CN116800405A - Lost device searching method and device, electronic device and storage medium - Google Patents

Lost device searching method and device, electronic device and storage medium Download PDF

Info

Publication number
CN116800405A
CN116800405A CN202210260725.9A CN202210260725A CN116800405A CN 116800405 A CN116800405 A CN 116800405A CN 202210260725 A CN202210260725 A CN 202210260725A CN 116800405 A CN116800405 A CN 116800405A
Authority
CN
China
Prior art keywords
encryption
candidate
target
position information
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210260725.9A
Other languages
Chinese (zh)
Inventor
陈文轩
范楠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN202210260725.9A priority Critical patent/CN116800405A/en
Publication of CN116800405A publication Critical patent/CN116800405A/en
Pending legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The disclosure provides a lost device searching method, a lost device searching device, electronic equipment and a storage medium, and relates to the technical field of data processing. The method comprises the following steps: acquiring a current encryption identifier sent by the searched equipment in a lost state; obtaining a target encryption public key corresponding to the current encryption identifier from a server; encrypting the position information of the relay equipment based on the target encryption public key to generate encrypted position information; and transmitting the current encryption identification and the encryption position information to a server. The method can enable the searched device to upload the encrypted position information by the aid of the nearby relay device under the condition of limited capacity, the uploaded encrypted position information cannot be decrypted by the server, and only the pre-paired tracking device can decrypt the position information.

Description

Lost device searching method and device, electronic device and storage medium
Technical Field
The disclosure relates to the technical field of data processing, and in particular relates to a lost device searching method, a lost device searching device, electronic equipment and a storage medium.
Background
In the related art, if the mobile device of the user is lost, the lost device may send its own location information to the server, and forward the location information to the tracking device through the server. However, in this case, the location information of the lost device can be easily acquired by a server or other terminal device, resulting in leakage of private data of the user. And, if the mobile device has limited capability, reporting of the location information cannot be achieved. Therefore, how to upload and protect the location information of the mobile device becomes a problem to be solved.
Disclosure of Invention
The disclosure provides a lost device searching method, a lost device searching device, electronic equipment and a storage medium.
In a first aspect, the present disclosure provides a method for searching for a lost device, which is applicable to a relay device, and includes:
acquiring a current encryption identifier sent by the searched equipment in a lost state;
obtaining a target encryption public key corresponding to the current encryption identifier from a server;
encrypting the position information of the relay equipment based on the target encryption public key to generate encrypted position information;
and transmitting the current encryption identification and the encryption position information to a server.
The method of the embodiment of the disclosure can enable the searched device to upload the encrypted position information by the aid of the nearby relay device under the condition of limited capacity, the uploaded encrypted position information cannot be decrypted by the server, and only the pre-paired tracking device can decrypt the position information.
In a second aspect, the present disclosure provides another method for searching for a lost device, suitable for tracking a device, including:
responding to the tracking equipment in an equipment searching mode, and acquiring the current encryption identification of the tracking equipment;
acquiring encryption position information of the relay equipment from a server based on the current encryption identification, wherein the lost equipment to be searched is in the search range of the relay equipment;
determining a target encryption private key corresponding to the current encryption identifier;
and decrypting the encrypted position information based on the target encryption private key to obtain the position information of the searched device.
In the embodiment of the disclosure, the tracking device stores a plurality of groups of encryption identifications and encryption private keys, so that a target encryption private key corresponding to a current encryption identification can be obtained from the tracking device, encryption position information is obtained from a server based on the current encryption identification, and the encryption position information is decrypted based on the target encryption private key. In this way, it is ensured that only the tracking device can acquire the encrypted position information from the server, and that only the tracking device has the target encryption private key, and can decrypt the encrypted position information.
In a third aspect, the present disclosure provides another method for searching for a lost device, which is applicable to a server, and includes:
Acquiring a first encryption identifier and encryption position information sent by a relay device, and storing the encryption position information according to the first encryption identifier;
acquiring a device search request, wherein the device search request is generated by the tracking device based on the second encryption identifier;
and acquiring target encryption position information from the stored encryption position information based on the device search request, and transmitting the target encryption position information to the tracking device for decryption.
According to the embodiment of the disclosure, the server can store the encryption position information sent by the relay device, acquire the target encryption position information based on the device search request sent by the tracking device and send the target encryption position information to the tracking device, and in this way, only the tracking device can be ensured to acquire the encryption position information from the server. Meanwhile, the server cannot decrypt the encrypted position information, so that the user privacy data is prevented from being revealed.
In a fourth aspect, the present disclosure provides a lost device searching apparatus, including:
the first acquisition module is used for acquiring a current encryption identifier sent by the searched equipment in a lost state;
the second acquisition module is used for acquiring a target encryption public key corresponding to the current encryption identifier from the server;
The encryption module is used for encrypting the position information of the relay equipment based on the target encryption public key to generate encrypted position information;
and the sending module is used for sending the current encryption identification and the encryption position information to the server.
In a fifth aspect, the present disclosure provides another lost device searching apparatus, including:
the first acquisition module is used for responding to the fact that the tracking equipment is in an equipment searching mode and acquiring the current encryption identification of the tracking equipment;
the second acquisition module is used for acquiring the encryption position information of the relay equipment from the server based on the current encryption identification, wherein the lost equipment to be searched is in the search range of the relay equipment;
the determining module is used for determining a target encryption private key corresponding to the current encryption identifier;
and the decryption module is used for decrypting the encrypted position information based on the target encryption private key to obtain the position information of the searched equipment.
In a sixth aspect, the present disclosure provides another lost device searching apparatus, including:
the first acquisition module is used for acquiring a first encryption identifier and encryption position information sent by the relay equipment and storing the encryption position information according to the first encryption identifier;
The second acquisition module is used for acquiring a device search request, and the device search request is generated by the tracking device based on the second encryption identifier;
and the sending module is used for acquiring the target encryption position information from the stored encryption position information based on the equipment searching request and sending the target encryption position information to the tracking equipment for decryption.
In a seventh aspect, the present disclosure provides an electronic device comprising a memory, a processor;
wherein the processor runs a program corresponding to the executable program code by reading the executable program code stored in the memory for implementing the method for finding lost devices according to the embodiments of the first, second or third aspect of the disclosure.
In an eighth aspect, the present disclosure provides a computer readable storage medium having stored thereon a computer program which when executed by a processor implements a method for finding lost devices according to an embodiment of the first, second or third aspect of the present disclosure.
In a ninth aspect, the present disclosure provides a computer program product comprising a computer program which, when executed by a processor, implements a method of finding a lost device according to an embodiment of the first, second or third aspect of the present disclosure.
It should be understood that the description in this section is not intended to identify key or critical features of the embodiments of the disclosure, nor is it intended to be used to limit the scope of the disclosure. Other features of the present disclosure will become apparent from the following specification.
Drawings
FIG. 1 is a schematic illustration of an application scenario of a lost device lookup method;
FIG. 2 is a flow chart of a method of lost device lookup in accordance with one embodiment of the present disclosure;
FIG. 3 is a flow chart of a method of finding lost devices according to one embodiment of the present disclosure;
FIG. 4 is a flow chart of a method of finding lost devices according to one embodiment of the present disclosure;
FIG. 5 is a flow chart of a method of finding lost devices according to one embodiment of the present disclosure;
FIG. 6 is a flow chart of a method of lost device lookup in accordance with one embodiment of the present disclosure;
FIG. 7 is a flow chart of a method of finding lost devices according to one embodiment of the present disclosure;
FIG. 8 is a flow chart of a method of lost device lookup in accordance with one embodiment of the present disclosure;
FIG. 9 is a flow chart of a method of finding lost devices according to one embodiment of the present disclosure;
FIG. 10 is a flow chart of a method of lost device lookup in accordance with one embodiment of the present disclosure;
FIG. 11 is a flow chart of a method of lost device lookup in accordance with one embodiment of the present disclosure;
FIG. 12 is a flow chart of a method of lost device lookup in accordance with one embodiment of the present disclosure;
FIG. 13 is a block diagram of a lost device lookup apparatus according to one embodiment of the present disclosure;
FIG. 14 is a block diagram of a lost device lookup apparatus according to one embodiment of the present disclosure;
FIG. 15 is a block diagram of a lost device lookup apparatus according to one embodiment of the present disclosure;
FIG. 16 is a block diagram of a lost device lookup apparatus according to one embodiment of the present disclosure;
fig. 17 is a block diagram of an electronic device used to implement a lost device lookup method of an embodiment of the present disclosure.
Detailed Description
Embodiments of the present disclosure are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are exemplary and intended for the purpose of explaining the present disclosure and are not to be construed as limiting the present disclosure.
Fig. 1 is a schematic application scenario diagram of a method for searching for a lost device according to the present disclosure. As shown in fig. 1, the application scenario may include: the device to be searched 11, the relay device 12, the server 13 and the tracking device 14. Wherein the sought device 11 is a lost mobile device and the relay device 12 is a mobile device in the vicinity of the sought device. The located device 11 can upload the encrypted location information by means of the relay device 12 so that the tracking device 14 can obtain the location information of the located device from the server 13.
It should be noted that fig. 1 is only a schematic diagram of an application scenario provided by the embodiment of the present disclosure, and the embodiment of the present disclosure does not limit devices included in fig. 1 or limit a positional relationship between devices in fig. 1, for example, in the application scenario shown in fig. 1, a data storage device may also be included, where the data storage device may be an external memory with respect to the server 13 or may be an internal memory integrated in the server 13. The device 11 to be searched can be a bluetooth headset, a smart watch, a mobile phone, etc., and the device to be searched needs to at least satisfy a near field communication function such as bluetooth or WiFi. The relay device 12 may be a cell phone, a computer, etc., and the relay device needs to satisfy the positioning and networking uploading functions. The tracking device 14 may be a cell phone, a computer, a smart watch, etc., and the tracking device 14 is required to satisfy networking functions.
The following describes a lost device searching method, apparatus, electronic device and storage medium with reference to the accompanying drawings.
Fig. 2 is a flowchart of a lost device lookup method applied to a relay device according to one embodiment of the present disclosure, as shown in fig. 2, including the steps of:
s21, acquiring the current encryption identification sent by the searched equipment in the lost state.
The searched device stores a plurality of candidate encryption identifications, when the searched device determines that the searched device is in a lost state, the current encryption identification is determined from the candidate encryption identifications according to the current minutes, and the current encryption identification is broadcasted nearby through near field communication functions such as Bluetooth or WiFi. Accordingly, the nearby relay device may receive the current encrypted identification broadcast by the seeking device when the bluetooth or WiFi function is turned on.
S22, obtaining a target encryption public key corresponding to the current encryption identification from the server.
The server stores a plurality of information pairs, each of which includes a candidate encryption identification and a candidate encryption public key. If the server has the candidate encryption identifier consistent with the current encryption identifier, the candidate encryption public key in the information pair to which the candidate encryption identifier belongs can be obtained as the target encryption public key. If the candidate encryption identification consistent with the current encryption identification does not exist in the server, the tracking equipment is proved to not start the equipment searching mode, and the equipment to be searched can be misjudged to be in a lost state. Alternatively, the relay device may discard the current encrypted identifier and refuse to receive the broadcast message sent by the searched device for a certain period of time.
In some implementations, each information pair also includes a candidate digital signature. Before the position information of the relay device is encrypted based on the target encryption public key, the target encryption public key and the target digital signature are verified, and it is determined that the server does not tamper the target encryption public key, namely, an intermediate attack initiated by the server exists.
S23, encrypting the position information of the relay device based on the target encryption public key to generate encrypted position information.
Since the relay device is a mobile device located near the device to be searched, and the relay device satisfies the positioning function, it is possible to acquire the position information of the relay device, and consider the position information of the relay device as the position information of the device to be searched. Alternatively, the location information of the relay device may be acquired based on a global positioning system (Global Positioning System, GPS) and encrypted based on a target encryption public key to avoid the device location information being acquired by others.
S24, the current encryption identification and the encryption position information are sent to the server.
In some implementations, the current encryption identification is sent to the server along with the encryption location information.
In other implementations, the current encryption identification and encryption location information are sent to the server separately.
In the embodiment of the disclosure, the relay device acquires a current encryption identifier sent by the searched device in a lost state, acquires a target encryption public key corresponding to the current encryption identifier from the server, encrypts the position information of the relay device based on the target encryption public key, generates encryption position information, and sends the current encryption identifier and the encryption position information to the server. The method of the embodiment of the disclosure can enable the searched device to upload the encrypted position information by the aid of the nearby relay device under the condition of limited capacity, the uploaded encrypted position information cannot be decrypted by the server, and only the pre-paired tracking device can decrypt the position information.
Fig. 3 is a flowchart of a lost device lookup method applied to a relay device according to one embodiment of the present disclosure, as shown in fig. 3, including the steps of:
s31, acquiring a target digital signature corresponding to the current encryption identifier from the server.
In the embodiment of the disclosure, the information pair stored in the server further includes a candidate digital signature, and if a candidate encryption identifier consistent with the current encryption identifier exists in the server, the candidate encryption public key and the candidate digital signature in the information pair to which the candidate encryption identifier belongs can be obtained as the target encryption public key and the target digital signature.
S32, carrying out security verification on the target encryption public key and the target digital signature.
Alternatively, the current encrypted identification may be verified based on the target encryption public key and the target digital signature, and the target digital signature may be signed based on the target encryption public key.
The current encryption identifier is obtained by intercepting and splicing the tracking device according to the target encryption public key and the target digital signature, and the target digital signature is obtained by signing the target encryption public key by the tracking device based on the target encryption private key. The target encryption public key and the target encryption private key are a pair of key pairs, and public key encryption and private key decryption can be used; or private key signature, public key verification signature.
Thus, the current encrypted identification can be verified based on the target digital signature and the target public encryption key according to the interception rules. And if the target digital signature and the target encryption public key are consistent with the current encryption identifier after being intercepted and spliced, the verification is passed.
Thus, the target digital signature may be signed based on the target encryption public key. If the result obtained after the signature verification is consistent with the target encryption public key, the signature verification passes.
And in response to the verification and the signature verification passing, determining that the security verification of the target encryption public key and the target digital signature passes.
And S33, after the security verification is passed, the step of encrypting the position information of the relay device based on the target encryption public key to generate encrypted position information is executed.
The security verification can determine that the server does not tamper with the target encryption public key, and avoid the relay device from encrypting the position information by using the wrong encryption public key. By the primary verification of the current encryption identification and the re-verification of the self-signature, the target encryption public key can be ensured to be generated by the tracking equipment, and the integrity of the target encryption public key is not destroyed, namely the target encryption public key is not tampered.
In the embodiment of the disclosure, the relay device acquires a target digital signature corresponding to a current encryption identifier from a server, performs security verification on a target encryption public key and the target digital signature, and performs encryption on position information of the relay device based on the target encryption public key after the security verification is passed, so as to generate encrypted position information. The method of the embodiment of the disclosure can confirm the target encryption public key, and avoid the relay equipment from encrypting the position information by using the wrong encryption public key, thereby avoiding the position information of the equipment from being acquired by other people.
Fig. 4 is a flowchart of a method of finding a lost device according to one embodiment of the present disclosure, the method being applied to a device being found, as shown in fig. 4, the method comprising the steps of:
S41, determining a current encryption identifier when the searched device is lost, and broadcasting the current encryption identifier.
In some implementations, state information for a sought device may be obtained, and the sought device is determined to be in a lost state based on the state information. For example, when the device to be searched is a bluetooth headset, if the bluetooth headset is not in a sleep state and is not successfully connected with other devices within a certain time, it may be determined that the bluetooth headset is in a lost state. In other implementations, if the data transmission of the searched device fails, it may be determined that the searched device is in a lost state.
The searched device stores a plurality of candidate encryption identifications, and when the searched device determines that the searched device is in a lost state, the searched device determines the current encryption identification from the candidate encryption identifications according to the current minutes and broadcasts the current encryption identification. For example, the device being sought may store 96 candidate encryption identifications ID 1-96, and when lost, the device being sought obtains i at the current minutes/15 and broadcasts the corresponding ID i via Bluetooth.
As one possible implementation, the tracking device and the device being sought may acquire the same candidate encryption identification and determine the current encryption identification therefrom based on the same calculation. In this way, the searched device and the tracking device can determine the same current encryption identifier at the same time, so as to realize the transmission of the encryption position information.
Broadcast is a form of multipoint delivery by which information of one mobile device can be transmitted to a plurality of mobile devices. The searched device can broadcast the current encryption identification to the nearby through a near field communication function such as Bluetooth or WiFi, so that encryption and uploading of the position information are realized by means of the nearby relay device.
In the embodiment of the disclosure, the current encryption identifier when the searched device is lost is determined, and the current encryption identifier is broadcasted. According to the embodiment of the disclosure, the searched device can realize encryption and uploading of the position information by means of the nearby relay device under the condition of limited capacity by broadcasting the current encryption identifier, and the privacy of a user is protected while data is uploaded.
Fig. 5 is a flowchart of a method of finding a lost device according to one embodiment of the present disclosure, the method being applied to a device being found, as shown in fig. 5, the method comprising the steps of:
s51, pairing with the tracking equipment, and acquiring a plurality of candidate encryption identifications in the pairing process, wherein the plurality of candidate encryption identifications comprise the current encryption identification.
Embodiments of the present disclosure require pairing of the sought device and the tracking device before the device is lost. The tracking device generates candidate encryption identifications in the pairing process and synchronizes the candidate encryption identifications to the searched device. The plurality of candidate encryption identifications comprise current encryption identifications.
Meanwhile, the tracking device may generate the candidate encryption identifier and also generate the candidate encryption public key, the candidate digital signature and the candidate encryption private key corresponding to the candidate encryption identifier. In response to being in the device search mode, the tracking device performs grouping association on the candidate encryption identification, the candidate encryption public key and the candidate digital signature, and uploads the candidate encryption identification, the candidate encryption public key and the candidate digital signature to the server, so that the relay device can acquire the corresponding target encryption public key and the target digital signature from the server according to the current encryption identification to perform security verification and encryption of the position information.
In the embodiment of the disclosure, the searched device is paired with the tracking device, and a plurality of candidate encryption identifications are obtained in the pairing process, wherein the plurality of candidate encryption identifications comprise the current encryption identification. According to the embodiment of the disclosure, the searched device and the tracking device are paired, so that the current encryption identifier can be synchronized on the searched device and the tracking device, and encryption transmission of the position information is realized.
Fig. 6 is a flowchart of a lost device finding method applied to a tracking device, as shown in fig. 6, according to one embodiment of the present disclosure, the method including the steps of:
s61, responding to the tracking device in a device searching mode, and acquiring the current encryption identification of the tracking device.
The user may set a device lookup mode on the tracking device, and in response to being in the device lookup mode, the tracking device may determine a current encryption identification from the stored plurality of candidate encryption identifications by a current number of minutes. For example, the tracking device may store 96 candidate encrypted identifications ID [1], ID [2],. The ID [96], and in the device lookup mode, the tracking device obtains i according to the current number of minutes/15 to obtain the current encrypted identification ID [ i ].
In some implementations, to prevent the time difference between the tracking device and the sought device from causing a difference in computation of i, the scope of the query may be appropriately enlarged, using several integers around i to enlarge the likelihood of querying the data. For example, ID [ i-3], ID [ i-2], ID [ i-1], ID [ i ], ID [ i+1], ID [ i+2], and ID [ i+3] may be used as the current encryption identification for acquiring encryption location information in the server.
S62, based on the current encryption identification, obtaining encryption position information of the relay device from a server, wherein the lost searched device is in the search range of the relay device.
In some implementations, the tracking device queries a server for a candidate encryption identifier consistent with the current encryption identifier, and if the information pair to which the candidate encryption identifier belongs has encryption position information stored in association with the candidate encryption identifier, acquires the encryption position information from the server. In other implementations, the tracking device generates a device lookup request based on the current encrypted identification, sends the device lookup request to the server, and receives encrypted location information obtained by the server based on the device lookup request.
The relay device is a mobile device nearby the searched device, and after the relay device searches the current encryption identifier broadcasted by the searched device, the searched device can upload the encryption position information by means of the positioning and networking uploading functions of the relay device. Thus, the location information of the relay device can be regarded as the location information of the searched device.
S63, determining a target encryption private key corresponding to the current encryption identification.
The tracking device stores a plurality of sets of information pairs, each of the information pairs including a candidate encryption public key, a candidate encryption private key, a candidate digital signature, and a candidate encryption identification. And determining a candidate encryption identifier consistent with the current encryption identifier, wherein the candidate encryption private key in the information pair to which the candidate encryption identifier belongs is the target encryption private key corresponding to the current encryption identifier.
S64, decrypting the encrypted position information based on the target encryption private key to obtain the position information of the searched device.
Because the relay device encrypts the position information by using the target encryption public key, and the target encryption public key and the target encryption private key are a pair of key pairs, the encrypted position information can be decrypted based on the target encryption private key, so that the position information of the relay device is obtained and is used as the position information of the searched device. In some implementations, the location information is displayed in text form. In other implementations, the location information is displayed on the map in coordinates.
In the embodiment of the disclosure, in response to the tracking device being in a device searching mode, a current encryption identifier of the tracking device is obtained, and based on the current encryption identifier, encryption position information of the relay device is obtained from a server, wherein the lost searched device is in a searching range of the relay device, a target encryption private key corresponding to the current encryption identifier is determined, and the encryption position information is decrypted based on the target encryption private key to obtain position information of the searched device. In the embodiment of the disclosure, the tracking device stores a plurality of groups of encryption identifications and encryption private keys, so that a target encryption private key corresponding to a current encryption identification can be obtained from the tracking device, encryption position information is obtained from a server based on the current encryption identification, and the encryption position information is decrypted based on the target encryption private key. In this way, it is ensured that only the tracking device can acquire the encrypted position information from the server, and that only the tracking device has the target encryption private key, and can decrypt the encrypted position information.
Fig. 7 is a flowchart of a lost device finding method applied to a tracking device according to one embodiment of the present disclosure, as shown in fig. 7, including the steps of:
S71, generating a plurality of key pairs consisting of candidate encryption public keys and candidate encryption private keys.
The tracking device generates a plurality of sets of key pairs consisting of candidate encryption public keys and candidate encryption private keys. For example, 96 sets of public-private key pairs PK [1], SK [1], PK [2], SK [2],..pk [96], SK [96] may be generated. For any key pair, public key encryption and private key decryption can be used; or private key signature, public key verification signature.
S72, for any key pair, generating a candidate digital signature by using the candidate encryption private key pair and the candidate encryption public key, and generating a candidate encryption identification based on the candidate encryption public key and the candidate digital signature.
And encrypting the candidate encryption public key by using the candidate encryption private key aiming at any key pair to generate a candidate digital signature. And intercepting and splicing the candidate encryption public key and the candidate digital signature to generate a candidate encryption identifier.
S73, acquiring a candidate encryption identifier and a candidate digital signature which have an association relationship with the candidate encryption public key, and associating the candidate encryption identifier, the candidate encryption public key and the candidate digital signature according to the association relationship to generate an information sequence.
And (3) associating any candidate encryption public key with the corresponding candidate digital signature and the candidate encryption identifier to generate a group of information pairs, and forming an information sequence by the plurality of groups of information pairs.
And S74, the information sequence is sent to the server.
In response to turning on the device lookup mode, the tracking device sends a sequence of information to the server.
In the embodiment of the disclosure, a tracking device generates a plurality of key pairs composed of a candidate encryption public key and a candidate encryption private key, generates a candidate digital signature for any key pair by using the candidate encryption private key to the candidate encryption public key, generates a candidate encryption identifier based on the candidate encryption public key and the candidate digital signature, acquires the candidate encryption identifier and the candidate digital signature which have an association relationship with the candidate encryption public key, and associates the candidate encryption identifier, the candidate encryption public key and the candidate digital signature according to the association relationship to generate an information sequence. In the embodiment of the disclosure, the tracking device generates a plurality of candidate encryption identifications, candidate encryption public keys and candidate digital signatures, and sends the associated generated information sequences to the server.
Fig. 8 is a flowchart of a lost device finding method applied to a tracking device according to one embodiment of the present disclosure, as shown in fig. 8, including the steps of:
S81, pairing with the searched device, and generating a candidate encryption identification in the pairing process.
To prevent loss of the mobile device, the user may pair the sought device with the tracking device in advance. In some implementations, the tracking device sends a pairing application to the device being sought, and if the device being sought accepts the pairing application, the tracking device successfully pairs with the device being sought. In other implementations, pairing is successful if the sought device is connected to the tracking device. For example, the computer may be used to send a pairing request to the mobile phone, and if the mobile phone receives the pairing request, the computer and the mobile phone are paired successfully. For another example, if the mobile phone is connected with the bluetooth headset, the pairing is successful.
For a specific implementation of generating the candidate encrypted identifier, reference may be made to related descriptions in embodiments of the present disclosure, which are not repeated here.
S82, synchronizing the candidate encryption identification to the searched equipment.
And in response to successful pairing of the tracking device and the searched device, synchronizing the candidate encryption identification to the searched device.
In the embodiment of the disclosure, the tracking device is paired with the searched device, and a candidate encryption identifier is generated in the pairing process and is synchronized to the searched device. According to the embodiment of the disclosure, the searched device and the tracking device are paired, so that the current encryption identifier can be synchronized on the searched device and the tracking device, and encryption transmission of the position information is realized.
Fig. 9 is a flowchart of a lost device lookup method applied to a server according to one embodiment of the present disclosure, as shown in fig. 9, including the steps of:
s91, acquiring a first encryption identifier and encryption position information sent by the relay equipment, and storing the encryption position information according to the first encryption identifier.
The server acquires a first encryption identifier and encryption position information sent by the relay equipment, and stores the encryption position information according to the first encryption identifier. The first encrypted identifier is a current encrypted identifier sent by the relay device.
S92, acquiring a device searching request, wherein the device searching request is generated by the tracking device based on the second encryption identification.
The server obtains a device lookup request to lookup the device, the device lookup request generated by the tracking device based on the second encrypted identification. The second encrypted identifier is the current encrypted identifier sent by the tracking device.
S93, acquiring target encryption position information based on the device search request from the stored encryption position information, and transmitting the target encryption position information to the tracking device for decryption.
If the second encryption identifier in the equipment searching request is the same as the first encryption identifier, the encryption position information corresponding to the first encryption identifier is used as target encryption position information, and the target encryption position information is sent to the tracking equipment for decryption.
In the embodiment of the disclosure, a server acquires a first encryption identifier and encryption position information sent by a relay device, stores the encryption position information according to the first encryption identifier, acquires a device search request, generates the device search request by a tracking device based on a second encryption identifier, acquires target encryption position information from the stored encryption position information based on the device search request, and sends the target encryption position information to the tracking device for decryption. According to the embodiment of the disclosure, the server can store the encryption position information sent by the relay device, acquire the target encryption position information based on the device search request sent by the tracking device and send the target encryption position information to the tracking device, and in this way, only the tracking device can be ensured to acquire the encryption position information from the server. Meanwhile, the server cannot decrypt the encrypted position information, so that the user privacy data is prevented from being revealed.
Fig. 10 is a flowchart of a lost device lookup method applied to a server according to one embodiment of the present disclosure, as shown in fig. 10, including the steps of:
s101, acquiring an information sequence sent by a tracking device, wherein the information sequence comprises a plurality of information pairs, and each information pair comprises a candidate encryption identifier, a candidate encryption public key and a candidate digital signature.
For details of the information sequence, reference may be made to related descriptions in various embodiments of the present disclosure, and details are not repeated here. The server may generate a corresponding stored list from the information sequence.
S102, acquiring a first encryption identifier and encryption position information sent by the relay equipment, and storing the encryption position information according to the first encryption identifier.
And in response to the existence of the candidate encryption identification consistent with the first encryption identification in the information sequence, storing the encryption position information in association with the information pair to which the candidate encryption identification belongs. Optionally, the encryption position information is stored in a storage list corresponding to the candidate encryption identification.
S103, acquiring a device searching request, wherein the device searching request is generated by the tracking device based on the second encryption identification.
For a specific implementation of step S103, reference may be made to related descriptions in various embodiments of the present disclosure, which are not repeated here.
S104, acquiring target encryption position information from the stored encryption position information based on the device search request, and transmitting the target encryption position information to the tracking device for decryption.
And comparing the second encryption identifier with the stored information pair associated with the encryption position information to obtain a target information pair, wherein the candidate encryption identifier in the target information pair is consistent with the second encryption identifier. The target information pair is associated with the stored encryption location information and is determined as target encryption location information.
In the embodiment of the disclosure, a server acquires an information sequence sent by a tracking device, wherein the information sequence comprises a plurality of information pairs, each information pair comprises a candidate encryption identifier, a candidate encryption public key and a candidate digital signature, a first encryption identifier and encryption position information sent by a relay device are acquired, the encryption position information is stored according to the first encryption identifier, a device search request is acquired, the device search request is generated by the tracking device based on a second encryption identifier, and from the stored encryption position information, target encryption position information is acquired based on the device search request and sent to the tracking device for decryption. The server in the embodiment of the disclosure can store the obtained encrypted position information based on the information sequence sent by the tracking device, and obtain the corresponding target encrypted position information based on the device search request and send the target encrypted position information to the tracking device.
Fig. 11 is a flowchart of a lost device lookup method applied to a server, as shown in fig. 11, according to one embodiment of the present disclosure, the method including the steps of:
s111, receiving a first encryption identification sent by the relay equipment.
The first encrypted identifier is a current encrypted identifier sent by the relay device, the searched device broadcasts the first encrypted identifier to the nearby in response to being in a lost state, and the relay device sends the first encrypted identifier to the server after receiving the broadcast message.
And S112, in response to the existence of the candidate encryption identification consistent with the first encryption identification in the information sequence, taking the candidate encryption public key and the candidate digital signature in the information pair to which the candidate encryption identification belongs as a target encryption public key and a target digital signature.
The tracking device sends a sequence of information to the server after turning on the device lookup mode, the sequence of information including a plurality of information pairs, each information pair including a candidate encryption identification, a candidate encryption public key, and a candidate digital signature. And in response to the existence of the candidate encryption identification consistent with the first encryption identification in the information sequence, taking the candidate encryption public key and the candidate digital signature in the information pair to which the candidate encryption identification belongs as a target encryption public key and a target digital signature.
And S113, the target encryption public key and the target digital signature are sent to the relay equipment for security verification.
And the target encryption public key and the target digital signature are sent to the relay equipment for safety verification, and after the verification is passed, the relay equipment can encrypt the position information by using the target encryption public key.
S114, receiving the encryption position information sent by the relay equipment, wherein the encryption position information is sent after the security verification of the target encryption public key and the target digital signature is passed.
The server receives the encryption position information sent by the relay equipment and stores the encryption position information and the corresponding information pair of the candidate encryption identification in an associated mode.
In the embodiment of the disclosure, a server receives a first encryption identifier sent by a relay device, responds to the existence of a candidate encryption identifier consistent with the first encryption identifier in an information sequence, takes a candidate encryption public key and a candidate digital signature in an information pair to which the candidate encryption identifier belongs as a target encryption public key and a target digital signature, sends the target encryption public key and the target digital signature to the relay device for security verification, and receives encryption position information sent by the relay device, wherein the encryption position information is sent after the security verification of the target encryption public key and the target digital signature is passed. The method of the embodiment of the disclosure can enable the relay equipment to confirm the target encryption public key, avoid the relay equipment from encrypting the position information by using the wrong encryption public key, and further avoid the position information of the equipment from being acquired by other people.
Fig. 12 is a flowchart of a method for searching for a lost device according to an embodiment of the present disclosure, and as shown in fig. 12, based on the method provided by the present disclosure, a process for searching for a lost device in an actual application scenario includes the following steps:
In the pairing stage, the tracking device generates 96 public-private key pairs SK [1-96], PK [1-96] and signs PK by using corresponding SK to obtain SIG [1-96], wherein SIG comprises two parts of < R, S > and corresponding PK, intercepts and splices S and obtains ID [1-96], and sends 96 IDs to the searched device.
In the searching stage, the tracking device uploads 96 ID-PK-SIG > pairs to the server after the device searching mode is started. The searched device obtains i according to the current minutes/15, and broadcasts the corresponding ID [ i ] through Bluetooth. When receiving the ID [ i ] broadcast, the relay device uses the ID [ i ] to inquire the corresponding < PK [ i ] and SIG [ i ] from the server, and after the verification is passed, encrypts the GPS information by using the PK [ i ] to generate encrypted position information ENC [ i ] and uploads the encrypted position information ENC [ i ] to the server.
The tracking device stores all the generated information (except ENC [ i ]), when searching, the tracking device acquires the corresponding ID [ i ] according to the current minutes/15, pulls the ENC [ i ] from the server, decrypts the corresponding SK [ i ] locally, solves the plaintext GPS information, and displays the plaintext GPS information locally.
In order to prevent the difference in time between the tracking device and the device to be searched from causing the difference in calculation of i, the query range may be appropriately enlarged, and the possibility of finding the data may be enlarged by using several integers around i. The key number "96" is optional, and the update frequency at the time of ID broadcasting is also optional.
Fig. 13 is a block diagram of a lost device lookup apparatus according to one embodiment of the present disclosure, and as shown in fig. 13, a lost device lookup apparatus 130, which is applicable to a relay device, includes:
a first obtaining module 131, configured to obtain a current encrypted identifier sent by the searched device in a lost state;
a second obtaining module 132, configured to obtain, from a server, a target encryption public key corresponding to the current encryption identifier;
an encryption module 133, configured to encrypt the location information of the relay device based on the target encryption public key, and generate encrypted location information;
and a transmitting module 134, configured to transmit the current encrypted identifier and the encrypted location information to the server.
The method of the embodiment of the disclosure can enable the searched device to upload the encrypted position information by the aid of the nearby relay device under the condition of limited capacity, the uploaded encrypted position information cannot be decrypted by the server, and only the pre-paired tracking device can decrypt the position information.
It should be noted that the foregoing explanation of the embodiment of the method for searching for a lost device is also applicable to the searching device for a lost device in this embodiment, which is not described herein.
Further, in one possible implementation manner of the embodiment of the present disclosure, the second obtaining module 132 is further configured to: acquiring a target digital signature corresponding to the current encryption identifier from a server; performing security verification on the target encryption public key and the target digital signature; and after the security verification is passed, the step of encrypting the position information of the relay device based on the target encryption public key to generate encrypted position information is executed.
Further, in one possible implementation manner of the embodiment of the present disclosure, the second obtaining module 132 is further configured to: verifying the current encryption identifier based on the target encryption public key and the target digital signature; verifying the target digital signature based on the target encryption public key; and determining that the security verification of the target encryption public key and the target digital signature is passed in response to the current encryption identification and the target digital signature being passed.
Fig. 14 is a block diagram of a lost device searching apparatus according to an embodiment of the present disclosure, and as shown in fig. 14, the lost device searching apparatus 140 includes:
and the broadcasting module 141 is configured to determine a current encrypted identifier when the searched device is lost, and broadcast the current encrypted identifier.
According to the embodiment of the disclosure, the searched device can realize encryption and uploading of the position information by means of the nearby relay device under the condition of limited capacity by broadcasting the current encryption identifier, and the privacy of a user is protected while data is uploaded.
It should be noted that the foregoing explanation of the embodiment of the method for searching for a lost device is also applicable to the searching device for a lost device in this embodiment, which is not described herein.
Further, in one possible implementation of the embodiment of the disclosure, the broadcasting module 141 is further configured to: acquiring state information of the searched device, and determining that the searched device is in a lost state based on the state information.
Further, in a possible implementation manner of the embodiment of the present disclosure, the lost device searching apparatus 140 further includes an obtaining module 142, configured to: pairing with the tracking equipment, and acquiring a plurality of candidate encryption identifications in the pairing process, wherein the plurality of candidate encryption identifications comprise the current encryption identification.
Fig. 15 is a block diagram of a lost device lookup apparatus according to one embodiment of the present disclosure, and as shown in fig. 15, the lost device lookup apparatus 150 suitable for tracking a device includes:
A first obtaining module 151, configured to obtain a current encryption identifier of the tracking device in response to the tracking device being in a device search mode;
a second obtaining module 152, configured to obtain, from the server, encrypted location information of the relay device based on the current encrypted identifier, where the lost device to be searched is within a search range of the relay device;
a determining module 153, configured to determine a target encryption private key corresponding to the current encryption identifier;
the decryption module 154 is configured to decrypt the encrypted location information based on the target encryption private key to obtain location information of the device to be searched.
In the embodiment of the disclosure, the tracking device stores a plurality of groups of encryption identifications and encryption private keys, so that a target encryption private key corresponding to a current encryption identification can be obtained from the tracking device, encryption position information is obtained from a server based on the current encryption identification, and the encryption position information is decrypted based on the target encryption private key. In this way, it is ensured that only the tracking device can acquire the encrypted position information from the server, and that only the tracking device has the target encryption private key, and can decrypt the encrypted position information.
It should be noted that the foregoing explanation of the embodiment of the method for searching for a lost device is also applicable to the searching device for a lost device in this embodiment, which is not described herein.
Further, in one possible implementation manner of the embodiment of the present disclosure, the second obtaining module 152 is further configured to: generating a device search request based on the current encryption identifier; sending a device search request to a server; the receiving server obtains the encrypted location information based on the device lookup request.
Further, in one possible implementation manner of the embodiment of the present disclosure, the first obtaining module 151 is further configured to: generating a plurality of key pairs consisting of candidate encryption public keys and candidate encryption private keys; generating a candidate digital signature for any key pair by using a candidate encryption private key to a candidate encryption public key, and generating a candidate encryption identifier based on the candidate encryption public key and the candidate digital signature; acquiring the candidate encryption identification and the candidate digital signature which have an association relationship with the candidate encryption public key, and associating the candidate encryption identification, the candidate encryption public key and the candidate digital signature according to the association relationship to generate an information sequence; the information sequence is sent to a server.
Further, in one possible implementation manner of the embodiment of the present disclosure, the first obtaining module 151 is further configured to: and partially intercepting the candidate encryption public key and the candidate digital signature to generate a candidate encryption identifier.
Further, in one possible implementation manner of the embodiment of the present disclosure, the first obtaining module 151 is further configured to: pairing with the searched equipment, and generating a candidate encryption identifier in the pairing process; the candidate encrypted identification is synchronized to the sought device.
Fig. 16 is a block diagram of a lost device lookup apparatus according to one embodiment of the present disclosure, and as shown in fig. 16, a lost device lookup apparatus 160 suitable for a server includes:
a first obtaining module 161, configured to obtain a first encryption identifier and encryption location information sent by the relay device, and store the encryption location information according to the first encryption identifier;
a second obtaining module 162, configured to obtain a device lookup request, where the device lookup request is generated by the tracking device based on the second encrypted identifier;
and a sending module 163, configured to obtain the target encrypted location information from the stored encrypted location information based on the device search request, and send the target encrypted location information to the tracking device for decryption.
According to the embodiment of the disclosure, the server can store the encryption position information sent by the relay device, acquire the target encryption position information based on the device search request sent by the tracking device and send the target encryption position information to the tracking device, and in this way, only the tracking device can be ensured to acquire the encryption position information from the server. Meanwhile, the server cannot decrypt the encrypted position information, so that the user privacy data is prevented from being revealed.
It should be noted that the foregoing explanation of the embodiment of the method for searching for a lost device is also applicable to the searching device for a lost device in this embodiment, which is not described herein.
Further, in one possible implementation manner of the embodiment of the present disclosure, the first obtaining module 161 is further configured to: acquiring an information sequence sent by tracking equipment, wherein the information sequence comprises a plurality of information pairs, and each information pair comprises a candidate encryption identifier, a candidate encryption public key and a candidate digital signature; storing the encrypted location information according to the first encrypted identifier, including: and storing the encryption position information and the information pair to which the candidate encryption identification belongs in an associated mode in response to the existence of the candidate encryption identification consistent with the first encryption identification in the information sequence.
Further, in one possible implementation of the embodiment of the disclosure, the sending module 163 is further configured to: comparing the second encryption identifier with the stored information pair associated with the encryption position information to obtain a target information pair, wherein the candidate encryption identifier in the target information pair is consistent with the second encryption identifier; the target information pair is associated with the stored encryption location information and is determined as target encryption location information.
Further, in one possible implementation manner of the embodiment of the present disclosure, the first obtaining module 161 is further configured to: receiving a first encryption identifier sent by a relay device; responding to the existence of a candidate encryption identifier consistent with the first encryption identifier in the information sequence, and taking a candidate encryption public key and a candidate digital signature in an information pair to which the candidate encryption identifier belongs as a target encryption public key and a target digital signature; transmitting the target encryption public key and the target digital signature to the relay device to perform security verification on the searched device; and receiving the encryption position information sent by the relay device, wherein the encryption position information is sent after the encryption position information is verified by the searching device.
According to embodiments of the present disclosure, the present disclosure also provides an electronic device, a readable storage medium and a computer program product.
Fig. 17 shows a schematic block diagram of an example electronic device 170 that may be used to implement embodiments of the present disclosure. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular telephones, smartphones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the disclosure described and/or claimed herein.
As shown in fig. 17, the apparatus includes a memory 171, a processor 172, and a computer program stored in the memory 171 and executable on the processor 172, and the processor 172 implements the foregoing lost device searching method when executing the program.
Furthermore, the terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include one or more such feature. In the description of the present invention, the meaning of "a plurality" is two or more, unless explicitly defined otherwise.
In the description of the present specification, a description referring to terms "one embodiment," "some embodiments," "examples," "specific examples," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present invention. In this specification, schematic representations of the above terms are not necessarily directed to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, the different embodiments or examples described in this specification and the features of the different embodiments or examples may be combined and combined by those skilled in the art without contradiction.
While embodiments of the present invention have been shown and described above, it will be understood that the above embodiments are illustrative and not to be construed as limiting the invention, and that variations, modifications, alternatives and variations may be made to the above embodiments by one of ordinary skill in the art within the scope of the invention.

Claims (27)

1. A method for searching for lost devices, adapted to a relay device, the method comprising:
acquiring a current encryption identifier sent by the searched equipment in a lost state;
obtaining a target encryption public key corresponding to the current encryption identifier from a server;
encrypting the position information of the relay equipment based on the target encryption public key to generate encrypted position information;
and sending the current encryption identification and the encryption position information to a server.
2. The method according to claim 1, wherein the method further comprises:
acquiring a target digital signature corresponding to the current encryption identifier from a server;
performing security verification on the target encryption public key and the target digital signature;
and after the security verification is passed, executing the step of encrypting the position information of the relay equipment based on the target encryption public key to generate encrypted position information.
3. The method of claim 2, wherein the securely verifying the target encryption public key and the target digital signature comprises:
verifying the current encryption identifier based on the target encryption public key and the target digital signature;
signing the target digital signature based on the target encryption public key;
and in response to the current encryption identification and the target digital signature passing verification, determining that the security verification of the target encryption public key and the target digital signature passes.
4. A method of locating lost devices, adapted to track devices, the method comprising:
responding to the tracking equipment in an equipment searching mode, and acquiring the current encryption identification of the tracking equipment;
acquiring encryption position information of the relay equipment from a server based on the current encryption identification, wherein the lost equipment to be searched is in the search range of the relay equipment;
determining a target encryption private key corresponding to the current encryption identifier;
and decrypting the encrypted position information based on the target encryption private key to obtain the position information of the searched device.
5. The method of claim 4, wherein the obtaining, from a server, the encrypted location information of the relay device based on the current encrypted identification, comprises:
generating a device search request based on the current encryption identifier;
sending the device search request to the server;
and receiving the encrypted position information acquired by the server based on the equipment searching request.
6. The method of claim 4, wherein prior to the obtaining the current encrypted identification of the tracking device, further comprising:
generating a plurality of key pairs consisting of candidate encryption public keys and candidate encryption private keys;
generating a candidate digital signature for any key pair by using a candidate encryption private key to a candidate encryption public key, and generating a candidate encryption identifier based on the candidate encryption public key and the candidate digital signature;
acquiring the candidate encryption identification and the candidate digital signature which have an association relationship with the candidate encryption public key, and associating the candidate encryption identification, the candidate encryption public key and the candidate digital signature according to the association relationship to generate an information sequence;
and sending the information sequence to the server.
7. The method of claim 6, wherein the generating a candidate cryptographic identification based on the candidate cryptographic public key and the candidate digital signature comprises:
and carrying out partial interception on the candidate encryption public key and the candidate digital signature to generate the candidate encryption identification.
8. The method of claim 6, wherein prior to the obtaining the current encrypted identification of the tracking device, further comprising:
pairing with the searched equipment, and generating the candidate encryption identification in the pairing process;
synchronizing the candidate encryption identification to the searched device.
9. A method for finding lost devices, adapted to a server, the method comprising:
acquiring a first encryption identifier and encryption position information sent by a relay device, and storing the encryption position information according to the first encryption identifier;
obtaining a device lookup request, the device lookup request generated by the tracking device based on the second encrypted identification;
and acquiring target encryption position information from the stored encryption position information based on the device search request, and transmitting the target encryption position information to the tracking device for decryption.
10. The method of claim 9, wherein prior to obtaining the first encrypted identification and the encrypted location information sent by the relay device, further comprising:
acquiring an information sequence sent by the tracking equipment, wherein the information sequence comprises a plurality of information pairs, and each information pair comprises a candidate encryption identifier, a candidate encryption public key and a candidate digital signature;
the storing the encrypted location information according to the first encrypted identifier includes:
and in response to the existence of a candidate encryption identifier consistent with the first encryption identifier in the information sequence, storing the encryption position information in association with an information pair to which the candidate encryption identifier belongs.
11. The method of claim 10, wherein the obtaining the target encrypted location information based on the device lookup request from the stored encrypted location information comprises:
comparing the second encryption identifier with the stored information pair associated with the encryption position information to obtain a target information pair, wherein the candidate encryption identifier in the target information pair is consistent with the second encryption identifier;
and determining the target information pair associated with the stored encryption position information as the target encryption position information.
12. The method according to any one of claims 10 or 11, wherein the obtaining the first encrypted identification and encrypted location information sent by the relay device includes:
receiving a first encryption identifier sent by the relay equipment;
responding to the existence of a candidate encryption identifier consistent with the first encryption identifier in the information sequence, and taking a candidate encryption public key and a candidate digital signature in the information pair to which the candidate encryption identifier belongs as a target encryption public key and a target digital signature;
transmitting the target encryption public key and the target digital signature to the relay equipment for security verification;
and receiving the encryption position information sent by the relay equipment, wherein the encryption position information is sent after the target encryption public key and the target digital signature pass the security verification.
13. A lost device finding apparatus, comprising:
the first acquisition module is used for acquiring a current encryption identifier sent by the searched equipment in a lost state;
the second acquisition module is used for acquiring a target encryption public key corresponding to the current encryption identifier from the server;
the encryption module is used for encrypting the position information of the relay equipment based on the target encryption public key to generate encrypted position information;
And the sending module is used for sending the current encryption identification and the encryption position information to a server.
14. The apparatus of claim 13, wherein the second acquisition module is further configured to:
acquiring a target digital signature corresponding to the current encryption identifier from a server;
performing security verification on the target encryption public key and the target digital signature;
and after the security verification is passed, executing the step of encrypting the position information of the relay equipment based on the target encryption public key to generate encrypted position information.
15. The apparatus of claim 14, wherein the second acquisition module is further configured to:
verifying the current encryption identifier based on the target encryption public key and the target digital signature;
signing the target digital signature based on the target encryption public key;
and in response to the current encryption identification and the target digital signature passing verification, determining that the security verification of the target encryption public key and the target digital signature passes.
16. A lost device finding apparatus, comprising:
the first acquisition module is used for responding to the tracking equipment in an equipment searching mode and acquiring the current encryption identification of the tracking equipment;
The second acquisition module is used for acquiring the encryption position information of the relay equipment from the server based on the current encryption identification, wherein the lost equipment to be searched is in the search range of the relay equipment;
the determining module is used for determining a target encryption private key corresponding to the current encryption identifier;
and the decryption module is used for decrypting the encrypted position information based on the target encryption private key to obtain the position information of the searched equipment.
17. The apparatus of claim 16, wherein the second acquisition module is further configured to:
generating a device search request based on the current encryption identifier;
sending the device search request to the server;
and receiving the encrypted position information acquired by the server based on the equipment searching request.
18. The apparatus of claim 16, wherein the first acquisition module is further configured to:
generating a plurality of key pairs consisting of candidate encryption public keys and candidate encryption private keys;
encrypting the candidate encryption public key by using a candidate encryption private key aiming at any key pair to generate a candidate digital signature, and generating a candidate encryption identifier based on the candidate encryption public key and the candidate digital signature;
Acquiring the candidate encryption identification and the candidate digital signature which have an association relationship with the candidate encryption public key, and associating the candidate encryption identification, the candidate encryption public key and the candidate digital signature according to the association relationship to generate an information sequence;
and sending the information sequence to the server.
19. The apparatus of claim 18, wherein the first acquisition module is further configured to:
and carrying out partial interception on the candidate encryption public key and the candidate digital signature to generate the candidate encryption identification.
20. The apparatus of claim 18, wherein the first acquisition module is further configured to:
pairing with the searched equipment, and generating the candidate encryption identification in the pairing process;
synchronizing the candidate encryption identification to the searched device.
21. A lost device finding apparatus, comprising:
the first acquisition module is used for acquiring a first encryption identifier and encryption position information sent by the relay equipment and storing the encryption position information according to the first encryption identifier;
the second acquisition module is used for acquiring a device search request, and the device search request is generated by the tracking device based on a second encryption identifier;
And the sending module is used for acquiring target encryption position information from the stored encryption position information based on the equipment searching request and sending the target encryption position information to the tracking equipment for decryption.
22. The apparatus of claim 21, wherein the first acquisition module is further configured to:
acquiring an information sequence sent by the tracking equipment, wherein the information sequence comprises a plurality of information pairs, and each information pair comprises a candidate encryption identifier, a candidate encryption public key and a candidate digital signature;
the storing the encrypted location information according to the first encrypted identifier includes:
and in response to the existence of a candidate encryption identifier consistent with the first encryption identifier in the information sequence, storing the encryption position information in association with an information pair to which the candidate encryption identifier belongs.
23. The apparatus of claim 22, wherein the transmitting module is further configured to:
comparing the second encryption identifier with the stored information pair associated with the encryption position information to obtain a target information pair, wherein the candidate encryption identifier in the target information pair is consistent with the second encryption identifier;
And determining the target information pair associated with the stored encryption position information as the target encryption position information.
24. The apparatus of any one of claims 22 or 23, wherein the first acquisition module is further configured to:
receiving a first encryption identifier sent by the relay equipment;
responding to the existence of a candidate encryption identifier consistent with the first encryption identifier in the information sequence, and taking a candidate encryption public key and a candidate digital signature in the information pair to which the candidate encryption identifier belongs as a target encryption public key and a target digital signature;
transmitting the target encryption public key and the target digital signature to the relay equipment for security verification;
and receiving the encryption position information sent by the relay equipment, wherein the encryption position information is sent after the target encryption public key and the target digital signature pass the security verification.
25. An electronic device, comprising a memory and a processor;
wherein the processor runs a program corresponding to the executable program code by reading the executable program code stored in the memory for implementing the method of any one of claims 1-3, claims 4-8 or claims 9-12.
26. A computer readable storage medium, on which a computer program is stored, characterized in that the program, when being executed by a processor, implements the method of any one of claims 1-3, claims 4-8 or claims 9-12.
27. A computer program product comprising a computer program which, when executed by a processor, implements the method of any of claims 1-3, claims 4-8 or claims 9-12.
CN202210260725.9A 2022-03-16 2022-03-16 Lost device searching method and device, electronic device and storage medium Pending CN116800405A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210260725.9A CN116800405A (en) 2022-03-16 2022-03-16 Lost device searching method and device, electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210260725.9A CN116800405A (en) 2022-03-16 2022-03-16 Lost device searching method and device, electronic device and storage medium

Publications (1)

Publication Number Publication Date
CN116800405A true CN116800405A (en) 2023-09-22

Family

ID=88044856

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210260725.9A Pending CN116800405A (en) 2022-03-16 2022-03-16 Lost device searching method and device, electronic device and storage medium

Country Status (1)

Country Link
CN (1) CN116800405A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113221188A (en) * 2021-04-25 2021-08-06 亿海蓝(北京)数据技术股份公司 AIS data evidence storing method, AIS data evidence obtaining device and AIS data evidence storing medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113221188A (en) * 2021-04-25 2021-08-06 亿海蓝(北京)数据技术股份公司 AIS data evidence storing method, AIS data evidence obtaining device and AIS data evidence storing medium

Similar Documents

Publication Publication Date Title
CN110971415B (en) Space-ground integrated space information network anonymous access authentication method and system
Li et al. Location-sharing systems with enhanced privacy in mobile online social networks
US11770711B2 (en) End-to-end encryption with distributed key management in a tracking device environment
CN108989848B (en) Video resource file acquisition method and management system
CN104144049B (en) A kind of encryption communication method, system and device
US20210092613A1 (en) Provision of location-specific user information
US9325507B2 (en) System and method for managing mobile device using device-to-device communication
CN105553951A (en) Data transmission method and data transmission device
CN111787533B (en) Encryption method, slice management method, terminal and access and mobility management entity
CN103797830A (en) Systems and methods for encoding exchanges with a set of shared ephemeral key data
US20220337428A1 (en) Anonymous broadcast method, key exchange method, anonymous broadcast system, key exchange system, communication device, and program
JP4962237B2 (en) Program and method for managing information on location of portable device and file encryption key
CN111954151B (en) Target object determining method, device, system and storage medium
EP2912799B1 (en) Methods and apparatus for data security in mobile ad hoc networks
US20150141061A1 (en) Method for tracking a mobile device onto a remote displaying unit
CN104703138A (en) Method and system for protecting location privacy
JP2010198349A (en) Data encryption system, communication device and data encryption method
WO2017054843A1 (en) Server and method for transmitting a geo-encrypted message
Xia et al. Searchable Public-Key Encryption with Data Sharing in Dynamic Groups for Mobile Cloud Storage.
CN116800405A (en) Lost device searching method and device, electronic device and storage medium
CN111107550A (en) Dual-channel access registration method and device for 5G terminal equipment and storage medium
CN113868505A (en) Data processing method and device, electronic equipment, server and storage medium
JP4585529B2 (en) Mobile terminal, ID information concealment method, and ID information inquiry method
US9369442B2 (en) System and method for the safe spontaneous transmission of confidential data over unsecure connections and switching computers
CN116707774A (en) Lost device searching method and device, electronic device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination