Disclosure of Invention
The invention mainly aims to provide a method and a device for safely transmitting broadcast messages, which realize the safe transmission of the broadcast messages by an agreed encryption and decryption technology, and can trigger a mobile terminal to enter a key updating operation through a key updating instruction, thereby further improving the safety of the broadcast messages.
In order to achieve the above object, a method for securely transmitting a broadcast message provided by the present invention includes:
the mobile terminal acquires a broadcast message sent by an information release system;
judging whether the broadcast message contains a characteristic bit string, if so, updating a key in the mobile terminal;
otherwise, the broadcast message is decrypted according to the key in the mobile terminal, and the decrypted message is displayed on the mobile terminal.
Optionally, before acquiring the broadcast message sent by the information distribution system, the mobile terminal further includes:
the mobile terminal and the information issuing system agree an encryption and decryption algorithm in advance to encrypt and decrypt the broadcast message;
the security center generates an encryption and decryption key according to the encryption and decryption algorithm.
Optionally, the updating the key in the mobile terminal includes:
intercepting key parameter information from all broadcast messages containing characteristic bit strings, and storing the key parameter information into a preset complete key storage space;
and splicing all the intercepted key parameter information into a complete key, and replacing the key in the mobile terminal with the complete key.
Optionally, after the updating the key in the mobile terminal, the method further includes:
and decrypting the subsequent broadcast message by the replaced new key.
Optionally, the broadcast message further includes: the length of the complete key, the content and length of the key parameter information, and the position of the key parameter information in the complete key storage space.
As another aspect of the present invention, there is provided a broadcast message secure transmission apparatus, including:
the acquisition module is used for the mobile terminal to acquire the broadcast message sent by the information release system;
the judging module is used for judging whether the broadcast message contains the characteristic bit string;
the updating module is used for updating the key in the mobile terminal when the broadcast message contains the characteristic bit string;
and the decryption display module is used for decrypting the broadcast message according to the key in the mobile terminal when the broadcast message does not contain the characteristic bit string, and displaying the decrypted message on the mobile terminal.
Optionally, the method further comprises:
the appointed module is used for the mobile terminal and the information issuing system to appoint an encryption and decryption algorithm in advance to encrypt and decrypt the broadcast message;
and the key generation module is used for generating an encrypted and decrypted key by the security center according to the encryption and decryption algorithm.
Optionally, the update module includes:
the intercepting unit is used for intercepting key parameter information from all broadcast messages containing the characteristic bit strings and storing the key parameter information into a preset complete key storage space;
and the splicing unit is used for splicing all the intercepted key parameter information into a complete key and replacing the key in the mobile terminal with the complete key.
Optionally, the method further comprises:
and the subsequent decryption module is used for decrypting the subsequent broadcast message through the replaced new key.
Optionally, the broadcast message further includes: the length of the complete key, the content and length of the key parameter information, and the position of the key parameter information in the complete key storage space.
The invention provides a method and a device for safely transmitting broadcast messages, wherein the method comprises the following steps: the mobile terminal acquires a broadcast message sent by an information release system; judging whether the broadcast message contains a characteristic bit string, if so, updating a key in the mobile terminal; otherwise, the broadcast message is decrypted according to the secret key in the mobile terminal, the decrypted message is displayed on the mobile terminal, the secure transmission of the broadcast message is realized through the appointed encryption and decryption technology, the mobile terminal is triggered to enter the secret key updating operation through the secret key updating instruction, and the security of the broadcast message is further improved.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no specific meaning in themselves. Thus, "module" and "component" may be used in a mixture.
Example one
As shown in fig. 1, in this embodiment, a method for securely transmitting a broadcast message includes:
s10, the mobile terminal acquires the broadcast message sent by the information release system;
s20, judging whether the broadcast message contains the characteristic bit string, if so, S30 updating the key in the mobile terminal;
otherwise, S40, the broadcast message is decrypted according to the key in the mobile terminal, and the decrypted message is displayed on the mobile terminal.
In this embodiment, secure transmission of the broadcast message is achieved through an agreed encryption and decryption technology, and the mobile terminal is triggered to enter a key update operation through the key update instruction, so that the security of the broadcast message is further improved.
In this embodiment, the mobile terminal includes: the terminal can receive broadcast messages through a broadcast channel, such as a smart phone, a function machine, a smart bracelet and a wearable device.
In this embodiment, the mobile terminal needs to make an improvement on the cell broadcast software module by the terminal manufacturer before leaving the factory: firstly, a storage RSA key (at least 2048 bit) is supported; the mobile terminal supports RSA encryption and decryption algorithm; secondly, the cell broadcast software module of the mobile terminal needs to process the original code stream of the broadcast message from the communication chip (such as a high-pass chip).
In the embodiment, only the information distribution system software and the mobile terminal need to be improved, the technical transformation of the operator network is not needed, and the technology is feasible and the cost is low.
In this embodiment, since the mobile terminal enforces the decryption technique, the information broadcast by the pseudo base station is recognized by the mobile terminal as illegal information and is not displayed or is displayed as scrambled information. The pseudo base station can not play a role in cheating or rumor distribution for mobile terminal users, and the great hidden danger in the information security field is relieved.
In this embodiment, if the broadcast message does not include the feature bit string, the mobile terminal decrypts the broadcast message by using the factory-set key (RSA public key), which indicates that the key does not need to be updated. If the information issuing system and the mobile terminal also agree with signature verification, the terminal also needs to verify whether the signature of the information is legal or not, and the message content is directly discarded if the signature is illegal. If the broadcast message comes from a legal publishing system, the mobile terminal user can see the correct message content; if the broadcast message comes from a pseudo base station or other illegal equipment, the mobile terminal user can not see the message or only see the messy codes.
In this embodiment, when the broadcast information received by the mobile terminal includes a feature bit string (for example, 0 xfffffffffffff), it indicates that the broadcast information is key update instruction information, and the mobile terminal enters a key update operation state, at this time, the terminal does not need to regularly connect to the internet to detect whether the security center has an updated key, so that the power consumption of the terminal can be saved, and the impact on the mobile communication network caused by the key update of a large number of mobile terminals connected to the internet is also avoided; the method avoids the payment of the flow fee by the mobile terminal user, and can realize the key update even if the function machine without the internet surfing function is available.
As shown in fig. 2, in this embodiment, before the step S10, the method further includes:
s01, the mobile terminal and the information issuing system agree in advance to encrypt and decrypt the broadcast message by an encryption and decryption algorithm;
and S02, the security center generates an encryption and decryption key according to the encryption and decryption algorithm.
In this embodiment, the encryption and decryption algorithm is an RSA asymmetric encryption and decryption algorithm, and the encryption and decryption algorithm includes: public key, private key, encryption decryption algorithm, its encryption decryption process is: encrypting the broadcast information through an encryption algorithm and a private key to obtain a ciphertext, wherein the private key is needed in the encryption process; and decrypting the ciphertext through a decryption algorithm and a public key to obtain a plaintext, wherein the decryption algorithm and the public key are needed in the decryption process.
In this embodiment, the security center generates the encrypted and decrypted keys according to the encryption and decryption algorithm, and is also responsible for performing security authentication on the information distribution system, and after the security authentication is passed, the information distribution system obtains the latest keys (the private key and the public key) from the security center.
As shown in fig. 3, in the present embodiment, the step S30 includes:
s31, intercepting key parameter information from all broadcast messages containing characteristic bit strings, and storing the key parameter information into a preset complete key storage space;
and S32, splicing all the intercepted key parameter information into a complete key, and replacing the key in the mobile terminal with the complete key.
In this embodiment, the broadcast message further includes, in addition to the key parameter information: the length of the complete key, the content and length of the key parameter information, and the position of the key parameter information in the complete key storage space.
As shown in fig. 4, in this embodiment, after step S30, the method further includes:
and S50, decrypting the subsequent broadcast message by the replaced new key.
Example two
As shown in fig. 5, in this embodiment, an apparatus for securely transmitting a broadcast message includes:
an obtainingmodule 10, configured to obtain, by a mobile terminal, a broadcast message sent by an information distribution system;
a judgingmodule 20, configured to judge whether the broadcast message includes a feature bit string;
an updatingmodule 30, configured to update a key in the mobile terminal when the broadcast message includes the feature bit string;
and thedecryption display module 40 is configured to decrypt the broadcast message according to the key in the mobile terminal when the broadcast message does not contain the characteristic bit string, and display the decrypted message on the mobile terminal.
In this embodiment, secure transmission of the broadcast message is achieved through an agreed encryption and decryption technology, and the mobile terminal is triggered to enter a key update operation through the key update instruction, so that the security of the broadcast message is further improved.
In this embodiment, the mobile terminal includes: the terminal can receive broadcast messages through a broadcast channel, such as a smart phone, a function machine, a smart bracelet and a wearable device.
In this embodiment, the mobile terminal needs to make an improvement on the cell broadcast software module by the terminal manufacturer before leaving the factory: firstly, a storage RSA key (at least 2048 bit) is supported; the mobile terminal supports RSA encryption and decryption algorithm; secondly, the cell broadcast software module of the mobile terminal needs to process the original code stream of the broadcast message from the communication chip (such as a high-pass chip).
In the embodiment, only the information issuing system software and the mobile terminal need to be improved, the technical transformation of the operator network is not needed, and the technology is feasible and the cost is low.
In this embodiment, since the mobile terminal enforces the decryption technique, the information broadcast by the pseudo base station is recognized by the mobile terminal as illegal information and is not displayed or is displayed as scrambled information. The pseudo base station can not play a role in cheating or rumor distribution for mobile terminal users, and the great hidden danger in the information security field is relieved.
In this embodiment, if the broadcast message does not include the feature bit string, the mobile terminal decrypts the broadcast message by using the factory-set key (RSA public key), which indicates that the key does not need to be updated. If the information issuing system and the mobile terminal also agree with signature verification, the terminal also needs to verify whether the signature of the information is legal or not, and the message content is directly discarded if the signature is illegal. If the broadcast message comes from a legal publishing system, the mobile terminal user can see the correct message content; if the broadcast message comes from a pseudo base station or other illegal equipment, the mobile terminal user can not see the message or only see the messy codes.
In this embodiment, when the broadcast information received by the mobile terminal includes a feature bit string (for example, 0 xfffffffffffff), it indicates that the broadcast information is key update instruction information, and the mobile terminal enters a key update operation state, at this time, the terminal does not need to regularly connect to the internet to detect whether the security center has an updated key, so that the power consumption of the terminal can be saved, and the impact on the mobile communication network caused by the key update of a large number of mobile terminals connected to the internet is also avoided; the method avoids the payment of the flow fee by the mobile terminal user, and can realize the key update even if the function machine without the internet surfing function is available.
As shown in fig. 6, in this embodiment, the apparatus for securely transmitting a broadcast message further includes:
theappointment module 50 is used for the mobile terminal and the information issuing system to appoint an encryption and decryption algorithm in advance to encrypt and decrypt the broadcast message;
and akey generation module 60 for the security center to generate the encrypted and decrypted keys according to the encryption and decryption algorithm.
In this embodiment, the encryption and decryption algorithm is an RSA asymmetric encryption and decryption algorithm, and the encryption and decryption algorithm includes: public key, private key, encryption decryption algorithm, its encryption decryption process is: encrypting the broadcast information through an encryption algorithm and a private key to obtain a ciphertext, wherein the private key is needed in the encryption process; and decrypting the ciphertext through a decryption algorithm and a public key to obtain a plaintext, wherein the decryption algorithm and the public key are needed in the decryption process.
In this embodiment, the security center generates the encrypted and decrypted keys according to the encryption and decryption algorithm, and is also responsible for performing security authentication on the information distribution system, and after the security authentication is passed, the information distribution system obtains the latest keys (the private key and the public key) from the security center.
As shown in fig. 7, in this embodiment, the update module includes:
an interceptingunit 31, configured to intercept key parameter information from all broadcast messages including the feature bit string, and store the key parameter information in a preset complete key storage space;
and thesplicing unit 32 is configured to splice all the intercepted key parameter information into a complete key, and replace the key in the mobile terminal with the complete key.
In this embodiment, the broadcast message further includes, in addition to the key parameter information: the length of the complete key, the content and length of the key parameter information, and the position of the key parameter information in the complete key storage space.
As shown in fig. 8, in this embodiment, the apparatus for securely transmitting a broadcast message further includes:
and asubsequent decryption module 70 for decrypting the subsequent broadcast message by the replaced new key.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.