[go: up one dir, main page]

CN117155601B - Calling method, device, electronic device and storage medium - Google Patents

Calling method, device, electronic device and storage medium Download PDF

Info

Publication number
CN117155601B
CN117155601B CN202310873231.2A CN202310873231A CN117155601B CN 117155601 B CN117155601 B CN 117155601B CN 202310873231 A CN202310873231 A CN 202310873231A CN 117155601 B CN117155601 B CN 117155601B
Authority
CN
China
Prior art keywords
flash message
signature
ciphertext
private key
text
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310873231.2A
Other languages
Chinese (zh)
Other versions
CN117155601A (en
Inventor
庄严
杨汉坤
蒋周良
吕宁
龙晓泉
孙宝寅
彭近
尧平
蔡发辉
林标强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Internet Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Internet Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Internet Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN202310873231.2A priority Critical patent/CN117155601B/en
Publication of CN117155601A publication Critical patent/CN117155601A/en
Application granted granted Critical
Publication of CN117155601B publication Critical patent/CN117155601B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Storage Device Security (AREA)

Abstract

本公开提出了一种呼叫方法、装置、电子设备及存储介质,涉及通信安全技术领域,该方法包括:获取主叫用户信息,并基于主叫用户信息生成呼叫闪信;响应于识别到基于呼叫闪信进行加V呼叫请求,生成第一公钥、第一私钥、第二公钥和第二私钥,并将呼叫闪信随机划分为预设段数的闪信文本;通过同态加密法对闪信文本进行第一加密,以生成闪信密文;基于第一公钥对闪信密文进行第二加密,以生成签名文本段,将签名文本段、闪信密文、第一私钥、第二公钥和第二私钥通过加V呼叫发送给云端服务器。通过将闪信划分为多个闪信文本进行加密传输,可以提高加密的复杂度,同时这种采用加密传输与数字签名验证的方式,提高闪信传递的保密性。

The present disclosure proposes a calling method, device, electronic device and storage medium, which relates to the field of communication security technology. The method includes: obtaining calling user information, and generating a call flash message based on the calling user information; in response to identifying a V call request based on the call flash message, generating a first public key, a first private key, a second public key and a second private key, and randomly dividing the call flash message into a preset number of flash message texts; performing a first encryption on the flash message text by homomorphic encryption to generate a flash message ciphertext; performing a second encryption on the flash message ciphertext based on the first public key to generate a signature text segment, and sending the signature text segment, the flash message ciphertext, the first private key, the second public key and the second private key to a cloud server through a V call. By dividing the flash message into multiple flash message texts for encrypted transmission, the complexity of encryption can be increased. At the same time, this method of using encrypted transmission and digital signature verification can improve the confidentiality of flash message transmission.

Description

呼叫方法、装置、电子设备及存储介质Calling method, device, electronic device and storage medium

技术领域Technical Field

本公开涉及通信安全技术领域,尤其涉及一种呼叫方法、装置、电子设备及存储介质。The present disclosure relates to the field of communication security technology, and in particular to a calling method, device, electronic device and storage medium.

背景技术Background technique

随着移动终端的普及和互联技术的发展,各种广告、中介电话及诈骗电话越来越干扰用户生活,目前普遍使用的技术是运营商提供的来电显示功能,但是对于陌生来电无法识别,其次,虽有些运营商会为用户提供被叫或主叫信息,但该些信息的展示内容以及弹出/展示时长均不够智能,另外,由于提示的信息中存在用户大量的隐私信息,因此,该些信息在传输过程中的安全性,也是不可忽视的问题之一。With the popularization of mobile terminals and the development of Internet technology, various advertisements, intermediary calls and fraudulent calls are increasingly interfering with users' lives. The commonly used technology at present is the caller ID function provided by operators, but it cannot identify unfamiliar calls. Secondly, although some operators will provide users with called or calling information, the display content and pop-up/display duration of such information are not smart enough. In addition, since a large amount of user privacy information exists in the prompted information, the security of such information during transmission is also one of the issues that cannot be ignored.

发明内容Summary of the invention

本公开旨在至少在一定程度上解决相关技术中的技术问题之一。The present disclosure aims to solve one of the technical problems in the related art at least to some extent.

为此,本公开的一个目的在于提出一种呼叫方法,应用于主叫客户端。To this end, an object of the present disclosure is to provide a calling method, which is applied to a calling client.

本公开的第二个目的在于提出一种呼叫方法,应用于云端服务器。The second objective of the present disclosure is to provide a calling method applied to a cloud server.

本公开的第三个目的在于提出一种呼叫方法,应用于被叫客户端。The third object of the present disclosure is to provide a calling method, which is applied to a called client.

本公开的第四个目的在于提出一种呼叫装置,应用于主叫客户端。The fourth objective of the present disclosure is to provide a calling device, which is applied to a calling client.

本公开的第五个目的在于提出一种呼叫装置,应用于云端服务器。The fifth objective of the present disclosure is to provide a calling device for application in a cloud server.

本公开的第六个目的在于提出一种呼叫装置,应用于被叫客户端。The sixth objective of the present disclosure is to provide a calling device, which is applied to a called client.

本公开的第七个目的在于提出一种电子设备。A seventh objective of the present disclosure is to provide an electronic device.

本公开的第八个目的在于提出一种非瞬时计算机可读存储介质。An eighth object of the present disclosure is to provide a non-transitory computer-readable storage medium.

本公开的第九个目的在于提出一种计算机程序产品。A ninth objective of the present disclosure is to provide a computer program product.

为达上述目的,本公开第一方面实施方式提出了一种呼叫方法,应用于主叫客户端,包括:获取主叫用户信息,并基于所述主叫用户信息生成呼叫闪信;响应于识别到基于所述呼叫闪信进行加V呼叫请求,生成第一公钥、第一私钥、第二公钥和第二私钥,并将所述呼叫闪信随机划分为预设段数的闪信文本;通过同态加密法对所述闪信文本进行第一加密,以生成闪信密文;基于所述第一公钥对所述闪信密文进行第二加密,以生成签名文本段,将所述签名文本段、所述闪信密文、所述第一私钥、所述第二公钥和所述第二私钥通过加V呼叫发送给云端服务器。To achieve the above-mentioned purpose, the first aspect of the present disclosure proposes a calling method, which is applied to a calling client, including: obtaining calling user information and generating a call flash message based on the calling user information; in response to identifying a request for a V call based on the call flash message, generating a first public key, a first private key, a second public key and a second private key, and randomly dividing the call flash message into a preset number of flash message text segments; performing a first encryption on the flash message text by homomorphic encryption to generate a flash message ciphertext; performing a second encryption on the flash message ciphertext based on the first public key to generate a signature text segment, and sending the signature text segment, the flash message ciphertext, the first private key, the second public key and the second private key to a cloud server via a V call.

根据本公开的一个实施方式,生成所述第一公钥和所述第一私钥,包括:随机获取两个不相同的第一质数和第二质数,以及随机获取两个互质的第一互质数和第二互质数,并获取随机长度的随机矩阵;基于所述第一质数、所述第二质数、所述第一互质数、所述第二互质数、所述随机长度和所述随机矩阵,组建所述第一公钥;基于所述第一质数,组建所述第一私钥。According to one embodiment of the present disclosure, generating the first public key and the first private key includes: randomly obtaining two different first prime numbers and second prime numbers, and randomly obtaining two mutually prime first and second mutually prime numbers, and obtaining a random matrix of random length; constructing the first public key based on the first prime number, the second prime number, the first mutually prime number, the second mutually prime number, the random length and the random matrix; and constructing the first private key based on the first prime number.

根据本公开的一个实施方式,所述基于所述第一质数、所述第二质数、所述第一互质数、所述第二互质数、所述随机长度和所述随机矩阵,组建所述第一公钥,包括:基于所述第二互质数和所述第二质数生成第一元素,以及将所述第一质数和所述第二质数的乘积作为第二元素;基于所述第一元素、所述第二元素、所述随机长度和所述随机矩阵和所述第一互质数,组建所述第一公钥。According to one embodiment of the present disclosure, the forming of the first public key based on the first prime number, the second prime number, the first coprime number, the second coprime number, the random length and the random matrix includes: generating a first element based on the second coprime number and the second prime number, and taking the product of the first prime number and the second prime number as the second element; forming the first public key based on the first element, the second element, the random length, the random matrix and the first coprime number.

根据本公开的一个实施方式,所述通过同态加密法对所述闪信文本进行第一加密,以生成闪信密文,包括:对所有闪信文本分别分配第一机密参数,其中,所述第一机密参数为随机的正整数;针对任一闪信文本,基于所述第一质数和所述闪信文本对应的第一机密参数,确定所述闪信文本的第二机密参数;基于所述第一机密参数和所述第二机密参数对所述闪信文本进行加密,以生成所述闪信密文。According to one embodiment of the present disclosure, the flash message text is first encrypted by homomorphic encryption to generate flash message ciphertext, including: assigning a first confidential parameter to all flash message texts respectively, wherein the first confidential parameter is a random positive integer; for any flash message text, based on the first prime number and the first confidential parameter corresponding to the flash message text, determining the second confidential parameter of the flash message text; and encrypting the flash message text based on the first confidential parameter and the second confidential parameter to generate the flash message ciphertext.

根据本公开的一个实施方式,所述基于所述第一质数和所述闪信文本对应的第一机密参数,确定所述闪信文本的第二机密参数,包括:将1与所述第一质数相除的余数与,所有第一机密参数的和进行相除,并将商作为所述闪信文本的第二机密参数。According to one embodiment of the present disclosure, determining the second confidential parameter of the flash message text based on the first prime number and the first confidential parameter corresponding to the flash message text includes: dividing the remainder of 1 and the first prime number by the sum of all the first confidential parameters, and taking the quotient as the second confidential parameter of the flash message text.

根据本公开的一个实施方式,所述基于所述第一机密参数和所述第二机密参数对所述闪信文本进行加密,包括:基于所述第一元素、所述第一互质数、所述第一机密参数、所述第二机密参数对所述闪信文本进行加密。According to one embodiment of the present disclosure, encrypting the flash message text based on the first confidential parameter and the second confidential parameter includes: encrypting the flash message text based on the first element, the first coprime number, the first confidential parameter, and the second confidential parameter.

根据本公开的一个实施方式,所述基于所述第一公钥对所述闪信密文进行第二加密,以生成签名文本段,包括:针对任一闪信密文,对所述闪信密文分配时间戳;基于所述时间戳、所述第一公钥和所述闪信密文,生成签名文本段。According to one embodiment of the present disclosure, the second encryption of the flash message ciphertext based on the first public key to generate a signature text segment includes: for any flash message ciphertext, assigning a timestamp to the flash message ciphertext; generating a signature text segment based on the timestamp, the first public key and the flash message ciphertext.

根据本公开的一个实施方式,所述基于所述时间戳、所述第一公钥和所述闪信密文,生成签名文本段,包括:对所述时间戳和所述闪信密文进行哈希运算,并将运算结果与所述第一公钥相乘,以生成所述签名文本段。According to one embodiment of the present disclosure, generating a signature text segment based on the timestamp, the first public key and the flash message ciphertext includes: performing a hash operation on the timestamp and the flash message ciphertext, and multiplying the operation result with the first public key to generate the signature text segment.

根据本公开的一个实施方式,生成所述第二公钥和所述第二私钥,包括:随机获取两个不相同的第三质数和第四质数,以及随机获取两个互质的第三互质数和第四互质数,并获取随机长度的随机矩阵;基于所述第三质数、所述第四质数、所述第三互质数、所述第四互质数、所述随机长度和所述随机矩阵,组建所述第二公钥;基于所述第三质数,组建所述第二私钥。According to one embodiment of the present disclosure, generating the second public key and the second private key includes: randomly obtaining two different third prime numbers and fourth prime numbers, and randomly obtaining two third coprime numbers and fourth coprime numbers that are mutually prime, and obtaining a random matrix of random length; constructing the second public key based on the third prime number, the fourth prime number, the third coprime number, the fourth coprime number, the random length and the random matrix; and constructing the second private key based on the third prime number.

根据本公开的一个实施方式,所述获取主叫用户信息,还包括:检测主叫用户是否已经注册;响应于检测到注册信息,基于所述注册信息确定所述主叫用户信息。According to an embodiment of the present disclosure, the acquiring of the calling user information further includes: detecting whether the calling user has been registered; and in response to detecting the registration information, determining the calling user information based on the registration information.

根据本公开的一个实施方式,所述方法还包括:响应于未检测到注册信息,生成提示信息,所示提示信息用于提醒所述主叫用户进行注册。According to an embodiment of the present disclosure, the method further includes: in response to failure to detect registration information, generating prompt information, wherein the prompt information is used to remind the calling user to register.

为达上述目的,本公开第二方面实施方式提出了一种呼叫方法,应用于云端服务器,包括:检测到主叫客户端发送的加V呼叫,获取所述加V呼叫中的签名文本段、闪信密文、第一私钥、第二公钥和第二私钥;基于所述第一私钥、所述闪信密文对所述签名文本段进行签名认证;基于认证结果对所述闪信密文进行重新排列,以获取目标闪信密文;基于所述第二公钥对所述目标闪信密文进行加密,以生成闪信全文签名,并将所述闪信全文签名、所述第二私钥和所述目标闪信密文发送给被叫客户端。To achieve the above-mentioned purpose, the second aspect of the present disclosure proposes a calling method, which is applied to a cloud server, including: detecting a V-call sent by a calling client, obtaining a signature text segment, a flash message ciphertext, a first private key, a second public key, and a second private key in the V-call; performing signature authentication on the signature text segment based on the first private key and the flash message ciphertext; rearranging the flash message ciphertext based on the authentication result to obtain a target flash message ciphertext; encrypting the target flash message ciphertext based on the second public key to generate a flash message full-text signature, and sending the flash message full-text signature, the second private key, and the target flash message ciphertext to the called client.

根据本公开的一个实施方式,所述基于所述第一私钥、所述闪信密文对所述签名文本段进行签名认证,包括:基于所述第一私钥对所述闪信密文进行解码,以获取解码文本段;将所述解码文本段与对应签名文本段进行匹配,即进行签名认证。According to one embodiment of the present disclosure, the signature authentication of the signature text segment based on the first private key and the flash message ciphertext includes: decoding the flash message ciphertext based on the first private key to obtain a decoded text segment; matching the decoded text segment with the corresponding signature text segment, that is, performing signature authentication.

根据本公开的一个实施方式,所述基于所述第一私钥对所述闪信密文进行解码,以获取解码文本段,包括:获取所述闪信密文的时间戳;对所述时间戳和所述闪信密文进行哈希运算,并将运算结果与所述第一私钥相乘,以获取所述解码文本段。According to one embodiment of the present disclosure, decoding the flash message ciphertext based on the first private key to obtain a decoded text segment includes: obtaining the timestamp of the flash message ciphertext; performing a hash operation on the timestamp and the flash message ciphertext, and multiplying the operation result with the first private key to obtain the decoded text segment.

根据本公开的一个实施方式,所述基于认证结果对所述闪信密文进行重新排列,以获取目标闪信密文,包括:将所述认证结果为验证通过的所述签名文本段对应的候选闪信密文,按照所述时间戳的顺序进行排列组合,以生成所述目标闪信密文。According to one embodiment of the present disclosure, the flash message ciphertext is rearranged based on the authentication result to obtain the target flash message ciphertext, including: the candidate flash message ciphertext corresponding to the signature text segment whose authentication result is verified is arranged and combined in the order of the timestamps to generate the target flash message ciphertext.

根据本公开的一个实施方式,所述将所述认证结果为验证通过的所述签名文本段对应的候选闪信密文,按照所述时间戳的顺序进行排列组合,包括:判断当前通信网络环境是否安全;响应于所述当前通信网络环境安全,基于第一组合方式对所述候选闪信密文按照所述时间戳的顺序进行排列组合;响应于所述当前通信网络环境不安全,基于第二组合方式对所述候选闪信密文按照所述时间戳的顺序进行排列组合。According to one embodiment of the present disclosure, the candidate flash message ciphertexts corresponding to the signature text segment with the authentication result of passed verification are arranged and combined in the order of the timestamps, including: judging whether the current communication network environment is safe; in response to the current communication network environment being safe, the candidate flash message ciphertexts are arranged and combined in the order of the timestamps based on a first combination method; in response to the current communication network environment being unsafe, the candidate flash message ciphertexts are arranged and combined in the order of the timestamps based on a second combination method.

为达上述目的,本公开第三方面实施方式提出了一种呼叫方法,应用于被叫客户端,包括:检测到主叫云端服务器发送的加V呼叫,获取所述加V呼叫中的闪信全文签名、第二私钥和目标闪信密文;基于所述第二私钥和所述闪信全文签名对所述目标闪信密文进行签名认证;响应于签名认证通过,对所述目标闪信密文进行解密,以生成闪信,并对所述闪信进行展示。To achieve the above-mentioned purpose, the third aspect of the present disclosure proposes a calling method, which is applied to the called client, including: detecting a V-call sent by the calling cloud server, obtaining the full-text signature of the flash message, the second private key and the target flash message ciphertext in the V-call; performing signature authentication on the target flash message ciphertext based on the second private key and the full-text signature of the flash message; in response to the signature authentication being passed, decrypting the target flash message ciphertext to generate a flash message, and displaying the flash message.

根据本公开的一个实施方式,所述基于所述第二私钥和所述闪信全文签名对所述目标闪信密文进行签名认证,包括:基于所述第二私钥对所述目标闪信密文进行解码,以获取目标闪信密文签名;将所述目标闪信密文签名与所述闪信全文签名进行匹配,即进行签名认证。According to one embodiment of the present disclosure, the signature authentication of the target flash message ciphertext based on the second private key and the full-text signature of the flash message includes: decoding the target flash message ciphertext based on the second private key to obtain the target flash message ciphertext signature; matching the target flash message ciphertext signature with the full-text signature of the flash message, i.e., performing signature authentication.

根据本公开的一个实施方式,所述方法还包括:获取用户基于所述闪信生成的操作指令;基于所述操作指令生成反馈信息,并发送给所述云端服务器。According to an embodiment of the present disclosure, the method further includes: obtaining an operation instruction generated by the user based on the flash message; generating feedback information based on the operation instruction, and sending it to the cloud server.

为达上述目的,本公开第四方面实施例提出了一种呼叫装置,应用于主叫客户端,包括:获取模块,用于获取主叫用户信息,并基于所述主叫用户信息生成呼叫闪信;划分模块,用于响应于识别到基于所述呼叫闪信进行加V呼叫请求,生成第一公钥、第一私钥、第二公钥和第二私钥,并将所述呼叫闪信随机划分为预设段数的闪信文本;第一加密模块,用于通过同态加密法对所述闪信文本进行第一加密,以生成闪信密文;第二加密模块,用于基于所述第一公钥对所述闪信密文进行第二加密,以生成签名文本段,将所述签名文本段、所述闪信密文、所述第一私钥、所述第二公钥和所述第二私钥通过加V呼叫发送给云端服务器。To achieve the above-mentioned purpose, the fourth aspect embodiment of the present disclosure proposes a calling device, which is applied to a calling client, including: an acquisition module, which is used to acquire calling user information and generate a call flash message based on the calling user information; a division module, which is used to generate a first public key, a first private key, a second public key and a second private key in response to identifying a request for a V call based on the call flash message, and randomly divide the call flash message into a preset number of flash message texts; a first encryption module, which is used to perform a first encryption on the flash message text through a homomorphic encryption method to generate a flash message ciphertext; a second encryption module, which is used to perform a second encryption on the flash message ciphertext based on the first public key to generate a signature text segment, and send the signature text segment, the flash message ciphertext, the first private key, the second public key and the second private key to the cloud server through a V call.

为达上述目的,本公开第五方面实施例提出了一种呼叫装置,应用于云端服务器,包括:检测模块,用于检测到主叫客户端发送的加V呼叫,获取所述加V呼叫中的签名文本段、闪信密文、第一私钥、第二公钥和第二私钥;认证模块,用于基于所述第一私钥、所述闪信密文对所述签名文本段进行签名认证;排列模块,用于基于认证结果对所述闪信密文进行重新排列,以获取目标闪信密文;发送模块,用于基于所述第二公钥对所述目标闪信密文进行加密,以生成闪信全文签名,并将所述闪信全文签名、所述第二私钥和所述目标闪信密文发送给被叫客户端。To achieve the above-mentioned purpose, the fifth aspect embodiment of the present disclosure proposes a calling device, which is applied to a cloud server, including: a detection module, which is used to detect a V-call sent by a calling client, and obtain a signature text segment, a flash message ciphertext, a first private key, a second public key, and a second private key in the V-call; an authentication module, which is used to perform signature authentication on the signature text segment based on the first private key and the flash message ciphertext; an arrangement module, which is used to rearrange the flash message ciphertext based on the authentication result to obtain a target flash message ciphertext; a sending module, which is used to encrypt the target flash message ciphertext based on the second public key to generate a full-text signature of the flash message, and send the full-text signature of the flash message, the second private key and the target flash message ciphertext to the called client.

为达上述目的,本公开第六方面实施例提出了一种呼叫装置,应用于被叫客户端,包括:监测模块,用于检测到主叫云端服务器发送的加V呼叫,获取所述加V呼叫中的闪信全文签名、第二私钥和目标闪信密文;识别模块,用于基于所述第二私钥和所述闪信全文签名对所述目标闪信密文进行签名认证;展示模块,用于响应于签名认证通过,对所述目标闪信密文进行解密,以生成闪信,并对所述闪信进行展示。To achieve the above-mentioned purpose, the sixth aspect embodiment of the present disclosure proposes a calling device, which is applied to the called client, including: a monitoring module, which is used to detect the V call sent by the calling cloud server, and obtain the full-text signature of the flash message, the second private key and the target flash message ciphertext in the V call; an identification module, which is used to perform signature authentication on the target flash message ciphertext based on the second private key and the full-text signature of the flash message; a display module, which is used to decrypt the target flash message ciphertext in response to the signature authentication being passed to generate a flash message, and display the flash message.

为达上述目的,本公开第七方面实施例提出了一种电子设备,包括:至少一个处理器;以及与所述至少一个处理器通信连接的存储器;其中,所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以实现如本公开第一方面实施例、第二方面实施例和第三方面实施例所述的呼叫方法。To achieve the above-mentioned purpose, the seventh aspect embodiment of the present disclosure proposes an electronic device, comprising: at least one processor; and a memory communicatively connected to the at least one processor; wherein the memory stores instructions executable by the at least one processor, and the instructions are executed by the at least one processor to implement the calling method as described in the first aspect embodiment, the second aspect embodiment and the third aspect embodiment of the present disclosure.

为达上述目的,本公开第四方面实施例提出了一种存储有计算机指令的非瞬时计算机可读存储介质,其中,所述计算机指令用于实现如本公开第一方面实施例、第二方面实施例和第三方面实施例所述的呼叫方法。To achieve the above-mentioned objectives, the fourth aspect embodiment of the present disclosure proposes a non-transitory computer-readable storage medium storing computer instructions, wherein the computer instructions are used to implement the calling method as described in the first aspect embodiment, the second aspect embodiment and the third aspect embodiment of the present disclosure.

为达上述目的,本公开第五方面实施例提出了一种计算机程序产品,包括计算机程序,所述计算机程序在被处理器执行时用于实现如本公开第一方面实施例、第二方面实施例和第三方面实施例所述的呼叫方法。To achieve the above-mentioned objectives, the fifth aspect embodiment of the present disclosure proposes a computer program product, including a computer program, which, when executed by a processor, is used to implement the calling method as described in the first aspect embodiment, the second aspect embodiment and the third aspect embodiment of the present disclosure.

通过将闪信划分为多个闪信文本进行加密传输,可以提高加密的复杂度,同时这种采用加密传输与数字签名验证的方式,提高闪信传递的保密性。By dividing the flash message into multiple flash message texts for encrypted transmission, the complexity of encryption can be increased. At the same time, this method of using encrypted transmission and digital signature verification can improve the confidentiality of flash message transmission.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

图1是本公开一个实施方式的一种呼叫方法的示意图;FIG1 is a schematic diagram of a calling method according to an embodiment of the present disclosure;

图2是本公开一个实施方式的另一种呼叫方法的示意图;FIG2 is a schematic diagram of another calling method according to an embodiment of the present disclosure;

图3是本公开一个实施方式的另一种呼叫方法的示意图;FIG3 is a schematic diagram of another calling method according to an embodiment of the present disclosure;

图4是本公开一个实施方式的另一种呼叫方法的示意图;FIG4 is a schematic diagram of another calling method according to an embodiment of the present disclosure;

图5是本公开一个实施方式的另一种呼叫方法的示意图;FIG5 is a schematic diagram of another calling method according to an embodiment of the present disclosure;

图6是本公开一个实施方式的另一种呼叫方法的示意图;FIG6 is a schematic diagram of another calling method according to an embodiment of the present disclosure;

图7是本公开一个实施方式的另一种呼叫方法的示意图;FIG7 is a schematic diagram of another calling method according to an embodiment of the present disclosure;

图8是本公开一个实施方式的一种呼叫装置的示意图;FIG8 is a schematic diagram of a calling device according to an embodiment of the present disclosure;

图9是本公开一个实施方式的另一种呼叫装置的示意图;FIG9 is a schematic diagram of another calling device according to an embodiment of the present disclosure;

图10是本公开一个实施方式的另一种呼叫装置的示意图;FIG10 is a schematic diagram of another calling device according to an embodiment of the present disclosure;

图11是本公开一个实施方式的一种电子设备的示意图。FIG. 11 is a schematic diagram of an electronic device according to an embodiment of the present disclosure.

具体实施方式Detailed ways

下面详细描述本公开的实施例,所述实施例的示例在附图中示出,其中自始至终相同或类似的标号表示相同或类似的元件或具有相同或类似功能的元件。下面通过参考附图描述的实施例是示例性的,旨在用于解释本公开,而不能理解为对本公开的限制。Embodiments of the present disclosure are described in detail below, examples of which are shown in the accompanying drawings, wherein the same or similar reference numerals throughout represent the same or similar elements or elements having the same or similar functions. The embodiments described below with reference to the accompanying drawings are exemplary and are intended to be used to explain the present disclosure, and should not be construed as limiting the present disclosure.

图1为本公开提出的一种呼叫方法的一种示例性实施方式的示意图,应用于主叫客户端,如图1所示,该呼叫方法包括以下步骤:FIG. 1 is a schematic diagram of an exemplary implementation of a calling method proposed in the present disclosure, which is applied to a calling client. As shown in FIG. 1 , the calling method includes the following steps:

S101,获取主叫用户信息,并基于主叫用户信息生成呼叫闪信。S101, obtaining calling user information, and generating a call flash message based on the calling user information.

本申请实施例的呼叫方法可应用于陌生号码呼叫的场景中,本申请实施例的呼叫的执行主体可为本申请实施例的呼叫装置,该呼叫装置可以设置在电子设备上。The calling method of the embodiment of the present application can be applied to the scenario of calling an unfamiliar number. The executor of the call in the embodiment of the present application can be the calling device in the embodiment of the present application, and the calling device can be set on an electronic device.

在本公开实施例中,用户信息可存储在主叫客户端的存储空间中,还可由用户手动输入,此处不作任何限定。In the disclosed embodiment, the user information may be stored in the storage space of the calling client, or may be manually input by the user, which is not limited herein.

需要说明的是,呼叫闪信是一项短信类业务,是指发送给用户的信息可直接显示在其手机屏幕上,阅读后信息不自动保存。It should be noted that Call Flash Message is a text messaging service, which means that the information sent to the user can be directly displayed on his or her mobile phone screen, and the information is not automatically saved after reading.

在本公开实施例中,呼叫闪信主要为在进行用户呼叫前,主叫用户会向被叫用户发送呼叫闪信,以将主叫客户端的请求和信息通过闪信的方式事先告知被叫用户。从而提升主叫用户和被叫用户的通话成功率和使用体验。In the disclosed embodiment, the call flash message mainly refers to that before making a user call, the calling user will send a call flash message to the called user, so as to inform the called user of the request and information of the calling client in advance through the flash message, thereby improving the call success rate and user experience of the calling user and the called user.

主叫客户端经过实名身份认,拨打被叫客户端电话号码,就能将主叫客户端的实名通话信息传递给被叫客户端,从而让被叫客户端能够识别陌生来电、提前了解主叫客户端的身份信息。让用户对一些广告、中介、诈骗电话等有基本的预判,减少骚扰电话对用户生活的干扰。After the real-name identity is verified, the calling client can dial the called client's phone number and pass the calling client's real-name call information to the called client, so that the called client can identify unfamiliar calls and know the calling client's identity information in advance. This allows users to have a basic prediction of some advertisements, intermediaries, fraud calls, etc., and reduce the interference of harassing calls on users' lives.

S102,响应于识别到基于呼叫闪信进行加V呼叫请求,生成第一公钥、第一私钥、第二公钥和第二私钥,并将呼叫闪信随机划分为预设段数的闪信文本。S102, in response to identifying a call request based on a call flash message, generating a first public key, a first private key, a second public key and a second private key, and randomly dividing the call flash message into a preset number of flash message text segments.

在本公开实施例中,主叫用户可通过加V呼叫模块进行加V呼叫请求,需要说明的是,该加V呼叫模块可为安装在主叫客户端的应用。In the embodiment of the present disclosure, the calling user may make a V-add call request through a V-add call module. It should be noted that the V-add call module may be an application installed on the calling client.

在本公开实施例中,公钥(Public Key)与私钥(Private Key)是通过加密算法得到的一个密钥对,即一个公钥和一个私钥,也就是非对称加密方式。公钥可对会话进行加密、验证数字签名,只有使用对应的私钥才能解密会话数据,从而保证数据传输的安全性。公钥是密钥对外公开的部分,私钥则是非公开的部分,由用户自行保管。In the disclosed embodiments, the public key and the private key are a key pair obtained through an encryption algorithm, that is, a public key and a private key, which is an asymmetric encryption method. The public key can encrypt the session and verify the digital signature. Only the corresponding private key can decrypt the session data, thereby ensuring the security of data transmission. The public key is the part of the key that is open to the public, and the private key is the non-public part, which is kept by the user.

在本公开实施例中,第一公钥、第一私钥、第二公钥和第二私钥的生成方法可为多种,此处不作任何限定,具体可根据实际的设计需要进行设定。In the embodiments of the present disclosure, there may be multiple methods for generating the first public key, the first private key, the second public key, and the second private key, which are not limited here and may be specifically set according to actual design requirements.

可选地,可通过预设的算法生成第一公钥、第一私钥、第二公钥和第二私钥,该生成第一公钥和第一私钥的算法与生成第二公钥和第二私钥的算法可为不同,此处不作任何限定。Optionally, the first public key, the first private key, the second public key and the second private key may be generated by a preset algorithm. The algorithm for generating the first public key and the first private key may be different from the algorithm for generating the second public key and the second private key, and no limitation is made here.

可选地,还可通过公钥私钥生成模型,生成第一公钥、第一私钥、第二公钥和第二私钥,该公钥私钥生成模型可为提前训练好的,并存储在电子设备的存储空间中,以方便在需要时调取使用。Optionally, a public key and private key generation model may be used to generate a first public key, a first private key, a second public key and a second private key. The public key and private key generation model may be trained in advance and stored in a storage space of an electronic device for easy retrieval when needed.

在本公开实施例中,预设段数可根据实际的设计需要进行变更,此处不作任何限定。In the embodiment of the present disclosure, the preset number of segments can be changed according to actual design needs and is not limited here.

S103,通过同态加密法对闪信文本进行第一加密,以生成闪信密文。S103, performing a first encryption on the flash message text by homomorphic encryption to generate a flash message ciphertext.

需要说明的是,同态加密是基于数学难题的计算复杂性理论的密码学技术。对经过同态加密的数据进行处理得到一个输出,将这一输出进行解密,其结果与用同一方法处理未加密的原始数据得到的输出结果是一样的。It should be noted that homomorphic encryption is a cryptographic technology based on the computational complexity theory of mathematical problems. The data that has been homomorphically encrypted is processed to obtain an output, and the output is decrypted, and the result is the same as the output obtained by processing the unencrypted original data in the same way.

通过同态加密法加密生成闪信密文,可以保证最终密文在被叫客户端进行解密时,生成的呼叫闪信不失真。By encrypting the flash message ciphertext using homomorphic encryption, it can be ensured that the generated call flash message is not distorted when the final ciphertext is decrypted by the called client.

S104,基于第一公钥对闪信密文进行第二加密,以生成签名文本段,将签名文本段、闪信密文、第一私钥、第二公钥和第二私钥通过加V呼叫发送给云端服务器。S104, perform a second encryption on the flash message ciphertext based on the first public key to generate a signature text segment, and send the signature text segment, the flash message ciphertext, the first private key, the second public key and the second private key to the cloud server via a V call.

在本公开实施例中,通过签名操作生成的签名文本段,是为了后续验证闪信密文是否在传输的过程中是否损坏或者被恶意修改。In the disclosed embodiment, the signature text segment generated by the signature operation is used to subsequently verify whether the flash message ciphertext is damaged or maliciously modified during the transmission process.

通过第一公钥对闪信密文进行第二加密的方法可为多种,此处不作任何限定。There are many methods for performing the second encryption on the flash message ciphertext using the first public key, and no limitation is made here.

在本公开实施例中,首先获取主叫用户信息,并基于主叫用户信息生成呼叫闪信,响应于识别到基于呼叫闪信进行加V呼叫请求,生成第一公钥、第一私钥、第二公钥和第二私钥,并将呼叫闪信随机划分为预设段数的闪信文本,然后通过同态加密法对闪信文本进行第一加密,以生成闪信密文,最后基于第一公钥对闪信密文进行第二加密,以生成签名文本段,将签名文本段、闪信密文、第一私钥、第二公钥和第二私钥通过加V呼叫发送给云端服务器。通过将闪信划分为多个闪信文本进行加密传输,可以提高加密的复杂度,同时这种采用加密传输与数字签名验证的方式,提高闪信传递的保密性。In the disclosed embodiment, the calling user information is first obtained, and a call flash message is generated based on the calling user information. In response to identifying a request for a V call based on the call flash message, a first public key, a first private key, a second public key, and a second private key are generated, and the call flash message is randomly divided into a preset number of flash message texts, and then the flash message text is first encrypted by homomorphic encryption to generate a flash message ciphertext, and finally the flash message ciphertext is second encrypted based on the first public key to generate a signature text segment, and the signature text segment, the flash message ciphertext, the first private key, the second public key, and the second private key are sent to the cloud server through the V call. By dividing the flash message into multiple flash message texts for encrypted transmission, the complexity of encryption can be increased, and at the same time, this method of using encrypted transmission and digital signature verification can improve the confidentiality of flash message transmission.

在一种可能实现的方式中,可根据主叫用户的用户等级生成不同的闪信。In one possible implementation, different flash messages may be generated according to the user level of the calling user.

可选地,如果主叫客户端是VIP用户,在V拨号界面把被叫客户端设为紧急用户名单中,则发出请求结束后,被叫客户端显示的来电提醒一直保留在手机终端页面,不会自动退出,直到被叫客户端点击确认为止。Optionally, if the calling client is a VIP user and the called client is set to the emergency user list in the V dialing interface, after the request is sent, the call reminder displayed by the called client will remain on the mobile terminal page and will not automatically exit until the called client clicks to confirm.

可选地,如果主叫客户端是VIP用户,在V拨号界面未将被叫客户端添加为紧急用户名单中,则发出请求结束后,被叫客户端显示的来电提醒保留5分钟。Optionally, if the calling client is a VIP user and the called client is not added as an emergency user list in the V dialing interface, after the request is sent, the incoming call reminder displayed by the called client is retained for 5 minutes.

可选地,如果主叫客户端非VIP用户,在V拨号界面未将被叫客户端添加为紧急用户名单中,则发出请求时被叫客户端显示的来电提醒当请求结束后自动退出。Optionally, if the calling client is not a VIP user and the called client is not added as an emergency user list in the V dialing interface, the incoming call reminder displayed by the called client when the request is sent will automatically exit after the request is completed.

需要说明的是,获取主叫用户信息还可检测主叫用户是否已经注册,响应于检测到注册信息,基于注册信息确定主叫用户信息。It should be noted that obtaining the calling user information may also detect whether the calling user has been registered, and in response to detecting the registration information, determine the calling user information based on the registration information.

响应于未检测到注册信息,生成提示信息,所示提示信息用于提醒主叫用户进行注册。In response to not detecting the registration information, a prompt message is generated, where the prompt message is used to remind the calling user to register.

上述实施例中,生成第一公钥和第一私钥,还可通过图2进一步解释,该方法包括:In the above embodiment, the first public key and the first private key are generated, which can be further explained by FIG. 2 . The method includes:

S201,随机获取两个不相同的第一质数和第二质数,以及随机获取两个互质的第一互质数和第二互质数,并获取随机长度的随机矩阵。S201, randomly obtain two different first prime numbers and second prime numbers, and randomly obtain two mutually prime first and second mutually prime numbers, and obtain a random matrix of random length.

在本公开实施例中,可通过双线性映射双线性配对生成随机长度的随机矩阵。In the embodiment of the present disclosure, a random matrix of random length may be generated by bilinear mapping and bilinear pairing.

S202,基于第一质数、第二质数、第一互质数、第二互质数、随机长度和随机矩阵,组建第一公钥。S202, constructing a first public key based on the first prime number, the second prime number, the first coprime number, the second coprime number, the random length and the random matrix.

在本公开实施例中,可首先基于第二互质数和第二质数生成第一元素,以及将第一质数和第二质数的乘积作为第二元素,然后基于第一元素、第二元素、随机长度和随机矩阵和第一互质数,组建第一公钥。In the embodiment of the present disclosure, a first element can be first generated based on a second coprime number and a second prime number, and the product of the first prime number and the second prime number can be used as the second element. Then, a first public key can be constructed based on the first element, the second element, a random length, a random matrix and the first coprime number.

S203,基于第一质数,组建第一私钥。S203, constructing a first private key based on the first prime number.

在一种可能实现的方式中,可选择两个大素数第一质数q1和第二质数q2,计算第一元素n=q1.q2;通过双线性映射双线性配对e:(G*G)→G1和两个互质的随机数g,u,G为随机矩阵长度,计算第二元素h=uq2In a possible implementation, two large prime numbers, a first prime number q1 and a second prime number q2 , are selected to calculate the first element n= q1.q2 ; and the second element h= uq2 is calculated by bilinear mapping bilinear pairing e:(G*G) G1 and two mutually prime random numbers g, u, where G is the random matrix length.

第一公钥为:(n,G,G1,e,g,h)。First public key is: (n,G,G 1 ,e,g,h).

第一私钥为:q1First private key is: q 1 .

在本公开实施例中,首先随机获取两个不相同的第一质数和第二质数,以及随机获取两个互质的第一互质数和第二互质数,并获取随机长度的随机矩阵,然后基于第一质数、第二质数、第一互质数、第二互质数、随机长度和随机矩阵,组建第一公钥,基于第一质数,组建第一私钥。由此,通过设置多个随机数,然后生成第一公钥和第一私钥,以此可以提升公钥私钥的随机性,不容易被复刻和破解。In the disclosed embodiment, firstly, two different first prime numbers and second prime numbers are randomly obtained, and two mutually prime first and second mutually prime numbers are randomly obtained, and a random matrix of random length is obtained, and then a first public key is formed based on the first prime number, the second prime number, the first mutually prime number, the second mutually prime number, the random length and the random matrix, and a first private key is formed based on the first prime number. Thus, by setting a plurality of random numbers, and then generating a first public key and a first private key, the randomness of the public key and the private key can be improved, and it is not easy to be copied and cracked.

上述实施例中,通过同态加密法对闪信文本进行第一加密,以生成闪信密文,还可通过图3进一步解释,该方法包括:In the above embodiment, the flash message text is first encrypted by homomorphic encryption to generate flash message ciphertext, which can be further explained by FIG. 3. The method includes:

S301,对所有闪信文本分别分配第一机密参数,其中,第一机密参数为随机的正整数。S301, assigning a first confidential parameter to all flash message texts respectively, wherein the first confidential parameter is a random positive integer.

S302,针对任一闪信文本,基于第一质数和闪信文本对应的第一机密参数,确定闪信文本的第二机密参数。S302: For any flash message text, determine a second confidential parameter of the flash message text based on a first prime number and a first confidential parameter corresponding to the flash message text.

在本公开实施例中,可通过将1与第一质数相除的余数与,所有第一机密参数的和进行相除,并将商作为闪信文本的第二机密参数。In the disclosed embodiment, the remainder obtained by dividing 1 by the first prime number can be divided by the sum of all first confidential parameters, and the quotient can be used as the second confidential parameter of the flash message text.

在一种可能实现的方式中,将闪信文本随机划分为t段,并为每段添加一个机密参数si,其中,i∈[1,t],第一机密参数si是从随机数中选取的一个正整数,q1是生成时使用的素数,s0的值为:In one possible implementation, the flash message text is randomly divided into t segments, and a confidential parameter si is added to each segment, where i∈[1,t], the first confidential parameter si is a positive integer selected from a random number, and q1 is the generated The prime number used when s 0 is:

s0=11/(s1+2+…st)s 0 =1 1 /(s 1 + 2 +…s t )

S303,基于第一机密参数和第二机密参数对闪信文本进行加密,以生成闪信密文。S303, encrypting the flash message text based on the first confidential parameter and the second confidential parameter to generate a flash message ciphertext.

在本公开实施例中,可基于第一元素、第一互质数、第一机密参数、第二机密参数对闪信文本进行加密。In the disclosed embodiment, the flash message text may be encrypted based on the first element, the first coprime number, the first confidential parameter, and the second confidential parameter.

可通过如下公式进行加密:It can be encrypted by the following formula:

其中,si为第一机密参数,s0为第二机密参数,r为随机数,h为第二元素,mi为第i段闪信密文,t为密文总段数,ci为第i段闪信密文。Among them, si is the first confidential parameter, s0 is the second confidential parameter, r is a random number, h is the second element, mi is the i-th flash message ciphertext, t is the total number of ciphertext segments, and ci is the i-th flash message ciphertext.

上述实施例中,基于第一公钥对闪信密文进行第二加密,以生成签名文本段,还可通过图4进一步解释,该方法包括:In the above embodiment, the flash message ciphertext is secondly encrypted based on the first public key to generate a signature text segment, which can be further explained by FIG. 4. The method includes:

S401,针对任一闪信密文,对闪信密文分配时间戳。S401, assigning a timestamp to any flash message ciphertext.

在本公开实施例中,不同的闪信密文对应的时间戳不同,以此可以用以区分不同的闪信密文。In the disclosed embodiment, different flash message ciphertexts correspond to different timestamps, which can be used to distinguish different flash message ciphertexts.

需要说明的是,时间戳为按照闪信密文的逻辑顺序进行排列的,即按照闪信密文在闪信文本中出现的先后顺序进行排列的。It should be noted that the timestamps are arranged in the logical order of the flash message ciphertexts, that is, in the order in which the flash message ciphertexts appear in the flash message text.

S402,基于时间戳、第一公钥和闪信密文,生成签名文本段。S402, generating a signature text segment based on the timestamp, the first public key and the flash message ciphertext.

在本公开实施例中,可通过对时间戳和闪信密文进行哈希运算,并将运算结果与第一公钥相乘,以生成签名文本段。In the disclosed embodiment, a signature text segment may be generated by performing a hash operation on the timestamp and the flash message ciphertext, and multiplying the operation result with the first public key.

在一种可能实现的方式中,对每段闪信密文ci进行签名处理,得到签名处理后的签名文本 In one possible implementation, each flash message ciphertext c i is signed to obtain the signed text after the signature processing.

其中,ci为闪信文本段密文,为公钥,H函数为使用SHA-256的哈希函数,ti为第i个闪信密文的时间戳。Among them, ci is the ciphertext of the flash message text segment, is the public key, H function is the hash function using SHA-256, and ti is the timestamp of the i-th flash message ciphertext.

上述实施例中,生成第二公钥和第二私钥,还可通过图5进一步解释,该方法包括:In the above embodiment, the second public key and the second private key are generated, which can be further explained by FIG. 5 , and the method includes:

S501,随机获取两个不相同的第三质数和第四质数,以及随机获取两个互质的第三互质数和第四互质数,并获取随机长度的随机矩阵。S501, randomly obtain two different third prime numbers and fourth prime numbers, and randomly obtain two mutually prime third coprime numbers and fourth coprime numbers, and obtain a random matrix of random length.

在本公开实施例中,可通过双线性映射双线性配对生成随机长度的随机矩阵。In the embodiment of the present disclosure, a random matrix of random length may be generated by bilinear mapping and bilinear pairing.

S502,基于第三质数、第四质数、第三互质数、第四互质数、随机长度和随机矩阵,组建第二公钥。S502, constructing a second public key based on a third prime number, a fourth prime number, a third mutually prime number, a fourth mutually prime number, a random length, and a random matrix.

在本公开实施例中,可首先基于第四互质数和第四质数生成第三元素,以及将第三质数和第四质数的乘积作为第四元素,然后基于第三元素、第四元素、随机长度和随机矩阵和第三互质数,组建第二公钥。In the embodiment of the present disclosure, the third element can be first generated based on the fourth coprime number and the fourth prime number, and the product of the third prime number and the fourth prime number can be used as the fourth element, and then the second public key can be constructed based on the third element, the fourth element, the random length and the random matrix and the third coprime number.

S503,基于第三质数,组建第二私钥。S503, constructing a second private key based on the third prime number.

在一种可能实现的方式中,可选择两个大素数第三质数p1和第四质数p2,计算第三元素m=p1.p2;通过双线性映射双线性配对f:(I*I)→I1和两个互质的随机数k,v,I为随机矩阵长度,计算第四元素l=vp2In a possible implementation, two large prime numbers, a third prime number p1 and a fourth prime number p2 , are selected to calculate the third element m= p1.p2 ; and the fourth element l= vp2 is calculated by bilinear mapping bilinear pairing f:(I*I) I1 and two mutually prime random numbers k, v, where I is the random matrix length.

第二公钥为:(m,I,I1,f,k,l)。Second public key is: (m,I,I 1 ,f,k,l).

第二私钥为:p1Second private key Is: p 1 .

图6为本公开提出的一种呼叫方法的一种示例性实施方式的示意图,应用于云端服务器,如图6所示,该呼叫方法包括以下步骤:FIG6 is a schematic diagram of an exemplary implementation of a calling method proposed in the present disclosure, which is applied to a cloud server. As shown in FIG6 , the calling method includes the following steps:

S601,检测到主叫客户端发送的加V呼叫,获取加V呼叫中的签名文本段、闪信密文、第一私钥、第二公钥和第二私钥。S601, detecting a V call sent by a calling client, and obtaining a signature text segment, a flash message ciphertext, a first private key, a second public key and a second private key in the V call.

需要说明的是,签名文本段、闪信密文、第一私钥、第二公钥和第二私钥的生成过程可参照上述实施例中的内容,此处不再赘述。It should be noted that the generation process of the signature text segment, the flash message ciphertext, the first private key, the second public key and the second private key can refer to the contents in the above embodiments and will not be repeated here.

S602,基于第一私钥、闪信密文对签名文本段进行签名认证。S602, perform signature authentication on the signature text segment based on the first private key and the flash message ciphertext.

在本公开实施例中,可首先基于第一私钥对闪信密文进行解码,以获取解码文本段,然后将解码文本段与对应签名文本段进行匹配,即进行签名认证。In the disclosed embodiment, the flash message ciphertext may first be decoded based on the first private key to obtain a decoded text segment, and then the decoded text segment may be matched with the corresponding signature text segment, ie, signature authentication may be performed.

需要说明的是,基于第一私钥对闪信密文进行解码,以获取解码文本段,可首先获取闪信密文的时间戳,然后对时间戳和闪信密文进行哈希运算,并将运算结果与第一私钥相乘,以获取解码文本段。It should be noted that, to decode the flash message ciphertext based on the first private key to obtain the decoded text segment, the timestamp of the flash message ciphertext can be first obtained, and then a hash operation is performed on the timestamp and the flash message ciphertext, and the operation result is multiplied by the first private key to obtain the decoded text segment.

在一种可能实现的方式中,可通过闪信密文ci、第一私钥和签名文本段验证数字签名。使用SHA-256的哈希函数H,和时间戳,计算数字签名:In a possible implementation method, the flash message ciphertext c i and the first private key and the signature text segment Verify the digital signature. Use the SHA-256 hash function H and the timestamp to calculate the digital signature:

在一种可能实现的方式中,云端服务器在接收到多个闪信文本段密文后,会为每个闪信文本段密文维护多列列表SMinfo,用于记录每个闪信文本段的签名认证结果。In one possible implementation, after receiving multiple flash message text segment ciphertexts, the cloud server will maintain a multi-column list SMinfo for each flash message text segment ciphertext, which is used to record the signature authentication result of each flash message text segment.

闪信文本段密文维护多列列表包括第一私钥、闪信密文、签名文本段和标识FLAG三列。其中标识为签名认证结果。The flash message text segment ciphertext maintains a multi-column list including the first private key, flash message ciphertext, signature text segment and flag FLAG, where the flag is the signature authentication result.

S603,基于认证结果对闪信密文进行重新排列,以获取目标闪信密文。S603, rearrange the flash message ciphertext based on the authentication result to obtain the target flash message ciphertext.

在本公开实施例中,将认证结果为验证通过的签名文本段对应的候选闪信密文,按照时间戳的顺序进行排列组合,以生成目标闪信密文。In the disclosed embodiment, the candidate flash message ciphertexts corresponding to the signature text segments with the authentication results of passed verification are arranged and combined in the order of timestamps to generate the target flash message ciphertext.

S604,基于第二公钥对目标闪信密文进行加密,以生成闪信全文签名,并将闪信全文签名、第二私钥和目标闪信密文发送给被叫客户端。S604: Encrypt the target flash message ciphertext based on the second public key to generate a flash message full text signature, and send the flash message full text signature, the second private key and the target flash message ciphertext to the called client.

在本公开实施例中,检测到主叫客户端发送的加V呼叫,获取加V呼叫中的签名文本段、闪信密文、第一私钥、第二公钥和第二私钥,然后基于第一私钥、闪信密文对签名文本段进行签名认证,而后基于验证结果对闪信密文进行重新排列,以获取目标闪信密文,最后基于第二公钥对目标闪信密文进行加密,以生成闪信全文签名,并将闪信全文签名、第二私钥和目标闪信密文发送给被叫客户端。由此,通过第一私钥、闪信密文对签名文本段进行签名认证,通过验证结果可以确定闪信密文在传输的过程中是否存在丢包、被篡改等情况,保证了闪信密文传输的安全性和完整性。In the disclosed embodiment, a V call sent by the calling client is detected, and the signature text segment, flash message ciphertext, first private key, second public key and second private key in the V call are obtained, and then the signature text segment is signed and authenticated based on the first private key and the flash message ciphertext, and then the flash message ciphertext is rearranged based on the verification result to obtain the target flash message ciphertext, and finally the target flash message ciphertext is encrypted based on the second public key to generate the full text signature of the flash message, and the full text signature of the flash message, the second private key and the target flash message ciphertext are sent to the called client. Thus, the signature text segment is signed and authenticated by the first private key and the flash message ciphertext, and the verification result can be used to determine whether the flash message ciphertext has been lost or tampered with during the transmission process, thereby ensuring the security and integrity of the flash message ciphertext transmission.

需要说明的是,将认证结果为验证通过的签名文本段对应的候选闪信密文,按照时间戳的顺序进行排列组合,还需要考虑网络安全的情况。It should be noted that the candidate flash message ciphertexts corresponding to the signature text segments with authentication results being verified are arranged and combined in the order of timestamps, and network security needs to be considered.

在本公开实施例中,可首先判断当前通信网络环境是否安全,响应于当前通信网络环境安全,基于第一组合方式对候选闪信密文按照时间戳的顺序进行排列组合,响应于当前通信网络环境不安全,基于第二组合方式对候选闪信密文按照时间戳的顺序进行排列组合。In the embodiment of the present disclosure, it can be first determined whether the current communication network environment is safe. In response to the current communication network environment being safe, the candidate flash message ciphertexts are arranged and combined in the order of timestamps based on a first combination method. In response to the current communication network environment being unsafe, the candidate flash message ciphertexts are arranged and combined in the order of timestamps based on a second combination method.

在一种可能实现的方式中,当网络处于安全的情况下,采用下列公式进行排列组合:In one possible implementation, when the network is secure, the following formula is used for permutation and combination:

当网络处于不安全的情况下,采用下列公式进行排列组合:When the network is insecure, use the following formula for permutation and combination:

其中,t为网络安全的时间,tb为网络不安全的时间。ci为闪信密文,Ccn为目标闪信密文。Among them, t is the network security time, tb is the network insecurity time, ci is the flash message ciphertext, Ccn is the target flash message ciphertext.

考虑到t≈tb,在本公开实施例中,Considering t≈t b , in the embodiment of the present disclosure,

取g和h的t公约数,则:Take the common divisor of g and h, then:

又由式(1)可知:From formula (1), we can know that:

因此可计算得到闪信全文的密文CcnTherefore, the ciphertext C cn of the full text of the flash message can be calculated:

图7为本公开提出的一种呼叫方法的一种示例性实施方式的示意图,应用于被叫客户端,如图7所示,该呼叫方法包括以下步骤:FIG. 7 is a schematic diagram of an exemplary implementation of a calling method proposed in the present disclosure, which is applied to a called client. As shown in FIG. 7 , the calling method includes the following steps:

S701,检测到主叫云端服务器发送的加V呼叫,获取加V呼叫中的闪信全文签名、第二私钥和目标闪信密文。S701, detecting a V call sent by the calling cloud server, and obtaining the full text signature, the second private key and the target flash message ciphertext in the V call.

需要说明的是,闪信全文签名、第二私钥和目标闪信密文的生成过程可参照上述实施例中的内容,此处不再赘述。It should be noted that the generation process of the flash message full-text signature, the second private key and the target flash message ciphertext can refer to the contents in the above embodiment and will not be repeated here.

S702,基于第二私钥和闪信全文签名对目标闪信密文进行签名认证。S702, perform signature authentication on the target flash message ciphertext based on the second private key and the full-text signature of the flash message.

在本公开实施例中,可首先基于第二私钥对目标闪信密文进行解码,以获取目标闪信密文签名,然后将目标闪信密文签名与闪信全文签名进行匹配,即进行签名认证。In the disclosed embodiment, the target flash message ciphertext may be first decoded based on the second private key to obtain the target flash message ciphertext signature, and then the target flash message ciphertext signature may be matched with the flash message full text signature, i.e., signature authentication may be performed.

在本公开实施例中,被叫客户端接收到闪信全文签名σcn和对应的目标闪信密文Ccn之后,对闪信全文签名Ccn进行验证,In the disclosed embodiment, after receiving the full text signature σ cn of the flash message and the corresponding target flash message ciphertext C cn , the called client verifies the full text signature C cn of the flash message.

根据闪信全文签名σcc、目标闪信密文Ccn、第二私钥验证签名值,H函数为使用SHA-256的哈希函数,ti是为时间戳:According to the full text signature of the flash message σ cc , the target flash message ciphertext C cn , and the second private key Verify the signature value, H function is the hash function using SHA-256, ti is the timestamp:

然后将σcc和σcn进行比较。Then compare σ cc and σ cn .

S703,响应于签名认证通过,对目标闪信密文进行解密,以生成闪信,并对闪信进行展示。S703, in response to the signature authentication being passed, decrypting the target flash message ciphertext to generate a flash message, and displaying the flash message.

如果σcc=σcn,则签名认证通过,否则,认证不通过,拒绝签名并丢目标闪信密文。If σ cc = σ cn , the signature authentication is successful; otherwise, the authentication fails, the signature is rejected, and the target flash message ciphertext is discarded.

在本公开实施例中,检测到主叫云端服务器发送的加V呼叫,获取加V呼叫中的闪信全文签名、第二私钥和目标闪信密文,然后基于第二私钥和闪信全文签名对目标闪信密文进行签名认证,响应于签名认证通过,对目标闪信密文进行解密,以生成闪信,并对闪信进行展示。由此,基于第二私钥和闪信全文签名对目标闪信密文进行签名认证,可以防止云端服务器在发送到被叫客户端的过程中数据包出现丢包、被篡改等情况,保证被叫客户端接收到闪信的完整性和真实性。In the disclosed embodiment, a V call sent by the calling cloud server is detected, the full text signature of the flash message, the second private key and the target flash message ciphertext in the V call are obtained, and then the target flash message ciphertext is signed and authenticated based on the second private key and the full text signature of the flash message. In response to the signature authentication passing, the target flash message ciphertext is decrypted to generate a flash message, and the flash message is displayed. Thus, the signature authentication of the target flash message ciphertext based on the second private key and the full text signature of the flash message can prevent the cloud server from losing or being tampered with the data packet in the process of sending it to the called client, and ensure the integrity and authenticity of the flash message received by the called client.

在一种可能实现的方式中,被叫放的闪信可为霸屏闪现,通过采用霸屏闪信的提示方式,被叫客户端点击确认或提示保留时间到期才会结束提示,提示强度高,从而能够避免用户错过重要来电。In one possible implementation, the flash message placed by the called party can be displayed on the screen. By adopting the prompt method of the flash message on the screen, the called client clicks confirmation or the prompt retention time expires before the prompt ends. The prompt intensity is high, thereby preventing the user from missing important calls.

在本公开实施例中,在对闪信进行展示后,还可获取用户基于闪信生成的操作指令,然后基于操作指令生成反馈信息,并发送给云端服务器。In the disclosed embodiment, after the flash message is displayed, the operation instruction generated by the user based on the flash message can also be obtained, and then feedback information is generated based on the operation instruction and sent to the cloud server.

需要说明的是,该反馈信息可包括被叫客户端是否愿意接受主叫客户端的呼叫请求。主叫客户端可根据反馈信息判断是否继续进行呼叫。It should be noted that the feedback information may include whether the called client is willing to accept the call request of the calling client. The calling client may determine whether to continue the call according to the feedback information.

在本公开实施例中,可通过以下公式对目标闪信密文进行解密,以生成闪信:In the embodiment of the present disclosure, the target flash message ciphertext can be decrypted by the following formula to generate a flash message:

通过离散对数得到闪信全文明文:Get the full text of the flash message through discrete logarithm:

在一种可能实现的方式中,被叫客户端在收到来实名闪信后,手机终端根据自身的信息与闪信信息进行匹配,匹配等级。In a possible implementation, after the called client receives the real-name flash message, the mobile terminal matches the flash message information with its own information to determine the matching level.

可首先根据电话和姓名进行匹配,确定了电话和姓名后,同时匹配结果将以闪信的形式返回主叫客户端。在完成步骤一后其次根据地理位置信息进行匹配,如果在同一个城市,同时匹配结果将以闪信的形式返回主叫客户端,如果不在同一个城市,根据上方通信录的共同联系人进行确认,如果存在想通联系人判定认识,将匹配结果反馈主叫客户端。3)还可以通过用户轨迹信息,如果两个人轨迹有重叠,且重叠时间间隔较短,重叠次数较多,那么可以判定说,可能认识。将匹配结果反馈主叫客户端。主叫客户端和被叫客户端查看闪信内容后,根据匹配结果提示判断是否继续拨打或接听。(1.提示是否出席同一会议,参加同一活动事项,到达相同场所;2.提示通讯录中的共同好友;3.提示曾经拨打的次数;4.提示曾经拨打此电话的目的。)如被叫客户端同意接听,点击闪信中确定或取消按钮,与主叫客户端进行通话。被叫客户端在接通来电后,再次收到实名霸屏闪信(与第一条闪信的区别,第一次只有实名信息,第二次是自己编辑的闪信名片),被叫客户端可根据霸屏闪信随时查看主叫客户端的身份信息并保存。First, the matching can be performed based on the phone number and name. After the phone number and name are determined, the matching result will be returned to the calling client in the form of a flash message. After completing step 1, the matching is performed based on the geographic location information. If they are in the same city, the matching result will be returned to the calling client in the form of a flash message. If they are not in the same city, they will be confirmed based on the common contacts in the address book above. If there is a common contact, it is determined that they know each other, and the matching result will be fed back to the calling client. 3) You can also use user trajectory information. If the two people's trajectories overlap, and the overlapping time interval is short and the number of overlaps is large, then it can be determined that they may know each other. Feedback the matching result to the calling client. After the calling client and the called client view the content of the flash message, they will determine whether to continue to dial or answer the call based on the matching result prompt. (1. Prompt whether to attend the same meeting, participate in the same event, and arrive at the same place; 2. Prompt common friends in the address book; 3. Prompt the number of times you have called; 4. Prompt the purpose of calling this phone.) If the called client agrees to answer, click the confirm or cancel button in the flash message to talk to the calling client. After the called client answers the call, it receives another real-name flash message (the difference from the first flash message is that the first one only has real-name information, while the second one is a flash message business card edited by itself). The called client can check and save the identity information of the calling client at any time based on the flash message.

进一步地,通话结束后,被叫客户端收到包含主叫客户端实名信息的追尾闪信。若被叫客户端未接听电话,亦可收到闪信及包含主叫客户端实名信息的追尾闪信。Further, after the call is finished, the called client receives a flash message containing the real name information of the calling client. If the called client does not answer the call, the flash message and the flash message containing the real name information of the calling client may also be received.

被叫客户端可根据保存的实名信息,将主叫客户端添加为好友,同时,向主叫客户端反馈另一条信息,包含被叫客户端的身份信息,以及被叫客户端将A添加为好友的确认回执,而且,在后续的好友关系中,可通过通话时长、频次,确定好友关系的亲密度,等级等。The called client can add the calling client as a friend based on the saved real-name information, and at the same time, feedback another message to the calling client, including the identity information of the called client and the confirmation receipt of the called client adding A as a friend. Moreover, in the subsequent friend relationship, the intimacy and level of the friend relationship can be determined by the call duration and frequency.

与上述几种实施例提供的呼叫方法相对应,本公开的一个实施例还提供了一种呼叫装置,由于本公开实施例提供的呼叫装置与上述几种实施例提供的呼叫方法相对应,因此上述呼叫方法的实施方式也适用于本公开实施例提供的呼叫装置,在下述实施例中不再详细描述。Corresponding to the calling methods provided in the above-mentioned embodiments, an embodiment of the present disclosure also provides a calling device. Since the calling device provided in the embodiment of the present disclosure corresponds to the calling methods provided in the above-mentioned embodiments, the implementation methods of the above-mentioned calling methods are also applicable to the calling device provided in the embodiment of the present disclosure and will not be described in detail in the following embodiments.

图8为本公开提出的一种呼叫装置的示意图,应用于主叫客户端,如图8所示,该呼叫装置800,包括:获取模块810、划分模块820、第一加密模块830和第二加密模块840。FIG8 is a schematic diagram of a calling device proposed in the present disclosure, which is applied to a calling client. As shown in FIG8 , the calling device 800 includes: an acquisition module 810 , a division module 820 , a first encryption module 830 and a second encryption module 840 .

其中,获取模块810,用于获取主叫用户信息,并基于主叫用户信息生成呼叫闪信。The acquisition module 810 is used to acquire the calling user information and generate a call flash message based on the calling user information.

划分模块820,用于响应于识别到基于呼叫闪信进行加V呼叫请求,生成第一公钥、第一私钥、第二公钥和第二私钥,并将呼叫闪信随机划分为预设段数的闪信文本。The division module 820 is used to generate a first public key, a first private key, a second public key and a second private key in response to identifying a call request based on a call flash message, and randomly divide the call flash message into a preset number of flash message texts.

第一加密模块830,用于通过同态加密法对闪信文本进行第一加密,以生成闪信密文。The first encryption module 830 is used to perform a first encryption on the flash message text by homomorphic encryption to generate a flash message ciphertext.

第二加密模块840,用于基于第一公钥对闪信密文进行第二加密,以生成签名文本段,将签名文本段、闪信密文、第一私钥、第二公钥和第二私钥通过加V呼叫发送给云端服务器。The second encryption module 840 is used to perform a second encryption on the flash message ciphertext based on the first public key to generate a signature text segment, and send the signature text segment, the flash message ciphertext, the first private key, the second public key and the second private key to the cloud server via a V call.

在本公开的一个实施例中,划分模块820,还用于:随机获取两个不相同的第一质数和第二质数,以及随机获取两个互质的第一互质数和第二互质数,并获取随机长度的随机矩阵;基于第一质数、第二质数、第一互质数、第二互质数、随机长度和随机矩阵,组建第一公钥;基于第一质数,组建第一私钥。In one embodiment of the present disclosure, the partitioning module 820 is further used to: randomly obtain two different first prime numbers and second prime numbers, and randomly obtain two mutually prime first and second mutually prime numbers, and obtain a random matrix of random length; based on the first prime number, the second prime number, the first mutually prime number, the second mutually prime number, the random length and the random matrix, form a first public key; based on the first prime number, form a first private key.

在本公开的一个实施例中,划分模块820,还用于:基于第二互质数和第二质数生成第一元素,以及将第一质数和第二质数的乘积作为第二元素;基于第一元素、第二元素、随机长度和随机矩阵和第一互质数,组建第一公钥。In one embodiment of the present disclosure, the division module 820 is also used to: generate a first element based on a second coprime number and a second prime number, and use the product of the first prime number and the second prime number as the second element; and construct a first public key based on the first element, the second element, the random length and the random matrix and the first coprime number.

在本公开的一个实施例中,第一加密模块830,还用于:对所有闪信文本分别分配第一机密参数,其中,第一机密参数为随机的正整数;针对任一闪信文本,基于第一质数和闪信文本对应的第一机密参数,确定闪信文本的第二机密参数;基于第一机密参数和第二机密参数对闪信文本进行加密,以生成闪信密文。In one embodiment of the present disclosure, the first encryption module 830 is also used to: assign a first confidential parameter to all flash message texts, wherein the first confidential parameter is a random positive integer; for any flash message text, determine a second confidential parameter of the flash message text based on a first prime number and the first confidential parameter corresponding to the flash message text; encrypt the flash message text based on the first confidential parameter and the second confidential parameter to generate a flash message ciphertext.

在本公开的一个实施例中,第一加密模块830,还用于:将1与第一质数相除的余数与,所有第一机密参数的和进行相除,并将商作为闪信文本的第二机密参数。In one embodiment of the present disclosure, the first encryption module 830 is further used to: divide the remainder of dividing 1 by the first prime number by the sum of all first confidential parameters, and use the quotient as the second confidential parameter of the flash message text.

在本公开的一个实施例中,第一加密模块830,还用于:基于第一元素、第一互质数、第一机密参数、第二机密参数对闪信文本进行加密。In one embodiment of the present disclosure, the first encryption module 830 is further used to encrypt the flash message text based on the first element, the first coprime number, the first confidential parameter, and the second confidential parameter.

在本公开的一个实施例中,第二加密模块840,还用于:针对任一闪信密文,对闪信密文分配时间戳;基于时间戳、第一公钥和闪信密文,生成签名文本段。In one embodiment of the present disclosure, the second encryption module 840 is further used to: assign a timestamp to any flash message ciphertext; and generate a signature text segment based on the timestamp, the first public key and the flash message ciphertext.

在本公开的一个实施例中,第二加密模块840,还用于:对时间戳和闪信密文进行哈希运算,并将运算结果与第一公钥相乘,以生成签名文本段。In one embodiment of the present disclosure, the second encryption module 840 is further used to: perform a hash operation on the timestamp and the flash message ciphertext, and multiply the operation result with the first public key to generate a signature text segment.

在本公开的一个实施例中,划分模块820,还用于:随机获取两个不相同的第三质数和第四质数,以及随机获取两个互质的第三互质数和第四互质数,并获取随机长度的随机矩阵;基于第三质数、第四质数、第三互质数、第四互质数、随机长度和随机矩阵,组建第二公钥;基于第三质数,组建第二私钥。In one embodiment of the present disclosure, the division module 820 is also used to: randomly obtain two different third prime numbers and fourth prime numbers, and randomly obtain two mutually prime third coprime numbers and fourth coprime numbers, and obtain a random matrix of random length; based on the third prime number, the fourth prime number, the third coprime number, the fourth coprime number, the random length and the random matrix, form a second public key; based on the third prime number, form a second private key.

在本公开的一个实施例中,获取模块810,还用于:检测主叫用户是否已经注册;响应于检测到注册信息,基于注册信息确定主叫用户信息。In one embodiment of the present disclosure, the acquisition module 810 is further used to: detect whether the calling user has been registered; and in response to detecting the registration information, determine the calling user information based on the registration information.

在本公开的一个实施例中,获取模块810,还用于:响应于未检测到注册信息,生成提示信息,所示提示信息用于提醒主叫用户进行注册。In one embodiment of the present disclosure, the acquisition module 810 is further used to: in response to failure to detect registration information, generate prompt information, where the prompt information is used to remind the calling user to register.

通过将闪信划分为多个闪信文本进行加密传输,可以提高加密的复杂度,同时这种采用加密传输与数字签名验证的方式,提高闪信传递的保密性。By dividing the flash message into multiple flash message texts for encrypted transmission, the complexity of encryption can be increased. At the same time, this method of using encrypted transmission and digital signature verification can improve the confidentiality of flash message transmission.

图9为本公开提出的一种呼叫装置的示意图,应用于云端服务器,如图9所示,该呼叫装置900,包括:检测模块910、认证模块920、排列模块930和发送模块940。FIG9 is a schematic diagram of a calling device proposed in the present disclosure, which is applied to a cloud server. As shown in FIG9 , the calling device 900 includes: a detection module 910 , an authentication module 920 , an arrangement module 930 and a sending module 940 .

检测模块910,用于检测到主叫客户端发送的加V呼叫,获取加V呼叫中的签名文本段、闪信密文、第一私钥、第二公钥和第二私钥。The detection module 910 is used to detect the V call sent by the calling client, and obtain the signature text segment, flash message ciphertext, first private key, second public key and second private key in the V call.

认证模块920,用于基于第一私钥、闪信密文对签名文本段进行签名认证。The authentication module 920 is used to perform signature authentication on the signature text segment based on the first private key and the flash message ciphertext.

排列模块930,用于基于认证结果对闪信密文进行重新排列,以获取目标闪信密文。The arrangement module 930 is used to rearrange the flash message ciphertext based on the authentication result to obtain the target flash message ciphertext.

发送模块940,用于基于第二公钥对目标闪信密文进行加密,以生成闪信全文签名,并将闪信全文签名、第二私钥和目标闪信密文发送给被叫客户端。The sending module 940 is used to encrypt the target flash message ciphertext based on the second public key to generate a flash message full-text signature, and send the flash message full-text signature, the second private key and the target flash message ciphertext to the called client.

在本公开的一个实施例中,认证模块920,还用于:基于第一私钥对闪信密文进行解码,以获取解码文本段;将解码文本段与对应签名文本段进行匹配,即进行签名认证。In one embodiment of the present disclosure, the authentication module 920 is further used to: decode the flash message ciphertext based on the first private key to obtain a decoded text segment; match the decoded text segment with the corresponding signature text segment, that is, perform signature authentication.

在本公开的一个实施例中,认证模块920,还用于:获取闪信密文的时间戳;对时间戳和闪信密文进行哈希运算,并将运算结果与第一私钥相乘,以获取解码文本段。In one embodiment of the present disclosure, the authentication module 920 is further used to: obtain the timestamp of the flash message ciphertext; perform a hash operation on the timestamp and the flash message ciphertext, and multiply the operation result with the first private key to obtain a decoded text segment.

在本公开的一个实施例中,排列模块930,还用于:将认证结果为验证通过的签名文本段对应的候选闪信密文,按照时间戳的顺序进行排列组合,以生成目标闪信密文。In one embodiment of the present disclosure, the arrangement module 930 is further used to arrange and combine the candidate flash message ciphertexts corresponding to the signature text segments with the authentication result of passed verification in the order of timestamps to generate the target flash message ciphertext.

在本公开的一个实施例中,排列模块930,还用于:判断当前通信网络环境是否安全;响应于当前通信网络环境安全,基于第一组合方式对候选闪信密文按照时间戳的顺序进行排列组合;响应于当前通信网络环境不安全,基于第二组合方式对候选闪信密文按照时间戳的顺序进行排列组合。In one embodiment of the present disclosure, the arrangement module 930 is also used to: determine whether the current communication network environment is safe; in response to the current communication network environment being safe, arrange and combine the candidate flash message ciphertexts in the order of timestamps based on a first combination method; in response to the current communication network environment being unsafe, arrange and combine the candidate flash message ciphertexts in the order of timestamps based on a second combination method.

通过第一私钥、闪信密文对签名文本段进行签名认证,通过验证结果可以确定闪信密文在传输的过程中是否存在丢包、被篡改等情况,保证了闪信密文传输的安全性和完整性。The signature text segment is signed and authenticated using the first private key and the flash message ciphertext. The verification result can be used to determine whether the flash message ciphertext has been lost or tampered with during transmission, thereby ensuring the security and integrity of the flash message ciphertext transmission.

图10为本公开提出的一种呼叫装置的示意图,应用于被叫客户端,如图10所示,该呼叫装置1000,包括:监测模块1010、识别模块1020、展示模块1030。FIG10 is a schematic diagram of a calling device proposed in the present disclosure, which is applied to a called client. As shown in FIG10 , the calling device 1000 includes: a monitoring module 1010 , an identification module 1020 , and a display module 1030 .

其中,监测模块1010,用于检测到主叫云端服务器发送的加V呼叫,获取加V呼叫中的闪信全文签名、第二私钥和目标闪信密文。Among them, the monitoring module 1010 is used to detect the V call sent by the calling cloud server, and obtain the full-text signature of the flash message, the second private key and the target flash message ciphertext in the V call.

识别模块1020,用于基于第二私钥和闪信全文签名对目标闪信密文进行签名认证。The identification module 1020 is used to perform signature authentication on the target flash message ciphertext based on the second private key and the full-text signature of the flash message.

展示模块1030,用于响应于签名认证通过,对目标闪信密文进行解密,以生成闪信,并对闪信进行展示。The display module 1030 is used to decrypt the target flash message ciphertext in response to the signature authentication being passed to generate a flash message, and then display the flash message.

在本公开的一个实施例中,识别模块1020,还用于:基于第二私钥对目标闪信密文进行解码,以获取目标闪信密文签名;将目标闪信密文签名与闪信全文签名进行匹配,即进行签名认证。In one embodiment of the present disclosure, the identification module 1020 is further used to: decode the target flash message ciphertext based on the second private key to obtain the target flash message ciphertext signature; match the target flash message ciphertext signature with the flash message full text signature, that is, perform signature authentication.

在本公开的一个实施例中,展示模块1030,还用于:获取用户基于闪信生成的操作指令;基于操作指令生成反馈信息,并发送给云端服务器。In one embodiment of the present disclosure, the display module 1030 is further used to: obtain the operation instruction generated by the user based on the flash message; generate feedback information based on the operation instruction, and send it to the cloud server.

基于第二私钥和闪信全文签名对目标闪信密文进行签名认证,可以防止云端服务器在发送到被叫客户端的过程中数据包出现丢包、被篡改等情况,保证被叫客户端接收到闪信的完整性和真实性。The target flash message ciphertext is signed and authenticated based on the second private key and the full-text signature of the flash message, which can prevent the cloud server from losing or tampering with the data packet when sending it to the called client, and ensure the integrity and authenticity of the flash message received by the called client.

为了实现上述实施例,本公开实施例还提出一种电子设备1100,如图11所示,该电子设备1100包括:处理器1101和处理器通信连接的存储器1102,存储器1102存储有可被至少一个处理器执行的指令,指令被至少一个处理器1101执行,以实现如本公开第一方面实施例的呼叫方法。In order to implement the above-mentioned embodiments, the embodiments of the present disclosure also propose an electronic device 1100, as shown in Figure 11, the electronic device 1100 includes: a processor 1101 and a memory 1102 communicatively connected to the processor, the memory 1102 stores instructions that can be executed by at least one processor, and the instructions are executed by at least one processor 1101 to implement a calling method as an embodiment of the first aspect of the present disclosure.

为了实现上述实施例,本公开实施例还提出一种存储有计算机指令的非瞬时计算机可读存储介质,其中,计算机指令用于使计算机实现如本公开第一方面实施例的呼叫方法。In order to implement the above embodiments, the embodiments of the present disclosure further propose a non-transitory computer-readable storage medium storing computer instructions, wherein the computer instructions are used to enable a computer to implement a calling method as in the first aspect of the embodiments of the present disclosure.

为了实现上述实施例,本公开实施例还提出一种计算机程序产品,包括计算机程序,计算机程序在被处理器执行时实现如本公开第一方面实施例的呼叫方法。In order to implement the above embodiments, the embodiments of the present disclosure further propose a computer program product, including a computer program, which implements the calling method of the first aspect of the present disclosure when executed by a processor.

在本公开的描述中,需要理解的是,术语“中心”、“纵向”、“横向”、“长度”、“宽度”、“厚度”、“上”、“下”、“前”、“后”、“左”、“右”、“竖直”、“水平”、“顶”、“底”“内”、“外”、“顺时针”、“逆时针”、“轴向”、“径向”、“周向”等指示的方位或位置关系为基于附图所示的方位或位置关系,仅是为了便于描述本公开和简化描述,而不是指示或暗示所指的装置或元件必须具有特定的方位、以特定的方位构造和操作,因此不能理解为对本公开的限制。In the description of the present disclosure, it should be understood that the terms "center", "longitudinal", "lateral", "length", "width", "thickness", "up", "down", "front", "back", "left", "right", "vertical", "horizontal", "top", "bottom", "inside", "outside", "clockwise", "counterclockwise", "axial", "radial", "circumferential" and the like indicate orientations or positional relationships based on the orientations or positional relationships shown in the accompanying drawings, and are only for the convenience of describing the present disclosure and simplifying the description, and do not indicate or imply that the referred device or element must have a specific orientation, be constructed and operated in a specific orientation, and therefore should not be understood as a limitation on the present disclosure.

此外,术语“第一”、“第二”仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括一个或者更多个该特征。在本公开的描述中,“多个”的含义是两个或两个以上,除非另有明确具体的限定。In addition, the terms "first" and "second" are used for descriptive purposes only and should not be understood as indicating or implying relative importance or implicitly indicating the number of the indicated technical features. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of the feature. In the description of the present disclosure, the meaning of "plurality" is two or more, unless otherwise clearly and specifically defined.

在本说明书的描述中,参考术语“一个实施例”、“一些实施例”、“示例”、“具体示例”、或“一些示例”等的描述意指结合该实施例或示例描述的具体特征、结构、材料或者特点包含于本公开的至少一个实施例或示例中。在本说明书中,对上述术语的示意性表述不必须针对的是相同的实施例或示例。而且,描述的具体特征、结构、材料或者特点可以在任一个或多个实施例或示例中以合适的方式结合。此外,在不相互矛盾的情况下,本领域的技术人员可以将本说明书中描述的不同实施例或示例以及不同实施例或示例的特征进行结合和组合。In the description of this specification, the description with reference to the terms "one embodiment", "some embodiments", "example", "specific example", or "some examples" etc. means that the specific features, structures, materials or characteristics described in conjunction with the embodiment or example are included in at least one embodiment or example of the present disclosure. In this specification, the schematic representations of the above terms do not necessarily refer to the same embodiment or example. Moreover, the specific features, structures, materials or characteristics described may be combined in any one or more embodiments or examples in a suitable manner. In addition, those skilled in the art may combine and combine the different embodiments or examples described in this specification and the features of the different embodiments or examples, without contradiction.

尽管上面已经示出和描述了本公开的实施例,可以理解的是,上述实施例是示例性的,不能理解为对本公开的限制,本领域的普通技术人员在本公开的范围内可以对上述实施例进行变化、修改、替换和变型。Although the embodiments of the present disclosure have been shown and described above, it is to be understood that the above embodiments are illustrative and are not to be construed as limitations of the present disclosure. A person skilled in the art may change, modify, replace and vary the above embodiments within the scope of the present disclosure.

Claims (24)

1.一种呼叫方法,其特征在于,应用于主叫客户端,包括:1. A calling method, characterized in that it is applied to a calling client, comprising: 获取主叫用户信息,并基于所述主叫用户信息生成呼叫闪信;Acquire calling user information, and generate a call flash message based on the calling user information; 响应于识别到基于所述呼叫闪信进行加V呼叫请求,生成第一公钥、第一私钥、第二公钥和第二私钥,并将所述呼叫闪信随机划分为预设段数的闪信文本;In response to identifying a call request based on the call flash message, generating a first public key, a first private key, a second public key, and a second private key, and randomly dividing the call flash message into a preset number of flash message texts; 通过同态加密法对所述闪信文本进行第一加密,以生成闪信密文;Performing a first encryption on the flash message text by homomorphic encryption to generate a flash message ciphertext; 基于所述第一公钥对所述闪信密文进行第二加密,以生成签名文本段,将所述签名文本段、所述闪信密文、所述第一私钥、所述第二公钥和所述第二私钥通过加V呼叫发送给云端服务器。The flash message ciphertext is encrypted for the second time based on the first public key to generate a signature text segment, and the signature text segment, the flash message ciphertext, the first private key, the second public key and the second private key are sent to the cloud server via a V call. 2.根据权利要求1所述的方法,其特征在于,生成所述第一公钥和所述第一私钥,包括:2. The method according to claim 1, characterized in that generating the first public key and the first private key comprises: 随机获取两个不相同的第一质数和第二质数,以及随机获取两个互质的第一互质数和第二互质数,并获取随机长度的随机矩阵;Randomly obtain two different first prime numbers and second prime numbers, and randomly obtain two mutually prime first coprime numbers and second coprime numbers, and obtain a random matrix of random length; 基于所述第一质数、所述第二质数、所述第一互质数、所述第二互质数、所述随机长度和所述随机矩阵,组建所述第一公钥;Based on the first prime number, the second prime number, the first coprime number, the second coprime number, the random length and the random matrix, forming the first public key; 基于所述第一质数,组建所述第一私钥。Based on the first prime number, the first private key is constructed. 3.根据权利要求2所述的方法,其特征在于,所述基于所述第一质数、所述第二质数、所述第一互质数、所述第二互质数、所述随机长度和所述随机矩阵,组建所述第一公钥,包括:3. method according to claim 2, is characterized in that, described based on described first prime number, described second prime number, described first coprime number, described second coprime number, described random length and described random matrix, set up described first public key, comprising: 基于所述第二互质数和所述第二质数生成第一元素,以及将所述第一质数和所述第二质数的乘积作为第二元素;Generate a first element based on the second coprime number and the second prime number, and use the product of the first prime number and the second prime number as the second element; 基于所述第一元素、所述第二元素、所述随机长度和所述随机矩阵和所述第一互质数,组建所述第一公钥。The first public key is constructed based on the first element, the second element, the random length, the random matrix and the first coprime number. 4.根据权利要求3所述的方法,其特征在于,所述通过同态加密法对所述闪信文本进行第一加密,以生成闪信密文,包括:4. The method according to claim 3, characterized in that the first encryption of the flash message text by homomorphic encryption method to generate the flash message ciphertext comprises: 对所有闪信文本分别分配第一机密参数,其中,所述第一机密参数为随机的正整数;Allocate a first confidential parameter to each flash message text, wherein the first confidential parameter is a random positive integer; 针对任一闪信文本,基于所述第一质数和所述闪信文本对应的第一机密参数,确定所述闪信文本的第二机密参数;For any flash message text, based on the first prime number and the first confidential parameter corresponding to the flash message text, determine the second confidential parameter of the flash message text; 基于所述第一机密参数和所述第二机密参数对所述闪信文本进行加密,以生成所述闪信密文。The flash message text is encrypted based on the first confidential parameter and the second confidential parameter to generate the flash message ciphertext. 5.根据权利要求4所述的方法,其特征在于,所述基于所述第一质数和所述闪信文本对应的第一机密参数,确定所述闪信文本的第二机密参数,包括:5. The method according to claim 4, characterized in that the determining the second confidentiality parameter of the flash message text based on the first prime number and the first confidentiality parameter corresponding to the flash message text comprises: 将1与所述第一质数相除的余数与,所有第一机密参数的和进行相除,并将商作为所述闪信文本的第二机密参数。The remainder obtained by dividing 1 by the first prime number is divided by the sum of all first confidential parameters, and the quotient is used as the second confidential parameter of the flash message text. 6.根据权利要求4所述的方法,其特征在于,所述基于所述第一机密参数和所述第二机密参数对所述闪信文本进行加密,包括:6. The method according to claim 4, characterized in that encrypting the flash message text based on the first confidentiality parameter and the second confidentiality parameter comprises: 基于所述第一元素、所述第一互质数、所述第一机密参数、所述第二机密参数对所述闪信文本进行加密。The flash message text is encrypted based on the first element, the first coprime number, the first confidential parameter, and the second confidential parameter. 7.根据权利要求6所述的方法,其特征在于,所述基于所述第一公钥对所述闪信密文进行第二加密,以生成签名文本段,包括:7. The method according to claim 6, characterized in that the second encryption of the flash message ciphertext based on the first public key to generate a signature text segment comprises: 针对任一闪信密文,对所述闪信密文分配时间戳;For any flash message ciphertext, assign a timestamp to the flash message ciphertext; 基于所述时间戳、所述第一公钥和所述闪信密文,生成签名文本段。A signature text segment is generated based on the timestamp, the first public key and the flash message ciphertext. 8.根据权利要求7所述的方法,其特征在于,所述基于所述时间戳、所述第一公钥和所述闪信密文,生成签名文本段,包括:8. The method according to claim 7, characterized in that the step of generating a signature text segment based on the timestamp, the first public key and the flash message ciphertext comprises: 对所述时间戳和所述闪信密文进行哈希运算,并将运算结果与所述第一公钥相乘,以生成所述签名文本段。A hash operation is performed on the timestamp and the flash message ciphertext, and the operation result is multiplied by the first public key to generate the signature text segment. 9.根据权利要求1所述的方法,其特征在于,生成所述第二公钥和所述第二私钥,包括:9. The method according to claim 1, wherein generating the second public key and the second private key comprises: 随机获取两个不相同的第三质数和第四质数,以及随机获取两个互质的第三互质数和第四互质数,并获取随机长度的随机矩阵;Randomly obtain two different third prime numbers and fourth prime numbers, and randomly obtain two mutually prime third and fourth coprime numbers, and obtain a random matrix of random length; 基于所述第三质数、所述第四质数、所述第三互质数、所述第四互质数、所述随机长度和所述随机矩阵,组建所述第二公钥;Based on the third prime number, the fourth prime number, the third mutually prime number, the fourth mutually prime number, the random length and the random matrix, forming the second public key; 基于所述第三质数,组建所述第二私钥。Based on the third prime number, the second private key is constructed. 10.根据权利要求1所述的方法,其特征在于,所述获取主叫用户信息,还包括:10. The method according to claim 1, wherein obtaining calling user information further comprises: 检测主叫用户是否已经注册;Check whether the calling user has registered; 响应于检测到注册信息,基于所述注册信息确定所述主叫用户信息。In response to detecting the registration information, the caller information is determined based on the registration information. 11.根据权利要求10所述的方法,其特征在于,所述方法还包括:11. The method according to claim 10, characterized in that the method further comprises: 响应于未检测到注册信息,生成提示信息,所示提示信息用于提醒所述主叫用户进行注册。In response to not detecting the registration information, a prompt message is generated, where the prompt message is used to remind the calling user to register. 12.一种呼叫方法,其特征在于,应用于云端服务器,包括:12. A calling method, characterized in that it is applied to a cloud server, comprising: 检测到主叫客户端发送的加V呼叫,获取所述加V呼叫中的签名文本段、闪信密文、第一私钥、第二公钥和第二私钥,所述签名文本段由主叫客户端基于第一公钥对所述闪信密文进行第二加密生成;Detecting a V call sent by the calling client, obtaining a signature text segment, a flash message ciphertext, a first private key, a second public key, and a second private key in the V call, wherein the signature text segment is generated by the calling client performing a second encryption on the flash message ciphertext based on the first public key; 基于所述第一私钥、所述闪信密文对所述签名文本段进行签名认证;Perform signature authentication on the signature text segment based on the first private key and the flash message ciphertext; 基于认证结果对所述闪信密文进行重新排列,以获取目标闪信密文;Rearranging the flash message ciphertext based on the authentication result to obtain the target flash message ciphertext; 基于所述第二公钥对所述目标闪信密文进行加密,以生成闪信全文签名,并将所述闪信全文签名、所述第二私钥和所述目标闪信密文发送给被叫客户端。The target flash message ciphertext is encrypted based on the second public key to generate a flash message full-text signature, and the flash message full-text signature, the second private key and the target flash message ciphertext are sent to the called client. 13.根据权利要求12所述的方法,其特征在于,所述基于所述第一私钥、所述闪信密文对所述签名文本段进行签名认证,包括:13. The method according to claim 12, characterized in that the step of performing signature authentication on the signature text segment based on the first private key and the flash message ciphertext comprises: 基于所述第一私钥对所述闪信密文进行解码,以获取解码文本段;Decoding the flash message ciphertext based on the first private key to obtain a decoded text segment; 将所述解码文本段与对应签名文本段进行匹配,即进行签名认证。The decoded text segment is matched with the corresponding signed text segment, that is, signature authentication is performed. 14.根据权利要求13所述的方法,其特征在于,所述基于所述第一私钥对所述闪信密文进行解码,以获取解码文本段,包括:14. The method according to claim 13, characterized in that the step of decoding the flash message ciphertext based on the first private key to obtain a decoded text segment comprises: 获取所述闪信密文的时间戳;Obtaining the timestamp of the flash message ciphertext; 对所述时间戳和所述闪信密文进行哈希运算,并将运算结果与所述第一私钥相乘,以获取所述解码文本段。A hash operation is performed on the timestamp and the flash message ciphertext, and the operation result is multiplied by the first private key to obtain the decoded text segment. 15.根据权利要求14所述的方法,其特征在于,所述基于认证结果对所述闪信密文进行重新排列,以获取目标闪信密文,包括:15. The method according to claim 14, characterized in that the step of rearranging the flash message ciphertext based on the authentication result to obtain the target flash message ciphertext comprises: 将所述认证结果为验证通过的所述签名文本段对应的候选闪信密文,按照所述时间戳的顺序进行排列组合,以生成所述目标闪信密文。The candidate flash message ciphertexts corresponding to the signature text segment whose authentication result is verified are arranged and combined in the order of the timestamps to generate the target flash message ciphertext. 16.根据权利要求15所述的方法,其特征在于,所述将所述认证结果为验证通过的所述签名文本段对应的候选闪信密文,按照所述时间戳的顺序进行排列组合,包括:16. The method according to claim 15, characterized in that the candidate flash message ciphertexts corresponding to the signature text segment with the authentication result of passed verification are arranged and combined according to the order of the timestamps, comprising: 判断当前通信网络环境是否安全;Determine whether the current communication network environment is secure; 响应于所述当前通信网络环境安全,基于第一组合方式对所述候选闪信密文按照所述时间戳的顺序进行排列组合;In response to the current communication network environment being secure, the candidate flash message ciphertexts are arranged and combined in the order of the timestamps based on a first combination method; 响应于所述当前通信网络环境不安全,基于第二组合方式对所述候选闪信密文按照所述时间戳的顺序进行排列组合。In response to the current communication network environment being insecure, the candidate flash message ciphertexts are arranged and combined in the order of the timestamps based on a second combination method. 17.一种呼叫方法,其特征在于,应用于被叫客户端,包括:17. A calling method, characterized in that it is applied to a called client, comprising: 检测到主叫云端服务器发送的加V呼叫,获取所述加V呼叫中的闪信全文签名、第二私钥和目标闪信密文,所述目标闪信密文由云端服务器基于认证结果对闪信密文进行重新排列生成,所述闪信全文签名由云端服务器基于第二公钥对所述目标闪信密文进行加密生成,所述认证结果由云端服务器基于第一私钥、闪信密文对签名文本段进行签名认证生成,所述签名文本段由主叫客户端基于第一公钥对闪信密文进行第二加密生成;Detecting a V call sent by the calling cloud server, obtaining the full-text signature of the flash message, the second private key and the target flash message ciphertext in the V call, wherein the target flash message ciphertext is generated by the cloud server by rearranging the flash message ciphertext based on the authentication result, the full-text signature of the flash message is generated by the cloud server encrypting the target flash message ciphertext based on the second public key, the authentication result is generated by the cloud server performing signature authentication on the signature text segment based on the first private key and the flash message ciphertext, and the signature text segment is generated by the calling client performing a second encryption on the flash message ciphertext based on the first public key; 基于所述第二私钥和所述闪信全文签名对所述目标闪信密文进行签名认证;Performing signature authentication on the target flash message ciphertext based on the second private key and the flash message full-text signature; 响应于签名认证通过,对所述目标闪信密文进行解密,以生成闪信,并对所述闪信进行展示。In response to the signature authentication being passed, the target flash message ciphertext is decrypted to generate a flash message, and the flash message is displayed. 18.根据权利要求17所述的方法,其特征在于,所述基于所述第二私钥和所述闪信全文签名对所述目标闪信密文进行签名认证,包括:18. The method according to claim 17, characterized in that the step of performing signature authentication on the target flash message ciphertext based on the second private key and the flash message full text signature comprises: 基于所述第二私钥对所述目标闪信密文进行解码,以获取目标闪信密文签名;Decoding the target flash message ciphertext based on the second private key to obtain the target flash message ciphertext signature; 将所述目标闪信密文签名与所述闪信全文签名进行匹配,即进行签名认证。The target flash message ciphertext signature is matched with the flash message full text signature, that is, signature authentication is performed. 19.根据权利要求17所述的方法,其特征在于,所述方法还包括:19. The method according to claim 17, characterized in that the method further comprises: 获取用户基于所述闪信生成的操作指令;Obtaining an operation instruction generated by the user based on the flash message; 基于所述操作指令生成反馈信息,并发送给所述云端服务器。Feedback information is generated based on the operation instruction and sent to the cloud server. 20.一种呼叫装置,其特征在于,应用于主叫客户端,包括:20. A calling device, characterized in that it is applied to a calling client, comprising: 获取模块,用于获取主叫用户信息,并基于所述主叫用户信息生成呼叫闪信;An acquisition module, used for acquiring calling user information and generating a call flash message based on the calling user information; 划分模块,用于响应于识别到基于所述呼叫闪信进行加V呼叫请求,生成第一公钥、第一私钥、第二公钥和第二私钥,并将所述呼叫闪信随机划分为预设段数的闪信文本;A division module, for generating a first public key, a first private key, a second public key, and a second private key in response to identifying a call request based on the call flash message, and randomly dividing the call flash message into flash message texts of a preset number of segments; 第一加密模块,用于通过同态加密法对所述闪信文本进行第一加密,以生成闪信密文;A first encryption module, used for performing a first encryption on the flash message text by homomorphic encryption to generate a flash message ciphertext; 第二加密模块,用于基于所述第一公钥对所述闪信密文进行第二加密,以生成签名文本段,将所述签名文本段、所述闪信密文、所述第一私钥、所述第二公钥和所述第二私钥通过加V呼叫发送给云端服务器。The second encryption module is used to perform a second encryption on the flash message ciphertext based on the first public key to generate a signature text segment, and send the signature text segment, the flash message ciphertext, the first private key, the second public key and the second private key to the cloud server via a V call. 21.一种呼叫装置,其特征在于,应用于云端服务器,包括:21. A calling device, characterized in that it is applied to a cloud server, comprising: 检测模块,用于检测到主叫客户端发送的加V呼叫,获取所述加V呼叫中的签名文本段、闪信密文、第一私钥、第二公钥和第二私钥,所述签名文本段由主叫客户端基于第一公钥对所述闪信密文进行第二加密生成;A detection module, configured to detect a V call sent by a calling client, and obtain a signature text segment, a flash message ciphertext, a first private key, a second public key, and a second private key in the V call, wherein the signature text segment is generated by the calling client performing a second encryption on the flash message ciphertext based on the first public key; 认证模块,用于基于所述第一私钥、所述闪信密文对所述签名文本段进行签名认证;An authentication module, used for performing signature authentication on the signature text segment based on the first private key and the flash message ciphertext; 排列模块,用于基于认证结果对所述闪信密文进行重新排列,以获取目标闪信密文;An arrangement module, used for rearranging the flash message ciphertext based on the authentication result to obtain the target flash message ciphertext; 发送模块,用于基于所述第二公钥对所述目标闪信密文进行加密,以生成闪信全文签名,并将所述闪信全文签名、所述第二私钥和所述目标闪信密文发送给被叫客户端。The sending module is used to encrypt the target flash message ciphertext based on the second public key to generate a flash message full-text signature, and send the flash message full-text signature, the second private key and the target flash message ciphertext to the called client. 22.一种呼叫装置,其特征在于,应用于被叫客户端,包括:22. A calling device, characterized in that it is applied to a called client, comprising: 监测模块,用于检测到主叫云端服务器发送的加V呼叫,获取所述加V呼叫中的闪信全文签名、第二私钥和目标闪信密文,所述目标闪信密文由云端服务器基于认证结果对闪信密文进行重新排列生成,所述闪信全文签名由云端服务器基于第二公钥对所述目标闪信密文进行加密生成,所述认证结果由云端服务器基于第一私钥、闪信密文对签名文本段进行签名认证生成,所述签名文本段由主叫客户端基于第一公钥对闪信密文进行第二加密生成;A monitoring module is used to detect a V call sent by a calling cloud server, and obtain a flash message full-text signature, a second private key, and a target flash message ciphertext in the V call, wherein the target flash message ciphertext is generated by the cloud server rearranging the flash message ciphertext based on an authentication result, the flash message full-text signature is generated by the cloud server encrypting the target flash message ciphertext based on the second public key, the authentication result is generated by the cloud server performing signature authentication on a signature text segment based on the first private key and the flash message ciphertext, and the signature text segment is generated by the calling client performing a second encryption on the flash message ciphertext based on the first public key; 识别模块,用于基于所述第二私钥和所述闪信全文签名对所述目标闪信密文进行签名认证;An identification module, used for performing signature authentication on the target flash message ciphertext based on the second private key and the full-text signature of the flash message; 展示模块,用于响应于签名认证通过,对所述目标闪信密文进行解密,以生成闪信,并对所述闪信进行展示。The display module is used to decrypt the target flash message ciphertext in response to the signature authentication being passed to generate a flash message, and display the flash message. 23.一种电子设备,其特征在于,包括存储器、处理器;23. An electronic device, characterized in that it comprises a memory and a processor; 其中,所述处理器通过读取所述存储器中存储的可执行程序代码来运行与所述可执行程序代码对应的程序,以用于实现如权利要求1-11中任一项所述的方法或者如权利要求12-16中任一项所述的方法或者如权利要求17-19中任一项所述的方法。The processor runs a program corresponding to the executable program code by reading the executable program code stored in the memory, so as to implement the method as claimed in any one of claims 1-11, the method as claimed in any one of claims 12-16, or the method as claimed in any one of claims 17-19. 24.一种计算机可读存储介质,其特征在于,所述计算机可读存储介质中存储有计算机执行指令,所述计算机执行指令被处理器执行时用于实现如权利要求1-11中任一项所述的方法或者如权利要求12-16中任一项所述的方法或者如权利要求17-19中任一项所述的方法。24. A computer-readable storage medium, characterized in that the computer-readable storage medium stores computer-executable instructions, and when the computer-executable instructions are executed by a processor, they are used to implement the method according to any one of claims 1 to 11, the method according to any one of claims 12 to 16, or the method according to any one of claims 17 to 19.
CN202310873231.2A 2023-07-14 2023-07-14 Calling method, device, electronic device and storage medium Active CN117155601B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310873231.2A CN117155601B (en) 2023-07-14 2023-07-14 Calling method, device, electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310873231.2A CN117155601B (en) 2023-07-14 2023-07-14 Calling method, device, electronic device and storage medium

Publications (2)

Publication Number Publication Date
CN117155601A CN117155601A (en) 2023-12-01
CN117155601B true CN117155601B (en) 2024-07-26

Family

ID=88903402

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310873231.2A Active CN117155601B (en) 2023-07-14 2023-07-14 Calling method, device, electronic device and storage medium

Country Status (1)

Country Link
CN (1) CN117155601B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104506731A (en) * 2014-12-26 2015-04-08 北京奇虎科技有限公司 Unfamiliar call reminding method and unfamiliar call reminding device
CN114710591A (en) * 2022-06-01 2022-07-05 浙江鹏信信息科技股份有限公司 Method and system for preventing harassment fraud calls

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009028137A1 (en) * 2007-08-28 2009-03-05 Panasonic Corporation Key terminal apparatus, lsi for encryption process, unique key producing method, and content system
TWI711293B (en) * 2019-03-26 2020-11-21 宏碁股份有限公司 Method of identity authentication for voice over internet protocol call and related device
US20220086276A1 (en) * 2020-09-16 2022-03-17 Douglas Ranalli Verified Calling Party Information Display Confirmation System
CN115915112A (en) * 2021-09-30 2023-04-04 华为技术有限公司 Call processing method, related equipment and storage medium
CN114827354A (en) * 2022-04-21 2022-07-29 微位(深圳)网络科技有限公司 Identity authentication information display method and device, electronic equipment and readable storage medium
CN114845301A (en) * 2022-04-28 2022-08-02 微位(深圳)网络科技有限公司 Number verification method, terminal and system based on super SIM card

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104506731A (en) * 2014-12-26 2015-04-08 北京奇虎科技有限公司 Unfamiliar call reminding method and unfamiliar call reminding device
CN114710591A (en) * 2022-06-01 2022-07-05 浙江鹏信信息科技股份有限公司 Method and system for preventing harassment fraud calls

Also Published As

Publication number Publication date
CN117155601A (en) 2023-12-01

Similar Documents

Publication Publication Date Title
CN111949953B (en) Identity authentication method, system and device based on block chain and computer equipment
CN109471844B (en) File sharing method and device, computer equipment and storage medium
CN109462483B (en) Block chain based mail evidence storage method, device, equipment and storage medium
CN111949954B (en) Login verification method, login verification system and computer storage medium
Farb et al. Safeslinger: easy-to-use and secure public-key exchange
TWI672073B (en) Communication, communication access/call method, device and system between mobile terminals
CN110519268B (en) Voting method, device, equipment, system and storage medium based on block chain
CN108234442B (en) Method, system and readable storage medium for acquiring contract
CN112003696A (en) SM9 key generation method, system, electronic equipment, device and storage medium
Shirvanian et al. On the pitfalls of end-to-end encrypted communications: A study of remote key-fingerprint verification
CN113365264B (en) Block chain wireless network data transmission method, device and system
CN110417740B (en) User data processing method, intelligent terminal, server and storage medium
CN112182627A (en) Block chain digital certificate management method and system based on mobile equipment
CN117155601B (en) Calling method, device, electronic device and storage medium
JP2020092287A (en) Communication device, communication method, and communication program
CN111726320B (en) Data processing method, device and equipment
JP6325654B2 (en) Network service providing apparatus, network service providing method, and program
US12348635B2 (en) System and methods for interactive document sharing and authentication with privacy guarantee
Chen et al. Threshold identity authentication signature: Impersonation prevention in social network services
TWI660324B (en) Method for producing electronic contracts certified by a user of a telecommunications operator
US20220083693A1 (en) Method for certifying transfer and content of a transferred file
CN116112167B (en) Key management system, method and device
CN116132086B (en) Network communication method, device, equipment and storage medium
CN119603074B (en) Interface communication method, device and system
CN115022820B (en) Verification method, terminal and system of 5G message

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant