Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for verifying SMS and transmitting reliability classification based on cipher technology mark

A cryptographic technology and short message technology, which is applied in the field of identity-based cryptographic technology to authenticate short message senders and realize reliable classified delivery, which can solve problems such as normal short message congestion and failure to receive, and achieve reduced processing pressure and a good business model And management mode, high efficiency effect

Active Publication Date: 2009-12-23
SHENZHEN OLYM INFORMATION SECURITY TECHOLOGY CO LTD
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the other hand, since all processing must be processed centrally at the aggregation gateway, the processing capacity required per second for the processing center is very high. During holidays or peak periods of SMS, there will be cases where the processing cannot be completed, resulting in normal SMS congestion or reception. less than

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for verifying SMS and transmitting reliability classification based on cipher technology mark
  • Method for verifying SMS and transmitting reliability classification based on cipher technology mark
  • Method for verifying SMS and transmitting reliability classification based on cipher technology mark

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment

[0077] The cryptographic center of the present invention is established by the identification-based cryptographic technology, (1) to determine the use of an identification signature algorithm, such as the IBS-2 algorithm in the prior art 1; (2) to generate system parameters (including the master key). See the appendix in Technique 1 for an example.

[0078] User application service process. First of all, the user should apply to the password center for registration. Individual users generally use their short message address as their identification. Other users can use their own legal identification as their registration identification, such as IP address, domain name, etc., or short message address, password center. Any registration authentication method can be used, such as "a method for authentication of user identity of public network security communication service based on identity cryptography" disclosed in CN1697379, as long as it can effectively prove that the identity ...

Embodiment approach

[0083] When processing a signed short message, verify whether the user's identification is in the identification blacklist, and if it is in the blacklist, it will be treated as a spam short message;

[0084] For short messages without signatures, short messages beyond the validity period of the service, and short messages whose signature validity has not passed the verification, the short messages are filtered according to ordinary short messages;

[0085] The present invention can also include the update process of identifying the blacklist: the user thinks that a short message that has passed the signature authentication is a spam short message, and can send the entire short message to the password center to report the short message; the password center verifies the reported short message After verifying the authenticity of the signature, determine whether the reported short message is a spam short message according to known rules, and determine whether to blacklist its user ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A short message authentication and reliable classified transmission method based on logo-based cryptographic technology, including: the user applies for registration with a legal and effective logo representing his own identity to the cryptographic center, and the cryptographic center provides the user with a private key and client software. The short message is signed. After receiving the short message, the user judges whether it is a short message with a signature. If the signature is verified successfully, the short message will be regarded as a valid short message. The invention has the advantages of simple method, easy implementation, accurate and reliable work, high efficiency, and convenient large-scale popularization.

Description

technical field [0001] The invention belongs to the field of network technology, in particular to a method for authenticating a short message sender and realizing reliable classified transmission based on an identification-based cryptographic technology. Short messages include mobile text messages, instant messaging QQ, MSN, etc. Background technique [0002] With the development of wireless communication and the Internet, mobile phone short messages, QQ, MSN, etc. have become important communication tools for people, and mobile phone short messages and MSN are gradually integrating and interoperating. There are also many problems, one of which is the proliferation of spam messages. As a media for information dissemination, without effective supervision methods, it will inevitably bring a lot of harmful information and bring harm to the society. During the SARS raging period, many unfounded rumors were spread through text messages. The scope is beyond people's expectations...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/14H04W12/04H04W12/06H04L9/32H04W12/041H04W12/08H04W12/088
Inventor 程朝辉王李琰
Owner SHENZHEN OLYM INFORMATION SECURITY TECHOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products