Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and terminal for message verification

A terminal and message technology, applied in the field of message verification, can solve the problems that affect the timeliness of PWS message verification, user terminals cannot know implicit certificates, and do not know PWS verification.

Active Publication Date: 2018-04-20
HUAWEI TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] However, when multiple CAs are configured in the user terminal, after receiving the PWS message, the user terminal cannot know which CA the received implicit certificate belongs to, or the user The terminal does not know which CA's public key to use to complete the verification of the PWS message
Therefore, the user terminal can only try one by one, so it is very likely that the user terminal will not get the correct key until the last one, which greatly affects the timeliness of PWS message verification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and terminal for message verification
  • Method and terminal for message verification
  • Method and terminal for message verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0091] The embodiment of the present invention also provides a message verification method, which is described by using the pre-configured information for determining the CA public key as the corresponding relationship between the identity information of the cell broadcast entity and the information of the CA, specifically as figure 2 As shown, the method includes:

[0092] 201. Receive an event message sent by a cell broadcast entity, where the event message carries the signature of the cell broadcast entity on the event message and the implicit certificate issued to the cell broadcast entity by a certificate center CA, wherein the implicit The certificate carries the identification information of the cell broadcast entity.

[0093] The identification information of the cell broadcast entity is used to obtain the public key of the CA in combination with the pre-stored information for determining the CA public key; the implicit certificate issued by the CA to the cell broadca...

Embodiment 3

[0197] The embodiment of the present invention provides a terminal 90 for message verification, specifically as Figure 9 As shown, the terminal includes a receiver 91 and a processor 92 .

[0198] The receiver 91 is configured to receive an event message sent by a cell broadcast entity, and send the event message to the processor 92, where the event message carries a signature of the cell broadcast entity on the event message And the implicit certificate issued by the certificate authority CA to the cell broadcast entity.

[0199] The event message may be a public alarm message or other messages carrying implicit certificates, which is not specifically limited in this embodiment of the present invention.

[0200] The implicit certificate issued by the CA to the cell broadcast entity is used to obtain the public key of the cell broadcast entity; the signature of the cell broadcast entity to the event message is used to verify the legitimacy of the event message .

[0201] T...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention provide a message verification method and terminal, which can improve the timeliness of event message verification. The method includes: receiving an event message sent by a cell broadcast entity; obtaining the public key of the CA according to pre-configured and information on determining the CA public key obtained from the network side, or according to information on the CA obtained from the network side; Then according to the obtained public key of the CA and the implicit certificate of the cell broadcast entity, obtain the public key of the cell broadcast entity; according to the public key of the cell broadcast entity, verify that the cell broadcast entity has The signature of the event message, and finally judge the legitimacy of the event message according to the verification result. The invention is applicable to the communication field.

Description

technical field [0001] The present invention relates to the communication field, in particular to a message verification method and terminal. Background technique [0002] PWS (Public Warning System) is a public warning system that warns of natural disasters or man-made accidents that may cause loss of human life and property. The PWS service is provided to the user by the telecom operator, and its content can be provided by the alarm information supply department. When a public alarm event occurs, the alarm information supply department generates alarm information and sends it to the operator. Operators use their networks to send alert messages to user terminals. The security requirements are particularly high since the news released by PWS has the potential to cause mass panic. According to the security requirements of PWS, the security mechanism should identify the sending source of the alarm notification, thereby preventing false alarm notifications and protecting the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30H04L29/06H04W4/90H04W12/10
CPCH04L9/3066H04L9/3247H04L9/3268H04L63/0823H04L63/126H04W4/90H04W12/106H04L9/3263
Inventor 毕晓宇陈璟许怡娴熊春山
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products