original short message can be directly displayed.
  • the selected encryption and decryption algorithm may be determined whether the currently received short message is an encrypted short message by determining whether the currently received short message satisfies the encryption condition.
  • the mobile terminal may further save the currently received short message to the mobile terminal short message database, and the currently received short message may include the encrypted short message, and may also include the original short message.
  • the short message text obtained by other third party applications is the encrypted short message.
  • the third party application monitors the mobile terminal short message database to steal the short message content, only the encrypted short message or the original short message that does not need to be encrypted can be obtained; thus, the third party application cannot obtain the real short message content, thereby realizing the user. Protection of mobile terminal information.
  • the mobile terminal may also preset a third-party application list, where the third-party application list includes a trusted third-party application in the mobile terminal specified by the user, so that the trusted third-party application can extract the private information in the short message.
  • the mobile terminal may send the original short message to a third-party application in the preset third-party application list.
  • many third-party applications play an increasingly important role in electronic transactions such as daily payments, transfers, etc.
  • These highly secure third-party applications are greatly trusted by users.
  • the mobile terminal bottom layer receives at least one original short message including the private information; when the original short message satisfies the encryption condition, the mobile terminal bottom layer encrypts the private information in the original short message to generate an encrypted short message.
  • 2 is a flow chart of another method for encrypting and decrypting information in a short message, and the method may include:
  • Step 200 A new short message is received at the bottom of the mobile phone.
  • Step 201 Determine whether the SMS encryption control switch is enabled. If yes, go to step 202; if no, go to step 204.
  • the bottom layer of the mobile phone can directly send the received new SMS to the SMS application of the mobile phone.
  • Step 202 Determine whether the length of the digit in the new short message is greater than or equal to the length threshold. If yes, go to step 203; if no, go to step 204.
  • the bottom layer of the mobile phone may sequentially detect the received new short message text from the start character to the end character, and record the length of the digital string of the detected continuous digital information.
  • the numeric string can be excluded. The calculation of the length.
  • numeric string length is 9; a numeric string in the new short message is "123-456-789", then the numeric string length is also 9 .
  • Step 203 Encrypt the digital information in the new short message, generate an encrypted short message, and add the short message.
  • the secret flag is set to 1, and the encrypted SMS and SMS encryption flag are sent to the SMS application of the mobile phone.
  • the original short message may be encrypted.
  • the first few digits of the commonly used digital information that needs to be encrypted may be regular or public, such as a mobile phone number, a bank card number, an ID card number, Therefore, when encrypting digital information, the middle bit can be used as the starting encryption bit, and the initial encryption bit is encrypted to the end of the digital information.
  • the first 6 digits of the 19-digit bank card number indicate the card issuing bank information, 7th to 10th. The bit indicates the card issue area, so the last 13 bits can be encrypted or the last 9 bits can be encrypted.
  • the encryption algorithm for encrypting digital information can adopt a classical encryption algorithm, for example, Data Encryption Standard (DES), International Data Encryption Algorithm (IDEA), and public key encryption algorithm (Ron). Rivest, Adi Shamir, Leonard Adleman, RSA), etc.
  • DES Data Encryption Standard
  • IOA International Data Encryption Algorithm
  • Ron public key encryption algorithm
  • a key number is preset by the mobile phone, and the key number to be encrypted in the digital information is added to the key number to modulo 10 to generate encrypted digital information.
  • the original digital information received in the new short message is 123456789
  • the initial encryption bit set by the mobile phone is 5
  • the key number is 3
  • the 5th digit of the digital information is 5 plus 3 equals 8
  • the result of 10 is modulo 8.
  • the obtained encrypted digital information is 123489012.
  • a multi-bit key number may also be set, for example, three key numbers 356 are set, and the fifth digit 5 of the digital information uses the first key number 3, and the sixth digit 6 uses the first Two key numbers 5, the 7th number 7 uses the 3rd key number 6. If the number of key digits is less than the length of the digital information to be encrypted, then after using all the key digits, the first key digit can be reused for the next digit to be encrypted, such as the 8th digit 8 reused One key number 3, the ninth number 9 continues to use the second key number 5, and the resulting encrypted digital information is 123481314.
  • the displayed digital information is still a number, avoiding the third party application or other people knowing the obtained digital letter.
  • the information is encrypted information.
  • Step 204 The short message application of the mobile phone receives the current short message.
  • Step 205 Determine whether the short message encryption flag is 1, if yes, go to step 206; if no, go to step 207.
  • the short message application of the mobile phone can determine whether the encrypted flag bit is 1. If it is 1, it indicates that the current SMS is an encrypted SMS. If it is 0, the current SMS is the original SMS.
  • Step 206 Decrypt the digital information in the current short message.
  • the short message application of the mobile phone can decrypt the received encrypted short message, and the decryption algorithm can correspond to the encryption algorithm used by the underlying mobile phone.
  • the bottom layer of the mobile phone uses the DES encryption algorithm
  • the preset short message application uses the corresponding DES decryption algorithm to decrypt the encrypted short message.
  • the bottom layer of the mobile phone adopts the simple encryption algorithm in step 203, that is, the key number is 3, and the initial encryption bit is 5.
  • the opposite operation may be performed on each encrypted digital information from the 5th bit, that is, the number directly greater than or equal to 3 is directly reduced by 3, and for the number less than 3, Add 10 and then subtract 3, and the original digital information 123456789 can be displayed after decryption.
  • Step 207 Display the current short message.
  • the mobile phone can display the original received text message, or can display the decrypted encrypted text message.
  • FIG. 3 is a flowchart of still another method for encrypting and decrypting information in a short message, and the method may include:
  • Step 300 A new short message is received at the bottom of the mobile phone.
  • Step 301 Determine whether the SMS encryption control switch is enabled. If yes, go to step 302; if no, go to step 304.
  • Step 302 Determine whether the new short message includes a character string that satisfies the set condition. If yes, go to step 303; if no, go to step 304.
  • the commonly used email address may be composed of three parts, the first part, the user account; the second part, the separator @; the third part, the mail receiving server domain name of the user mailbox, used to identify the mail receiving server where the mail receiving server is located position.
  • the special string identifier can be @plus the mail receiving server domain name of the user mailbox. For example, @sina.com, @163.com, @gmail.com, @hotmail.com, etc.
  • Step 303 Encrypt the mailbox information in the new short message, generate an encrypted short message, and send the encrypted short message to the short message application of the mobile phone.
  • @163.com is included in the new short message
  • at least 4 characters immediately preceding @ can be encrypted, for example, the American Standard Code for Information Exchange for each character in the content to be encrypted (American Standard Code for Information Interchange (ASCII) plus 2 is displayed again.
  • ASCII American Standard Code for Information Interchange
  • the hexadecimal ASCII code corresponding to the character 'b' is '62'
  • the character corresponding to the hexadecimal ASCII code '64' after adding 2 is 'd'
  • the bigbang@163.com is encrypted as bigdcpi@163.com, and can send encrypted text messages to the mobile phone's SMS application.
  • Step 304 The short message application of the mobile phone receives the current short message.
  • Step 305 Determine whether the SMS encryption control switch is enabled. If yes, go to step 306; if no, go to step 308.
  • Step 306 Determine whether the current short message contains a character string that satisfies the set condition. If yes, go to step 307; if no, go to step 308.
  • the current short message may be determined by detecting whether the current short message includes the string identifier '@163.com'. Whether it is encrypted SMS.
  • Step 307 Decrypt the mailbox information in the current short message.
  • the encryption algorithm and the decryption algorithm respectively used in the SMS application of the mobile phone bottom layer and the mobile phone may be agreed in advance, and the encrypted short message may be decrypted by using the decryption algorithm after the encrypted short message received by the mobile phone short message application.
  • the mobile phone short message application when the mobile phone short message application receives the current short message, the first four characters immediately adjacent to @ can be decrypted, and the ASCII code of each character in the content to be decrypted is subtracted by 2, and the correct character information is obtained.
  • Step 308 Display the current short message.
  • the mobile phone can display the original received text message, or can display the decrypted encrypted text message.
  • the embodiment of the present disclosure further provides an apparatus for encrypting and decrypting information in a short message.
  • 4 is a schematic structural diagram of a device for encrypting and decrypting information in a short message. As shown in FIG. 4, the device may include a bottom layer 400 of the mobile terminal and a short message application 401 of the mobile terminal;
  • the mobile terminal bottom layer 400 is configured to: receive at least one original short message including private information; and when the original short message satisfies an encryption condition, encrypt the private information in the original short message to generate an encrypted short message to the mobile
  • the short message application of the terminal sends the encrypted short message.
  • the short message application 401 of the mobile terminal is configured to: after receiving the encrypted short message, decrypt the encrypted short message.
  • the privacy information may include at least one of the following: digital combination information, and character combination information that is not all numbers.
  • the encryption condition may include that the length of the digital combination information included in the original short message is greater than or equal to a length threshold;
  • the encryption condition may include that the original short message includes a character string that satisfies the setting condition.
  • the encryption condition may further include: the mobile terminal short message encryption control switch is turned on.
  • the bottom layer 400 of the mobile terminal may be further configured to: send the original short message to a third-party application in a preset third-party application list.
  • the preset third-party application list may include: a trusted third-party application in the mobile terminal specified by the user.
  • Embodiments of the present disclosure also provide a computer readable storage medium storing a computer executable And a method of implementing encryption and decryption of information in the short message when the computer executable instruction is executed.
  • embodiments of the present disclosure can be provided as a method, system, or computer program product.
  • embodiments of the present disclosure may take the form of a hardware embodiment, a software embodiment, or a combination of software and hardware aspects.
  • embodiments of the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage and optical storage, etc.) including computer usable program code.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more flows of the flowchart, or a block or blocks of the block diagram, or at least one block of the flowchart and at least one block of the block diagram.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more flows of the flowchart, or a block or blocks of the block diagram, or at least one block of the flowchart and at least one block of the block diagram.
  • computer storage medium includes volatile and nonvolatile, implemented in any method or technology for storing information, such as computer readable instructions, data structures, program modules or other data. Sex, removable and non-removable media.
  • Computer storage media include, but are not limited to, Random Access Memory (RAM), Read-Only Memory (ROM), and Electrically Erasable Programmable Read-only Memory (EEPROM). Flash memory or other memory technology, compact disc read-only memory (CD-ROM), digital versatile disc (DVD) or other optical disc storage, magnetic cassette, magnetic tape, disk storage or other magnetic storage device, or Any other medium used to store the desired information and that can be accessed by the computer.
  • communication media typically includes computer readable instructions, data structures, program modules, or other data in a modulated data signal, such as a carrier wave or other transport mechanism, and can include any information delivery media. .
  • the mobile terminal bottom layer receives at least one original short message including the private information; when the original short message satisfies the encryption condition, the mobile terminal bottom layer encrypts the private information in the original short message to generate an encrypted short message.

Abstract

A method and device for encrypting and decrypting information in a short message. The method comprises: a lower layer of a mobile terminal receives at least one original short message comprising private information; when the original short message satisfies an encryption criterion, the lower layer of the mobile terminal encrypts the private information in the original short message to generate an encrypted short message, transmits to a short message application of the mobile terminal the encrypted short message; and upon receiving the encrypted short message, the short message application of the mobile terminal decrypts the encrypted short message.

Description

一种短信中信息加解密的方法和装置Method and device for information encryption and decryption in short message 技术领域Technical field
本公开涉及但不限于通信技术领域,尤其是一种短信中信息加解密方法和装置。The present disclosure relates to, but is not limited to, the field of communication technologies, and in particular, to a method and apparatus for encrypting and decrypting information in a short message.
背景技术Background technique
随着移动终端的普及率越来越高,如手机、平板电脑、智能手表等,移动终端已经成为人们生活中常用的便携式移动电子设备,短信功能作为移动终端中一项基础通信业务,早已经成为移动终端必备的功能之一。而随着移动终端中各种第三方应用层出不穷,许多第三方应用都申请了读取短信的权限。某些恶意的第三方应用可能会通过窃取用户短信,从而获取用户个人隐私,使用户的信息安全受到威胁。为了避免用户信息泄露,常常使用移动终端短信加密方法,仅允许移动终端厂家自带的预置短信应用查看真实的短信内容,而其他第三方应用无法获取真实的短信内容,实现对用户移动终端信息的保护。With the increasing popularity of mobile terminals, such as mobile phones, tablets, smart watches, etc., mobile terminals have become portable mobile electronic devices commonly used in people's lives. As a basic communication service in mobile terminals, the short message function has already been used. Become one of the essential features of mobile terminals. With the emergence of various third-party applications in mobile terminals, many third-party applications have applied for permission to read short messages. Some malicious third-party applications may steal the user's text messages to gain the user's personal privacy and threaten the user's information security. In order to avoid user information leakage, the mobile terminal short message encryption method is often used, and only the preset short message application provided by the mobile terminal manufacturer is allowed to view the real short message content, and other third party applications cannot obtain the real short message content, thereby realizing the information about the user mobile terminal. protection of.
发明内容Summary of the invention
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。The following is an overview of the topics detailed in this document. This Summary is not intended to limit the scope of the claims.
短信加密方法可以包括:第一种方法,发送方移动终端对原始短信文本进行加密,将加密后的短信文本传递到接收方移动终端后,接收方移动终端对加密后的短信文本进行解密,并显示解密后的短信文本。第二种方法,接收方收到短信后显示的是加密的短信文本,在用户输入密码后接收方就可以显示原始短信文本。The short message encryption method may include: the first method, the sender mobile terminal encrypts the original short message text, and after transmitting the encrypted short message text to the receiving mobile terminal, the receiving mobile terminal decrypts the encrypted short message text, and The decrypted text message is displayed. In the second method, after receiving the short message, the receiving party displays the encrypted short message text, and the receiving party can display the original short message text after the user inputs the password.
然而,对于第一种方法,需要发送方和接收方的移动终端共同配合,如果发送方和接收方使用的是不同类型的移动终端,至少一方的移动终端不具备加密功能,或者双方的移动终端具备不同的加密机制,这种方法就无法实 现,因此,第一种方法在实用性方面存在很大限制。However, for the first method, the mobile terminal of the sender and the receiver is required to cooperate. If the sender and the receiver use different types of mobile terminals, at least one of the mobile terminals does not have an encryption function, or both mobile terminals. With different encryption mechanisms, this method cannot be implemented. Now, therefore, the first method has great limitations in terms of practicality.
对于第二种方法,大致是为了防止其他人拿到移动终端后查看短信,所以在查看短信时增加了输入密码的操作。但移动终端上安装的很多第三方应用都可以绕过这种加密机制,从而直接接收或读取短信,因此,第二种方法在实用性方面也存在不足。For the second method, it is roughly to prevent other people from viewing the short message after receiving the mobile terminal, so the operation of inputting the password is added when viewing the short message. However, many third-party applications installed on mobile terminals can bypass this encryption mechanism and directly receive or read short messages. Therefore, the second method is also insufficient in practicality.
本文提供一种短信中信息加解密的方法和装置,实现了对用户短信中重要隐私信息的保护,降低用户重要隐私信息泄露风险,保证用户信息安全,提升用户体验。This paper provides a method and device for encrypting and decrypting information in a short message, which realizes the protection of important private information in the short message of the user, reduces the risk of leakage of important private information of the user, ensures the security of the user information, and improves the user experience.
本公开实施例提供了一种短信中信息加解密的方法,包括:An embodiment of the present disclosure provides a method for encrypting and decrypting information in a short message, including:
移动终端底层接收到至少一条包含隐私信息的原始短信;The bottom layer of the mobile terminal receives at least one original short message containing private information;
所述原始短信满足加密条件时,所述移动终端底层对所述原始短信中的所述隐私信息进行加密生成加密短信,向所述移动终端的短信应用发送所述加密短信;When the original short message satisfies the encryption condition, the mobile terminal bottom layer encrypts the private information in the original short message to generate an encrypted short message, and sends the encrypted short message to the short message application of the mobile terminal;
所述移动终端的短信应用接收到所述加密短信后,对所述加密短信进行解密。After receiving the encrypted short message, the short message application of the mobile terminal decrypts the encrypted short message.
在一种示例性实施方式中,所述隐私信息包括以下至少一种:数字组合信息、不全为数字的字符组合信息。In an exemplary embodiment, the privacy information includes at least one of the following: digital combination information, and character combination information that is not all numbers.
在一种示例性实施方式中,所述隐私信息包括数字组合信息时,所述加密条件包括所述原始短信包含的所述数字组合信息长度大于等于长度阈值;In an exemplary embodiment, when the private information includes digital combination information, the encryption condition includes that the length of the digital combination information included in the original short message is greater than or equal to a length threshold;
所述隐私信息包括不全为数字的字符组合信息时,所述加密条件包括所述原始短信中包含满足设定条件的字符串。When the private information includes character combination information that is not all digits, the encryption condition includes that the original short message includes a character string that satisfies the setting condition.
在一种示例性实施方式中,所述加密条件还包括:所述移动终端短信加密控制开关开启。In an exemplary embodiment, the encryption condition further includes: the mobile terminal short message encryption control switch is turned on.
在一种示例性实施方式中,所述方法还包括:所述移动终端底层向预设的第三方应用列表中的第三方应用发送所述原始短信。In an exemplary embodiment, the method further includes: the mobile terminal bottom layer transmitting the original short message to a third party application in a preset third party application list.
在一种示例性实施方式中,所述预设的第三方应用列表包括:用户指定的所述移动终端中可信任的第三方应用。In an exemplary embodiment, the preset third-party application list includes: a third-party application trusted by the user in the mobile terminal.
本公开实施例还提供了一种短信中信息加解密的装置,所述装置包括移动终端底层和移动终端的短信应用;其中, An embodiment of the present disclosure further provides an apparatus for encrypting and decrypting information in a short message, where the apparatus includes a bottom message of a mobile terminal and a short message application of the mobile terminal;
移动终端底层,设置为:接收到至少一条包含隐私信息的原始短信;在所述原始短信满足加密条件时,对所述原始短信中的所述隐私信息进行加密生成加密短信,向所述移动终端的短信应用发送所述加密短信;The bottom layer of the mobile terminal is configured to: receive at least one original short message including the private information; and when the original short message satisfies the encryption condition, encrypt the private information in the original short message to generate an encrypted short message, to the mobile terminal The short message application sends the encrypted short message;
移动终端的短信应用,设置为:在接收到所述加密短信后,对所述加密短信进行解密。The short message application of the mobile terminal is configured to: after receiving the encrypted short message, decrypt the encrypted short message.
在一种示例性实施方式中,所述隐私信息包括以下至少一种:数字组合信息、不全为数字的字符组合信息。In an exemplary embodiment, the privacy information includes at least one of the following: digital combination information, and character combination information that is not all numbers.
在一种示例性实施方式中,所述隐私信息包括数字组合信息时,所述加密条件包括所述原始短信包含的所述数字组合信息长度大于等于长度阈值;In an exemplary embodiment, when the private information includes digital combination information, the encryption condition includes that the length of the digital combination information included in the original short message is greater than or equal to a length threshold;
所述隐私信息包括不全为数字的字符组合信息时,所述加密条件包括所述原始短信中包含满足设定条件的字符串。When the private information includes character combination information that is not all digits, the encryption condition includes that the original short message includes a character string that satisfies the setting condition.
在一种示例性实施方式中,所述加密条件还包括:所述移动终端短信加密控制开关开启。In an exemplary embodiment, the encryption condition further includes: the mobile terminal short message encryption control switch is turned on.
在一种示例性实施方式中,所述移动终端底层,还设置为:向预设的第三方应用列表中的第三方应用发送所述原始短信。In an exemplary embodiment, the mobile terminal bottom layer is further configured to: send the original short message to a third-party application in a preset third-party application list.
在一种示例性实施方式中,所述预设的第三方应用列表包括:用户指定的所述移动终端中可信任的第三方应用。In an exemplary embodiment, the preset third-party application list includes: a third-party application trusted by the user in the mobile terminal.
本公开实施例还提供了一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令被执行时实现上述短信中信息加解密的方法。Embodiments of the present disclosure also provide a computer readable storage medium storing computer executable instructions, the method of implementing encryption and decryption of information in the short message when the computer executable instructions are executed.
本公开实施例中,移动终端底层接收到至少一条包含隐私信息的原始短信;所述原始短信满足加密条件时,所述移动终端底层对所述原始短信中的所述隐私信息进行加密生成加密短信,向所述移动终端的短信应用发送所述加密短信;所述移动终端的短信应用接收到所述加密短信后,对所述加密短信进行解密;如此,可以不需要移动终端发送方和接收方共同配合,实现了对用户短信中重要隐私信息的加密保护,降低用户重要隐私信息泄露风险,保证用户信息安全,提升用户体验。In the embodiment of the present disclosure, the mobile terminal bottom layer receives at least one original short message including the private information; when the original short message satisfies the encryption condition, the mobile terminal bottom layer encrypts the private information in the original short message to generate an encrypted short message. Sending the encrypted short message to the short message application of the mobile terminal; after receiving the encrypted short message, the short message application of the mobile terminal decrypts the encrypted short message; thus, the sender and the receiver of the mobile terminal may not be needed. Cooperate with each other to realize the encryption protection of important private information in the user's short message, reduce the risk of leakage of important private information of the user, ensure the security of the user information, and enhance the user experience.
在阅读并理解了附图和详细描述后,可以明白其他方面。 Other aspects will be apparent upon reading and understanding the drawings and detailed description.
附图概述BRIEF abstract
图1为一种短信中信息加解密的方法的流程图;1 is a flow chart of a method for encrypting and decrypting information in a short message;
图2为另一种短信中信息加解密的方法的流程图;2 is a flow chart of another method for encrypting and decrypting information in a short message;
图3为又一种短信中信息加解密的方法的流程图;3 is a flow chart of another method for encrypting and decrypting information in a short message;
图4为短信中信息加解密的装置的结构示意图。FIG. 4 is a schematic structural diagram of an apparatus for encrypting and decrypting information in a short message.
本公开的较佳实施方式Preferred embodiment of the present disclosure
下面结合附图对本公开的实施方式进行描述。Embodiments of the present disclosure will be described below with reference to the accompanying drawings.
图1为一种短信中信息加解密的方法的流程图,如图1所示,该方法包括:FIG. 1 is a flowchart of a method for encrypting and decrypting information in a short message. As shown in FIG. 1, the method includes:
步骤100:移动终端底层接收到至少一条包含隐私信息的原始短信。Step 100: The mobile terminal bottom layer receives at least one original short message including private information.
这里,移动终端可以是手机、平板电脑、智能手表等,移动终端底层可以是安卓手机的电信框架层、操作系统(Operating System,OS)层、驱动层等。Here, the mobile terminal may be a mobile phone, a tablet computer, a smart watch, etc., and the bottom layer of the mobile terminal may be a telecommunication framework layer of an Android mobile phone, an operating system (OS) layer, a driver layer, and the like.
所述隐私信息可以包括以下至少一种:数字信息、字符组合信息。可选地,所述隐私信息可以包含以下至少一项:银行卡号、密码、手机号、邮箱地址、网址等。The privacy information may include at least one of the following: digital information, character combination information. Optionally, the private information may include at least one of the following: a bank card number, a password, a mobile phone number, an email address, a web address, and the like.
步骤101:所述原始短信满足加密条件时,所述移动终端底层对所述原始短信中的所述隐私信息进行加密生成加密短信,向所述移动终端的短信应用发送所述加密短信。Step 101: When the original short message satisfies the encryption condition, the mobile terminal bottom layer encrypts the private information in the original short message to generate an encrypted short message, and sends the encrypted short message to the short message application of the mobile terminal.
可选地,所述隐私信息包括数字组合信息时,所述加密条件可以包括所述原始短信包含的所述数字组合信息长度大于等于长度阈值;例如,原始短信中包含一条数字组合信息为2563689,设定的长度阈值为4,此时数字组合信息的长度7大于长度阈值4,就需要对原始短信进行加密处理。Optionally, when the private information includes the digital combination information, the encryption condition may include that the length of the digital combination information included in the original short message is greater than or equal to a length threshold; for example, the original short message includes a digital combination information of 2,563,689. The set length threshold is 4. When the length 7 of the digital combination information is greater than the length threshold 4, the original short message needs to be encrypted.
所述隐私信息包括不全为数字的字符组合信息时,所述加密条件可以包括所述原始短信中包含满足设定条件的字符串;所述设定条件可以是原始短信包含规定的字符串标识,这里,规定字符串标识可以是邮箱、网址等信息中特殊的字符串标识,例如,.com、.net、.org、@163.com、@gmail.com等; 当原始短信中包含一条网址信息www.un.org时,此时检测到了规定字符串标识.org,就可以确定需要对原始短信进行加密处理。When the private information includes the character combination information that is not all digits, the encryption condition may include: the original short message includes a character string that satisfies the setting condition; and the setting condition may be that the original short message includes the specified string identifier. Here, the specified string identifier may be a special string identifier in a mailbox, a web address, etc., for example, .com, .net, .org, @163.com, @gmail.com, etc.; When the original short message contains a web address information www.un.org, the specified string identifier .org is detected at this time, and it can be determined that the original short message needs to be encrypted.
可选地,所述加密条件还可以包括:所述移动终端短信加密控制开关开启。Optionally, the encryption condition may further include: the mobile terminal short message encryption control switch is turned on.
可以理解的是,移动终端中设置短信加密控制开关时,用户可以选择开启或关闭短信加密控制开关实现移动终端是否使用短信中隐私信息加密的功能。It can be understood that, when the SMS encryption control switch is set in the mobile terminal, the user can select to enable or disable the SMS encryption control switch to implement whether the mobile terminal uses the privacy information encryption function in the short message.
可选地,所述移动终端底层对所述原始短信中的所述隐私信息进行加密生成加密短信后,可以同时设置短信加密标志位并向移动终端的短信应用发送该短信加密标志位;例如,短信加密标志位设置为‘1’时,说明原始短信已经被加密,短信加密标志位设置为‘0’时,说明原始短信未被加密。Optionally, after the mobile terminal bottom layer encrypts the private information in the original short message to generate an encrypted short message, the short message encryption flag bit may be set at the same time and the short message encryption flag bit is sent to the short message application of the mobile terminal; for example, When the SMS encryption flag is set to '1', the original SMS has been encrypted. When the SMS encryption flag is set to '0', the original SMS is not encrypted.
可以说明的是,当所述原始短信不满足加密条件时,移动终端底层可以向移动终端的短信应用发送原始短信。It can be noted that when the original short message does not satisfy the encryption condition, the mobile terminal bottom layer can send the original short message to the short message application of the mobile terminal.
示例性地,当短信中需要加密的隐私信息为数字信息时,移动终端短信加密控制开关打开后,可以判断原始短信中的数字信息是否需要进行加密;当所述原始短信包含的数字信息长度大于等于长度阈值时,可以对所述原始短信中的数字信息进行加密生成加密短信,所述移动终端底层可以发送所述加密短信;当所述原始短信包含的数字信息长度小于长度阈值时,所述移动终端底层可以发送所述原始短信。Illustratively, when the private information to be encrypted in the short message is digital information, after the mobile terminal short message encryption control switch is turned on, it can be determined whether the digital information in the original short message needs to be encrypted; when the original short message contains digital information length greater than When the length is equal to the length threshold, the digital information in the original short message may be encrypted to generate an encrypted short message, and the mobile terminal may send the encrypted short message; when the length of the digital information included in the original short message is less than a length threshold, The original message can be sent by the bottom layer of the mobile terminal.
这里,上述数字信息的长度阈值可以由用户自行设置。原始短信中数字信息的长度小于长度阈值时,隐私信息一般可以不是用户需要保密的数字,例如数字长度小于4位数的一般为日期、时间、钱数、人数等。而用户需要保护的数字信息可以较长,例如身份证号码、手机号码、银行卡号等,对于用户重要的密码信息,例如银行卡密码、终端应用登陆密码、支付密码等在设置时都有最短长度限制。因此,移动终端可以有选择性地对接收到的原始短信中数字进行加密,提高短信中信息加密保护效率。Here, the length threshold of the above digital information can be set by the user. When the length of the digital information in the original short message is less than the length threshold, the private information may not be a number that the user needs to keep secret. For example, the number of digits less than 4 digits is generally the date, time, amount of money, number of people, and the like. The digital information that the user needs to protect can be long, such as the ID number, the mobile phone number, the bank card number, etc., and the password information important to the user, such as the bank card password, the terminal application login password, the payment password, etc., has the shortest length when set. limit. Therefore, the mobile terminal can selectively encrypt the received digital short message and improve the information encryption protection efficiency in the short message.
步骤102:所述移动终端的短信应用接收到所述加密短信后,对所述加密短信进行解密。 Step 102: After receiving the encrypted short message, the short message application of the mobile terminal decrypts the encrypted short message.
可以理解的是,所述移动终端的短信应用在显示当前接收的短信前,还可以判断当前接收的短信是否为加密短信。It can be understood that the short message application of the mobile terminal can also determine whether the currently received short message is an encrypted short message before displaying the currently received short message.
可选地,判断短信加密标志位是否为1,如果是,可以继续判断当前接收的短信为所述加密短信,所述移动终端的短信应用可以解密所述加密短信,并显示解密后的短信文本;如果否,所述移动终端的短信应用可以直接显示所述原始短信。Optionally, it is determined whether the short message encryption flag is 1, and if yes, it may continue to determine that the currently received short message is the encrypted short message, and the short message application of the mobile terminal may decrypt the encrypted short message and display the decrypted short message text. If not, the short message application of the mobile terminal can directly display the original short message.
可选地,所述移动终端的短信应用接收到所述加密短信后,可以判断短信加密标志位是否为1,如果是,则可以判定当前接收的短信为所述加密短信,于是可以解密所述加密短信,并显示解密后的短信文本;如果否,则可以判定当前接收的短信为未被加密的原始短信,于是可以直接显示所述原始短信。Optionally, after receiving the encrypted short message, the short message application of the mobile terminal may determine whether the short message encryption flag is 1, and if yes, determine that the currently received short message is the encrypted short message, and then the decrypted message may be decrypted. Encrypt the short message and display the decrypted short message text; if not, it can be determined that the currently received short message is an unencrypted original short message, and then the original short message can be directly displayed.
可选地,如果选择的加密和解密算法不改变加密内容的长度或者不改变规定的字符串标识,可以通过判断当前接收的短信是否满足加密条件,来确定当前接收的短信是否为加密短信。Optionally, if the selected encryption and decryption algorithm does not change the length of the encrypted content or does not change the specified string identifier, it may be determined whether the currently received short message is an encrypted short message by determining whether the currently received short message satisfies the encryption condition.
这里,移动终端还可以保存所述当前接收的短信至移动终端短信数据库,所述当前接收的短信可以包括所述加密短信,也可以包括所述原始短信。Here, the mobile terminal may further save the currently received short message to the mobile terminal short message database, and the currently received short message may include the encrypted short message, and may also include the original short message.
可以理解的是,在对原始短信进行加密后,除了所述移动终端的短信应用外,其他第三方应用获取到的短信文本为所述加密短信。当其他第三方应用对移动终端短信数据库进行监控企图盗取短信内容时,也只能获取到加密短信或者不需要加密的原始短信;如此,使第三方应用无法获取真实的短信内容,实现对用户移动终端信息的保护。It can be understood that, after encrypting the original short message, in addition to the short message application of the mobile terminal, the short message text obtained by other third party applications is the encrypted short message. When other third-party applications monitor the mobile terminal short message database to steal the short message content, only the encrypted short message or the original short message that does not need to be encrypted can be obtained; thus, the third party application cannot obtain the real short message content, thereby realizing the user. Protection of mobile terminal information.
可选地,移动终端也可以预设第三方应用列表,第三方应用列表中包括用户指定的所述移动终端中可信任的第三方应用,方便可信任的第三方应用提取短信中的隐私信息。移动终端底层接收到原始短信后,可以向预设的第三方应用列表中的第三方应用发送所述原始短信。Optionally, the mobile terminal may also preset a third-party application list, where the third-party application list includes a trusted third-party application in the mobile terminal specified by the user, so that the trusted third-party application can extract the private information in the short message. After receiving the original short message, the mobile terminal may send the original short message to a third-party application in the preset third-party application list.
示例性地,很多第三方应用在人们的日常支付、转账等电子交易中扮演着越来越重要的角色,这些安全性很高的第三方应用得到了用户极大的信任。在这些用户信任的第三方应用使用时,有时需要提取移动终端接收到的短信中的数字验证信息来完成操作,因此,为了方便所述用户信任的第三方应用 读取短信中正确的数字验证信息,可以允许所述用户信任的第三方应用直接获得原始短信,自动提取正确的数字验证信息,方便用户使用。Illustratively, many third-party applications play an increasingly important role in electronic transactions such as daily payments, transfers, etc. These highly secure third-party applications are greatly trusted by users. When the third-party applications trusted by these users are used, it is sometimes necessary to extract the digital verification information in the short message received by the mobile terminal to complete the operation, and therefore, in order to facilitate the third-party application trusted by the user. Reading the correct digital verification information in the short message can allow the third-party application trusted by the user to directly obtain the original short message, and automatically extract the correct digital verification information, which is convenient for the user to use.
本公开实施例中,移动终端底层接收到至少一条包含隐私信息的原始短信;所述原始短信满足加密条件时,所述移动终端底层对所述原始短信中的所述隐私信息进行加密生成加密短信,向所述移动终端的短信应用发送所述加密短信;所述移动终端的短信应用接收到所述加密短信后,对所述加密短信进行解密;如此,可以不需要移动终端发送方和接收方共同配合,实现了对用户短信中重要隐私信息的加密保护,降低用户重要隐私信息泄露风险,保证用户信息安全,提升用户体验。In the embodiment of the present disclosure, the mobile terminal bottom layer receives at least one original short message including the private information; when the original short message satisfies the encryption condition, the mobile terminal bottom layer encrypts the private information in the original short message to generate an encrypted short message. Sending the encrypted short message to the short message application of the mobile terminal; after receiving the encrypted short message, the short message application of the mobile terminal decrypts the encrypted short message; thus, the sender and the receiver of the mobile terminal may not be needed. Cooperate with each other to realize the encryption protection of important private information in the user's short message, reduce the risk of leakage of important private information of the user, ensure the security of the user information, and enhance the user experience.
下面以移动终端为手机为例,对手机中的数字信息的加密和解密进行详细说明。图2为另一种短信中信息加解密的方法的流程图,该方法可以包括:The following uses the mobile terminal as a mobile phone as an example to describe the encryption and decryption of digital information in the mobile phone in detail. 2 is a flow chart of another method for encrypting and decrypting information in a short message, and the method may include:
步骤200:手机底层接收到一条新短信。Step 200: A new short message is received at the bottom of the mobile phone.
步骤201:判断短信加密控制开关是否开启,如果是,执行步骤202;如果否,跳到步骤204。Step 201: Determine whether the SMS encryption control switch is enabled. If yes, go to step 202; if no, go to step 204.
这里,如果短信加密控制开关未开启,手机底层可以直接发送接收到的新短信给手机的短信应用。Here, if the SMS encryption control switch is not enabled, the bottom layer of the mobile phone can directly send the received new SMS to the SMS application of the mobile phone.
步骤202:判断新短信中的数字长度是否大于等于长度阈值,如果是,执行步骤203;如果否,跳到步骤204。Step 202: Determine whether the length of the digit in the new short message is greater than or equal to the length threshold. If yes, go to step 203; if no, go to step 204.
本公开实施例中,手机底层可以对接收到的新短信文本从开始字符到结束字符进行依次检测,记录检测到的连续数字信息的数字字符串长度。其中,数字字符串中存在的空格、逗号、顿号、连接符“-”等常见间隔符号时,可认为是用户为了便于准确的阅读或记录所输入的,因此,可以不计入数字字符串长度的计算中。In the embodiment of the present disclosure, the bottom layer of the mobile phone may sequentially detect the received new short message text from the start character to the end character, and record the length of the digital string of the detected continuous digital information. Among them, when there are common space symbols such as spaces, commas, commas, and connectors "-" in the numeric string, it can be considered that the user inputs the data in order to facilitate accurate reading or recording. Therefore, the numeric string can be excluded. The calculation of the length.
例如,新短信中的一个数字字符串为“123456789”,那么该数字字符串长度为9;新短信中的一个数字字符串为“123-456-789”,那么该数字字符串长度也为9。For example, if a numeric string in a new short message is "123456789", then the numeric string length is 9; a numeric string in the new short message is "123-456-789", then the numeric string length is also 9 .
步骤203:对新短信中的数字信息进行加密,生成加密短信且将短信加 密标志位置1,并向手机的短信应用发送加密短信和短信加密标志位。Step 203: Encrypt the digital information in the new short message, generate an encrypted short message, and add the short message. The secret flag is set to 1, and the encrypted SMS and SMS encryption flag are sent to the SMS application of the mobile phone.
本公开实施例中,如果新短信中至少一串数字信息长度大于等于长度阈值,则可以对原始短信进行加密。这里,一条短信中可能存在被汉字或其他字符隔开的至少2串数字信息。In the embodiment of the present disclosure, if the length of at least one string of digital information in the new short message is greater than or equal to the length threshold, the original short message may be encrypted. Here, there may be at least two strings of digital information separated by Chinese characters or other characters in a short message.
可选地,手机底层在对新短信中的数字信息进行加密时,由于常用的需要加密的数字信息的前几位号码可能是规律的或者公开的,例如手机号、银行卡号、身份证号码,所以在对数字信息加密时,可以将中间位作为起始加密位,对起始加密位到数字信息末尾进行加密,例如19位的银行卡号中前6位表示发卡银行信息,第7-第10位表示发卡地区,因此可以对后13位进行加密,或者对后9位进行加密。Optionally, when the bottom layer of the mobile phone encrypts the digital information in the new short message, the first few digits of the commonly used digital information that needs to be encrypted may be regular or public, such as a mobile phone number, a bank card number, an ID card number, Therefore, when encrypting digital information, the middle bit can be used as the starting encryption bit, and the initial encryption bit is encrypted to the end of the digital information. For example, the first 6 digits of the 19-digit bank card number indicate the card issuing bank information, 7th to 10th. The bit indicates the card issue area, so the last 13 bits can be encrypted or the last 9 bits can be encrypted.
这里,对数字信息进行加密的加密算法,可以采用经典的加密算法,例如,数字加密标准(Data Encryption Standard,DES)、国际数据加密算法(International Data Encryption Algorithm、IDEA)、公钥加密算法(Ron Rivest、Adi Shamir、Leonard Adleman,RSA)等。Here, the encryption algorithm for encrypting digital information can adopt a classical encryption algorithm, for example, Data Encryption Standard (DES), International Data Encryption Algorithm (IDEA), and public key encryption algorithm (Ron). Rivest, Adi Shamir, Leonard Adleman, RSA), etc.
也可以采用一些简单的加密算法,例如由手机预先设定一位密钥数字,对数字信息中需要加密的数字加上所述密钥数字后对10取模,生成加密数字信息。例如接收到的新短信中原始数字信息为123456789,手机设定的起始加密位为5,密钥数字为3,数字信息中第5位数字5加3等于8,对10取模结果为8,将第6、第7、第8位按照同样的加密算法进行加密后,得到的加密数字信息是123489012。Some simple encryption algorithms may also be used. For example, a key number is preset by the mobile phone, and the key number to be encrypted in the digital information is added to the key number to modulo 10 to generate encrypted digital information. For example, the original digital information received in the new short message is 123456789, the initial encryption bit set by the mobile phone is 5, the key number is 3, the 5th digit of the digital information is 5 plus 3 equals 8, and the result of 10 is modulo 8. After encrypting the sixth, seventh, and eighth bits according to the same encryption algorithm, the obtained encrypted digital information is 123489012.
在另一种实施方式中,也可以设置多位密钥数字,例如设置三个密钥数字356,数字信息中第5位数字5使用第一个密钥数字3,第6位数字6使用第二个密钥数字5,第7个数字7使用第3个密钥数字6。如果密钥数字个数小于需要加密的数字信息长度,则在使用完所有密钥数字时,对下一个需要加密的数字可以重新使用第一个密钥数字,如第8个数字8重新使用第1个密钥数字3,第9个数字9继续使用第2个密钥数字5,最终得到的加密数字信息是123481314。In another embodiment, a multi-bit key number may also be set, for example, three key numbers 356 are set, and the fifth digit 5 of the digital information uses the first key number 3, and the sixth digit 6 uses the first Two key numbers 5, the 7th number 7 uses the 3rd key number 6. If the number of key digits is less than the length of the digital information to be encrypted, then after using all the key digits, the first key digit can be reused for the next digit to be encrypted, such as the 8th digit 8 reused One key number 3, the ninth number 9 continues to use the second key number 5, and the resulting encrypted digital information is 123481314.
可以看出,在采用上述简单的加密算法时,对数字信息进行加密后,显示的数字信息仍然为数字,避免第三方应用或者其他人知悉所获得的数字信 息为加密信息。It can be seen that when the above simple encryption algorithm is used, after the digital information is encrypted, the displayed digital information is still a number, avoiding the third party application or other people knowing the obtained digital letter. The information is encrypted information.
步骤204:手机的短信应用接收到当前短信。Step 204: The short message application of the mobile phone receives the current short message.
步骤205:判断短信加密标志位是否为1,如果是,执行步骤206;如果否,跳到步骤207。Step 205: Determine whether the short message encryption flag is 1, if yes, go to step 206; if no, go to step 207.
这里,手机的短信应用接收到当前短信后,可以判断加密标志位是否为1。如果为1,说明当前短信为加密短信;如果为0,说明当前短信为原始短信。Here, after receiving the current short message, the short message application of the mobile phone can determine whether the encrypted flag bit is 1. If it is 1, it indicates that the current SMS is an encrypted SMS. If it is 0, the current SMS is the original SMS.
步骤206:对当前短信中的数字信息进行解密。Step 206: Decrypt the digital information in the current short message.
这里,手机的短信应用可以对接收到的加密短信进行解密,解密算法可以与手机底层使用的加密算法相对应。Here, the short message application of the mobile phone can decrypt the received encrypted short message, and the decryption algorithm can correspond to the encryption algorithm used by the underlying mobile phone.
例如,手机底层使用DES加密算法,预置短信应用就使用相应的DES解密算法对加密短信进行解密。For example, the bottom layer of the mobile phone uses the DES encryption algorithm, and the preset short message application uses the corresponding DES decryption algorithm to decrypt the encrypted short message.
如果手机底层采用步骤203中简单加密算法,即密钥数字为3,起始加密位为5。当手机的短信应用接收到的加密数字信息为123489012时,可以从第5位开始对每一位加密数字信息执行相反的操作,即对大于等于3的数直接减3,对小于3的数,先加10再减3,解密后便可显示出原始数字信息123456789。If the bottom layer of the mobile phone adopts the simple encryption algorithm in step 203, that is, the key number is 3, and the initial encryption bit is 5. When the encrypted digital information received by the short message application of the mobile phone is 123489012, the opposite operation may be performed on each encrypted digital information from the 5th bit, that is, the number directly greater than or equal to 3 is directly reduced by 3, and for the number less than 3, Add 10 and then subtract 3, and the original digital information 123456789 can be displayed after decryption.
步骤207:显示当前短信。Step 207: Display the current short message.
本步骤中,手机可以显示接收到的原始短信,或者可以显示解密后的加密短信。In this step, the mobile phone can display the original received text message, or can display the decrypted encrypted text message.
下面以移动终端为手机为例,对手机短信中的个人邮箱的加密和解密进行详细说明。图3为又一种短信中信息加解密的方法的流程图,该方法可以包括:The following uses the mobile terminal as a mobile phone as an example to describe the encryption and decryption of the personal mailbox in the mobile phone short message. FIG. 3 is a flowchart of still another method for encrypting and decrypting information in a short message, and the method may include:
步骤300:手机底层接收到一条新短信。Step 300: A new short message is received at the bottom of the mobile phone.
步骤301:判断短信加密控制开关是否开启,如果是,执行步骤302;如果否,跳到步骤304。 Step 301: Determine whether the SMS encryption control switch is enabled. If yes, go to step 302; if no, go to step 304.
步骤302:判断新短信中是否包含满足设定条件的字符串,如果是,执行步骤303;如果否,跳到步骤304。Step 302: Determine whether the new short message includes a character string that satisfies the set condition. If yes, go to step 303; if no, go to step 304.
本公开实施例中,常用的邮箱地址可以由三部分组成,第一部分,用户账号;第二部分,分隔符@;第三部分,用户信箱的邮件接收服务器域名,用以标识邮件接收服务器所在的位置。隐私信息为邮箱地址时,特殊的字符串标识可以是@加上用户信箱的邮件接收服务器域名。例如,@sina.com、@163.com、@gmail.com、@hotmail.com等。In the embodiment of the present disclosure, the commonly used email address may be composed of three parts, the first part, the user account; the second part, the separator @; the third part, the mail receiving server domain name of the user mailbox, used to identify the mail receiving server where the mail receiving server is located position. When the privacy information is an email address, the special string identifier can be @plus the mail receiving server domain name of the user mailbox. For example, @sina.com, @163.com, @gmail.com, @hotmail.com, etc.
步骤303:对新短信中的邮箱信息进行加密,生成加密短信,并向手机的短信应用发送加密短信。Step 303: Encrypt the mailbox information in the new short message, generate an encrypted short message, and send the encrypted short message to the short message application of the mobile phone.
示例性地,如果检测到新短信中包含有@163.com,可以将紧邻@的前面至少4个字符进行加密处理,例如,对需要加密的内容中每一个字符的美国信息交换标准代码(American Standard Code for Information Interchange,ASCII)加2再显示出来。例如,字符‘b’对应的十六进制ASCII码为‘62’,加上2后的十六进制ASCII码‘64’对应的字符为‘d’。这里,对bigbang@163.com加密后为bigdcpi@163.com,并可以向手机的短信应用发送加密短信。Illustratively, if it is detected that @163.com is included in the new short message, at least 4 characters immediately preceding @ can be encrypted, for example, the American Standard Code for Information Exchange for each character in the content to be encrypted (American Standard Code for Information Interchange (ASCII) plus 2 is displayed again. For example, the hexadecimal ASCII code corresponding to the character 'b' is '62', and the character corresponding to the hexadecimal ASCII code '64' after adding 2 is 'd'. Here, the bigbang@163.com is encrypted as bigdcpi@163.com, and can send encrypted text messages to the mobile phone's SMS application.
步骤304:手机的短信应用接收到当前短信。Step 304: The short message application of the mobile phone receives the current short message.
步骤305:判断短信加密控制开关是否开启,如果是,执行步骤306;如果否,跳到步骤308。Step 305: Determine whether the SMS encryption control switch is enabled. If yes, go to step 306; if no, go to step 308.
步骤306:判断当前短信中是否包含满足设定条件的字符串,如果是,执行步骤307;如果否,跳到步骤308。Step 306: Determine whether the current short message contains a character string that satisfies the set condition. If yes, go to step 307; if no, go to step 308.
本公开实施例中,对邮箱加密后可以不改变设定条件的字符串标识‘@163.com’,因此,可以通过检测当前短信中是否包含字符串标识‘@163.com’来确定当前短信是否为加密短信。In the embodiment of the present disclosure, after the mailbox is encrypted, the string identifier '@163.com' of the setting condition may not be changed. Therefore, the current short message may be determined by detecting whether the current short message includes the string identifier '@163.com'. Whether it is encrypted SMS.
步骤307:对当前短信中的邮箱信息进行解密。Step 307: Decrypt the mailbox information in the current short message.
这里,手机底层和手机的短信应用分别使用的加密算法和解密算法可以是提前约定好的,在手机的短信应用接收到的加密短信后可以利用解密算法对加密短信进行解密。 Here, the encryption algorithm and the decryption algorithm respectively used in the SMS application of the mobile phone bottom layer and the mobile phone may be agreed in advance, and the encrypted short message may be decrypted by using the decryption algorithm after the encrypted short message received by the mobile phone short message application.
本步骤中,当手机短信应用接收到当前短信后,可以对紧邻@的前面4个字符进行解密处理,将需要解密的内容中每一个字符的ASCII码减去2后,得到正确的字符信息。In this step, when the mobile phone short message application receives the current short message, the first four characters immediately adjacent to @ can be decrypted, and the ASCII code of each character in the content to be decrypted is subtracted by 2, and the correct character information is obtained.
步骤308:显示当前短信。Step 308: Display the current short message.
本步骤中,手机可以显示接收到的原始短信,或者可以显示解密后的加密短信。In this step, the mobile phone can display the original received text message, or can display the decrypted encrypted text message.
本公开实施例还提供了一种短信中信息加解密的装置。图4为短信中信息加解密的装置的组成结构示意图,如图4所示,该装置可以包括移动终端底层400和移动终端的短信应用401;其中,The embodiment of the present disclosure further provides an apparatus for encrypting and decrypting information in a short message. 4 is a schematic structural diagram of a device for encrypting and decrypting information in a short message. As shown in FIG. 4, the device may include a bottom layer 400 of the mobile terminal and a short message application 401 of the mobile terminal;
移动终端底层400,设置为:接收到至少一条包含隐私信息的原始短信;在所述原始短信满足加密条件时,对所述原始短信中的所述隐私信息进行加密生成加密短信,向所述移动终端的短信应用发送所述加密短信。The mobile terminal bottom layer 400 is configured to: receive at least one original short message including private information; and when the original short message satisfies an encryption condition, encrypt the private information in the original short message to generate an encrypted short message to the mobile The short message application of the terminal sends the encrypted short message.
移动终端的短信应用401,设置为:在接收到所述加密短信后,对所述加密短信进行解密。The short message application 401 of the mobile terminal is configured to: after receiving the encrypted short message, decrypt the encrypted short message.
所述隐私信息可以包括以下至少一种:数字组合信息、不全为数字的字符组合信息。The privacy information may include at least one of the following: digital combination information, and character combination information that is not all numbers.
所述隐私信息包括数字组合信息时,所述加密条件可以包括所述原始短信包含的所述数字组合信息长度大于等于长度阈值;When the private information includes the digital combination information, the encryption condition may include that the length of the digital combination information included in the original short message is greater than or equal to a length threshold;
所述隐私信息包括不全为数字的字符组合信息时,所述加密条件可以包括所述原始短信中包含满足设定条件的字符串。When the private information includes character combination information that is not all digits, the encryption condition may include that the original short message includes a character string that satisfies the setting condition.
所述加密条件还可以包括:所述移动终端短信加密控制开关开启。The encryption condition may further include: the mobile terminal short message encryption control switch is turned on.
所述移动终端底层400,还可以设置为:向预设的第三方应用列表中的第三方应用发送所述原始短信。The bottom layer 400 of the mobile terminal may be further configured to: send the original short message to a third-party application in a preset third-party application list.
所述预设的第三方应用列表可以包括:用户指定的所述移动终端中可信任的第三方应用。The preset third-party application list may include: a trusted third-party application in the mobile terminal specified by the user.
本公开实施例还提供了一种计算机可读存储介质,存储有计算机可执行 指令,所述计算机可执行指令被执行时实现上述短信中信息加解密的方法。Embodiments of the present disclosure also provide a computer readable storage medium storing a computer executable And a method of implementing encryption and decryption of information in the short message when the computer executable instruction is executed.
本领域内的技术人员可以明白,本公开的实施例可提供为方法、系统、或计算机程序产品。因此,本公开实施例可采用硬件实施例、软件实施例、或结合软件和硬件方面的实施例的形式。而且,本公开实施例可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器和光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art will appreciate that embodiments of the present disclosure can be provided as a method, system, or computer program product. Thus, embodiments of the present disclosure may take the form of a hardware embodiment, a software embodiment, or a combination of software and hardware aspects. Moreover, embodiments of the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage and optical storage, etc.) including computer usable program code.
本公开可以是参照根据本公开实施例的方法、设备(系统)、和计算机程序产品的流程图、或方框图、或流程图和方框图来描述的。可以理解可由计算机程序指令实现流程图中的每一流程、或方框图中的每一方框、或流程图和方框图中的每一流程和每一方框、以及流程图中流程的结合、或方框图中方框的结合、或流程图中流程和方框图中方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程、或方框图一个方框或多个方框、或流程图至少一个流程和方框图至少一个方框中指定的功能的装置。The present disclosure may be described with reference to flowchart illustrations, or block diagrams, or flowcharts and block diagrams of methods, devices (systems), and computer program products according to embodiments of the present disclosure. It will be understood that each flow in the flowcharts, or each block in the block diagram, or each of the flowcharts and block diagrams, and combinations of Combination of, or a combination of the flow in the flowchart and the blocks in the block diagram. These computer program instructions can be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing device to produce a machine for the execution of instructions for execution by a processor of a computer or other programmable data processing device. Means for implementing the functions specified in one or more flows of the flowchart, or a block or blocks of the block diagram, or at least one block of the flowchart and at least one block of the block diagram.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程、或方框图一个方框或多个方框、或流程图至少一个流程和方框图至少一个方框中指定的功能。The computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device. The apparatus implements the functions specified in one or more flows of the flowchart, or a block or blocks of the block diagram, or at least one block of the flowchart and at least one block of the block diagram.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程、或方框图一个方框或多个方框、或流程图至少一个流程和方框图至少一个方框中指定的功能的步骤。These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device. The instructions provide steps for implementing the functions specified in one or more flows of the flowchart, or a block or blocks of the block diagram, or at least one block of the flowchart and at least one block of the block diagram.
本领域普通技术人员可以理解,上文中所公开方法中的全部或某些步骤、系统、装置中的功能模块/单元可以被实施为软件、固件、硬件及其适当的组合。在硬件实施方式中,在以上描述中提及的功能模块/单元之间的划分 不一定对应于物理组件的划分;例如,一个物理组件可以具有多个功能,或者一个功能或步骤可以由若干物理组件合作执行。某些组件或所有组件可以被实施为由处理器,如数字信号处理器或微处理器执行的软件,或者被实施为硬件,或者被实施为集成电路,如专用集成电路。这样的软件可以分布在计算机可读介质上,计算机可读介质可以包括计算机存储介质(或非暂时性介质)和通信介质(或暂时性介质)。如本领域普通技术人员公知的,术语计算机存储介质包括在用于存储信息(诸如计算机可读指令、数据结构、程序模块或其他数据)的任何方法或技术中实施的易失性和非易失性、可移除和不可移除介质。计算机存储介质包括但不限于随机存取存储器(RAM,Random Access Memory)、只读存储器(ROM,Read-Only Memory)、电可擦除只读存储器(EEPROM,Electrically Erasable Programmable Read-only Memory)、闪存或其他存储器技术、光盘只读存储器(CD-ROM,Compact Disc Read-Only Memory)、数字多功能盘(DVD)或其他光盘存储、磁盒、磁带、磁盘存储或其他磁存储装置、或者可以用于存储期望的信息并且可以被计算机访问的任何其他的介质。此外,本领域普通技术人员公知的是,通信介质通常包含计算机可读指令、数据结构、程序模块或者诸如载波或其他传输机制之类的调制数据信号中的其他数据,并且可包括任何信息递送介质。Those of ordinary skill in the art will appreciate that all or some of the steps, systems, and functional blocks/units of the methods disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware implementation, the division between functional modules/units mentioned in the above description It does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed cooperatively by several physical components. Some or all of the components may be implemented as software executed by a processor, such as a digital signal processor or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on a computer readable medium, which may include computer storage media (or non-transitory media) and communication media (or transitory media). As is well known to those of ordinary skill in the art, the term computer storage medium includes volatile and nonvolatile, implemented in any method or technology for storing information, such as computer readable instructions, data structures, program modules or other data. Sex, removable and non-removable media. Computer storage media include, but are not limited to, Random Access Memory (RAM), Read-Only Memory (ROM), and Electrically Erasable Programmable Read-only Memory (EEPROM). Flash memory or other memory technology, compact disc read-only memory (CD-ROM), digital versatile disc (DVD) or other optical disc storage, magnetic cassette, magnetic tape, disk storage or other magnetic storage device, or Any other medium used to store the desired information and that can be accessed by the computer. Moreover, it is well known to those skilled in the art that communication media typically includes computer readable instructions, data structures, program modules, or other data in a modulated data signal, such as a carrier wave or other transport mechanism, and can include any information delivery media. .
本领域的普通技术人员可以理解,可以对本公开的技术方案进行修改或者等同替换,而不脱离本公开技术方案的精神和范围,均应涵盖在本公开的权利要求范围当中。A person skilled in the art can understand that the technical solutions of the present disclosure may be modified or equivalent, without departing from the spirit and scope of the present disclosure, and should be included in the scope of the claims of the present disclosure.
工业实用性Industrial applicability
本公开实施例中,移动终端底层接收到至少一条包含隐私信息的原始短信;所述原始短信满足加密条件时,所述移动终端底层对所述原始短信中的所述隐私信息进行加密生成加密短信,向所述移动终端的短信应用发送所述加密短信;所述移动终端的短信应用接收到所述加密短信后,对所述加密短信进行解密;如此,可以不需要移动终端发送方和接收方共同配合,实现了对用户短信中重要隐私信息的加密保护,降低用户重要隐私信息泄露风险,保证用户信息安全,提升用户体验。 In the embodiment of the present disclosure, the mobile terminal bottom layer receives at least one original short message including the private information; when the original short message satisfies the encryption condition, the mobile terminal bottom layer encrypts the private information in the original short message to generate an encrypted short message. Sending the encrypted short message to the short message application of the mobile terminal; after receiving the encrypted short message, the short message application of the mobile terminal decrypts the encrypted short message; thus, the sender and the receiver of the mobile terminal may not be needed. Cooperate with each other to realize the encryption protection of important private information in the user's short message, reduce the risk of leakage of important private information of the user, ensure the security of the user information, and enhance the user experience.

Claims (13)

  1. 一种短信中信息加解密的方法,所述方法包括:A method for encrypting and decrypting information in a short message, the method comprising:
    移动终端底层接收到至少一条包含隐私信息的原始短信;The bottom layer of the mobile terminal receives at least one original short message containing private information;
    所述原始短信满足加密条件时,所述移动终端底层对所述原始短信中的所述隐私信息进行加密生成加密短信,向所述移动终端的短信应用发送所述加密短信;When the original short message satisfies the encryption condition, the mobile terminal bottom layer encrypts the private information in the original short message to generate an encrypted short message, and sends the encrypted short message to the short message application of the mobile terminal;
    所述移动终端的短信应用接收到所述加密短信后,对所述加密短信进行解密。After receiving the encrypted short message, the short message application of the mobile terminal decrypts the encrypted short message.
  2. 根据权利要求1所述的方法,其中,所述隐私信息包括以下至少一种:数字组合信息、不全为数字的字符组合信息。The method of claim 1, wherein the privacy information comprises at least one of the following: digital combination information, and character combination information that is not all numbers.
  3. 根据权利要求2所述的方法,其中,所述隐私信息包括数字组合信息时,所述加密条件包括所述原始短信包含的所述数字组合信息长度大于等于长度阈值;The method according to claim 2, wherein, when the private information comprises digital combination information, the encryption condition comprises that the length of the digital combination information included in the original short message is greater than or equal to a length threshold;
    所述隐私信息包括不全为数字的字符组合信息时,所述加密条件包括所述原始短信中包含满足设定条件的字符串。When the private information includes character combination information that is not all digits, the encryption condition includes that the original short message includes a character string that satisfies the setting condition.
  4. 根据权利要求1所述的方法,所述加密条件还包括:所述移动终端短信加密控制开关开启。The method according to claim 1, wherein the encryption condition further comprises: the mobile terminal short message encryption control switch is turned on.
  5. 根据权利要求1所述的方法,所述方法还包括:所述移动终端底层向预设的第三方应用列表中的第三方应用发送所述原始短信。The method according to claim 1, further comprising: the mobile terminal bottom layer transmitting the original short message to a third party application in a preset third party application list.
  6. 根据权利要求5所述的方法,其中,所述预设的第三方应用列表包括:用户指定的所述移动终端中可信任的第三方应用。The method according to claim 5, wherein the preset third-party application list comprises: a third-party application trusted by the user in the mobile terminal.
  7. 一种短信中信息加解密的装置,所述装置包括移动终端底层和移动终端的短信应用;其中,A device for encrypting and decrypting information in a short message, the device comprising a bottom message of a mobile terminal and a short message application of the mobile terminal; wherein
    移动终端底层,设置为:接收到至少一条包含隐私信息的原始短信;在所述原始短信满足加密条件时,对所述原始短信中的所述隐私信息进行加密生成加密短信,向所述移动终端的短信应用发送所述加密短信;The bottom layer of the mobile terminal is configured to: receive at least one original short message including the private information; and when the original short message satisfies the encryption condition, encrypt the private information in the original short message to generate an encrypted short message, to the mobile terminal The short message application sends the encrypted short message;
    移动终端的短信应用,设置为:在接收到所述加密短信后,对所述加密 短信进行解密。The short message application of the mobile terminal is set to: after receiving the encrypted short message, the encryption SMS to decrypt.
  8. 根据权利要求7所述的装置,其中,所述隐私信息包括以下至少一种:数字组合信息、不全为数字的字符组合信息。The apparatus according to claim 7, wherein the privacy information comprises at least one of the following: digital combination information, and character combination information that is not all numbers.
  9. 根据权利要求8所述的装置,其中,所述隐私信息包括数字组合信息时,所述加密条件包括所述原始短信包含的所述数字组合信息长度大于等于长度阈值;The device according to claim 8, wherein, when the private information comprises digital combination information, the encryption condition comprises that the length of the digital combination information included in the original short message is greater than or equal to a length threshold;
    所述隐私信息包括不全为数字的字符组合信息时,所述加密条件包括所述原始短信中包含满足设定条件的字符串。When the private information includes character combination information that is not all digits, the encryption condition includes that the original short message includes a character string that satisfies the setting condition.
  10. 根据权利要求7所述的装置,所述加密条件还包括:所述移动终端短信加密控制开关开启。The apparatus according to claim 7, wherein the encryption condition further comprises: the mobile terminal short message encryption control switch is turned on.
  11. 根据权利要求7所述的装置,所述移动终端底层,还设置为:向预设的第三方应用列表中的第三方应用发送所述原始短信。The device of claim 7, the bottom layer of the mobile terminal is further configured to: send the original short message to a third-party application in a preset third-party application list.
  12. 根据权利要求11所述的装置,其中,所述预设的第三方应用列表包括:用户指定的所述移动终端中可信任的第三方应用。The apparatus according to claim 11, wherein the preset third-party application list comprises: a third-party application trusted by the user in the mobile terminal.
  13. 一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令被执行时实现如权利要求1至6中任一权利要求所述的短信中信息加解密的方法。 A computer readable storage medium storing computer executable instructions that, when executed, implement a method of encrypting and decrypting information in a short message as claimed in any one of claims 1 to 6.
PCT/CN2017/102768 2016-09-30 2017-09-21 Method and device for encrypting and decrypting information in short message WO2018059303A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610873400.2A CN107889102B (en) 2016-09-30 2016-09-30 Method and device for encrypting and decrypting information in short message
CN201610873400.2 2016-09-30

Publications (1)

Publication Number Publication Date
WO2018059303A1 true WO2018059303A1 (en) 2018-04-05

Family

ID=61763686

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/102768 WO2018059303A1 (en) 2016-09-30 2017-09-21 Method and device for encrypting and decrypting information in short message

Country Status (2)

Country Link
CN (1) CN107889102B (en)
WO (1) WO2018059303A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112732776A (en) * 2020-12-25 2021-04-30 山东师范大学 Secure approximate pattern matching method and system and electronic equipment

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109274582B (en) * 2018-09-20 2021-12-10 腾讯科技(武汉)有限公司 Instant communication message display method, device, equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101247605A (en) * 2008-03-25 2008-08-20 中兴通讯股份有限公司 Short information enciphering and endorsement method, mobile terminal and short information ciphering system
CN101626567A (en) * 2009-06-29 2010-01-13 深圳华为通信技术有限公司 Short message sending and receiving method, short message sending and receiving device and mobile terminal
US20140359704A1 (en) * 2011-09-09 2014-12-04 Kingston Digital, Inc. Private cloud routing server, private network service and smart device client architecture without utilizing a public cloud based routing server
CN104301886A (en) * 2014-10-21 2015-01-21 中国联合网络通信集团有限公司 Short message reading method and system, terminal and wearable device
CN105610770A (en) * 2015-07-27 2016-05-25 宇龙计算机通信科技(深圳)有限公司 Access method, access device, terminal, encryption method, encryption device and terminal

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101795315A (en) * 2009-12-25 2010-08-04 深圳市杰普林数码科技有限公司 System and method for encrypting short messages by using mobile phone terminal
CN102811426A (en) * 2011-05-30 2012-12-05 网秦无限(北京)科技有限公司 Method and system for cryptographically sending and receiving messages of mobile device
CN202818612U (en) * 2012-06-19 2013-03-20 吴振陵 System capable of blocking unauthorized SMS text messages or bulk SMS text messages
CN102916948B (en) * 2012-09-29 2015-05-06 深圳市易联盛世科技有限公司 Data safety processing method and device, and terminal
CN104486756B (en) * 2014-12-05 2018-11-16 深圳职业技术学院 A kind of encryption and decryption method and system of close writing paper short message
CN105704690B (en) * 2016-01-20 2019-01-22 福州大学 The method and system of the hidden close communication of short message based on hand-set digit fingerprint authentication
CN106027229B (en) * 2016-07-28 2019-04-23 武汉斗鱼网络科技有限公司 A kind of encryption and decryption method and system based on intelligent terminal compass

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101247605A (en) * 2008-03-25 2008-08-20 中兴通讯股份有限公司 Short information enciphering and endorsement method, mobile terminal and short information ciphering system
CN101626567A (en) * 2009-06-29 2010-01-13 深圳华为通信技术有限公司 Short message sending and receiving method, short message sending and receiving device and mobile terminal
US20140359704A1 (en) * 2011-09-09 2014-12-04 Kingston Digital, Inc. Private cloud routing server, private network service and smart device client architecture without utilizing a public cloud based routing server
CN104301886A (en) * 2014-10-21 2015-01-21 中国联合网络通信集团有限公司 Short message reading method and system, terminal and wearable device
CN105610770A (en) * 2015-07-27 2016-05-25 宇龙计算机通信科技(深圳)有限公司 Access method, access device, terminal, encryption method, encryption device and terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112732776A (en) * 2020-12-25 2021-04-30 山东师范大学 Secure approximate pattern matching method and system and electronic equipment
CN112732776B (en) * 2020-12-25 2022-08-26 山东师范大学 Secure approximate pattern matching method and system and electronic equipment

Also Published As

Publication number Publication date
CN107889102A (en) 2018-04-06
CN107889102B (en) 2021-04-02

Similar Documents

Publication Publication Date Title
US8457308B2 (en) Communication system and method for protecting messages between two mobile phones
JP6543040B2 (en) System and method for remote access, remote digital signature
EP3220573B1 (en) Method and system for controlling encryption of information and analyzing information as well as terminal
US20160260091A1 (en) Universal wallet for digital currency
US9525548B2 (en) Provisioning techniques
CN110100422B (en) Data writing method and device based on block chain intelligent contract and storage medium
JP6533291B2 (en) Method and apparatus for encrypting / decrypting data on a mobile terminal
WO2016045469A1 (en) Information encryption method and mobile terminal
US9686251B2 (en) Devices and techniques for controlling disclosure of sensitive information
KR20150087205A (en) Secure communication architecture
US10158613B1 (en) Combined hidden dynamic random-access devices utilizing selectable keys and key locators for communicating randomized data together with sub-channels and coded encryption keys
US20210184851A1 (en) Authentication device, system and method
US10917440B1 (en) Communication server and method of secured transmission of messages
US20200145389A1 (en) Controlling Access to Data
WO2018059303A1 (en) Method and device for encrypting and decrypting information in short message
US8769301B2 (en) Product authentication based upon a hyperelliptic curve equation and a curve pairing function
CN112492352A (en) Video encryption and decryption method and device, electronic equipment and storage medium
US10623384B2 (en) Combined hidden dynamic random-access devices utilizing selectable keys and key locators for communicating randomized data together with sub-channels and coded encryption keys
CN105809494A (en) method and system for invoice generation and invoice verification
US9537842B2 (en) Secondary communications channel facilitating document security
CN110532792B (en) Method and system for checking privacy information
CN103514540A (en) USBKEY business realization method and system
WO2016184087A1 (en) Method and system for transmitting information inter-device, source terminal and storage medium
EP3310017A1 (en) Electronic device for two factor authentication
US11876797B2 (en) Multi-factor geofencing system for secure encryption and decryption system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17854753

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17854753

Country of ref document: EP

Kind code of ref document: A1