CN104125228B - Exchange method and device - Google Patents

Exchange method and device Download PDF

Info

Publication number
CN104125228B
CN104125228B CN201410371542.XA CN201410371542A CN104125228B CN 104125228 B CN104125228 B CN 104125228B CN 201410371542 A CN201410371542 A CN 201410371542A CN 104125228 B CN104125228 B CN 104125228B
Authority
CN
China
Prior art keywords
key
information
access information
user
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410371542.XA
Other languages
Chinese (zh)
Other versions
CN104125228A (en
Inventor
刘嘉
周涵宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zhigu Ruituo Technology Services Co Ltd
Original Assignee
Beijing Zhigu Ruituo Technology Services Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zhigu Ruituo Technology Services Co Ltd filed Critical Beijing Zhigu Ruituo Technology Services Co Ltd
Priority to CN201410371542.XA priority Critical patent/CN104125228B/en
Publication of CN104125228A publication Critical patent/CN104125228A/en
Application granted granted Critical
Publication of CN104125228B publication Critical patent/CN104125228B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

This application provides a kind of exchange method and devices, are related to the communications field.The method includes:An activity is participated in response to a user, obtains the access information that the movable at least partly participant shares;At least one key is generated according to the access information;It is encrypted using the personal information of user described at least one key pair, obtains an encryption information;Broadcast the encryption information.The method and device can enable the user of participation same campaign decrypt mutual encryption information, and other unrelated users can not then decrypt the encryption information due to no access information, to improve the safety of information interactive process.

Description

Exchange method and device
Technical field
This application involves the communications field more particularly to a kind of exchange methods and device.
Background technology
With the development of Internet technology, internet social network site and social networking application have provided a virtual interacting to the user Platform is linked up and is exchanged on the line to facilitate people.But the considerations of for factors such as safety, people under line to exchanging There are all scrupulous.For example, sometimes, it is desirable to find there is same or similar experience with oneself in the people of surrounding The other users of (for example access identical website, read identical books, travel to identical place), to easily carry out Communication under line with exchange;However, the people that user is not intended to other unrelated at this time obtains the information of oneself again.
By taking online education as an example, user not can gather some MOOC (massive open online Courses, large-scale open network course) website on line course learning and discussion.Then, when user return to school or Company may wonder in people around with the presence or absence of the user also learnt in the websites MOOC, if someone and oneself study are same A branch of instruction in school etc..A kind of scheme is user by oneself learning information (website, course name, user name etc.) and personal information (name, phone, address etc.) carries out disclosure, so that other people receive and check in the way of radio broadcasting etc..However, the party Case can cause user information to be received and read there is no the irrelevant personnel learnt in the websites MOOC by some, influence user information Safety.
Invention content
The purpose of the application is:A kind of exchange method and device are provided, interactive safety is improved.
According to the one side of at least one embodiment of the application, a kind of exchange method is provided, the method includes:
An activity is participated in response to a user, one that the movable at least partly participant shares is obtained and accesses letter Breath;
At least one key is generated according to the access information;
It is encrypted using the personal information of user described at least one key pair, obtains an encryption information;
Broadcast the encryption information.
According to the other side of at least one embodiment of the application, a kind of exchange method is provided, the method includes:
An activity is participated in response to a user, obtains the access information that the movable at least partly participant shares;
An at least key is generated according to the access information;
Receive an encryption information;
Use encryption information described in an at least secret key decryption.
According to the other side of at least one embodiment of the application, a kind of interactive device is provided, described device includes:
It is total to obtain the movable at least partly participant for participating in an activity in response to a user for one acquisition module The access information enjoyed;
One generation module, for generating at least one key according to the access information;
One encrypting module, for being encrypted using the personal information of user described at least one key pair, Obtain an encryption information;
One first broadcast module, for broadcasting the encryption information.
According to the other side of at least one embodiment of the application, a kind of interactive device is provided, described device includes:
It is total to obtain the movable at least partly participant for participating in an activity in response to a user for one acquisition module The access information enjoyed;
One generation module, for generating an at least key according to the access information;
One first receiving module, for receiving an encryption information;
One deciphering module, for encryption information described in an at least secret key decryption described in.
Exchange method and device described in the embodiment of the present application can enable the user of participation same campaign decrypt mutual Encryption information, and other unrelated users can not then decrypt the encryption information due to no access information, to improve The safety of information interactive process.
Description of the drawings
Fig. 1 is the flow chart of exchange method described in the application one embodiment;
Fig. 2 is the flow chart of exchange method described in one embodiment of the application;
Fig. 3 is the flow chart of exchange method described in the application another embodiment;
Fig. 4 is the flow chart of exchange method described in one embodiment of the application;
Fig. 5 is the modular structure schematic diagram of interactive device described in one embodiment of the invention;
Fig. 6 is the modular structure schematic diagram of generation module described in one embodiment of the application;
Fig. 7 is the modular structure schematic diagram of encrypting module described in one embodiment of the application;
Fig. 8 is the modular structure schematic diagram of interactive device described in one embodiment of the application;
Fig. 9 is the modular structure schematic diagram of interactive device described in another embodiment of the present invention;
Figure 10 is the modular structure schematic diagram of generation module described in one embodiment of the application;
Figure 11 is the modular structure schematic diagram of interactive device described in one embodiment of the application;
Figure 12 is the modular structure schematic diagram of interactive device described in the application another embodiment;
Figure 13 is the modular structure schematic diagram of interactive device described in the application another embodiment;
Figure 14 is the modular structure schematic diagram of interactive device described in the application another embodiment;
Figure 15 is the hardware architecture diagram of interactive device described in the application one embodiment;
Figure 16 is the hardware architecture diagram of interactive device described in the application another embodiment.
Specific implementation mode
With reference to the accompanying drawings and examples, the specific implementation mode of the application is described in further detail.Implement below Example is not limited to scope of the present application for illustrating the application.
It will be appreciated by those skilled in the art that in embodiments herein, the size of the serial number of following each steps is not intended to The priority of execution sequence, the execution sequence of each step should be determined by its function and internal logic, implement without coping with the application The implementation process of example constitutes any restriction.
Fig. 1 is the flow chart of exchange method described in the application one embodiment, and the method can be in such as one interaction dress Set realization.As shown in Figure 1, the method includes:
S120:An activity is participated in response to a user, obtains the visit that the movable at least partly participant shares Ask information;
S140:At least one key is generated according to the access information;
S160:It is encrypted using the personal information of user described at least one key pair, obtains an encryption Information;
S180:Broadcast the encryption information.
The embodiment of the present application the method participates in an activity in response to a user, obtains described movable at least partly join The access information shared with person, and key is generated according to the access information, it is obtained using key encryption personal information To encryption information, the Last call encryption information, in this way after equally participating in the movable user and receiving the encryption information, Encryption information described in the corresponding secret key decryption of the access information can be used, and other unrelated users are due to no visit It asks information, then can not decrypt the encryption information, to improve the safety of information interactive process.
Below with reference to specific implementation mode, the function of described step S120, S140, S160 and S180 is described in detail.
S120:An activity is participated in response to a user, obtains the visit that the movable at least partly participant shares Ask information.
Wherein, the activity includes:An information resources are accessed, for example accesses a website when learning online classes, access One MAC (Media Access Control, physical address) address etc..Correspondingly, the access information can be the activity At least one of corresponding URL (Uniform Resoure Locator, uniform resource locator), MAC Address, activity description. For example, user participates in a network courses, the access information can be the network address of the network courses, naturally it is also possible to be specific Course number, course content etc..
S140:At least one key is generated according to the access information.
Wherein, at least one key can be a key, can also be multiple keys.In the step, need by At least one key is generated according to the access information according to a pre-defined rule, the pre-defined rule includes the number for generating key Amount, and specifically how to generate, to which all users for sharing the access information can be corresponding according to unified rule generation Key, and then the encryption information of other side can be decrypted each other.For example, the access information can be location as follows:http:// Abc.eng.com/startup/detail_2014_07/24/37489034_0.shtml (abbreviation destination network addresses once) It then can be using the corresponding ASCII character in entire address as the key of the generation according to the pre-defined rule.
In one embodiment, at least one key is multiple keys, and the step S140 may include:
S141:Multiple sub- access informations are obtained according to the access information;
S142:The multiple key is generated according to the multiple sub- access information.
In present embodiment, it is still assumed that the access information is address above mentioned http://abc.eng.com/ The access information can be divided into the visit of following three by startup/detail_2014_07/24/37489034_0.shtml Ask information:http://abc.eng.com (hereinafter referred to as the first subaddressing);http://abc.eng.com/startup is (following Referred to as the second subaddressing);http://abc.eng.com/startup/detail_2014_07/24/37489034_0.shtml (hereinafter referred to as third subaddressing).It is then possible to using the ASCII character of three sub- access informations as close corresponding to it Key ultimately generates 3 keys.
In one embodiment, the step S140 can be in related to the access information in response to the user A precalculated position and be triggered, i.e., in response to the user be in the relevant precalculated position of the access information, according to The access information generates at least one key.For example, the user has participated in the warp that an a certain university sponsors on the net Ji learns Course Training, and when user arrives the university by chance to go on business, the method detects the position of user and stores one before Access information (such as relevant information of Economics Courses training) is related, and the key is generated thus according to the access information, And subsequent step S160 and S180 are executed, to find the classmate of oneself in the university.
S160:It is encrypted using the personal information of user described at least one key pair, obtains an encryption Information.
The personal information may include name, gender, address, phone, work unit, hobby of the user etc. Information.
In one embodiment, it can be encrypted at least one entire personal information of key pair, such as institute It is the corresponding ASCII character of the destination network addresses to state at least one key, and institute is encrypted using the ASCII character as a key State all personal information of user.
In another embodiment, at least one key can be multiple keys, and the step S160 can To include:
S161:The personal information of the user is divided into multiple sub- personal information;
S162:It is encrypted using the multiple sub- personal information of the multiple key pair.
For example, in the step S161, three sub- personal information can be divided into according to the sensitivity of personal information: (name, gender, hobby);(phone);(address, work unit) in the step S162, can enable first subaddressing pair The the first sub- personal information of key pair (name, gender, hobby) answered is encrypted, and enables the corresponding key pair of second subaddressing Second sub- personal information (phone) is encrypted, enable the corresponding sub- personal information of key pair third of the third subaddressing (address, Work unit) it is encrypted.The benefit of this cipher mode is that the registration for the access information that two users have is higher, then It can be more decryption other side encryption information, meet requirement of the encryption information transmission side to information security.
In order to further increase degree of safety, in one embodiment, layered encryption side may be used in the step S162 Formula is encrypted using the multiple sub- personal information of the multiple key pair, for example enables the third subaddressing corresponding The sub- personal information of third described in key pair is encrypted to obtain the first encryption information, enables the corresponding key pair of second subaddressing Second sub- personal information and the first encryption information are encrypted to obtain the second encryption information, enable first subaddressing corresponding close The first sub- personal information of key pair and the second encryption information are encrypted, and obtain the final encryption information.
S180:Broadcast the encryption information.
In the step, generally the encryption information can be broadcasted by wireless modes such as bluetooth, purple honeybees.
In the step, the broadcast encryption information can be triggered in response to the operation of user.In one embodiment, Also respond to the user be in the relevant precalculated position of the access information, broadcast the encryption information.For example, described User has participated in the Economics Courses training that an a certain university sponsors on the net, and has recorded corresponding access information, generates At least one key, has obtained the encryption information, and when user arrives the university by chance to go on business, the method detects The position of user is related to an access information (such as relevant information of Economics Courses training) is stored before, then described in broadcast Encryption information, to find the classmate of oneself in the university.
In addition, a user may have multiple access informations, if an access information is corresponding at least one Key is denoted as the access corresponding key group, then multiple access information can correspond to multiple key groups, described in reception For one side of encryption information, how to quickly find the encryption information that the decryption of corresponding key group receives and be one and ask Topic.It is quickly found out corresponding key group in order to facilitate recipient, referring to Fig. 2, in one embodiment, the method can be with Including step:
S190:A summary info is generated according at least one key, broadcasts the summary info.
Wherein, the summary info, which can be utilized, generates such as MD5 scheduling algorithms according at least one key, and recipient can It is compared with the summary info received with the corresponding summary info of the key with oneself, can be solved to be quickly found out The key group of the close encryption information.
In addition, the embodiment of the present application also provides a kind of computer-readable medium, including following operate is carried out when executed Computer-readable instruction:Execute step S120, S140, S160 and S180's of the method in above-mentioned Fig. 1 illustrated embodiments Operation.
To sum up, the embodiment of the present application the method can make the user of participation same campaign decrypt mutual encryption information, And other unrelated users can not then decrypt the encryption information due to no access information, to improve information exchange The safety of process, and information security is further increased by layered encryption mode, and by broadcasting summary info side Just recipient decrypts the encryption information, and the user experience is improved.
Fig. 3 is the flow chart of exchange method described in the application another embodiment, and the method can be in such as one interaction It is realized on device.As shown in figure 3, the method includes:
S320:An activity is participated in response to a user, obtains the access that the movable at least partly participant shares Information;
S340:An at least key is generated according to the access information;
S360:Receive an encryption information;
S380:Use encryption information described in an at least secret key decryption.
The embodiment of the present application the method participates in an activity in response to a user, obtains described movable at least partly join The access information shared with person generates an at least key according to the access information, and after receiving encryption key, using described At least a secret key decryption is encryption information, to make the user of participation same campaign decrypt mutual encryption information, and other nothings User is closed due to no access information, then can not decrypt the encryption information, improve the safety of information interactive process.
Below in conjunction with specific implementation mode, the function of described step S320, S340, S360 and S380 is described in detail.
S320:An activity is participated in response to a user, obtains the visit that the movable at least partly participant shares Ask information.
Wherein, the activity includes:An information resources are accessed, for example accesses a website when learning online classes, access One MAC Address etc..Correspondingly, the access information can be in the corresponding URL of the activity, MAC Address, activity description at least One.For example, user participates in a network courses, the access information can be the network address of the network courses, naturally it is also possible to be Specific course number, course content etc..
S340:At least one key is generated according to the access information.
Wherein, at least one key can be a key, can also be multiple keys.In the step, need by At least one key is generated according to the access information according to a pre-defined rule, the pre-defined rule includes the number for generating key Amount, and specifically how to generate, to which all users for sharing the access information can be corresponding according to unified rule generation Key, and then the encryption information of other side can be decrypted each other.For example, the access information can be location as follows:http:// Abc.eng.com/startup/detail_2014_07/24/37489034_0.shtml (abbreviation destination network addresses once) It then can be using the corresponding ASCII character in entire address as the key of the generation according to the pre-defined rule.
In one embodiment, at least one key is multiple keys, and the step S340 may include:
S341:Multiple sub- access informations are obtained according to the access information;
S342:The multiple key is generated according to the multiple sub- access information.
In present embodiment, it is still assumed that the access information is address above mentioned http://abc.eng.com/ The access information can be divided into the visit of following three by startup/detail_2014_07/24/37489034_0.shtml Ask information:http://abc.eng.com (hereinafter referred to as the first subaddressing);http://abc.eng.com/startup is (following Referred to as the second subaddressing);http://abc.eng.com/startup/detail_2014_07/24/37489034_0.shtml (hereinafter referred to as third subaddressing).It is then possible to using the ASCII character of three sub- access informations as close corresponding to it Key ultimately generates 3 keys.
S360:Receive an encryption information.
In the step, the encryption information can be received by wireless modes such as bluetooth, purple honeybees.
S380:Use encryption information described in an at least secret key decryption.
One user may have multiple access informations, if the corresponding at least one key of an access information remembered The access corresponding key group is done, then multiple access information can correspond to multiple key groups, if using the multiple close Key group attempts the decryption encryption information successively will spend more time although the method can also be realized.Therefore, For the side for receiving the encryption information, how to quickly find corresponding key group and decrypt the encryption received Information is a problem.In order to improve decryption speed, a predetermined condition can be met in response to an at least key, use institute State encryption information described in an at least secret key decryption.That is, prejudging whether at least one key meets predetermined item Part is decrypted if conditions are not met, then cancelling using it, in the case of only meeting predetermined condition, is just decrypted using it.
In one embodiment, whether an at least key meets described in being judged according to the location of described user The predetermined condition.For example, when the location of described user is a campus, it can be determined that an at least key pair Whether the access information answered is related to study, if related, then it is assumed that meets predetermined condition, otherwise, is then unsatisfactory for predetermined condition.
In another embodiment, whether an at least key is full described in being judged according to the operational order of the user The foot predetermined condition.For example, when the user inputs the network address of the websites MOOC in a mobile device, then may determine that Whether the corresponding access information of an at least key is related to the websites MOOC, if related, then it is assumed that meet predetermined item Otherwise part is then unsatisfactory for predetermined condition.
In another embodiment, the method can also include:
S371:Receive a summary info;
S372:One generated by comparing the summary info and an at least key judges institute with reference to summary info State whether an at least key meets the predetermined condition.
Wherein, the summary info received is that the key of the corresponding encryption information generates, that is to say, that is hair What the key of the side of sending generated, and it is described generated with reference to the key that summary info is recipient, can be right in the step S372 Than the summary info and it is described refer to summary info, if the two is consistent, the key of recipient can decrypt the encryption Information meets the predetermined condition;Otherwise, it is not possible to decrypt the encryption information, that is, be unsatisfactory for the predetermined condition.
Referring to Fig. 4, in one embodiment, the method can also include:
S390:Operation is executed according to the result for decrypting the encryption information.
In the step, after the encryption information described in successful decryption, notify user that nearby there may be related online activities Other users exist, and possible distance is prompted according to signal strength;If the details of the other user can be obtained, in addition to Notice is outdoor, can also address list or chat tool etc. be added in the personal information of reception.
In addition, the embodiment of the present application also provides a kind of computer-readable medium, including following operate is carried out when executed Computer-readable instruction:Execute step S120, S140, S160 and S180's of the method in above-mentioned Fig. 1 illustrated embodiments Operation.
To sum up, the embodiment of the present application the method can make the user of participation same campaign decrypt mutual encryption information, And other unrelated users can not then decrypt the encryption information due to no access information, to improve information exchange The safety of process, and by prejudging whether meet predetermined condition to key, improve decryption speed, improve user Experience.
Fig. 5 is the modular structure schematic diagram of interactive device described in one embodiment of the invention, and the interactive device can be Smart mobile phone, tablet computer etc. have the electronic equipment of communication function.As shown in figure 5, described device 500 may include:
One acquisition module 510 obtains the movable at least partly participant for participating in an activity in response to a user A shared access information;
One generation module 520, for generating at least one key according to the access information;
One encrypting module 530, for place to be encrypted using the personal information of user described at least one key pair Reason, obtains an encryption information;
One first broadcast module 540, for broadcasting the encryption information.
The embodiment of the present application described device participates in an activity in response to a user, obtains described movable at least partly join The access information shared with person, and key is generated according to the access information, it is obtained using key encryption personal information To encryption information, the Last call encryption information, in this way after equally participating in the movable user and receiving the encryption information, Encryption information described in the corresponding secret key decryption of the access information can be used, and other unrelated users are due to no visit It asks information, then can not decrypt the encryption information, to improve the safety of information interactive process.
Below with reference to specific implementation mode, the acquisition module 510, generation module 520, encrypting module is described in detail 530 and first broadcast module 540 function.
The acquisition module 510 obtains described movable at least partly participate in for participating in an activity in response to a user The access information that person shares
Wherein, the activity includes:An information resources are accessed, for example accesses a website when learning online classes, access One MAC Address etc..Correspondingly, the access information can be in the corresponding URL of the activity, MAC Address, activity description at least One.For example, user participates in a network courses, the access information can be the network address of the network courses, naturally it is also possible to be Specific course number, course content etc..
The generation module 520, for generating at least one key according to the access information.
Wherein, at least one key can be a key, can also be multiple keys.The generation module 520, It needs to generate at least one key according to the access information according to a pre-defined rule, the pre-defined rule includes that generation is close The quantity of key, and specifically how to generate, to which all users for sharing the access information can be raw according to unified rule At corresponding key, and then the encryption information of other side can be decrypted each other.For example, the access information can be location as follows: http://abc.eng.com/startup/detail_2014_07/24/37489034_0.shtml (abbreviation target networks once Network address) it then can be using the corresponding ASCII character in entire address as the key of the generation according to the pre-defined rule.
Referring to Fig. 6, in one embodiment, at least one key is multiple keys, and the generation module 520 can To include:
One first unit 521, for obtaining multiple sub- access informations according to the access information;
One second unit 522, for generating the multiple key according to the multiple sub- access information.
In present embodiment, it is still assumed that the access information is address above mentioned http://abc.eng.com/ Startup/detail_2014_07/24/37489034_0.shtml, the first unit 521 can draw the access information It is divided into the sub- access information of following three:http://abc.eng.com (hereinafter referred to as the first subaddressing);http:// Abc.eng.com/startup (hereinafter referred to as the second subaddressing);http://abc.eng.com/startup/detail_ (2014_07/24/37489034_0.shtml hereinafter referred to as third subaddressing).Then, the second unit 522 can should The ASCII character of three sub- access informations ultimately generates 3 keys respectively as the key corresponding to it.
In one embodiment, the generation module 520 can be in and the access information in response to the user A relevant precalculated position generates at least one key according to the access information.For example, the user participates on the net The Economics Courses training that one a certain university sponsors, when user arrives the university by chance to go on business, the generation module 520 is detectd The position for measuring user is related to an access information (such as relevant information of Economics Courses training) is stored before, thus according to The access information generates the key, to find the classmate of oneself in the university.
The encrypting module 530, for being encrypted using the personal information of user described at least one key pair Processing, obtains an encryption information.
The personal information may include name, gender, address, phone, work unit, hobby of the user etc. Information.
In one embodiment, it can be encrypted at least one entire personal information of key pair, such as institute It is the corresponding ASCII character of the destination network addresses to state at least one key, and institute is encrypted using the ASCII character as a key State all personal information of user.
Referring to Fig. 7, in another embodiment, at least one key can be multiple keys, the encryption mould Block 530 includes:
One division unit 531, for the personal information of the user to be divided into multiple sub- personal information;
One encryption unit 532, for being encrypted using the multiple sub- personal information of the multiple key pair.
For example, the division unit 531, can be divided into three sub- personal information according to the sensitivity of personal information: (name, gender, hobby);(phone);(address, work unit), the encryption unit 532 can enable first subaddressing The first sub- personal information of corresponding key pair (name, gender, hobby) is encrypted, and enables the corresponding key of second subaddressing Second sub- personal information (phone) is encrypted, sub- personal information (of the corresponding key pair third of the third subaddressing is enabled Location, work unit) it is encrypted.The benefit of this cipher mode is that the registration for the access information that two users have is higher, The encryption information for the decryption other side that then it can be more, meets requirement of the encryption information transmission side to information security.
In order to further increase degree of safety, in one embodiment, layered encryption may be used in the encryption unit 532 Mode is encrypted using the multiple sub- personal information of the multiple key pair.For example the third subaddressing is enabled to correspond to Key pair described in the sub- personal information of third be encrypted to obtain the first encryption information, enable the corresponding key of second subaddressing Second sub- personal information and the first encryption information are encrypted to obtain the second encryption information, enable first subaddressing corresponding The first sub- personal information of key pair and the second encryption information are encrypted, and obtain the final encryption information.
First broadcast module 540, for broadcasting the encryption information.
First broadcast module 540 can pass through the encryption information as described in the broadcast of the wireless modes such as bluetooth, purple honeybee.
First broadcast module 540 can trigger the broadcast encryption information in response to the operation of user.In one kind In embodiment, first broadcast module 540, for being in pre- with the access information relevant one in response to the user Positioning is set, and the encryption information is broadcasted.For example, the user has participated in the Economics Courses training that an a certain university sponsors on the net Instruction, and corresponding access information is had recorded, at least one key is generated, the encryption information has been obtained, when user touches When ingeniously arriving the university and going on business, the method detects the position of user and stores an access information (such as economics class before The relevant information of Cheng Peixun) it is related, the encryption information is then broadcasted, to find the classmate of oneself in the university.
In addition, a user may have multiple access informations, if an access information is corresponding at least one Key is denoted as the access corresponding key group, then multiple access information can correspond to multiple key groups, described in reception For one side of encryption information, how to quickly find the encryption information that the decryption of corresponding key group receives and be one and ask Topic.It is quickly found out corresponding key group in order to facilitate recipient, referring to Fig. 8, in one embodiment, described device 500 is also Including:
One second broadcast module 550 broadcasts the abstract for generating a summary info according at least one key Information.
Wherein, the summary info, which can be utilized, generates such as MD5 scheduling algorithms according at least one key, and recipient can It is compared with the summary info received with the corresponding summary info of the key with oneself, can be solved to be quickly found out The key group of the close encryption information.
Fig. 9 is the modular structure schematic diagram of interactive device described in another embodiment of the present invention, and the interactive device can be with Smart mobile phone, tablet computer etc. have the electronic equipment of communication function.Referring to Fig. 9, described device 900 includes:
One acquisition module 910 obtains the movable at least partly participant for participating in an activity in response to a user A shared access information;
One generation module 920, for generating an at least key according to the access information;
One first receiving module 930, for receiving an encryption information;
One deciphering module 940, for encryption information described in an at least secret key decryption described in.
The embodiment of the present application described device participates in an activity in response to a user, obtains described movable at least partly join The access information shared with person generates an at least key according to the access information, and after receiving encryption key, using described At least a secret key decryption is encryption information, to make the user of participation same campaign decrypt mutual encryption information, and other nothings User is closed due to no access information, then can not decrypt the encryption information, improve the safety of information interactive process.
Below in conjunction with specific implementation mode, the acquisition module 910, generation module 920, the first receiving module is described in detail 930 and deciphering module 940 function.
The acquisition module 910 obtains described movable at least partly participate in for participating in an activity in response to a user The access information that person shares
Wherein, the activity includes:An information resources are accessed, for example accesses a website when learning online classes, access One MAC Address etc..Correspondingly, the access information can be in the corresponding URL of the activity, MAC Address, activity description at least One.For example, user participates in a network courses, the access information can be the network address of the network courses, naturally it is also possible to be Specific course number, course content etc..
The generation module 920, for generating at least one key according to the access information.
Wherein, at least one key can be a key, can also be multiple keys.The generation module 920, It needs to generate at least one key according to the access information according to a pre-defined rule, the pre-defined rule includes that generation is close The quantity of key, and specifically how to generate, to which all users for sharing the access information can be raw according to unified rule At corresponding key, and then the encryption information of other side can be decrypted each other.For example, the access information can be location as follows: http://abc.eng.com/startup/detail_2014_07/24/37489034_0.shtml (abbreviation target networks once Network address) it then can be using the corresponding ASCII character in entire address as the key of the generation according to the pre-defined rule.
Referring to Figure 10, in one embodiment, at least one key is multiple keys, the generation module 920 May include:
One first unit 921, for obtaining multiple sub- access informations according to the access information;
One second unit 922, for generating the multiple key according to the multiple sub- access information.
In present embodiment, it is still assumed that the access information is address above mentioned http://abc.eng.com/ Startup/detail_2014_07/24/37489034_0.shtml, the first unit 921 can draw the access information It is divided into the sub- access information of following three:http://abc.eng.com (hereinafter referred to as the first subaddressing);http:// Abc.eng.com/startup (hereinafter referred to as the second subaddressing);http://abc.eng.com/startup/detail_ (2014_07/24/37489034_0.shtml hereinafter referred to as third subaddressing).Then, the second unit 922 can should The ASCII character of three sub- access informations ultimately generates 3 keys respectively as the key corresponding to it.
First receiving module 930, for receiving an encryption information.
First receiving module 930 can pass through the encryption information as described in the reception of the wireless modes such as bluetooth, purple honeybee.
The deciphering module 940, for encryption information described in an at least secret key decryption described in.
One user may have multiple access informations, if the corresponding at least one key of an access information remembered The access corresponding key group is done, then multiple access information can correspond to multiple key groups, if using the multiple close Key group attempts the decryption encryption information successively will spend more time although the method can also be realized.Therefore, For the side for receiving the encryption information, how to quickly find corresponding key group and decrypt the encryption received Information is a problem.In order to improve decryption speed, a predetermined condition can be met in response to an at least key, use institute State encryption information described in an at least secret key decryption.That is, prejudging whether at least one key meets predetermined item Part is decrypted if conditions are not met, then cancelling using it, in the case of only meeting predetermined condition, is just decrypted using it.
Referring to Figure 11, in one embodiment, described device 900 further includes:
One judgment module 950, for whether meeting institute according to an at least key described in the location of described user judgement State predetermined condition.For example, when the location of described user is a campus, it can be determined that an at least key pair is answered Access information it is whether related to study, if related, then it is assumed that meet predetermined condition, otherwise, be then unsatisfactory for predetermined condition.
Referring to Figure 12, in another embodiment, described device 900 further includes:
One judgment module 960, for whether meeting institute according to an at least key described in the judgement of the operational order of the user State predetermined condition.For example, when the user inputs the network address of the websites MOOC in a mobile device, then may determine that described Whether the corresponding access information of an at least key is related to the websites MOOC, if related, then it is assumed that meet predetermined condition, it is no Then, then it is unsatisfactory for predetermined condition.
Referring to Figure 13, in another embodiment, described device 900 further includes:
One second receiving module 970, for receiving a summary info;
One judgment module 980, the reference for being generated by comparing the summary info and an at least key Whether an at least key meets the predetermined condition described in summary info judgement.
Wherein, the summary info that second receiving module 970 receives is the key of the corresponding encryption information Generate, that is to say, that be sender key generate, and it is described with reference to summary info be recipient key generate, institute Judgment module 980 is stated, the summary info can be compared and described with reference to summary info, if the two is consistent, recipient's Key can decrypt the encryption information, that is, meet the predetermined condition;Otherwise, it is not possible to decrypt the encryption information, i.e., not Meet the predetermined condition.
Referring to Figure 14, in one embodiment, described device 900 further includes:
One execution module 990, for executing operation according to the result for decrypting the encryption information.
After the encryption information described in successful decryption, the execution module 990 notifies user that nearby there may be correlations to exist The movable other users of line exist, and prompt possible distance according to signal strength;If the detailed letter of the other user can be obtained In addition to notice open air can also address list or chat tool etc. be added in the personal information of reception by breath.
The hardware configuration of interactive device described in another embodiment of the application is as shown in figure 15.The application specific embodiment is simultaneously The specific implementation of the interactive device is not limited, referring to Figure 15, described device 1500 may include:
Processor (processor) 1510, communication interface (Communications Interface) 1520, memory (memory) 1530 and communication bus 1540.Wherein:
Processor 1510, communication interface 1520 and memory 1530 complete mutual lead to by communication bus 1540 Letter.
Communication interface 1520, for being communicated with other network elements.
Processor 1510 can specifically execute the phase in above-mentioned embodiment of the method shown in FIG. 1 for executing program 1532 Close step.
Specifically, program 1532 may include program code, and said program code includes computer-managed instruction.
Processor 1510 may be a central processor CPU or specific integrated circuit ASIC (Application Specific Integrated Circuit), or be arranged to implement the integrated electricity of one or more of the embodiment of the present application Road.
Memory 1530, for storing program 1532.Memory 1530 may include high-speed RAM memory, it is also possible to also Including nonvolatile memory (non-volatile memory), for example, at least a magnetic disk storage.Program 1532 specifically may be used To execute following steps:
An activity is participated in response to a user, one that the movable at least partly participant shares is obtained and accesses letter Breath;
At least one key is generated according to the access information;
It is encrypted using the personal information of user described at least one key pair, obtains an encryption information;
Broadcast the encryption information.
The specific implementation of each step may refer to the corresponding steps in above-described embodiment or module in program 1532, herein not It repeats.It is apparent to those skilled in the art that for convenience and simplicity of description, the equipment and mould of foregoing description The specific work process of block can refer to corresponding processes in the foregoing method embodiment description, and details are not described herein.
The hardware configuration of interactive device described in the application one embodiment is as shown in figure 16.The application specific embodiment is not The specific implementation of the interactive device is limited, referring to Figure 16, described device 1600 may include:
Processor (processor) 1610, communication interface (Communications Interface) 1620, memory (memory) 1630 and communication bus 1640.Wherein:
Processor 1610, communication interface 1620 and memory 1630 complete mutual lead to by communication bus 1640 Letter.
Communication interface 1620, for being communicated with other network elements.
Processor 1610 can specifically execute the phase in above-mentioned embodiment of the method shown in FIG. 1 for executing program 1632 Close step.
Specifically, program 1632 may include program code, and said program code includes computer-managed instruction.
Processor 1610 may be a central processor CPU or specific integrated circuit ASIC (Application Specific Integrated Circuit), or be arranged to implement the integrated electricity of one or more of the embodiment of the present application Road.
Memory 1630, for storing program 1632.Memory 1630 may include high-speed RAM memory, it is also possible to also Including nonvolatile memory (non-volatile memory), for example, at least a magnetic disk storage.Program 1632 specifically may be used To execute following steps:
An activity is participated in response to a user, obtains the access information that the movable at least partly participant shares;
An at least key is generated according to the access information;
Receive an encryption information;
Use encryption information described in an at least secret key decryption.
The specific implementation of each step may refer to the corresponding steps in above-described embodiment or module in program 1632, herein not It repeats.It is apparent to those skilled in the art that for convenience and simplicity of description, the equipment and mould of foregoing description The specific work process of block can refer to corresponding processes in the foregoing method embodiment description, and details are not described herein.
Those of ordinary skill in the art may realize that lists described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and method and step can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, depends on the specific application and design constraint of technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed Scope of the present application.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in a computer read/write memory medium.Based on this understanding, the technical solution of the application is substantially in other words The part of the part that contributes to existing technology or the technical solution can be expressed in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be People's computer, controller or network equipment etc.) execute each embodiment the method for the application all or part of step. And storage medium above-mentioned includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic disc or CD.
Embodiment of above is merely to illustrate the application, and is not the limitation to the application, in relation to the common of technical field Technical staff can also make a variety of changes and modification in the case where not departing from spirit and scope, therefore all Equivalent technical solution also belongs to the scope of the application, and the scope of patent protection of the application should be defined by the claims.

Claims (30)

1. a kind of exchange method, which is characterized in that the method includes:
An activity is participated in response to a user, obtains the access information that the movable at least partly participant shares;
At least one key is generated according to the access information;
It is encrypted using the personal information of user described at least one key pair, obtains an encryption information;
Broadcast the encryption information;
At least one key is multiple keys;
It is described to include according at least one key of access information generation:
Multiple sub- access informations are obtained according to the access information;
The multiple key is generated according to the multiple sub- access information;
The personal information using user described at least one key pair be encrypted including:
The personal information of the user is divided into multiple sub- personal information;
It is encrypted using the multiple sub- personal information of the multiple key pair.
2. the method as described in claim 1, which is characterized in that the activity includes:Access an information resources.
3. method as claimed in claim 1 or 2, which is characterized in that the access information includes:The corresponding URL of the activity, At least one of MAC Address, activity description.
4. method as claimed in claim 1 or 2, which is characterized in that described at least one close according to access information generation Key includes:
At least one key is generated according to the access information according to pre-defined rule.
5. method as claimed in claim 1 or 2, which is characterized in that described at least one close according to access information generation Key includes:
In response to the user be in the relevant precalculated position of the access information, according to the access information generate described in At least one key.
6. the method as described in claim 1, which is characterized in that described to use the personal letter of the multiple son of the multiple key pair Breath be encrypted including:
It is encrypted using the multiple sub- personal information of the multiple key pair using layered encryption mode.
7. the method as described in claim 1,2, any one of 6, which is characterized in that the broadcast encryption information includes:
In response to the user be in the relevant precalculated position of the access information, broadcast the encryption information.
8. the method as described in claim 1,2, any one of 6, which is characterized in that the method further includes:
A summary info is generated according at least one key, broadcasts the summary info.
9. a kind of exchange method, which is characterized in that the method includes:
An activity is participated in response to a user, obtains the access information that the movable at least partly participant shares;
An at least key is generated according to the access information;
Receive an encryption information;
Use encryption information described in an at least secret key decryption;
At least one key is multiple keys;
It is described to include according at least one key of access information generation:
Multiple sub- access informations are obtained according to the access information;
The multiple key is generated according to the multiple sub- access information.
10. method as claimed in claim 9, which is characterized in that the activity includes:Access an information resources.
11. the method as described in claim 9 or 10, which is characterized in that the access information includes:The activity is corresponding At least one of URL, MAC Address, activity description.
12. the method as described in claim 9 or 10, which is characterized in that described at least one according to access information generation Key includes:
According to pre-defined rule according to an at least key described in access information generation.
13. the method as described in claim 9 or 10, which is characterized in that add described in an at least secret key decryption described in Confidential information includes:
Meet a predetermined condition in response to an at least key, uses encryption information described in an at least secret key decryption.
14. method as claimed in claim 13, which is characterized in that the method further includes:
Whether meet the predetermined condition according to an at least key described in the location of described user judgement.
15. method as claimed in claim 13, which is characterized in that the method further includes:
Whether meet the predetermined condition according to an at least key described in the judgement of the operational order of the user.
16. method as claimed in claim 13, which is characterized in that the method further includes:
Receive a summary info;
By comparing at least one described in the reference summary info judgement that the summary info and an at least key are generated Whether key meets the predetermined condition.
17. the method as described in claim 9,10, any one of 14 to 16, which is characterized in that the method further includes:
Operation is executed according to the result for decrypting the encryption information.
18. a kind of interactive device, which is characterized in that described device includes:
One acquisition module obtains what the movable at least partly participant shared for participating in an activity in response to a user One access information;
One generation module, for generating at least one key according to the access information;
One encrypting module is obtained for being encrypted using the personal information of user described at least one key pair One encryption information;
One first broadcast module, for broadcasting the encryption information;
At least one key is multiple keys;
The generation module includes:
One first unit, for obtaining multiple sub- access informations according to the access information;
One second unit, for generating the multiple key according to the multiple sub- access information;
The encrypting module includes:
One division unit, for the personal information of the user to be divided into multiple sub- personal information;
One encryption unit, for being encrypted using the multiple sub- personal information of the multiple key pair.
19. device as claimed in claim 18, which is characterized in that the generation module is used for according to pre-defined rule according to institute It states access information and generates at least one key.
20. device as claimed in claim 18, which is characterized in that the generation module, for being in response to the user With the relevant precalculated position of the access information, at least one key is generated according to the access information.
21. device as claimed in claim 18, which is characterized in that the encryption unit, for being made using layered encryption mode It is encrypted with the multiple sub- personal information of the multiple key pair.
22. the device as described in any one of claim 18 to 21, which is characterized in that first broadcast module, for ringing User described in Ying Yu be in the relevant precalculated position of the access information, broadcast the encryption information.
23. the device as described in any one of claim 18 to 21, which is characterized in that described device further includes:
One second broadcast module broadcasts the summary info for generating a summary info according at least one key.
24. a kind of interactive device, which is characterized in that described device includes:
One acquisition module obtains what the movable at least partly participant shared for participating in an activity in response to a user One access information;
One generation module, for generating an at least key according to the access information;
One first receiving module, for receiving an encryption information;
One deciphering module, for encryption information described in an at least secret key decryption described in;
At least one key is multiple keys;
The generation module includes:
One first unit, for obtaining multiple sub- access informations according to the access information;
One second unit, for generating the multiple key according to the multiple sub- access information.
25. device as claimed in claim 24, which is characterized in that the generation module is used for according to pre-defined rule according to institute State an at least key described in access information generation.
26. the device as described in claim 24 or 25, which is characterized in that the deciphering module, in response to it is described at least One key meets a predetermined condition, uses encryption information described in an at least secret key decryption.
27. device as claimed in claim 26, which is characterized in that described device further includes:
One judgment module, for whether meeting the predetermined item according to an at least key described in the location of described user judgement Part.
28. device as claimed in claim 26, which is characterized in that described device further includes:
One judgment module, for whether meeting the predetermined item according to an at least key described in the judgement of the operational order of the user Part.
29. device as claimed in claim 26, which is characterized in that described device further includes:
One second receiving module, for receiving a summary info;
One judgment module, one for being generated by comparing the summary info and an at least key refers to summary info Whether an at least key meets the predetermined condition described in judging.
30. the device as described in claim 24,25, any one of 27 to 29, which is characterized in that described device further includes:
One execution module, for executing operation according to the result for decrypting the encryption information.
CN201410371542.XA 2014-07-30 2014-07-30 Exchange method and device Active CN104125228B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410371542.XA CN104125228B (en) 2014-07-30 2014-07-30 Exchange method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410371542.XA CN104125228B (en) 2014-07-30 2014-07-30 Exchange method and device

Publications (2)

Publication Number Publication Date
CN104125228A CN104125228A (en) 2014-10-29
CN104125228B true CN104125228B (en) 2018-09-04

Family

ID=51770492

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410371542.XA Active CN104125228B (en) 2014-07-30 2014-07-30 Exchange method and device

Country Status (1)

Country Link
CN (1) CN104125228B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106254302B (en) * 2015-11-30 2019-07-09 北京智谷睿拓技术服务有限公司 Information processing method and equipment
CN110213049B (en) * 2019-06-03 2021-12-21 江苏恒宝智能系统技术有限公司 Secret key updating system for interaction of vehicle-mounted equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102999710A (en) * 2011-09-14 2013-03-27 北京大学 Method, equipment and system for safely sharing digital content
CN103401949A (en) * 2013-08-21 2013-11-20 北京邮电大学 Personal data safety sharing system and method for mobile phone

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20070108315A (en) * 2005-12-07 2007-11-09 한국전자통신연구원 Appartus and method for privacy information sharing service using signed callback url message
CN102624917A (en) * 2012-03-29 2012-08-01 杨涛 Privacy protection system based on broadcast and attribute encryption technology

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102999710A (en) * 2011-09-14 2013-03-27 北京大学 Method, equipment and system for safely sharing digital content
CN103401949A (en) * 2013-08-21 2013-11-20 北京邮电大学 Personal data safety sharing system and method for mobile phone

Also Published As

Publication number Publication date
CN104125228A (en) 2014-10-29

Similar Documents

Publication Publication Date Title
Khan et al. A provable and privacy-preserving authentication scheme for UAV-enabled intelligent transportation systems
CN113127916B (en) Data set processing method, data processing method, device and storage medium
US9553833B2 (en) Confidential messages in a group chat
CN108292454A (en) Access management
CN107736001A (en) The dynamic group member identity of equipment
US9372987B1 (en) Apparatus and method for masking a real user controlling synthetic identities
CN104335214B (en) Electronic equipment and system and server for certification electronic equipment
CN104145445A (en) Methods, apparatuses, and computer-readable storage media for securely accessing social networking data
CN104052762B (en) The method, apparatus and system of data sharing
CN102640103A (en) Method and apparatus for providing access to social content
CN107071723A (en) With sharing user profile close to device
CN107211049A (en) Pre-cache on WAP
CN107819735B (en) Information processing method and system
CN104917761B (en) A kind of general access control method and device
CN107770126A (en) Personal identification method, system and dynamic token, mobile terminal, gateway device
US10575169B2 (en) Information processing method and device
EP3902201B1 (en) Methods and devices for increasing entropy of a blockchain using blinded outcome diversification
JP2015537483A (en) Drawing management system and drawing management method by fingerprint authentication
BR112014000515B1 (en) ELECTRONIC DATA SHARING DEVICE AND METHOD OF USE
CN110140336A (en) Consecutive password technology
EP3308496A2 (en) System, apparatus and method for secure coordination of a rendezvous point for distributed devices using entropy multiplexing
CN107154916A (en) A kind of authentication information acquisition methods, offer method and device
CN104125228B (en) Exchange method and device
CN104243153B (en) The method and user equipment of a kind of user for discovering device
Park et al. Trusted online social network (OSN) services with optimal data management

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant