Message source verification method, device and system and message sending method and device

A verification method and source technology, applied in the field of communication, can solve the problems of property loss, difficulty for users to identify the authenticity of news sources, forgery and counterfeiting of news sources, etc.

Active Publication Date: 2018-07-10
ALIBABA GRP HLDG LTD
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in real life, there are malicious message senders who use fake base stations to forge the phone numbers of official organizations to send mobile phone text messages containing fraudulent content to users, or claim to be an official organization to send emails containing false content to users.
After receiving the above-mentioned notification message, the user may think that the official notification message can be trusted, so according to the instructions of the message content, perform operations such as bank transfers and order counterfeit products, resulting in property losses
[0004] Therefore, since the source of the notification message may be forged and counterfeited, it is difficult for the user to identify the authenticity of the source of the message, and there is a risk of property loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Message source verification method, device and system and message sending method and device
  • Message source verification method, device and system and message sending method and device
  • Message source verification method, device and system and message sending method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0193] figure 1 An application scenario diagram of message source verification according to Embodiment 1 of the present application is shown. It can be seen from the figure that in the message verification scenario of the embodiment of the present application, there are a message issuer, a user terminal, an authenticity verifier and a root certificate issuing authority.

[0194] Among them, the sender of the message may be a trusted base station, a message server of an official organization, or other user terminals trusted by the message receiver, or a fake base station that sends notification messages containing fraudulent or false content, or other untrustworthy The sender of malicious messages such as user terminals.

[0195] Specifically, the message issuer may request a message issue certificate from the root certificate issuing authority, and the root certificate issuer may return a corresponding message issue certificate according to the message issuer. The message is...

Embodiment 2

[0203] figure 2 A schematic diagram of information exchange for message source verification according to Embodiment 2 of the present application is shown. It can be seen from the figure that information exchange is performed among the message sender, user terminal, authenticity verifier and root certificate issuing authority to complete the verification of the source of the message.

[0204] Specifically, the root certificate issuing authority can issue a message release certificate to the message sender, and the message sender uses the message release certificate to sign the content of the message to be sent, and compresses the message signature in Chinese encoding to shorten the The length of the message signature. The sender of the message composes the message content and the message signature into a notification message, and sends the notification message to the user terminal using a conventional untrusted and unverifiable channel of the message source. For example, not...

Embodiment 3

[0207] image 3 It shows a flow chart of the steps of a message source verification method in Embodiment 3 of the present application, which may specifically include the following steps:

[0208] Step 301, obtain a notification message to be verified; the notification message includes message content and an actual message signature.

[0209] In practical applications, when sending a notification message to a certain target client, the message source end used to send the notification message may, according to the source identifier of the message source end, select from, for example, PKI (Public Key Infrastructure, public key infrastructure), The certificate issuing platform such as CA (Certificate Authority, certification center) obtains the corresponding target public key certificate.

[0210] In practical applications, the target public key certificate can also be pre-stored in the message source, and the target public key certificate can be obtained locally when a notificat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a message source verification method and device. The method comprises the steps that a notification message to be verified is acquired, wherein the notification message includes the message content and the actual message signature; the target public key certificate acquired by the message source indicated by the message content is acquired; the standard message signature of the message content is generated by using the target public key certificate; and the actual message signature of the notification message to be verified is judged to be consistent with the standard message signature so that the notification message is ensured to be from the message source indicated by the message content. The reliability of the message source of the notificationmessage can be identified so that the risk of property loss caused by the fact that the forged and fake message source is difficult to be identified by the user can be reduced.

Description

technical field [0001] The present application relates to the field of communication technology, and in particular, to a message source verification method and a message source verification device, and a message sending method and a message sending device, as well as a method for providing an interactive interface and an interactive equipment, and a source verification system. Background technique [0002] At present, users often receive notification messages in various forms such as short messages, emails, and instant messaging messages. Usually, the user will judge whether the notification message is trustworthy according to the source of the notification message. For example, a user may believe that an email whose title is a bank institution is trustworthy, or a user may believe that a text message whose phone number is a public number of an official institution is trustworthy. [0003] However, in real life, there are malicious message senders who use fake base station...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3247H04L9/3263H04L63/0823H04L63/12H04L63/30
Inventor 王康
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products