[go: up one dir, main page]

CN104363584B - A kind of method, apparatus and terminal of short message Encrypt and Decrypt - Google Patents

A kind of method, apparatus and terminal of short message Encrypt and Decrypt Download PDF

Info

Publication number
CN104363584B
CN104363584B CN201410698970.3A CN201410698970A CN104363584B CN 104363584 B CN104363584 B CN 104363584B CN 201410698970 A CN201410698970 A CN 201410698970A CN 104363584 B CN104363584 B CN 104363584B
Authority
CN
China
Prior art keywords
password
terminal
short message
characters
numbers
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410698970.3A
Other languages
Chinese (zh)
Other versions
CN104363584A (en
Inventor
夏绍华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Green Seed Technology Co ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201410698970.3A priority Critical patent/CN104363584B/en
Publication of CN104363584A publication Critical patent/CN104363584A/en
Application granted granted Critical
Publication of CN104363584B publication Critical patent/CN104363584B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

本发明实施例公开了一种短消息加、解密的方法、装置及终端,涉及移动终端技术领域,能够减少对短消息进行加密和解密的过程花费的时间。其中,短消息加密方法包括:获取第一号码和第二号码;利用第一号码和第二号码,生成目标密码;利用目标密码,对待发送短消息进行加密。短消息解密方法包括:获取第一号码和第二号码;利用第一号码和第二号码,生成目标密码;利用目标密码,对接收的短消息进行解密,并得到解密后的短消息。本发明适用于发送方终端对短消息进行加密和接收方终端对短消息进行解密的场景中。

The embodiment of the invention discloses a method, device and terminal for encrypting and decrypting short messages, relates to the technical field of mobile terminals, and can reduce the time spent in the process of encrypting and decrypting short messages. Wherein, the short message encryption method includes: obtaining the first number and the second number; using the first number and the second number to generate a target password; using the target password to encrypt the short message to be sent. The short message decryption method includes: obtaining the first number and the second number; using the first number and the second number to generate a target password; using the target password to decrypt the received short message and obtain the decrypted short message. The present invention is applicable to the scene where the sender terminal encrypts the short message and the receiver terminal decrypts the short message.

Description

一种短消息加、解密的方法、装置及终端Method, device and terminal for encrypting and decrypting short messages

技术领域technical field

本发明涉及移动终端技术领域,尤其涉及一种短消息加、解密的方法、装置及终端。The invention relates to the technical field of mobile terminals, in particular to a short message encryption and decryption method, device and terminal.

背景技术Background technique

随着电子信息技术的发展,越来越多的终端使用短消息在终端之间传递信息,但是在短消息的传递过程中,短消息可能会被黑客截获,从而造成短消息中的信息泄露,产生安全隐患。With the development of electronic information technology, more and more terminals use short messages to transmit information between terminals. However, during the transmission of short messages, short messages may be intercepted by hackers, resulting in information leakage in short messages. create safety hazards.

为了防止短消息中的信息泄露,现有技术中,发送方终端使用公钥对短消息进行加密,并将加密后的短消息向接收方终端发送,接收方终端利用与公钥对应的私钥,对加密后的短消息进行解密,得到短消息。In order to prevent information leakage in the short message, in the prior art, the sender terminal encrypts the short message with a public key, and sends the encrypted short message to the receiver terminal, and the receiver terminal uses the private key corresponding to the public key to , decrypt the encrypted short message to obtain the short message.

由于发送方终端的公钥和接收方的私钥存在对应关系,所以当发送方终端利用公钥对短消息加密后,需要与接收方终端进行协商,使接收方终端得知发送方终端加密使用的公钥,从而使得接收方使用与该公钥对应的私钥对加密的短消息进行解密,保证发送方终端和接收方终端之间能够正常传输短消息。在每次发送方终端与接收方终端传输短消息时,发送方终端都需要与接收方终端协商加密使用的公钥以及解密使用的与该公钥对应的私钥。在对短消息加密和解密的过程中,发送方终端与接收方终端之间的协商会花费大量时间,增加了对短消息加密和解密过程花费的时间。Since there is a corresponding relationship between the public key of the sender terminal and the private key of the receiver, when the sender terminal uses the public key to encrypt the short message, it needs to negotiate with the receiver terminal so that the receiver terminal knows the encryption method used by the sender terminal. public key, so that the recipient uses the private key corresponding to the public key to decrypt the encrypted short message, ensuring that the short message can be normally transmitted between the sender terminal and the receiver terminal. Every time when the sender terminal and the receiver terminal transmit a short message, the sender terminal needs to negotiate with the receiver terminal on the public key used for encryption and the private key corresponding to the public key used for decryption. In the process of encrypting and decrypting the short message, the negotiation between the sending terminal and the receiving terminal will take a lot of time, which increases the time spent in the process of encrypting and decrypting the short message.

发明内容Contents of the invention

本发明的实施例提供一种短消息加、解密的方法、装置及终端,能够减少对短消息进行加密和解密的过程花费的时间。Embodiments of the present invention provide a method, device and terminal for encrypting and decrypting short messages, which can reduce the time spent in the process of encrypting and decrypting short messages.

为达到上述目的,本发明的实施例采用如下技术方案:In order to achieve the above object, embodiments of the present invention adopt the following technical solutions:

第一方面,本发明实施例提供一种短消息加密的方法,包括:In the first aspect, the embodiment of the present invention provides a method for encrypting a short message, including:

获取第一号码和第二号码,所述第一号码为发送方终端的电话号码,所述第二号码为接收方终端的电话号码;Obtaining a first number and a second number, the first number is the phone number of the sender terminal, and the second number is the phone number of the receiver terminal;

利用所述第一号码和所述第二号码,生成目标密码;using the first number and the second number to generate a target password;

利用所述目标密码,对待发送短消息进行加密。The short message to be sent is encrypted by using the target password.

第二方面,本发明实施例提供一种短消息解密的方法,包括:In a second aspect, the embodiment of the present invention provides a method for decrypting a short message, including:

获取第一号码和第二号码,所述第一号码为发送方终端的电话号码,所述第二号码为接收方终端的电话号码;Obtaining a first number and a second number, the first number is the phone number of the sender terminal, and the second number is the phone number of the receiver terminal;

利用所述第一号码和所述第二号码,生成目标密码;using the first number and the second number to generate a target password;

利用所述目标密码,对接收的短消息进行解密,并得到解密后的短消息。The received short message is decrypted by using the target password, and the decrypted short message is obtained.

第三方面,本发明实施例提供一种短消息加密的装置,包括:In a third aspect, the embodiment of the present invention provides a device for encrypting short messages, including:

第一获取模块,用于获取第一号码和第二号码,所述第一号码为发送方终端的电话号码,所述第二号码为接收方终端的电话号码;A first obtaining module, configured to obtain a first number and a second number, the first number is the phone number of the sender terminal, and the second number is the phone number of the receiver terminal;

第一生成模块,用于利用所述第一号码和所述第二号码,生成目标密码;A first generating module, configured to generate a target password by using the first number and the second number;

加密模块,用于利用所述目标密码,对待发送短消息进行加密。The encryption module is used to encrypt the short message to be sent by using the target password.

第四方面,本发明实施例提供一种短消息解密的装置,包括:In a fourth aspect, an embodiment of the present invention provides a device for decrypting a short message, including:

第二获取模块,用于获取第一号码和第二号码,所述第一号码为发送方终端的电话号码,所述第二号码为接收方终端的电话号码;The second obtaining module is used to obtain a first number and a second number, the first number is the phone number of the sender terminal, and the second number is the phone number of the receiver terminal;

第二生成模块,用于利用所述第一号码和所述第二号码,生成目标密码;A second generating module, configured to generate a target password by using the first number and the second number;

解密模块,用于利用所述目标密码,对接收的短消息进行解密,并得到解密后的短消息。The decryption module is used to decrypt the received short message by using the target password, and obtain the decrypted short message.

第五方面,本发明实施例提供一种终端,所述终端包括上述方案提供的短消息加密的装置。In a fifth aspect, an embodiment of the present invention provides a terminal, and the terminal includes the device for encrypting short messages provided by the above solution.

第六方面,本发明实施例提供一种终端,所述终端包括上述方案提供的短消息解密的装置。In a sixth aspect, an embodiment of the present invention provides a terminal, and the terminal includes the device for decrypting a short message provided by the above solution.

本发明实施例提供的一种短消息加、解密的方法、装置及终端,发送方终端能够根据发送方终端的电话号码和接收方终端的电话号码,生成目标密码,利用目标密码对短消息进行加密,接收方终端采用和发送方终端相同的方法,生成目标密码,利用目标密码对短消息进行解密。与发送端终端利用公钥加密,接收方终端利用与公钥对应的私钥解密的现有技术相比,本发明实施例利用发送方终端的电话号码和接收方终端的电话号码,生成为短消息加密的目标密码,因为发送方终端的电话号码和接收方终端的电话号码是发送方终端和接收方终端的本地信息,不需要发送方终端和接收方终端进行商讨决定,从而省去了发送方终端与接收方终端协商花费的时间,减少了对短消息进行加密和解密的过程花费的时间。A short message encryption and decryption method, device, and terminal provided by the embodiments of the present invention, the sender terminal can generate a target password according to the phone number of the sender terminal and the phone number of the receiver terminal, and use the target password to decrypt the short message Encryption, the receiving terminal uses the same method as the sending terminal to generate a target password, and uses the target password to decrypt the short message. Compared with the prior art in which the sending terminal uses the public key to encrypt and the receiving terminal uses the private key corresponding to the public key to decrypt, the embodiment of the present invention uses the phone number of the sending terminal and the phone number of the receiving terminal to generate a short The target password for message encryption, because the phone number of the sender's terminal and the phone number of the receiver's terminal are the local information of the sender's terminal and the receiver's terminal, there is no need for the sender's terminal and the receiver's terminal to discuss and decide, thus eliminating the need to send The time spent on negotiating between the receiving terminal and the receiving terminal is shortened, and the time spent on encrypting and decrypting the short message is reduced.

附图说明Description of drawings

为了更清楚地说明本发明实施例中的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其它的附图。In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the following will briefly introduce the accompanying drawings that need to be used in the embodiments. Obviously, the accompanying drawings in the following description are only some embodiments of the present invention. For Those of ordinary skill in the art can also obtain other drawings based on these drawings without making creative efforts.

图1为本发明实施例提供的一种短消息加密的方法的流程图;Fig. 1 is the flowchart of a kind of short message encryption method that the embodiment of the present invention provides;

图2为本发明实施例提供的一种短消息加密的方法的一种具体实现方式的流程图;Fig. 2 is the flow chart of a kind of specific implementation of the method for a kind of short message encryption that the embodiment of the present invention provides;

图2a、图2b为本发明实施例提供的选取的第一号码和第二号码中的数字进行组合的举例说明示意图;Fig. 2a and Fig. 2b are schematic illustrations illustrating the combination of numbers in the selected first number and the second number provided by the embodiment of the present invention;

图2c为本发明实施例提供的维吉尼亚密码表的说明示意图;Fig. 2c is a schematic illustration of the Virginia cipher table provided by the embodiment of the present invention;

图3为本发明实施例提供的一种短消息加密的方法的另一种具体实现方式的流程图;Fig. 3 is a flow chart of another specific implementation of a method for encrypting a short message provided by an embodiment of the present invention;

图4为本发明实施例提供的一种短消息解密的方法的流程图;Fig. 4 is a flow chart of a method for decrypting a short message provided by an embodiment of the present invention;

图5为本发明实施例提供的一种短消息解密的方法的一种具体实现方式的流程图;Fig. 5 is a flow chart of a specific implementation of a method for decrypting a short message provided by an embodiment of the present invention;

图6为本发明实施例提供的一种短消息解密的方法的另一种具体实现方式的流程图;FIG. 6 is a flow chart of another specific implementation of a method for decrypting a short message provided by an embodiment of the present invention;

图7为本发明实施例提供的一种短消息加密的装置的结构示意图;FIG. 7 is a schematic structural diagram of a short message encryption device provided by an embodiment of the present invention;

图8为本发明实施例提供的一种短消息解密的装置的结构示意图。Fig. 8 is a schematic structural diagram of an apparatus for decrypting a short message provided by an embodiment of the present invention.

具体实施方式Detailed ways

下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其它实施例,都属于本发明保护的范围。The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

本发明实施例提供的技术方案,应用于发送方终端和接收方终端对短消息进行加、解密的场景中,发送方终端和接收方终端可以是手机,也可以是安装有收发短信软件的计算机或平板电脑等。发送方终端对待发送的短消息进行加密,并将加密后的短消息向接收方终端发送,接收方终端接收加密的短消息,并对加密的短消息进行解密,从而得到短消息。The technical solution provided by the embodiment of the present invention is applied to the scene where the sender terminal and the receiver terminal encrypt and decrypt the short message. The sender terminal and the receiver terminal can be mobile phones or computers installed with software for sending and receiving short messages or tablet etc. The sender terminal encrypts the short message to be sent, and sends the encrypted short message to the receiver terminal, and the receiver terminal receives the encrypted short message, and decrypts the encrypted short message to obtain the short message.

本发明实施例提供了一种短消息加密的方法,应用于发送方终端,如图1所示,包括:The embodiment of the present invention provides a short message encryption method, which is applied to the sender terminal, as shown in Figure 1, including:

101,获取第一号码和第二号码。101. Obtain a first number and a second number.

其中,第一号码为发送方终端的电话号码,第二号码为接收方终端的电话号码。发送方终端获取本身的电话号码和短消息对应的接收方终端的电话号码,电话号码的位数在此并不限定。Wherein, the first number is the phone number of the sending terminal, and the second number is the phone number of the receiving terminal. The sending terminal acquires its own phone number and the phone number of the receiving terminal corresponding to the short message, and the number of digits of the phone number is not limited here.

其中,发送方终端可以在完成编辑短消息后,接收用户的选择指令,来决定是否对待发送的短消息加密。Wherein, after finishing editing the short message, the sending terminal may receive a user's selection instruction to decide whether to encrypt the short message to be sent.

102,利用所述第一号码和所述第二号码,生成目标密码。102. Generate a target password by using the first number and the second number.

其中,发送方终端利用发送方终端和接收方终端的电话号码,通过对电话号码中的数字进行选取、组合、利用映射关系替换字符、以及借助各种密码表等技术手段,生成用于对待发送短消息进行加密的目标密码。Among them, the sender terminal uses the phone numbers of the sender terminal and the receiver terminal to generate a password for the phone number to be sent by selecting and combining numbers in the phone number, replacing characters with mapping relationships, and using various password tables and other technical means. The target password for encrypting short messages.

需要说明的是,发送方终端对短消息进行加密时得到的目标密码与接收方终端对短消息进行解密时使用的目标密码相同,即发送方终端生成目标密码与接收方终端生成目标密码的方法相同。It should be noted that the target password obtained when the sending terminal encrypts the short message is the same as the target password used when the receiving terminal decrypts the short message, that is, the sending terminal generates the target password in the same way as the receiving terminal generates the target password. same.

103,利用所述目标密码,对待发送短消息进行加密。103. Encrypt the short message to be sent by using the target password.

其中,利用102中生成的目标密码,对待发送短消息进行加密。Wherein, utilize the target password generated in 102 to encrypt the short message to be sent.

本发明实施例提供的一种短消息加密的方法,能够根据发送方终端的电话号码和接收方终端的电话号码,生成目标密码,利用目标密码对短消息进行加密。与发送端终端利用公钥加密,接收方终端利用与公钥对应的私钥解密的现有技术相比,本发明实施例利用发送方终端的电话号码和接收方终端的电话号码,生成为短消息加密的目标密码,因为发送方终端的电话号码和接收方终端的电话号码是发送方终端和接收方终端的本地信息,不需要发送方终端和接收方终端进行商讨决定,从而省去了发送方终端与接收方终端协商花费的时间,减少了对短消息进行加密和解密的过程花费的时间。The method for encrypting a short message provided by the embodiment of the present invention can generate a target password according to the phone number of the sender terminal and the phone number of the receiver terminal, and use the target password to encrypt the short message. Compared with the prior art in which the sending terminal uses the public key to encrypt and the receiving terminal uses the private key corresponding to the public key to decrypt, the embodiment of the present invention uses the phone number of the sending terminal and the phone number of the receiving terminal to generate a short The target password for message encryption, because the phone number of the sender's terminal and the phone number of the receiver's terminal are the local information of the sender's terminal and the receiver's terminal, there is no need for the sender's terminal and the receiver's terminal to discuss and decide, thus eliminating the need to send The time spent on negotiating between the receiving terminal and the receiving terminal is shortened, and the time spent on encrypting and decrypting the short message is reduced.

进一步的,为了进一步保证加密的短消息的安全,本发明实施例还提供了一种短消息加密的方法的具体方案,目标密码包括M个字符;本方案对图1所示的方案中的102的执行过程进一步细化,102可以具体实现为1021-1024,如图2所示,包括:Further, in order to further ensure the security of the encrypted short message, the embodiment of the present invention also provides a specific scheme of a method for encrypting a short message, wherein the target password includes M characters; The execution process is further refined, and 102 can be specifically implemented as 1021-1024, as shown in Figure 2, including:

1021,选取所述第一号码中的M1个数字和所述第二号码中的M2个数字。1021. Select M1 numbers in the first number and M2 numbers in the second number.

其中,目标密码包括M个字符,M为整数。在第一号码中选取M1个数字,并在第二号码中选取M2个数字,使得M1+M2=M,且M1、M2均为整数。在发送方终端选取第一号码和第二号码中的数字的过程中,具体的,避免选取第一号码和第二号码中具有较强规律性的数字,比如手机号码第一位数字大多相同,均为1,可以避免选取该类数字。当第一号码和第二号码均为11位的手机号,目标密码要求为128比特位,即目标密码长16个字节,也可以说目标密码包括16个字符时,因为大部分手机号码的第一位数字为1,第二位数字为3、5或8,所以在第一号码和第二号码中挑选数字时,先排除第一号码和第二号码的第一位数字和第二位数字,可以再从第一号码剩余的9个数字中选取8个数字,从第二号码剩余的9个数字中选取8个数字。比如:第一号码为13316881857,第二号码为18612345678,舍去第一号码中的第一位数字1和第二位数字3,还可以舍去第6位数字8;同时,舍去第二号码中的第一位数字1和第二位数字3,还可以舍去第6位数字3,选取第一号码剩余的8个数字3、1、6、8、1、8、5、7和第二号码剩余的8个数字6、1、2、4、5、6、7、8。Wherein, the target password includes M characters, and M is an integer. Select M1 numbers from the first number, and select M2 numbers from the second number, so that M1+M2=M, and both M1 and M2 are integers. In the process of selecting the numbers in the first number and the second number by the sending terminal, specifically, avoid selecting numbers with strong regularity in the first number and the second number, for example, most of the first digits of mobile phone numbers are the same, are all 1, you can avoid selecting such numbers. When both the first number and the second number are 11-digit mobile phone numbers, the target password is required to be 128 bits, that is, the target password is 16 bytes long, and it can also be said that the target password includes 16 characters, because most of the mobile phone numbers The first digit is 1, and the second digit is 3, 5 or 8, so when selecting numbers from the first and second numbers, first exclude the first and second digits of the first and second numbers You can choose 8 numbers from the remaining 9 numbers of the first number and 8 numbers from the remaining 9 numbers of the second number. For example: the first number is 13316881857, the second number is 18612345678, the first number 1 and the second number 3 in the first number are discarded, and the sixth digit 8 can also be discarded; at the same time, the second number is discarded In the first number 1 and the second number 3, the sixth number 3 can also be discarded, and the remaining 8 numbers 3, 1, 6, 8, 1, 8, 5, 7 and the first number can be selected. The remaining 8 numbers of the second number are 6, 1, 2, 4, 5, 6, 7, 8.

需要说明的是,接收方终端选取的第一号码的M1个数字和第二号码的M2个数字,与发送方终端选取的第一号码的M1个数字和第二号码的M2个数字是相同的。It should be noted that the M1 digits of the first number and the M2 digits of the second number selected by the receiving terminal are the same as the M1 digits of the first number and the M2 digits of the second number selected by the sending terminal .

1022,将选取的所述第一号码中的M1个数字和所述第二号码中的M2个数字组合,得到第一层密码。1022. Combine the selected M1 digits in the first number with the M2 digits in the second number to obtain a first-level password.

其中,发送方终端可以将第一号码中的M1个数字和第二号码中的M2个数字直接按顺序排列,组合成第一层密码,比如:如图2a所示,第一号码中选取的8个数字3、1、6、8、1、8、5、7与第二号码中选取的8个数字6、1、2、4、5、6、7、8,按原有顺序排列,组成第一层密码3168185761245678。发送方终端也可以激昂第一号码中的M1个数字和第二号码中的M2个数字打乱顺序,组成第一层密码,比如:如图2b所示,第一号码中选取的8个数字3、1、6、8、1、8、5、7与第二号码中选取的8个数字6、1、2、4、5、6、7、8,将相邻的每两个数字的位置对换,组成第一层密码1386817516426587。Among them, the sender terminal can directly arrange the M1 numbers in the first number and the M2 numbers in the second number in order to form a first-level password, for example: as shown in Figure 2a, the selected password in the first number The 8 numbers 3, 1, 6, 8, 1, 8, 5, 7 and the 8 numbers selected from the second number 6, 1, 2, 4, 5, 6, 7, 8 are arranged in the original order, Form the first layer of password 3168185761245678. The sender's terminal can also shuffle the M1 numbers in the first number and the M2 numbers in the second number to form a first-level password. For example, as shown in Figure 2b, the 8 numbers selected in the first number 3, 1, 6, 8, 1, 8, 5, 7 and the 8 numbers selected from the second number 6, 1, 2, 4, 5, 6, 7, 8, the adjacent two numbers The positions are reversed to form the first password 1386817516426587.

需要说明的是,接收方终端将第一号码的M1个数字和第二号码的M2个数字组合的方法,与发送方终端将第一号码的M1个数字和第二号码的M2个数字组合的方法是相同的。It should be noted that the method for the receiver terminal to combine the M1 digits of the first number with the M2 digits of the second number is the same as the method for the sender terminal to combine the M1 digits of the first number with the M2 digits of the second number. The method is the same.

1023,根据所述第一层密码与存储在所述发送方终端的共用映射关系,得到第二层密码。1023. Obtain a second layer password according to the shared mapping relationship between the first layer password and the sender terminal.

其中,第二层密码由映射字符组成,映射字符具体可以为英文字符、拉丁文字符等字符,共用映射关系包括第一号码中的数字与映射字符的映射关系,以及第二号码中的数字与映射字符的映射关系。发送方终端可以在26个英文字符中选取10个英文字符与数字0-9形成映射关系,即共用映射关系可以为选取的10个英文字符与数字0-9之间的映射关系。比如:共用映射关系如表一所示,若第一层密码为3168185761245678,发送方终端利用如表一所示的共用映射关系,可以得到第二层密码FQMTQTSWMQHLSMWT。Wherein, the second-level password is composed of mapping characters, which may specifically be English characters, Latin characters and other characters, and the shared mapping relationship includes the mapping relationship between the numbers in the first number and the mapping characters, and the relationship between the numbers in the second number and the mapping characters. The mapping relationship of mapped characters. The sending terminal may select 10 English characters from 26 English characters to form a mapping relationship with numbers 0-9, that is, the common mapping relationship may be a mapping relationship between the selected 10 English characters and numbers 0-9. For example, the shared mapping relationship is shown in Table 1. If the first layer password is 3168185761245678, the sender terminal can obtain the second layer password FQMTQTSWMQHLSMWT by using the shared mapping relationship shown in Table 1.

表一Table I

数字number 00 11 22 33 44 55 66 77 88 99 英文字符English characters CC QQ Hh Ff LL SS Mm WW TT ZZ

需要说明的是,接收方终端存储有与发送方终端相同的共用映射关系。It should be noted that the receiver terminal stores the same common mapping relationship as that of the sender terminal.

1024,根据所述第二层密码、存储在所述发送方终端的共用密码表,以及预设的共用密钥,得到所述目标密码。1024. Obtain the target password according to the second layer password, the common password table stored in the sender terminal, and the preset common key.

其中,根据第二层密码中的映射字符,预设的共用密钥,以及存储在发送方终端的共用密码表,得到目标密码。共用密码表包括映射字符和共用密钥中的字符的组合与目标密码中的字符的对应关系,共用密码表可以是维吉尼亚密码表或与维吉尼亚密码表同类的多表密码表。利用第二层密码和预设的共用密钥,在共用密码表中可以查找到与映射字符和共用密钥中的字符的组合对应的密码字符,从而得到目标密码。比如,共用密码表为如图2c所示的维吉尼亚密码表,第一行为映射字符,第一列为共用密钥中的字符,维吉尼亚密码表中的其他部分为目标密码中可能出现的字符,根据映射字符和共用密钥中的字符在维吉尼亚密码表中交叉所得的字符,能够得到目标密码。例如:第二层密码为FQMTQTSWMQHLSMWT,预设的共用密钥为RELATIONS,映射字符F与共用密钥中的字符R的组合对应的目标密码中的字符为W,映射字符Q与共用密钥中的字符E的组合对应的目标密码中的字符为U,以此类推,可以得到的第二层密码、共用密钥和目标密码的对应关系如表二所示:Wherein, the target password is obtained according to the mapped characters in the second layer password, the preset shared key, and the shared password table stored in the sender's terminal. The common password table includes the corresponding relationship between the combination of the mapping characters and the characters in the common key and the characters in the target password. The common password table can be a Virginia password table or a multi-table password table similar to the Virginia password table . Using the second-level password and the preset shared key, the password character corresponding to the combination of the mapped character and the character in the shared key can be found in the shared password table, so as to obtain the target password. For example, the common cipher table is the Virginia cipher table shown in Figure 2c. The first row is the mapping character, the first column is the character in the common key, and the other parts in the Virginia cipher table are the characters in the target password. The characters that may appear, according to the characters obtained by crossing the mapped characters and the characters in the common key in the Virginia cipher table, the target password can be obtained. For example: the second-level password is FQMTQTSWMQHLSMWT, the preset common key is RELATIONS, the character in the target password corresponding to the combination of the mapping character F and the character R in the common key is W, and the mapping character Q and the character R in the common key The character in the target password corresponding to the combination of character E is U, and so on, the corresponding relationship between the second-level password, common key and target password that can be obtained is shown in Table 2:

表二Table II

第二层密码second password Ff QQ Mm TT QQ TT SS WW Mm QQ Hh LL SS Mm WW TT 共用密钥shared key RR EE. LL AA TT II Oo NN SS RR EE. LL AA TT II Oo 目标密码target password WW Uu Xx TT JJ BB GG JJ EE. Hh LL WW SS Ff EE. Hh

所以,得到的目标密码为WUXTJBGJEHLWSFEH。Therefore, the resulting target password is WUXTJBGJEHLWSFEH.

需要说明的是,接收方终端存储有与发送方终端相同的共用密码表,以及与发送方终端相同的预设的共用密钥。It should be noted that the receiver terminal stores the same common password table as the sender terminal, and the same preset common key as the sender terminal.

本发明实施例提供的一种短消息加密的方法,能够根据发送方终端的电话号码和接收方终端的电话号码,生成目标密码,利用目标密码对短消息进行加密。与发送端终端利用公钥加密,接收方终端利用与公钥对应的私钥解密的现有技术相比,本发明实施例利用发送方终端的电话号码和接收方终端的电话号码,生成为短消息加密的目标密码,因为发送方终端的电话号码和接收方终端的电话号码是发送方终端和接收方终端的本地信息,不需要发送方终端和接收方终端进行商讨决定,从而省去了发送方终端与接收方终端协商花费的时间,减少了对短消息进行加密和解密的过程花费的时间。具体的,根据第一号码和第二号码生成第一层密码,再将第一层密码转化为第二层密码,最后利用密码表将第二层密码转化为目标密码,使用密码表能够有效的对抗字频统计,提高破解密码的难度,进一步提高了密码的安全性。The method for encrypting a short message provided by the embodiment of the present invention can generate a target password according to the phone number of the sender terminal and the phone number of the receiver terminal, and use the target password to encrypt the short message. Compared with the prior art in which the sending terminal uses the public key to encrypt and the receiving terminal uses the private key corresponding to the public key to decrypt, the embodiment of the present invention uses the phone number of the sending terminal and the phone number of the receiving terminal to generate a short The target password for message encryption, because the phone number of the sender's terminal and the phone number of the receiver's terminal are the local information of the sender's terminal and the receiver's terminal, there is no need for the sender's terminal and the receiver's terminal to discuss and decide, thus eliminating the need to send The time spent on negotiating between the receiving terminal and the receiving terminal is shortened, and the time spent on encrypting and decrypting the short message is reduced. Specifically, generate the first-level password according to the first number and the second number, then convert the first-level password into the second-level password, and finally use the password table to convert the second-level password into the target password. Using the password table can effectively Fight against word frequency statistics, increase the difficulty of cracking passwords, and further improve the security of passwords.

此外,为了表明短消息是加密的短消息,本发明实施例还提供了一种短消息加密的方法的具体方案,本方案在图1所示的方案中的103之后,增加了105-106,如图3所示,包括:In addition, in order to indicate that the short message is an encrypted short message, the embodiment of the present invention also provides a specific scheme of a method for encrypting a short message. This scheme adds 105-106 after 103 in the scheme shown in FIG. 1 , As shown in Figure 3, including:

105,对所述加密的待发送短消息进行摘要,得到摘要内容。105. Digest the encrypted short message to be sent to obtain the digest content.

其中,发送方终端可以对加密的短消息进行MD5(Message-Digest Algorithm5,消息摘要算法第五版)散列摘要,得到摘要内容;或者,发送方终端还可以对加密后的短消息进行HMAC(Hash-based Message Authentication Code,哈希运算消息认证码)摘要,得到摘要内容。发送方终端和接收方终端将摘要内容作为该短信为加密后的短信的标识。Wherein, the sender terminal can carry out MD5 (Message-Digest Algorithm5, message digest algorithm fifth edition) hash summary to the encrypted short message to obtain the summary content; or, the sender terminal can also perform HMAC ( Hash-based Message Authentication Code, hash operation message authentication code) summary, get the summary content. The sender's terminal and the receiver's terminal use the summary content as an identification that the short message is an encrypted short message.

106,将所述摘要内容添加至所述加密的待发送短消息中。106. Add the summary content to the encrypted short message to be sent.

其中,发送方终端将摘要内容添加到加密的待发送短消息中,具体的,可以将摘要内容填充到加密的待发送短消息的尾部,在后续发送过程中,将添加了摘要内容的加密的待发送短消息向接收方终端发送。Wherein, the sender terminal adds the digest content to the encrypted short message to be sent. Specifically, the digest content can be filled into the tail of the encrypted short message to be sent. In the subsequent sending process, the encrypted message with the digest content added The short message to be sent is sent to the receiver terminal.

本发明实施例提供的一种短消息加密的方法,能够根据发送方终端的电话号码和接收方终端的电话号码,生成目标密码,利用目标密码对短消息进行加密。与发送端终端利用公钥加密,接收方终端利用与公钥对应的私钥解密的现有技术相比,本发明实施例利用发送方终端的电话号码和接收方终端的电话号码,生成为短消息加密的目标密码,因为发送方终端的电话号码和接收方终端的电话号码是发送方终端和接收方终端的本地信息,不需要发送方终端和接收方终端进行商讨决定,从而省去了发送方终端与接收方终端协商花费的时间,减少了对短消息进行加密和解密的过程花费的时间。而且,在加密的待发送短消息中添加摘要内容,标识该短消息为加密的短消息,接收方终端可以根据接收的短消息是否具有摘要内容,判断是否需要对接收的短消息进行解密。The method for encrypting a short message provided by the embodiment of the present invention can generate a target password according to the phone number of the sender terminal and the phone number of the receiver terminal, and use the target password to encrypt the short message. Compared with the prior art in which the sending terminal uses the public key to encrypt and the receiving terminal uses the private key corresponding to the public key to decrypt, the embodiment of the present invention uses the phone number of the sending terminal and the phone number of the receiving terminal to generate a short The target password for message encryption, because the phone number of the sender's terminal and the phone number of the receiver's terminal are the local information of the sender's terminal and the receiver's terminal, there is no need for the sender's terminal and the receiver's terminal to discuss and decide, thus eliminating the need to send The time spent on negotiating between the receiving terminal and the receiving terminal is shortened, and the time spent on encrypting and decrypting the short message is reduced. Moreover, the digest content is added to the encrypted short message to be sent to identify the short message as an encrypted short message, and the receiver terminal can judge whether the received short message needs to be decrypted according to whether the received short message has digest content.

本发明实施例提供了一种短消息解密的方法,应用于接收方终端,如图4所示,包括:The embodiment of the present invention provides a method for decrypting a short message, which is applied to a receiving terminal, as shown in FIG. 4 , including:

201,获取第一号码和第二号码。201. Obtain a first number and a second number.

其中,第一号码为发送方终端的电话号码,第二号码为接收方终端的电话号码。接收方终端获取本身的电话号码和短消息对应的发送方终端的电话号码,电话号码的位数在此并不限定。Wherein, the first number is the phone number of the sending terminal, and the second number is the phone number of the receiving terminal. The receiver terminal acquires its own phone number and the phone number of the sender terminal corresponding to the short message, and the number of digits of the phone number is not limited here.

202,利用所述第一号码和所述第二号码,生成目标密码。202. Generate a target password by using the first number and the second number.

其中,接收方终端利用发送方终端和接收方终端的电话号码,通过对电话号码中的数字进行选取、组合、利用映射关系替换字符、以及借助各种密码表等技术手段,生成用于对接收的短消息进行解密的目标密码。Wherein, the receiver terminal uses the phone numbers of the sender terminal and the receiver terminal to generate a password for the receiver by selecting and combining numbers in the phone numbers, replacing characters with mapping relationships, and using various password tables and other technical means. The target password for decrypting the short message.

203,利用所述目标密码,对接收的短消息进行解密,并得到解密后的短消息。203. Decrypt the received short message by using the target password, and obtain the decrypted short message.

其中,接收方终端利用202中生成的目标密码,对接收的短消息进行解密,并得到解密后的短消息。Wherein, the receiver terminal decrypts the received short message by using the target password generated in 202, and obtains the decrypted short message.

本发明实施例提供的一种短消息解密的方法,能够根据发送方终端的电话号码和接收方终端的电话号码,生成目标密码,利用目标密码对加密的短消息进行解密。与发送端终端利用公钥加密,接收方终端利用与公钥对应的私钥解密的现有技术相比,本发明实施例利用发送方终端的电话号码和接收方终端的电话号码,生成用于对加密的短消息解密的目标密码,因为发送方终端的电话号码和接收方终端的电话号码是发送方终端和接收方终端的本地信息,不需要发送方终端和接收方终端进行商讨决定,从而省去了发送方终端与接收方终端协商花费的时间,减少了对短消息进行加密和解密的过程花费的时间。A short message decryption method provided by the embodiment of the present invention can generate a target password according to the phone number of the sender terminal and the phone number of the receiver terminal, and use the target password to decrypt the encrypted short message. Compared with the prior art in which the sending terminal uses the public key to encrypt and the receiving terminal uses the private key corresponding to the public key to decrypt, the embodiment of the present invention uses the phone number of the sending terminal and the phone number of the receiving terminal to generate an The target password for decrypting the encrypted short message, because the phone number of the sender's terminal and the phone number of the receiver's terminal are the local information of the sender's terminal and the receiver's terminal, there is no need for the sender's terminal and the receiver's terminal to discuss and decide, thus The time spent in negotiating between the sender terminal and the receiver terminal is saved, and the time spent in the process of encrypting and decrypting the short message is reduced.

进一步的,为了进一步保证对加密的短消息进行解密的安全,本发明实施例还提供了一种短消息解密的方法的具体方案,目标密码包括M个字符;本方案对图4所示的方案中的202的执行过程进一步细化,202可以具体实现为2021-2024,如图5所示,包括:Further, in order to further ensure the security of decrypting the encrypted short message, the embodiment of the present invention also provides a specific scheme of a method for decrypting a short message, wherein the target password includes M characters; this scheme is to the scheme shown in Figure 4 The execution process of 202 in 202 is further refined, and 202 can be specifically implemented as 2021-2024, as shown in Figure 5, including:

2021,选取所述第一号码中的M1个数字和所述第二号码中的M2个数字。2021. Select M1 digits in the first number and M2 digits in the second number.

其中,M1+M2=M,所述M1、M2、M均为整数。接收方终端在第一号码和第二号码中选取数字的具体内容参见1021中的具体内容,在此不再赘述。Wherein, M1+M2=M, and said M1, M2, and M are all integers. For the specific content of selecting numbers from the first number and the second number by the receiving terminal, refer to the specific content in step 1021, which will not be repeated here.

需要说明的是,接收方终端选取的第一号码的M1个数字和第二号码的M2个数字,与发送方终端选取的第一号码的M1个数字和第二号码的M2个数字是相同的。It should be noted that the M1 digits of the first number and the M2 digits of the second number selected by the receiving terminal are the same as the M1 digits of the first number and the M2 digits of the second number selected by the sending terminal .

2022,将选取的所述第一号码中的M1个数字和所述第二号码中的M2个数字组合,得到第一层密码。2022. Combine the selected M1 digits in the first number with the M2 digits in the second number to obtain a first-level password.

其中,接收方终端得到第一层密码的方法参见1022中的具体内容,在此不再赘述。Wherein, for the method for the receiver terminal to obtain the first-level password, refer to the specific content in step 1022, which will not be repeated here.

需要说明的是,接收方终端将第一号码的M1个数字和第二号码的M2个数字组合的方法,与发送方终端将第一号码的M1个数字和第二号码的M2个数字组合的方法是相同的。It should be noted that the method for the receiver terminal to combine the M1 digits of the first number with the M2 digits of the second number is the same as the method for the sender terminal to combine the M1 digits of the first number with the M2 digits of the second number. The method is the same.

2023,根据所述第一层密码与存储在所述接收方终端的共用映射关系,得到第二层密码。2023. Obtain a second layer password according to the shared mapping relationship between the first layer password and the receiver terminal.

其中,第二层密码由映射字符组成,共用映射关系包括第一号码中的数字与映射字符的映射关系,以及第二号码中的数字与映射字符的映射关系。接收方终端得到第二层密码的方法参见1023中的具体内容,在此不再赘述。Wherein, the second-level password is composed of mapped characters, and the common mapping relationship includes a mapping relationship between numbers in the first number and mapped characters, and a mapping relationship between numbers in the second number and mapped characters. For the method for the recipient terminal to obtain the second layer password, refer to the specific content in step 1023, which will not be repeated here.

需要说明的是,接收方终端存储的共用映射关系与发送方终端存储的共用映射关系相同。It should be noted that the common mapping relationship stored by the receiving terminal is the same as the common mapping relationship stored by the sending terminal.

2024,根据所述第二层密码、存储在所述接收方终端的共用密码表,以及预设的共用密钥,得到所述目标密码。2024. Obtain the target password according to the second layer password, the shared password table stored in the receiver terminal, and the preset shared key.

其中,共用密码表包括映射字符和共用密钥中的字符的组合与目标密码中的字符的对应关系。接收方终端得到目标的方法参见1024中的具体内容,在此不再赘述.Wherein, the common password table includes the correspondence between the combination of the mapped characters and the characters in the common key and the characters in the target password. For the method for the receiving terminal to obtain the target, refer to the specific content in 1024, which will not be repeated here.

需要说明的是,接收方终端存储的共用密码表与发送方终端存储的共用密码表相同,接收方终端预设的共用密钥与发送方终端预设的共用密钥相同。It should be noted that the common password table stored by the receiver terminal is the same as that stored by the sender terminal, and the shared key preset by the receiver terminal is the same as that preset by the sender terminal.

本发明实施例提供的一种短消息解密的方法,能够根据发送方终端的电话号码和接收方终端的电话号码,生成目标密码,利用目标密码对加密的短消息进行解密。与发送端终端利用公钥加密,接收方终端利用与公钥对应的私钥解密的现有技术相比,本发明实施例利用发送方终端的电话号码和接收方终端的电话号码,生成用于对加密的短消息解密的目标密码,因为发送方终端的电话号码和接收方终端的电话号码是发送方终端和接收方终端的本地信息,不需要发送方终端和接收方终端进行商讨决定,从而省去了发送方终端与接收方终端协商花费的时间,减少了对短消息进行加密和解密的过程花费的时间。具体的,根据第一号码和第二号码生成第一层密码,再将第一层密码转化为第二层密码,最后利用密码表将第二层密码转化为目标密码,使用密码表能够有效的对抗字频统计,提高破解密码的难度,进一步提高了密码的安全性,使得在解密过程中,接收方终端能够准确的对发送方终端加密的短消息进行解密。A short message decryption method provided by the embodiment of the present invention can generate a target password according to the phone number of the sender terminal and the phone number of the receiver terminal, and use the target password to decrypt the encrypted short message. Compared with the prior art in which the sending terminal uses the public key to encrypt and the receiving terminal uses the private key corresponding to the public key to decrypt, the embodiment of the present invention uses the phone number of the sending terminal and the phone number of the receiving terminal to generate an The target password for decrypting the encrypted short message, because the phone number of the sender's terminal and the phone number of the receiver's terminal are the local information of the sender's terminal and the receiver's terminal, there is no need for the sender's terminal and the receiver's terminal to discuss and decide, thus The time spent in negotiating between the sender terminal and the receiver terminal is saved, and the time spent in the process of encrypting and decrypting the short message is reduced. Specifically, generate the first-level password according to the first number and the second number, then convert the first-level password into the second-level password, and finally use the password table to convert the second-level password into the target password. Using the password table can effectively Counter word frequency statistics, increase the difficulty of cracking the password, and further improve the security of the password, so that in the decryption process, the receiving terminal can accurately decrypt the encrypted short message of the sending terminal.

此外,为了确定接收到的短消息是否为加密的短消息,本发明实施例还提供了一种短消息解密的方法的具体方案,本方案在对接收到的接收短消息进行解密之前增加了判断该短消息是否为加密的短消息的步骤,如图6所示,包括:In addition, in order to determine whether the received short message is an encrypted short message, the embodiment of the present invention also provides a specific scheme of a short message decryption method. This scheme adds a judgment before decrypting the received short message. Whether this short message is the step of the encrypted short message, as shown in Figure 6, comprises:

301,检测接收到的短消息是否包含摘要内容。301. Detect whether the received short message contains summary content.

其中,摘要内容指示接收到的短消息为加密后的短消息。摘要内容可以添加到接收的短消息的尾部,具体的,接收方终端可以检测接收的短消息的尾部是否具有摘要内容。Wherein, the summary content indicates that the received short message is an encrypted short message. The summary content can be added to the tail of the received short message. Specifically, the receiver terminal can detect whether the received short message has summary content at the tail.

302,若所述接收短消息包含摘要内容,则获取第一号码和第二号码。302. If the received short message includes summary content, acquire a first number and a second number.

其中,若接收的短消息包含摘要内容,表示该接收的短消息为加密的短消息,需要进行解密,才可以得到可阅读的短消息。Wherein, if the received short message contains digest content, it means that the received short message is an encrypted short message, which needs to be decrypted to obtain a readable short message.

若接收的短消息中不包含摘要内容,则表示该接收的短消息为不加密的短消息,不需要进行解密,可以按照打开普通短信的方式打开该接收的短消息,并阅读。If the received short message does not contain the summary content, it means that the received short message is an unencrypted short message and does not need to be decrypted. The received short message can be opened and read in the same way as an ordinary short message.

303,利用所述第一号码和所述第二号码,生成目标密码。303. Generate a target password by using the first number and the second number.

304,利用所述目标密码,对接收的短消息进行解密,并得到解密后的短消息。304. Decrypt the received short message by using the target password, and obtain the decrypted short message.

其中,302-304的具体内容参见201-203中的内容,在此不再赘述。Wherein, for the specific content of 302-304, refer to the content in 201-203, which will not be repeated here.

本发明实施例提供的一种短消息解密的方法,能够根据发送方终端的电话号码和接收方终端的电话号码,生成目标密码,利用目标密码对加密的短消息进行解密。与发送端终端利用公钥加密,接收方终端利用与公钥对应的私钥解密的现有技术相比,本发明实施例利用发送方终端的电话号码和接收方终端的电话号码,生成用于对加密的短消息解密的目标密码,因为发送方终端的电话号码和接收方终端的电话号码是发送方终端和接收方终端的本地信息,不需要发送方终端和接收方终端进行商讨决定,从而省去了发送方终端与接收方终端协商花费的时间,减少了对短消息进行加密和解密的过程花费的时间。而且,接收方终端可以根据接收的短消息是否具有摘要内容,判断是否需要对接收的短消息进行解密,从而在接收的短消息并未加密的情况下,不对该短消息进行解密,避免浪费解密所占用的资源。A short message decryption method provided by the embodiment of the present invention can generate a target password according to the phone number of the sender terminal and the phone number of the receiver terminal, and use the target password to decrypt the encrypted short message. Compared with the prior art in which the sending terminal uses the public key to encrypt and the receiving terminal uses the private key corresponding to the public key to decrypt, the embodiment of the present invention uses the phone number of the sending terminal and the phone number of the receiving terminal to generate an The target password for decrypting the encrypted short message, because the phone number of the sender's terminal and the phone number of the receiver's terminal are the local information of the sender's terminal and the receiver's terminal, there is no need for the sender's terminal and the receiver's terminal to discuss and decide, thus The time spent in negotiating between the sender terminal and the receiver terminal is saved, and the time spent in the process of encrypting and decrypting the short message is reduced. Moreover, the receiver terminal can judge whether the received short message needs to be decrypted according to whether the received short message has digest content, so that if the received short message is not encrypted, the short message is not decrypted to avoid wasteful decryption. resources used.

本发明实施例提供了一种短消息加密的装置400,如图7所示,包括:The embodiment of the present invention provides a short message encryption device 400, as shown in Figure 7, including:

第一获取模块401,用于获取第一号码和第二号码。The first obtaining module 401 is configured to obtain the first number and the second number.

其中,第一号码为发送方终端的电话号码,第二号码为接收方终端的电话号码。Wherein, the first number is the phone number of the sending terminal, and the second number is the phone number of the receiving terminal.

第一生成模块402,用于利用所述第一号码和所述第二号码,生成目标密码。The first generation module 402 is configured to use the first number and the second number to generate a target password.

加密模块403,用于利用所述目标密码,对待发送短消息进行加密。The encryption module 403 is configured to encrypt the short message to be sent by using the target password.

具体的,第一生成模块402,还用于选取所述第一号码中的M1个数字和所述第二号码中的M2个数字,其中,目标密码包括M个字符,M1+M2=M,所述M1、M2、M均为整数;将选取的所述第一号码中的M1个数字和所述第二号码中的M2个数字组合,得到第一层密码;根据所述第一层密码与存储在所述发送方终端的共用映射关系,得到第二层密码,所述第二层密码由映射字符组成,所述共用映射关系包括所述第一号码中的数字与所述映射字符的映射关系,以及所述第二号码中的数字与所述映射字符的映射关系;根据所述第二层密码、存储在所述发送方终端的共用密码表,以及预设的共用密钥,得到所述目标密码,所述共用密码表包括所述映射字符和所述共用密钥中的字符的组合与所述目标密码中的字符的对应关系。Specifically, the first generation module 402 is also used to select M1 numbers in the first number and M2 numbers in the second number, wherein the target password includes M characters, M1+M2=M, The M1, M2, and M are all integers; the selected M1 numbers in the first number and the M2 numbers in the second number are combined to obtain a first-level password; according to the first-level password and the shared mapping relationship stored in the sender terminal to obtain a second-level password, the second-level password is composed of mapped characters, and the shared mapping relationship includes the numbers in the first number and the mapped characters A mapping relationship, and a mapping relationship between the numbers in the second number and the mapped characters; according to the second layer password, the shared password table stored in the sender terminal, and the preset shared key, obtain For the target password, the common password table includes the correspondence between the combination of the mapped characters and the characters in the common key and the characters in the target password.

此外,加密模块403,还用于对所述加密的待发送短消息进行摘要,得到摘要内容;将所述摘要内容添加至所述加密的待发送短消息中。In addition, the encryption module 403 is also configured to digest the encrypted short message to be sent to obtain the digest content; add the digest content to the encrypted short message to be sent.

本发明实施例提供的一种短消息加密的装置,能够根据发送方终端的电话号码和接收方终端的电话号码,生成目标密码,利用目标密码对短消息进行加密。与发送端终端利用公钥加密,接收方终端利用与公钥对应的私钥解密的现有技术相比,本发明实施例利用发送方终端的电话号码和接收方终端的电话号码,生成为短消息加密的目标密码,因为发送方终端的电话号码和接收方终端的电话号码是发送方终端和接收方终端的本地信息,不需要发送方终端和接收方终端进行商讨决定,从而省去了发送方终端与接收方终端协商花费的时间,减少了对短消息进行加密和解密的过程花费的时间。具体的,根据第一号码和第二号码生成第一层密码,再将第一层密码转化为第二层密码,最后利用密码表将第二层密码转化为目标密码,使用密码表能够有效的对抗字频统计,提高破解密码的难度,进一步提高了密码的安全性。而且,在加密的待发送短消息中添加摘要内容,标识该短消息为加密的短消息,接收方终端可以根据接收的短消息是否具有摘要内容,判断是否需要对接收的短消息进行解密。The short message encryption device provided by the embodiment of the present invention can generate a target password according to the phone number of the sender terminal and the phone number of the receiver terminal, and use the target password to encrypt the short message. Compared with the prior art in which the sending terminal uses the public key to encrypt and the receiving terminal uses the private key corresponding to the public key to decrypt, the embodiment of the present invention uses the phone number of the sending terminal and the phone number of the receiving terminal to generate a short The target password for message encryption, because the phone number of the sender's terminal and the phone number of the receiver's terminal are the local information of the sender's terminal and the receiver's terminal, there is no need for the sender's terminal and the receiver's terminal to discuss and decide, thus eliminating the need to send The time spent on negotiating between the receiving terminal and the receiving terminal is shortened, and the time spent on encrypting and decrypting the short message is reduced. Specifically, generate the first-level password according to the first number and the second number, then convert the first-level password into the second-level password, and finally use the password table to convert the second-level password into the target password. Using the password table can effectively Fight against word frequency statistics, increase the difficulty of cracking passwords, and further improve the security of passwords. Moreover, the digest content is added to the encrypted short message to be sent to identify the short message as an encrypted short message, and the receiver terminal can judge whether the received short message needs to be decrypted according to whether the received short message has digest content.

本发明实施例提供了一种短消息解密的装置500,如图8所示,包括:The embodiment of the present invention provides a device 500 for decrypting short messages, as shown in FIG. 8 , including:

第二获取模块501,用于获取第一号码和第二号码。The second obtaining module 501 is configured to obtain the first number and the second number.

其中,第一号码为发送方终端的电话号码,第二号码为接收方终端的电话号码。Wherein, the first number is the phone number of the sending terminal, and the second number is the phone number of the receiving terminal.

第二生成模块502,用于利用所述第一号码和所述第二号码,生成目标密码。The second generation module 502 is configured to use the first number and the second number to generate a target password.

解密模块503,用于利用所述目标密码,对接收的短消息进行解密,并得到解密后的短消息。The decryption module 503 is configured to use the target password to decrypt the received short message, and obtain the decrypted short message.

具体的,第二生成模块502,还用于选取所述第一号码中的M1个数字和所述第二号码中的M2个数字,其中,M1+M2=M,所述M1、M2、M均为整数;将选取的所述第一号码中的M1个数字和所述第二号码中的M2个数字组合,得到第一层密码;根据所述第一层密码与存储在所述接收方终端的共用映射关系,得到第二层密码,所述第二层密码由映射字符组成,所述共用映射关系包括所述第一号码中的数字与所述映射字符的映射关系,以及所述第二号码中的数字与所述映射字符的映射关系;根据所述第二层密码、存储在所述接收方终端的共用密码表,以及预设的共用密钥,得到所述目标密码,所述共用密码表包括所述映射字符和所述共用密钥中的字符的组合与所述目标密码中的字符的对应关系。Specifically, the second generation module 502 is also used to select M1 numbers in the first number and M2 numbers in the second number, wherein, M1+M2=M, and the M1, M2, M are all integers; combine the M1 digits in the selected first number with the M2 digits in the second number to obtain a first-level password; according to the first-level password and stored in the receiver The common mapping relationship of the terminal is used to obtain the second-level password, the second-level password is composed of mapped characters, the common mapping relationship includes the mapping relationship between the numbers in the first number and the mapped characters, and the second The mapping relationship between the numbers in the second number and the mapped characters; according to the second layer password, the common password table stored in the receiver terminal, and the preset common key, the target password is obtained, and the The common password table includes correspondences between combinations of the mapped characters and characters in the common key and characters in the target password.

此外,解密模块503,还用于检测接收到的短消息是否包含摘要内容,所述摘要内容指示接收到的短消息为加密后的短消息;当接收到的短消息包含摘要内容时,对接收到的短消息进行解密流程。In addition, the decryption module 503 is also used to detect whether the received short message contains a summary content, and the summary content indicates that the received short message is an encrypted short message; when the received short message contains a summary content, the receiving The received short message is decrypted.

本发明实施例提供的一种短消息解密的装置,能够根据发送方终端的电话号码和接收方终端的电话号码,生成目标密码,利用目标密码对加密的短消息进行解密。与发送端终端利用公钥加密,接收方终端利用与公钥对应的私钥解密的现有技术相比,本发明实施例利用发送方终端的电话号码和接收方终端的电话号码,生成用于对加密的短消息解密的目标密码,因为发送方终端的电话号码和接收方终端的电话号码是发送方终端和接收方终端的本地信息,不需要发送方终端和接收方终端进行商讨决定,从而省去了发送方终端与接收方终端协商花费的时间,减少了对短消息进行加密和解密的过程花费的时间。具体的,根据第一号码和第二号码生成第一层密码,再将第一层密码转化为第二层密码,最后利用密码表将第二层密码转化为目标密码,使用密码表能够有效的对抗字频统计,提高破解密码的难度,进一步提高了密码的安全性,使得在解密过程中,接收方终端能够准确的对发送方终端加密的短消息进行解密。而且,接收方终端可以根据接收的短消息是否具有摘要内容,判断是否需要对接收的短消息进行解密,从而在接收的短消息并未加密的情况下,不对该短消息进行解密,避免浪费解密所占用的资源。An apparatus for decrypting a short message provided by an embodiment of the present invention can generate a target password according to the phone number of the sender terminal and the phone number of the receiver terminal, and use the target password to decrypt the encrypted short message. Compared with the prior art in which the sending terminal uses the public key to encrypt and the receiving terminal uses the private key corresponding to the public key to decrypt, the embodiment of the present invention uses the phone number of the sending terminal and the phone number of the receiving terminal to generate an The target password for decrypting the encrypted short message, because the phone number of the sender's terminal and the phone number of the receiver's terminal are the local information of the sender's terminal and the receiver's terminal, there is no need for the sender's terminal and the receiver's terminal to discuss and decide, thus The time spent in negotiating between the sender terminal and the receiver terminal is saved, and the time spent in the process of encrypting and decrypting the short message is reduced. Specifically, generate the first-level password according to the first number and the second number, then convert the first-level password into the second-level password, and finally use the password table to convert the second-level password into the target password. Using the password table can effectively Counter word frequency statistics, increase the difficulty of cracking the password, and further improve the security of the password, so that in the decryption process, the receiving terminal can accurately decrypt the encrypted short message of the sending terminal. Moreover, the receiver terminal can judge whether the received short message needs to be decrypted according to whether the received short message has digest content, so that if the received short message is not encrypted, the short message is not decrypted to avoid wasteful decryption. resources used.

本发明实施例还提供了一种终端,所述终端包括本发明实施例提供的短消息加密的装置400,具体内容参见上述实施例,在此不再赘述。The embodiment of the present invention also provides a terminal, and the terminal includes the device 400 for encrypting short messages provided by the embodiment of the present invention. For details, refer to the above-mentioned embodiments, which will not be repeated here.

本发明实施例还提供了一种终端,所述终端包括本发明实施例提供的短消息解密的装置500,具体内容参见上述实施例,在此不再赘述。The embodiment of the present invention also provides a terminal, and the terminal includes the device 500 for decrypting the short message provided by the embodiment of the present invention. For details, refer to the above-mentioned embodiments, which will not be repeated here.

本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于设备实施例而言,由于其基本相似于方法实施例,所以描述得比较简单,相关之处参见方法实施例的部分说明即可。Each embodiment in this specification is described in a progressive manner, the same and similar parts of each embodiment can be referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, for the device embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and for relevant parts, please refer to part of the description of the method embodiment.

本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的程序可存储于一计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,所述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)或随机存储记忆体(Random AccessMemory,RAM)等。Those of ordinary skill in the art can understand that all or part of the processes in the methods of the above embodiments can be implemented through computer programs to instruct related hardware, and the programs can be stored in a computer-readable storage medium. During execution, it may include the processes of the embodiments of the above-mentioned methods. Wherein, the storage medium may be a magnetic disk, an optical disk, a read-only memory (Read-Only Memory, ROM) or a random access memory (Random Access Memory, RAM) and the like.

以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到的变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应该以权利要求的保护范围为准。The above is only a specific embodiment of the present invention, but the scope of protection of the present invention is not limited thereto. Anyone skilled in the art can easily think of changes or substitutions within the technical scope disclosed in the present invention. All should be covered within the protection scope of the present invention. Therefore, the protection scope of the present invention should be determined by the protection scope of the claims.

Claims (8)

1.一种短消息加密的方法,其特征在于,包括:1. A method for short message encryption, characterized in that, comprising: 获取第一号码和第二号码,所述第一号码为发送方终端的电话号码,所述第二号码为接收方终端的电话号码;Obtaining a first number and a second number, the first number is the phone number of the sender terminal, and the second number is the phone number of the receiver terminal; 利用所述第一号码和所述第二号码,生成目标密码;using the first number and the second number to generate a target password; 利用所述目标密码,对待发送短消息进行加密;Utilize the target password to encrypt the short message to be sent; 其中,所述目标密码包括M个字符;所述利用所述第一号码和所述第二号码,生成目标密码,包括:Wherein, the target password includes M characters; the use of the first number and the second number to generate the target password includes: 选取所述第一号码中的M1个数字和所述第二号码中的M2个数字,其中,M1+M2=M,所述M1、M2、M均为整数;Select M1 numbers in the first number and M2 numbers in the second number, where M1+M2=M, and M1, M2, and M are all integers; 将选取的所述第一号码中的M1个数字和所述第二号码中的M2个数字组合,得到第一层密码;Combining the selected M1 digits in the first number with the M2 digits in the second number to obtain a first-level password; 根据所述第一层密码与存储在所述发送方终端的共用映射关系,得到第二层密码,所述第二层密码由映射字符组成,所述共用映射关系包括所述第一号码中的数字与所述映射字符的映射关系,以及所述第二号码中的数字与所述映射字符的映射关系;According to the shared mapping relationship between the first-level password and stored in the sender terminal, a second-level password is obtained, the second-level password is composed of mapped characters, and the shared mapping relationship includes the characters in the first number a mapping relationship between numbers and the mapped characters, and a mapping relationship between numbers in the second number and the mapped characters; 根据所述第二层密码、存储在所述发送方终端的共用密码表,以及预设的共用密钥,得到所述目标密码,所述共用密码表包括所述映射字符和所述共用密钥中的字符的组合与所述目标密码中的字符的对应关系。Obtain the target password according to the second layer password, the shared password table stored in the sender terminal, and the preset shared key, the shared password table includes the mapped characters and the shared key The correspondence between the combinations of characters in and the characters in the target password. 2.根据权利要求1所述的方法,其特征在于,在所述利用所述目标密码,对待发送短消息进行加密之后,还包括:2. The method according to claim 1, characterized in that, after said utilizing said target password to encrypt the short message to be sent, further comprising: 对所述加密的待发送短消息进行摘要,得到摘要内容;Digesting the encrypted short message to be sent to obtain the digest content; 将所述摘要内容添加至所述加密的待发送短消息中。Add the summary content to the encrypted short message to be sent. 3.一种短消息解密的方法,其特征在于,包括:3. A method for decrypting a short message, comprising: 获取第一号码和第二号码,所述第一号码为发送方终端的电话号码,所述第二号码为接收方终端的电话号码;Obtaining a first number and a second number, the first number is the phone number of the sender terminal, and the second number is the phone number of the receiver terminal; 利用所述第一号码和所述第二号码,生成目标密码;using the first number and the second number to generate a target password; 利用所述目标密码,对接收的短消息进行解密,并得到解密后的短消息;Utilize the target password to decrypt the received short message, and obtain the decrypted short message; 其中,所述目标密码包括M个字符;所述利用所述第一号码和第二号码,生成目标密码,包括:Wherein, the target password includes M characters; the use of the first number and the second number to generate the target password includes: 选取所述第一号码中的M1个数字和所述第二号码中的M2个数字,其中,M1+M2=M,所述M1、M2、M均为整数;Select M1 numbers in the first number and M2 numbers in the second number, where M1+M2=M, and M1, M2, and M are all integers; 将选取的所述第一号码中的M1个数字和所述第二号码中的M2个数字组合,得到第一层密码;Combining the selected M1 digits in the first number with the M2 digits in the second number to obtain a first-level password; 根据所述第一层密码与存储在所述接收方终端的共用映射关系,得到第二层密码,所述第二层密码由映射字符组成,所述共用映射关系包括所述第一号码中的数字与所述映射字符的映射关系,以及所述第二号码中的数字与所述映射字符的映射关系;According to the common mapping relationship between the first-level password and the receiver terminal, a second-level password is obtained, the second-level password is composed of mapped characters, and the common mapping relationship includes the characters in the first number a mapping relationship between numbers and the mapped characters, and a mapping relationship between numbers in the second number and the mapped characters; 根据所述第二层密码、存储在所述接收方终端的共用密码表,以及预设的共用密钥,得到所述目标密码,所述共用密码表包括所述映射字符和所述共用密钥中的字符的组合与所述目标密码中的字符的对应关系。Obtain the target password according to the second-level password, a shared password table stored in the receiver terminal, and a preset shared key, the shared password table including the mapped characters and the shared key The correspondence between the combinations of characters in and the characters in the target password. 4.根据权利要求3所述的方法,其特征在于,在所述获取第一号码和第二号码之前,还包括:4. The method according to claim 3, further comprising: before said acquiring the first number and the second number: 检测接收到的短消息是否包含摘要内容,所述摘要内容指示接收到的短消息为加密后的短消息;Detecting whether the received short message contains summary content, the summary content indicates that the received short message is an encrypted short message; 若接收到的短消息包含摘要内容,则对接收到的短消息进行解密流程。If the received short message contains digest content, the decryption process is performed on the received short message. 5.一种短消息加密的装置,其特征在于,包括:5. A device for encrypting short messages, characterized in that it comprises: 第一获取模块,用于获取第一号码和第二号码,所述第一号码为发送方终端的电话号码,所述第二号码为接收方终端的电话号码;A first obtaining module, configured to obtain a first number and a second number, the first number is the phone number of the sender terminal, and the second number is the phone number of the receiver terminal; 第一生成模块,用于利用所述第一号码和所述第二号码,生成目标密码;A first generating module, configured to generate a target password by using the first number and the second number; 加密模块,用于利用所述目标密码,对待发送短消息进行加密,An encryption module, configured to encrypt the short message to be sent by using the target password, 所述第一生成模块,还用于选取所述第一号码中的M1个数字和所述第二号码中的M2个数字,其中,所述目标密码包括M个字符,M1+M2=M,所述M1、M2、M均为整数;将选取的所述第一号码中的M1个数字和所述第二号码中的M2个数字组合,得到第一层密码;根据所述第一层密码与存储在所述发送方终端的共用映射关系,得到第二层密码,所述第二层密码由映射字符组成,所述共用映射关系包括所述第一号码中的数字与所述映射字符的映射关系,以及所述第二号码中的数字与所述映射字符的映射关系;根据所述第二层密码、存储在所述发送方终端的共用密码表,以及预设的共用密钥,得到所述目标密码,所述共用密码表包括所述映射字符和所述共用密钥中的字符的组合与所述目标密码中的字符的对应关系。The first generation module is also used to select M1 numbers in the first number and M2 numbers in the second number, wherein the target password includes M characters, M1+M2=M, The M1, M2, and M are all integers; the selected M1 numbers in the first number and the M2 numbers in the second number are combined to obtain a first-level password; according to the first-level password and the shared mapping relationship stored in the sender terminal to obtain a second-level password, the second-level password is composed of mapped characters, and the shared mapping relationship includes the numbers in the first number and the mapped characters A mapping relationship, and a mapping relationship between the numbers in the second number and the mapped characters; according to the second layer password, the shared password table stored in the sender terminal, and the preset shared key, obtain For the target password, the common password table includes the correspondence between the combination of the mapped characters and the characters in the common key and the characters in the target password. 6.一种短消息解密的装置,其特征在于,包括:6. A device for decrypting short messages, characterized in that it comprises: 第二获取模块,用于获取第一号码和第二号码,所述第一号码为发送方终端的电话号码,所述第二号码为接收方终端的电话号码;The second obtaining module is used to obtain a first number and a second number, the first number is the phone number of the sender terminal, and the second number is the phone number of the receiver terminal; 第二生成模块,用于利用所述第一号码和所述第二号码,生成目标密码;A second generating module, configured to generate a target password by using the first number and the second number; 解密模块,用于利用所述目标密码,对接收的短消息进行解密,并得到解密后的短消息,The decryption module is used to decrypt the received short message by using the target password, and obtain the decrypted short message, 所述第二生成模块,还用于选取所述第一号码中的M1个数字和所述第二号码中的M2个数字,其中,所述目标密码包括M个字符,M1+M2=M,所述M1、M2、M均为整数;将选取的所述第一号码中的M1个数字和所述第二号码中的M2个数字组合,得到第一层密码;根据所述第一层密码与存储在所述接收方终端的共用映射关系,得到第二层密码,所述第二层密码由映射字符组成,所述共用映射关系包括所述第一号码中的数字与所述映射字符的映射关系,以及所述第二号码中的数字与所述映射字符的映射关系;根据所述第二层密码、存储在所述接收方终端的共用密码表,以及预设的共用密钥,得到所述目标密码,所述共用密码表包括所述映射字符和所述共用密钥中的字符的组合与所述目标密码中的字符的对应关系。The second generating module is also used to select M1 numbers in the first number and M2 numbers in the second number, wherein the target password includes M characters, M1+M2=M, The M1, M2, and M are all integers; the selected M1 numbers in the first number and the M2 numbers in the second number are combined to obtain a first-level password; according to the first-level password and the shared mapping relationship stored in the receiving terminal to obtain a second-level password, the second-level password is composed of mapped characters, and the shared mapping relationship includes the numbers in the first number and the mapped characters A mapping relationship, and a mapping relationship between numbers in the second number and the mapped characters; according to the second layer password, the shared password table stored in the receiver terminal, and the preset shared key, obtain For the target password, the common password table includes the correspondence between the combination of the mapped characters and the characters in the common key and the characters in the target password. 7.一种终端,其特征在于,所述终端包括权利要求5所述的装置。7. A terminal, characterized in that the terminal comprises the device according to claim 5. 8.一种终端,其特征在于,所述终端包括权利要求6所述的装置。8. A terminal, characterized in that the terminal comprises the device according to claim 6.
CN201410698970.3A 2014-11-27 2014-11-27 A kind of method, apparatus and terminal of short message Encrypt and Decrypt Active CN104363584B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410698970.3A CN104363584B (en) 2014-11-27 2014-11-27 A kind of method, apparatus and terminal of short message Encrypt and Decrypt

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410698970.3A CN104363584B (en) 2014-11-27 2014-11-27 A kind of method, apparatus and terminal of short message Encrypt and Decrypt

Publications (2)

Publication Number Publication Date
CN104363584A CN104363584A (en) 2015-02-18
CN104363584B true CN104363584B (en) 2018-06-15

Family

ID=52530795

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410698970.3A Active CN104363584B (en) 2014-11-27 2014-11-27 A kind of method, apparatus and terminal of short message Encrypt and Decrypt

Country Status (1)

Country Link
CN (1) CN104363584B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106844288B (en) * 2015-12-07 2022-03-22 创新先进技术有限公司 Random character string generation method and device
CN106535144A (en) * 2016-10-27 2017-03-22 珠海格力电器股份有限公司 Method and terminal for sending encrypted short message

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101626567A (en) * 2009-06-29 2010-01-13 深圳华为通信技术有限公司 Short message sending and receiving method, short message sending and receiving device and mobile terminal
CN101854594A (en) * 2009-04-03 2010-10-06 北京航空航天大学 Information sending method and device and information receiving method and device
CN102523565A (en) * 2011-11-23 2012-06-27 宇龙计算机通信科技(深圳)有限公司 Method, system and mobile communication terminal for encrypting and decrypting message data safely
CN102905238A (en) * 2012-09-11 2013-01-30 中国科学院信息工程研究所 Method and device for generating short messages containing control commands, analysis method and device
CN103458382A (en) * 2013-05-22 2013-12-18 深圳市中易通网络技术有限公司 Hardware encryption transmission and storage method and system of mobile phone private short messages
CN103795524A (en) * 2014-01-24 2014-05-14 闻泰通讯股份有限公司 Dynamic short message encryption and decryption method based on 3DES

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050232422A1 (en) * 2004-04-19 2005-10-20 Jingdong Lin GSM (Global System for Mobile communication) handset with carrier independent personal encryption

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101854594A (en) * 2009-04-03 2010-10-06 北京航空航天大学 Information sending method and device and information receiving method and device
CN101626567A (en) * 2009-06-29 2010-01-13 深圳华为通信技术有限公司 Short message sending and receiving method, short message sending and receiving device and mobile terminal
CN102523565A (en) * 2011-11-23 2012-06-27 宇龙计算机通信科技(深圳)有限公司 Method, system and mobile communication terminal for encrypting and decrypting message data safely
CN102905238A (en) * 2012-09-11 2013-01-30 中国科学院信息工程研究所 Method and device for generating short messages containing control commands, analysis method and device
CN103458382A (en) * 2013-05-22 2013-12-18 深圳市中易通网络技术有限公司 Hardware encryption transmission and storage method and system of mobile phone private short messages
CN103795524A (en) * 2014-01-24 2014-05-14 闻泰通讯股份有限公司 Dynamic short message encryption and decryption method based on 3DES

Also Published As

Publication number Publication date
CN104363584A (en) 2015-02-18

Similar Documents

Publication Publication Date Title
CN111079128B (en) Data processing method and device, electronic equipment and storage medium
CN107770182B (en) Data storage method of home gateway and home gateway
CN107086915B (en) Data transmission method, data sending end and data receiving end
WO2017097041A1 (en) Data transmission method and device
US8694467B2 (en) Random number based data integrity verification method and system for distributed cloud storage
EP3324572A1 (en) Information transmission method and mobile device
US20140195804A1 (en) Techniques for secure data exchange
KR102304831B1 (en) Encryption systems and method using permutaion group based cryptographic techniques
CN113572743B (en) Data encryption and decryption methods and devices, computer equipment and storage medium
CN104468095A (en) Data transmission method and device
CN105577379A (en) An information processing method and device
CN112866237A (en) Data communication method, device, equipment and storage medium
WO2017016447A1 (en) Two-dimensional code mask encryption and decryption method and system
CN105760764A (en) Encryption and decryption methods and devices for embedded storage device file and terminal
CN103414682A (en) Method for cloud storage of data and system
CN109274644A (en) Data processing method, terminal and watermark server
JP2009531728A (en) Encryption methods for highest security applications
CN104717056A (en) Two-dimensional code encryption and decryption method and encryption and decryption device
CN109474616B (en) Multi-platform data sharing method and device and computer readable storage medium
CN111131158A (en) Single byte symmetric encryption and decryption method, device and readable medium
CN105721505A (en) Data secure transmission method, device and system
CN111988325B (en) Transaction information processing system, method, apparatus, computer device and storage medium
CN107425959A (en) A kind of method for realizing encryption, system, client and service end
CN110069906A (en) A kind of encryption and decryption method and its device of electronic document
Somaiya et al. Implementation and evaluation of EMAES–A hybrid encryption algorithm for sharing multimedia files with more security and speed

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20250527

Address after: 100020 Room 202, 2nd Floor, Building 2, No. 15 Guanghua Road Community, Chaoyang District, Beijing

Patentee after: Beijing Green Seed Technology Co.,Ltd.

Country or region after: China

Address before: 518040 Guangdong city in Shenzhen Province, Futian District Tian An Digital City, the innovation and Technology Square, B block 807-809 room

Patentee before: YULONG COMPUTER TELECOMMUNICATION SCIENTIFIC (SHENZHEN) Co.,Ltd.

Country or region before: China