CN105120452B - Transmit the method, apparatus and system of information - Google Patents

Transmit the method, apparatus and system of information Download PDF

Info

Publication number
CN105120452B
CN105120452B CN201510373613.4A CN201510373613A CN105120452B CN 105120452 B CN105120452 B CN 105120452B CN 201510373613 A CN201510373613 A CN 201510373613A CN 105120452 B CN105120452 B CN 105120452B
Authority
CN
China
Prior art keywords
key
cipher
information
terminal
wearable device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510373613.4A
Other languages
Chinese (zh)
Other versions
CN105120452A (en
Inventor
刘书文
张晓亮
于红亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing millet Payment Technology Co., Ltd.
Original Assignee
Beijing Millet Payment Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Millet Payment Technology Co Ltd filed Critical Beijing Millet Payment Technology Co Ltd
Priority to CN201510373613.4A priority Critical patent/CN105120452B/en
Publication of CN105120452A publication Critical patent/CN105120452A/en
Application granted granted Critical
Publication of CN105120452B publication Critical patent/CN105120452B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]

Abstract

The disclosure is directed to a kind of method, apparatus and system for transmitting information, belong to technical field of data transmission.The method includes:The corresponding first key of first terminal is obtained, the first key is that the first wearable device is generated according to the cipher instruction that the mark of first wearable device and user input;Specify information is encrypted using the first key, obtains the first cipher-text information;First cipher-text information is sent to first terminal, the first terminal is used to that first cipher-text information to be decrypted using first wearable device.The key that the disclosure passes through acquisition first terminal corresponding first, specify information is encrypted using first key, obtain the first cipher-text information, and the first cipher-text information is sent to first terminal, even if specify information is intercepted and captured by third party during transmission, third party also can only obtain the specify information of ciphertext form, can not get real information, effectively prevent the leakage of specify information.

Description

Transmit the method, apparatus and system of information
Technical field
This disclosure relates to technical field of data transmission more particularly to a kind of method, apparatus and system for transmitting information.
Background technique
With the development of development of Mobile Internet technology, the data that people are transmitted by mobile terminal are more and more.These pass through It include the identifying code of such as payment, the account of bank and password sensitive information in the data of mobile terminal transmission.
In the related technology, all data of mobile terminal are all made of plaintext transmission.
Since data have the risk intercepted and captured by third party during transmission, plaintext transmission is used when third party intercepts and captures Sensitive information when, the true content of sensitive information can be got, cause sensitive information leakage.
Summary of the invention
To overcome the problems, such as to reveal user sensitive information present in the relevant technologies, the disclosure provides a kind of transmission information Method, apparatus and system.
According to the first aspect of the embodiments of the present disclosure, a kind of method for transmitting information is provided, including:
The corresponding first key of first terminal is obtained, the first key is that the first wearable device can according to described first What the mark of wearable device and the cipher instruction of user's input generated;
Specify information is encrypted using the first key, obtains the first cipher-text information;
First cipher-text information is sent to the first terminal, the first terminal is used for wearable using described first First cipher-text information is decrypted in equipment, obtains the specify information.
It is described to obtain first when the method is executed by server in a kind of possible implementation of first aspect The corresponding first key of terminal, including:
According to the corresponding relationship of the terminal of storage and key, the corresponding first key of the first terminal is obtained.
Optionally, the method also includes:
The second key of ciphertext form is received, the second key of the ciphertext form is that first wearable device uses The second key of third key pair is encrypted, and second key and the third key are described first wearable Equipment is generated according to the cipher instruction that the mark of first wearable device and user input, the third key with it is described First key is the same key used in a pair of secret keys used in rivest, shamir, adelman or symmetric encipherment algorithm;
It is decrypted using second key of the first key to the ciphertext form, obtains second key;
The corresponding first key of the first terminal is updated to second key.
In the alternatively possible implementation of first aspect, when the method is executed by server, the method is also Including:
Receive the second cipher-text information, second cipher-text information, which is the second wearable device, uses second terminal corresponding the What specify information described in four key pairs was encrypted, the 4th key is second wearable device according to described What the mark of two wearable devices and the cipher instruction of user's input generated, the 4th key is close used in symmetry algorithm Key;
It is decrypted using the second cipher-text information described in the 4th key pair, obtains the specify information.
Optionally, the method also includes:
The 5th key of ciphertext form is received, the 5th key of the ciphertext form is that second wearable device uses What the 5th key of the 4th key pair was encrypted, the 5th key is second wearable device according to What the mark of the second wearable device and the cipher instruction of user's input generated;
It is decrypted using the 5th key of ciphertext form described in the 4th key pair, obtains the 5th key;
It is the 5th key by corresponding 4th key updating of the second terminal.
In first aspect in another possible implementation, when the method is executed by second terminal, the acquisition The corresponding first key of first terminal, including:
Key request is sent to server, the key request is for obtaining the first key;
The first key is received, the first key is that the server is closed according to the terminal of storage and the corresponding of key What system obtained.
In first aspect in another possible implementation, when the method is executed by second terminal, the use The first key encrypts the specify information, obtains the first cipher-text information, including:
The first key and the specify information are sent to the second wearable device;
First cipher-text information is received, first cipher-text information is that second wearable device uses described first Specify information described in key pair is encrypted.
According to the second aspect of an embodiment of the present disclosure, a kind of method for transmitting information is provided, including:
The first cipher-text information is received, first cipher-text information is using the corresponding first key of first terminal to specified letter What breath was encrypted, the first key is mark and use of first wearable device according to first wearable device What the cipher instruction of family input generated;
First cipher-text information is sent to first wearable device;
Receive the specify information, the specify information, which is first wearable device, uses described in third key pair the What one cipher-text information was decrypted, the third key is first wearable device wearable to be set according to described first What standby mark and the cipher instruction of user's input generated, the third key and the first key are rivest, shamir, adelman Used in the same key used in a pair of secret keys or symmetric encipherment algorithm.
In a kind of possible implementation of second aspect, the method also includes:
The second key of ciphertext form is received, the second key of the ciphertext form is that first wearable device uses What second key of third key pair was encrypted, second key is first wearable device according to What the mark of the first wearable device and the cipher instruction of user's input generated;
The second key of the ciphertext form is sent to server, so that the server is using the first key to institute The second key for stating ciphertext form is decrypted, and obtains second key, and by the corresponding first key of the first terminal It is updated to second key.
According to the third aspect of an embodiment of the present disclosure, a kind of device transmitting information is provided, including:
Key Acquisition Module, for obtaining the corresponding first key of first terminal, the first key is first wearable Equipment is generated according to the cipher instruction that the mark of first wearable device and user input;
Information encrypting module obtains the first cipher-text information for encrypting using the first key to specify information;
Information sending module, for sending first cipher-text information to the first terminal, the first terminal is used for First cipher-text information is decrypted using first wearable device, obtains the specify information.
In a kind of possible implementation of the third aspect, when described device is server, the Key Acquisition Module For,
According to the corresponding relationship of the terminal of storage and key, the corresponding first key of the first terminal is obtained.
Optionally, described device further includes:
First key receiving module, for receiving the second key of ciphertext form, the second key of the ciphertext form is First wearable device is encrypted using the second key of third key pair, second key and the third Key is that the cipher instruction that first wearable device is inputted according to the mark of first wearable device and user is raw At, the third key and the first key are that a pair of secret keys used in rivest, shamir, adelman or symmetric cryptography are calculated The same key used in method;
First key deciphering module, for being solved using second key of the first key to the ciphertext form It is close, obtain second key;
First key update module, for the corresponding first key of the first terminal to be updated to second key.
In the alternatively possible implementation of the third aspect, when described device is server, described device further includes:
Information receiving module, for receiving the second cipher-text information, second cipher-text information is that the second wearable device makes What the specify information described in corresponding 4th key pair of second terminal was encrypted, the 4th key is described second can Wearable device is generated according to the cipher instruction that the mark of second wearable device and user input, and the 4th key is Key used in symmetry algorithm;
Information deciphering module is obtained described for being decrypted using the second cipher-text information described in the 4th key pair Specify information.
Optionally, described device further includes:
Second key reception module, for receiving the 5th key of ciphertext form, the 5th key of the ciphertext form is Second wearable device is encrypted using the 5th key of the 4th key pair, and the 5th key is described Second wearable device is generated according to the cipher instruction that the mark of second wearable device and user input;
Second cipher key decryption block, for being solved using the 5th key of ciphertext form described in the 4th key pair It is close, obtain the 5th key;
Second key updating module, for being the 5th key by corresponding 4th key updating of the second terminal.
In the third aspect in another possible implementation, when described device is second terminal, the acquisition of information Module includes:
Request-to-send submodule, for sending key request to server, the key request is for obtaining described first Key;
Key reception submodule, for receiving the first key, the first key is the server according to storage Terminal and key corresponding relationship obtain.
In the third aspect in another possible implementation, when described device is second terminal, the information encryption Module includes:
Information sending submodule, for sending the first key and the specify information to the second wearable device;
Information receiving submodule, for receiving first cipher-text information, first cipher-text information is described second can Wearable device encrypts the specify information using the first key.
According to a fourth aspect of embodiments of the present disclosure, a kind of device transmitting information is provided, including:
First receiving module, for receiving the first cipher-text information, first cipher-text information is corresponding using first terminal First key specify information is encrypted, the first key is that the first wearable device can according to described first What the mark of wearable device and the cipher instruction of user's input generated;
First sending module, for sending first cipher-text information to first wearable device;
Second receiving module, for receiving the specify information, the specify information is that first wearable device makes The first cipher-text information described in third key pair is decrypted, and the third key is the first wearable device root It is generated according to the cipher instruction that the mark of first wearable device and user input, the third key and described first close Key is the same key used in a pair of secret keys used in rivest, shamir, adelman or symmetric encipherment algorithm.
In a kind of possible implementation of fourth aspect, described device further includes:
Third receiving module, for receiving the second key of ciphertext form, the second key of the ciphertext form is described First wearable device is encrypted using second key of third key pair, and second key is described first Wearable device is generated according to the cipher instruction that the mark of first wearable device and user input;
Second sending module, for sending the second key of the ciphertext form to server, so that the server makes It is decrypted with second key of the first key to the ciphertext form, obtains second key, and by described first The corresponding first key of terminal is updated to second key.
According to a fifth aspect of the embodiments of the present disclosure, a kind of device transmitting information is provided, including:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
The corresponding first key of first terminal is obtained, the first key is that the first wearable device can according to described first What the mark of wearable device and the cipher instruction of user's input generated;
Specify information is encrypted using the first key, obtains the first cipher-text information;
First cipher-text information is sent to the first terminal, the first terminal is used for wearable using described first First cipher-text information is decrypted in equipment, obtains the specify information.
According to a sixth aspect of an embodiment of the present disclosure, a kind of device transmitting information is provided, including:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
The first cipher-text information is received, first cipher-text information is using the corresponding first key of first terminal to specified letter What breath was encrypted, the first key is mark and use of first wearable device according to first wearable device What the cipher instruction of family input generated;
First cipher-text information is sent to first wearable device;
Receive the specify information, the specify information, which is first wearable device, uses described in third key pair the What one cipher-text information was decrypted, the third key is first wearable device wearable to be set according to described first What standby mark and the cipher instruction of user's input generated, the third key and the first key are rivest, shamir, adelman Used in the same key used in a pair of secret keys or symmetric encipherment algorithm.
According to the 7th of the embodiment of the present disclosure the aspect, a kind of system for transmitting information is provided, including:
First wearable device, it is raw for the cipher instruction according to the mark of first wearable device and user's input At the corresponding first key of first terminal and third key, the third key and the first key are rivest, shamir, adelman Used in the same key used in a pair of secret keys or symmetric encipherment algorithm;
Server, for obtaining the first key;Specify information is encrypted using the first key, obtains One cipher-text information;First cipher-text information is sent to the first terminal;
The first terminal, for receiving first cipher-text information;Described the is sent to first wearable device One cipher-text information;
First wearable device is also used to, and receives first cipher-text information;Using described in the third key pair First cipher-text information is decrypted, and obtains the specify information;The specify information is sent to the first terminal;
The first terminal is also used to, and receives the specify information.
According to the eighth aspect of the embodiment of the present disclosure, a kind of system for transmitting information is provided, including:
First wearable device, it is raw for the cipher instruction according to the mark of first wearable device and user's input At the corresponding first key of first terminal and third key, the third key and the first key are rivest, shamir, adelman Used in the same key used in a pair of secret keys or symmetric encipherment algorithm;
Second terminal, for sending key request to server, the key request is for obtaining the first key;
The server, for receiving the key request;According to the corresponding relationship of the terminal of storage and key, institute is obtained State first key;The first key is sent to the second terminal;
The second terminal is also used to, and receives the first key;The first key is sent to the second wearable device;
Second wearable device, for receiving the first key;Using the first key to specify information into Row encryption, obtains the first cipher-text information;First cipher-text information is sent to the second terminal;
The second terminal is also used to, and receives first cipher-text information;It is close that described first is sent to the first terminal Literary information;
The first terminal, for receiving first cipher-text information;Described the is sent to first wearable device One cipher-text information;
First wearable device is also used to, and receives first cipher-text information;Using described in the third key pair First cipher-text information is decrypted, and obtains the specify information;The specify information is sent to the first terminal;
The first terminal is also used to, and receives the specify information.
According to the 9th of the embodiment of the present disclosure the aspect, a kind of system for transmitting information is provided, including:
First wearable device, it is raw for the cipher instruction according to the mark of first wearable device and user's input At the corresponding first key of first terminal and third key, the third key and the first key are rivest, shamir, adelman Used in the same key used in a pair of secret keys or symmetric encipherment algorithm;
Second wearable device, it is raw for the cipher instruction according to the mark of second wearable device and user's input At corresponding 4th key of second terminal, the 4th key is key used in symmetry algorithm;Use the 4th key Specify information is encrypted, the second cipher-text information is obtained;Second cipher-text information is sent to the second terminal;
The second terminal, for receiving second cipher-text information;Second cipher-text information is sent to server;
The server, for receiving second cipher-text information;Believed using the second ciphertext described in the 4th key pair Breath is decrypted, and obtains the specify information;Obtain the first key;Using the first key to the specify information into Row encryption, obtains the first cipher-text information;First cipher-text information is sent to the first terminal;
The first terminal, for receiving first cipher-text information;Described the is sent to first wearable device One cipher-text information;
First wearable device is also used to, and receives first cipher-text information;Using described in the third key pair First cipher-text information is decrypted, and obtains the specify information;The specify information is sent to the first terminal;
The first terminal is also used to, and receives the specify information.
The technical scheme provided by this disclosed embodiment can include the following benefits:It is corresponding by obtaining first terminal First key, specify information is encrypted using first key, obtains the first cipher-text information, and is sent to first terminal First cipher-text information, even if specify information is intercepted and captured by third party during transmission, third party also can only obtain ciphertext form Specify information, real information can not be got, effectively prevent the leakage of specify information.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention Example, and be used to explain the principle of the present invention together with specification.
Fig. 1 is a kind of application scenario diagram of method for transmitting information shown according to an exemplary embodiment;
Fig. 2 is the application scenario diagram of the method for another transmission information shown according to an exemplary embodiment;
Fig. 3 is a kind of flow chart of method for transmitting information shown according to an exemplary embodiment;
Fig. 4 is the flow chart of the method for another transmission information shown according to an exemplary embodiment;
Fig. 5 is the flow chart of the method for another transmission information shown according to an exemplary embodiment;
Fig. 6 is the flow chart of the method for another transmission information shown according to an exemplary embodiment;
Fig. 7 is a kind of flow chart of method for transmitting information shown according to an exemplary embodiment;
Fig. 8 is a kind of block diagram of device for transmitting information shown according to an exemplary embodiment;
Fig. 9 is the block diagram of the device of another transmission information shown according to an exemplary embodiment;
Figure 10 is the block diagram of the device of another transmission information shown according to an exemplary embodiment;
Figure 11 is the block diagram of the device of another transmission information shown according to an exemplary embodiment;
Figure 12 is the block diagram of the device of another transmission information shown according to an exemplary embodiment;
Figure 13 is the block diagram of the device of another transmission information shown according to an exemplary embodiment;
Figure 14 is a kind of block diagram of device shown according to an exemplary embodiment;
Figure 15 is a kind of block diagram of device shown according to an exemplary embodiment;
Figure 16 is a kind of block diagram of system for transmitting information shown according to an exemplary embodiment;
Figure 17 is the block diagram of the system of another transmission information shown according to an exemplary embodiment;
Figure 18 is the block diagram of the system of another transmission information shown according to an exemplary embodiment.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistented with the present invention.On the contrary, they be only with it is such as appended The example of device and method being described in detail in claims, some aspects of the invention are consistent.
Fig. 1 and Fig. 2 is first combined simply to introduce the application of the method for the transmission information of embodiment of the present disclosure offer below Scene.
As shown in Figure 1, server 10 is connect with terminal 20, by server 10, (such as millet takes terminal 20 (such as millet mobile phone) Business device) service is provided.Terminal 20 is connect with wearable device 30 (such as Intelligent bracelet), and wearable device 30 is logged in terminal 20 System account is identical, and wearable device 30 is that terminal 20 generates key, and assists the encryption and decryption of the realization information of terminal 20.Clothes Sensitive information (such as identifying code, login password) ciphertext is transferred to terminal 20 by business device 10.
As shown in Fig. 2, two two interconnected between server 10, terminal 20, terminal 40, terminal 20 and terminal 40 are by clothes Business device 10 provides service.Terminal 20 is connect with wearable device 30 (such as Intelligent bracelet), and wearable device 30 and terminal 20 log in System account it is identical, wearable device 30 be terminal 20 generate key, and assist terminal 20 realize information encryption and decryption. Terminal 40 is connect with wearable device 50 (such as Intelligent bracelet), and wearable device 50 is identical as the system account that terminal 40 logs in, Wearable device 50 is that terminal 40 generates key, and assists the encryption and decryption of the realization information of terminal 40.Terminal 40 is in server With the help of 10, sensitive information (such as identifying code, login password) ciphertext is transferred to terminal 20.
It should be noted that above-mentioned application scenarios are only for example, the disclosure is not restricted to this.
Fig. 3 is a kind of flow chart of method for transmitting information shown according to an exemplary embodiment, as shown in figure 3, should The method of information is transmitted for including the following steps in terminal or server.
In step s 11, the key of first terminal corresponding first is obtained.
In the present embodiment, first key is that the first wearable device is defeated according to the mark of the first wearable device and user What the cipher instruction entered generated.
It is readily apparent that, the mark of each wearable device is different, and wearable device identifies according to it and generates key, can be with Two wearable devices are avoided to generate identical key.
Optionally, the first wearable device can be Intelligent bracelet.
It should be noted that the corresponding key of terminal can for the information for being sent to terminal encrypted used in it is close Key (used key is decrypted in the information sent to terminal), or the information sent to terminal carries out encryption institute The key (used key is decrypted to the information for being sent to terminal) used.In the present embodiment, first key is The information for being sent to first terminal is carried out encrypting used key.
In step s 12, specify information is encrypted using first key, obtains the first cipher-text information.
In the present embodiment, the sensitive informations such as the identifying code of payment, the account of bank and password are designated the information as.First is close Literary information is the specify information of ciphertext form.
In step s 13, the first cipher-text information is sent to first terminal.
In the present embodiment, first terminal is used to that the first cipher-text information to be decrypted using the first wearable device.
The embodiment of the present disclosure by obtain first terminal corresponding first key, using first key to specify information into Row encryption obtains the first cipher-text information, and sends the first cipher-text information to first terminal, even if specify information is in the process of transmission Middle to be intercepted and captured by third party, third party also can only obtain the specify information of ciphertext form, can not get real information, effectively avoid The leakage of specify information.
Fig. 4 is the flow chart of the method for another transmission information shown according to an exemplary embodiment, as shown in figure 4, The method of the transmission information is for including the following steps in terminal.
In the step s 21, the first cipher-text information is received.
In the present embodiment, the first cipher-text information is to be added using the corresponding first key of first terminal to specify information It is close to obtain, i.e. the specify information of ciphertext form.First key is mark of first wearable device according to the first wearable device Know and the cipher instruction generation of user's input.Designate the information as the sensitive letter such as the identifying code of payment, the account of bank and password Breath.
It is readily apparent that, the mark of each wearable device is different, and wearable device identifies according to it and generates key, can be with Two wearable devices are avoided to generate identical key.
Optionally, the first wearable device can be Intelligent bracelet.
In step S22, the first cipher-text information is sent to the first wearable device.
In step S23, specify information is received.
In the present embodiment, specify information is that the first wearable device is solved using the first cipher-text information of third key pair It is close to obtain.Third key is the cipher instruction that the first wearable device is inputted according to the mark of the first wearable device and user It generates.Third key is to make in a pair of secret keys used in rivest, shamir, adelman or symmetric encipherment algorithm with first key The same key.
It should be noted that the corresponding key of terminal can for the information for being sent to terminal encrypted used in it is close Key (used key is decrypted in the information sent to terminal), or the information sent to terminal carries out encryption institute The key (used key is decrypted to the information for being sent to terminal) used.In the present embodiment, first key is The information for being sent to first terminal is carried out to encrypt used key, third key is that the information for sending first terminal carries out Key used in encrypting.
The embodiment of the present disclosure uses third key pair the by receiving the first cipher-text information, and by the first wearable device One cipher-text information is decrypted, and obtains specify information, even if specify information is intercepted and captured by third party during transmission, third party Also it can only obtain the specify information of ciphertext form, real information can not be got, effectively prevent the leakage of specify information.
Fig. 5 is the flow chart of the method for another transmission information shown according to an exemplary embodiment, as shown in figure 5, The method of the transmission information is given first terminal (application scenarios as shown in Figure 1) for server transport specify information, including with Lower step.
In step S31, server obtains the corresponding first key of first terminal.
In the present embodiment, first key is that the first wearable device is defeated according to the mark of the first wearable device and user What the cipher instruction entered generated.
Optionally, first key can be public-key cryptography used in rivest, shamir, adelman, or symmetric cryptography Key used in algorithm.Be readily apparent that, when first key be rivest, shamir, adelman used in public-key cryptography when, due to public affairs The information of key encryption is opened, only corresponding private cipher key could be decrypted, and private cipher key is only stored in first terminal, Bu Huiyou It causes to leak in transmission, therefore only first terminal could use the information of private cipher key pair public key encryption to be solved Close, safety of the information of public key encryption in transmission process is very high.When first key is to use in symmetric encipherment algorithm Key when, be single key, the calculation being encrypted and decrypted using first key as used in symmetric encipherment algorithm Method is simple, and calculating speed is fast, and lower to the equipment requirement for generating key, and cost of implementation is low.
In a kind of implementation of the present embodiment, step S31 may include:
According to the corresponding relationship of the terminal of storage and key, the corresponding first key of first terminal is obtained.
In practical applications, in order to manage and maintain the corresponding relationship between each terminal and key, can be arranged in server Cipher key list, cipher key list include the corresponding relationship of multiple terminals and key, be easy to use the key of each terminal carry out encryption and Decryption.In the present embodiment, server can obtain the corresponding first key of first terminal from cipher key list.
Optionally, the corresponding key of each terminal can be modified, and improve the flexibility and safety of key.Preferably, respectively It when its key of terminal modifications, can be reported to server, key replacement cipher key list terminal that server reports terminal is corresponding Key, so as in the future use modified key.
In step s 32, server encrypts specify information using first key, obtains the first cipher-text information.
In the present embodiment, the sensitive informations such as the identifying code of payment, the account of bank and password are designated the information as.First is close Literary information is the specify information of ciphertext form.
In step S33, server sends the first cipher-text information to first terminal.
In step S34, first terminal sends the first cipher-text information to the first wearable device.
In step s 35, the first wearable device is decrypted using the first cipher-text information of third key pair, is specified Information.
In the present embodiment, third key is that the first wearable device is defeated according to the mark of the first wearable device and user What the cipher instruction entered generated.Third key and first key are for a pair of secret keys used in rivest, shamir, adelman or symmetrically The same key used in Encryption Algorithm.
It in practical applications, can when using wearable device (such as Intelligent bracelet) as terminal encryption and the tool of decryption Wearable device is identical with the system account that terminal logs in, to make that the mutual of information may be implemented between wearable device and terminal It passes, the key of counterpart terminal can be generated in wearable device, and is terminal encryption or solution confidential information.
Wearable device can be defaulted when producing is equipped with public-key cryptography that a pair of of rivest, shamir, adelman uses and privately owned The key that key or a symmetric encipherment algorithm use improves cipher key delivery in order to transmit the key of its generation for the first time Safety.The key that is equipped with of wearable device default can be stored in the cipher key list of server in advance, wearable device the It is primary to generate key, after the key encryption of key pair generation for the first time that default can be used, logged in together with wearable device System account sends jointly to server.Server is decrypted using the key defaulted in cipher key list, obtains wearable set The standby key generated for the first time and the corresponding terminal of the key (terminal is identical as the system account that wearable device logs in), and will The mark (such as the system account logged in) of the key that wearable device generates for the first time and corresponding terminal is stored in cipher key list In, improve the safety of cipher key delivery.
Optionally, this method can also include:
First wearable device is close according to the cipher instruction generation second that the mark of the first wearable device and user input Key;
First wearable device is encrypted using the second key of third key pair, obtains the second key of ciphertext form;
First wearable device sends the second key of ciphertext form to first terminal;
First terminal sends the second key of ciphertext form to server;
Server is decrypted using the second key of the first key to ciphertext form, obtains the second key;
The corresponding first key of first terminal is updated to the second key by server.
It is to be appreciated that modifying to the corresponding key of terminal, the difficulty that key is cracked can be promoted, to be promoted The safety of information encryption.And transmitted after being encrypted to the second key, the second Key Exposure can be prevented, use is improved The safety for the information transmission that second key is encrypted.
In step S36, the first wearable device sends specify information to first terminal.
It should be noted that the corresponding key of terminal can for the information for being sent to terminal encrypted used in it is close Key (used key is decrypted in the information sent to terminal), or the information sent to terminal carries out encryption institute The key (used key is decrypted to the information for being sent to terminal) used.In the present embodiment, first key is The information for being sent to first terminal is carried out to encrypt used key, third key is that the information for sending first terminal carries out Key used in encrypting.
Step S31, which is realized, obtains the corresponding first key of first terminal, and step S32 is realized using first key to finger Determine information to be encrypted, obtain the first cipher-text information, step S33 and step S34 realize the transmission of the first cipher-text information and connect It receives, step S35 and step S36 are realized and be decrypted using the first cipher-text information of third key pair, and specify information is obtained.
The embodiment of the present disclosure by obtain first terminal corresponding first key, using first key to specify information into Row encryption obtains the first cipher-text information, and sends the first cipher-text information to first terminal, even if specify information is in the process of transmission Middle to be intercepted and captured by third party, third party also can only obtain the specify information of ciphertext form, can not get real information, effectively avoid The leakage of specify information.Since wearable device is compared with terminal, it is hacked a possibility that low, therefore first key It is that the first wearable device generates, first terminal also uses the first wearable device that the first cipher-text information is decrypted, can To improve the safety of key and information, the leakage of specify information is further effectively prevented.
Fig. 6 is the flow chart of the method for another transmission information shown according to an exemplary embodiment, as shown in fig. 6, The method of the transmission information is given first terminal (application scenarios as shown in Figure 2) for second terminal transmission specify information, and the One terminal is included the following steps using the public-key cryptography and private cipher key of a pair of of rivest, shamir, adelman.
In step S41, second terminal obtains the corresponding first key of first terminal.
In the present embodiment, first key is that the first wearable device is defeated according to the mark of the first wearable device and user What the cipher instruction entered generated.
In a kind of implementation of the present embodiment, step S41 may include:
Second terminal sends key request to server, and key request is for obtaining first key;
Server obtains first key according to the terminal of storage and the corresponding relationship of key;
Server sends first key to second terminal.
In practical applications, in order to manage and maintain the corresponding relationship between each terminal and key, can be arranged in server Cipher key list, cipher key list include the corresponding relationship of multiple terminals and key, be easy to use the key of each terminal carry out encryption and Decryption.In the present embodiment, server can obtain the corresponding first key of first terminal from cipher key list.
In step S42, second terminal sends first key to the second wearable device.
In step S43, the second wearable device encrypts specify information using first key, obtains the first ciphertext Information.
In the present embodiment, the sensitive informations such as the identifying code of payment, the account of bank and password are designated the information as.First is close Literary information is the specify information of ciphertext form.
Optionally, specify information can be sent to the second wearable device by second terminal, can also input the by user Two wearable devices, the disclosure to this with no restriction.
It in practical applications, can when using wearable device (such as Intelligent bracelet) as terminal encryption and the tool of decryption Wearable device is identical with the system account that terminal logs in, to make that the mutual of information may be implemented between wearable device and terminal It passes, the key of counterpart terminal can be generated in wearable device, and is terminal encryption or solution confidential information.
In step S44, the second wearable device sends the first cipher-text information to second terminal.
In step S45, second terminal sends the first cipher-text information to first terminal.
In step S46, first terminal sends the first cipher-text information to the first wearable device.
Optionally, step S46 can be identical as step S34, and this will not be detailed here.
In step S47, the first wearable device is decrypted using the first cipher-text information of third key pair, is specified Information.
Optionally, step S47 can be identical as step S35, and this will not be detailed here.
In step S48, the first wearable device sends specify information to first terminal.
Optionally, step S48 can be identical as step S36, and this will not be detailed here.
It should be noted that the corresponding key of terminal can for the information for being sent to terminal encrypted used in it is close Key (used key is decrypted in the information sent to terminal), or the information sent to terminal carries out encryption institute The key (used key is decrypted to the information for being sent to terminal) used.In the present embodiment, first key and Second key is to carry out encrypting used key to the information for being sent to first terminal, and third key is to send to first terminal Information carry out encrypting used key.
Step S41, which is realized, obtains the corresponding first key of first terminal, and step S42 and step S43, which are realized, uses the One key pair specify information is encrypted, and the first cipher-text information is obtained, and step S44, step S45 and step S46 realizes One cipher-text information sends and receives, and step S47 and step S48 are realized and solved using the first cipher-text information of third key pair It is close, obtain specify information.
The embodiment of the present disclosure by obtain first terminal corresponding first key, using first key to specify information into Row encryption obtains the first cipher-text information, and sends the first cipher-text information to first terminal, even if specify information is in the process of transmission Middle to be intercepted and captured by third party, third party also can only obtain the specify information of ciphertext form, can not get real information, effectively avoid The leakage of specify information.Since wearable device is compared with terminal, it is hacked a possibility that low, therefore first key It is that the first wearable device generates, first terminal also uses the first wearable device that the first cipher-text information is decrypted, can To improve the safety of key and information, the leakage of specify information is further effectively prevented.
Fig. 7 is the flow chart of the method for another transmission information shown according to an exemplary embodiment, as shown in fig. 7, The method of the transmission information is given first terminal (application scenarios as shown in Figure 2) for second terminal transmission specify information, and the One terminal uses the key of a symmetric encipherment algorithm, includes the following steps.
In step s 51, the second wearable device is added using the corresponding 4th key pair specify information of second terminal It is close, obtain the second cipher-text information.
In the present embodiment, the 4th key is that the second wearable device is inputted according to the mark of the second Intelligent bracelet and user Cipher instruction generate.4th key is key used in symmetry algorithm.Designate the information as identifying code, the bank of payment The sensitive informations such as account and password.Second cipher-text information is the specify information of ciphertext form.
Optionally, specify information can be sent to the second wearable device by second terminal, can also input the by user Two wearable devices, the disclosure to this with no restriction.
It in practical applications, can when using wearable device (such as Intelligent bracelet) as terminal encryption and the tool of decryption Wearable device is identical with the system account that terminal logs in, to make that the mutual of information may be implemented between wearable device and terminal It passes, the key of counterpart terminal can be generated in wearable device, and is terminal encryption or solution confidential information.
In order to manage and maintain the corresponding relationship between each terminal and key, cipher key list, key can be set in server List includes the corresponding relationship of multiple terminals and key, and the key of each terminal is easy to use to be encrypted and decrypted.
Optionally, the corresponding key of each terminal can be modified, and improve the flexibility and safety of key.Preferably, respectively It when its key of terminal modifications, can be reported to server, key replacement cipher key list terminal that server reports terminal is corresponding Key, so as in the future use modified key.
Optionally, this method can also include:
Second wearable device is close according to the cipher instruction generation the 5th that the mark of the second wearable device and user input Key;
Second wearable device is encrypted using the 5th key of the 4th key pair, obtains the 5th key of ciphertext form;
Second wearable device sends the 5th key of ciphertext form to second terminal;
Second terminal sends the 5th key of ciphertext form to server;
Server is decrypted using the 5th key of the 4th key pair ciphertext form, obtains the 5th key;
Corresponding 4th key updating of second terminal is the 5th key by server.
It is to be appreciated that modifying to the corresponding key of terminal, the difficulty that key is cracked can be promoted, to be promoted The safety of information encryption.And transmitted after being encrypted to the 5th key, the 5th Key Exposure can be prevented, use is improved The safety for the information transmission that 5th key is encrypted.
In step S52, the second wearable device sends the second cipher-text information to second terminal.
In step S53, second terminal sends the second cipher-text information to server.
In step S54, server obtains the 4th key, and is decrypted using the 4th the second cipher-text information of key pair, Obtain specify information.
In step S55, server obtains the corresponding first key of first terminal, and uses first terminal corresponding first Key pair specify information is encrypted, and the first cipher-text information is obtained.
Optionally, obtaining the corresponding first key of first terminal can be identical as step S31, corresponding using first terminal First key encrypts specify information, and obtaining the first cipher-text information can be identical as step S32, and this will not be detailed here.
In step S56, server sends the first cipher-text information to first terminal.
Optionally, step S56 can be identical as step S33, and this will not be detailed here.
In step S57, first terminal sends the first cipher-text information to the first wearable device.
Optionally, step S57 can be identical as step S34, and this will not be detailed here.
In step S58, the first wearable device is decrypted using the first cipher-text information of third key pair, is specified Information.
Optionally, step S58 can be identical as step S35, and this will not be detailed here.
In step S59, the first wearable device sends specify information to first terminal.
Optionally, step S59 can be identical as step S36, and this will not be detailed here.
It should be noted that the corresponding key of terminal can for the information for being sent to terminal encrypted used in it is close Key (used key is decrypted in the information sent to terminal), or the information sent to terminal carries out encryption institute The key (used key is decrypted to the information for being sent to terminal) used.In the present embodiment, first key and Second key is to carry out encrypting used key to the information for being sent to first terminal, and third key is to send to first terminal Information encrypt used key, the 4th key and the 5th key are to add to the information for being sent to second terminal It is close, to second terminal send information encrypt used in key.
Step S55 realizes the key for obtaining first terminal corresponding first and using first key to specify information It is encrypted, obtains the first cipher-text information, step S56 and step S57 realize sending and receiving for the first cipher-text information, step S58 and step S59 is realized to be decrypted using the first cipher-text information of third key pair, obtains specify information.
The embodiment of the present disclosure by obtain first terminal corresponding first key, using first key to specify information into Row encryption obtains the first cipher-text information, and sends the first cipher-text information to first terminal, even if specify information is in the process of transmission Middle to be intercepted and captured by third party, third party also can only obtain the specify information of ciphertext form, can not get real information, effectively avoid The leakage of specify information.Since wearable device is compared with terminal, it is hacked a possibility that low, therefore first key It is that the first wearable device generates, first terminal also uses the first wearable device that the first cipher-text information is decrypted, can To improve the safety of key and information, the leakage of specify information is further effectively prevented.
Fig. 8 is a kind of block diagram of device for transmitting information shown according to an exemplary embodiment, referring to Fig. 8, the transmission The device of information includes Key Acquisition Module 601, information encrypting module 602 and information sending module 603.
The Key Acquisition Module 601 is configured as obtaining the corresponding first key of first terminal, and first key is first can Wearable device is generated according to the cipher instruction that the mark of the first wearable device and user input.
The information encrypting module 602 is configured with first key and encrypts to specify information, obtains the first ciphertext Information.
The information sending module 603 is configured as sending the first cipher-text information to first terminal, and first terminal is for using The first cipher-text information is decrypted in first wearable device.
The embodiment of the present disclosure by obtain first terminal corresponding first key, using first key to specify information into Row encryption obtains the first cipher-text information, and sends the first cipher-text information to first terminal, even if specify information is in the process of transmission Middle to be intercepted and captured by third party, third party also can only obtain the specify information of ciphertext form, can not get real information, effectively avoid The leakage of specify information.Since wearable device is compared with terminal, it is hacked a possibility that low, therefore first key It is that the first wearable device generates, first terminal also uses the first wearable device that the first cipher-text information is decrypted, can To improve the safety of key and information, the leakage of specify information is further effectively prevented.
Fig. 9 is the block diagram of the device of another transmission information shown according to an exemplary embodiment, referring to Fig. 9, the biography The device of defeated information includes Key Acquisition Module 701, information encrypting module 702 and information sending module 703.
The Key Acquisition Module 701 is configured as obtaining the corresponding first key of first terminal, and first key is first can Wearable device is generated according to the cipher instruction that the mark of the first wearable device and user input.
The information encrypting module 702 is configured with first key and encrypts to specify information, obtains the first ciphertext Information.
The information sending module 703 is configured as sending the first cipher-text information to first terminal, and first terminal is for using The first cipher-text information is decrypted in first wearable device.
In a kind of implementation of the present embodiment, when the device is server, which can be by It is configured to the corresponding relationship of the terminal and key according to storage, obtains the corresponding first key of first terminal.
Optionally, which can further include first key receiving module 704, first key deciphering module 705 and first Key updating module 706.
The first key receiving module 704 is configured as receiving the second key of ciphertext form, and the second of ciphertext form is close Key is that the first wearable device is encrypted to obtain using the second key of third key pair, and the second key and third key are First wearable device is generated according to the cipher instruction that the mark of the first wearable device and user input, third key and the One key is the same key used in a pair of secret keys used in rivest, shamir, adelman or symmetric encipherment algorithm.
The first key deciphering module 705 is configured with first key and solves to the second key of ciphertext form It is close, obtain the second key.
The first key update module 706 is configured as the corresponding first key of first terminal being updated to the second key.
The embodiment of the present disclosure by obtain first terminal corresponding first key, using first key to specify information into Row encryption obtains the first cipher-text information, and sends the first cipher-text information to first terminal, even if specify information is in the process of transmission Middle to be intercepted and captured by third party, third party also can only obtain the specify information of ciphertext form, can not get real information, effectively avoid The leakage of specify information.Since wearable device is compared with terminal, it is hacked a possibility that low, therefore first key It is that the first wearable device generates, first terminal also uses the first wearable device that the first cipher-text information is decrypted, can To improve the safety of key and information, the leakage of specify information is further effectively prevented.
Figure 10 is the block diagram of the device of another transmission information shown according to an exemplary embodiment, referring to Fig.1 0, it should The device for transmitting information includes Key Acquisition Module 801, information encrypting module 802 and information sending module 803.
The Key Acquisition Module 801 is configured as obtaining the corresponding first key of first terminal, and first key is first can Wearable device is generated according to the cipher instruction that the mark of the first wearable device and user input.
The information encrypting module 802 is configured with first key and encrypts to specify information, obtains the first ciphertext Information.
The information sending module 803 is configured as sending the first cipher-text information to first terminal, and first terminal is for using The first cipher-text information is decrypted in first wearable device.
In a kind of implementation of the present embodiment, when the device is server, which can also connect including information Receive module 804 and information deciphering module 805.
The information receiving module 804 is configured as receiving the second cipher-text information, and the second cipher-text information is second wearable to set Standby that the corresponding 4th key pair specify information of second terminal is used to be encrypted, the 4th key is the second wearable device It is generated according to the cipher instruction that the mark of the second Intelligent bracelet and user input, the 4th key is close used in symmetry algorithm Key.
The information deciphering module 805 is configured with the 4th the second cipher-text information of key pair and is decrypted, and is specified Information.
Optionally, which can also include the second key reception module 806, the second cipher key decryption block 807 and second Key updating module 808.
The second key reception module 806 is configured as receiving the 5th key of ciphertext form, and the 5th of ciphertext form is close Key is that the second wearable device is encrypted to obtain using the 5th key of the 4th key pair, and the 5th key is second wearable to set What the standby cipher instruction inputted according to the mark of the second wearable device and user generated.
The 5th key that second cipher key decryption block 807 is configured with the 4th key pair ciphertext form is solved It is close, obtain the 5th key.
Second key updating module 808 is configured as corresponding 4th key updating of second terminal being the 5th key.
In another implementation of the present embodiment, which can further include first key receiving module, first close Key deciphering module and first key update module.
The first key receiving module is configured as receiving the second key of ciphertext form, and the second key of ciphertext form is First wearable device is encrypted using the second key of third key pair, and the second key and third key are first Wearable device is generated according to the cipher instruction that the mark of the first wearable device and user input, third key and first close Key is the same key used in a pair of secret keys used in rivest, shamir, adelman or symmetric encipherment algorithm.
The first key deciphering module is configured with first key and the second key of ciphertext form is decrypted, and obtains To the second key.
The first key update module is configured as the corresponding first key of first terminal being updated to the second key.
The embodiment of the present disclosure by obtain first terminal corresponding first key, using first key to specify information into Row encryption obtains the first cipher-text information, and sends the first cipher-text information to first terminal, even if specify information is in the process of transmission Middle to be intercepted and captured by third party, third party also can only obtain the specify information of ciphertext form, can not get real information, effectively avoid The leakage of specify information.Since wearable device is compared with terminal, it is hacked a possibility that low, therefore first key It is that the first wearable device generates, first terminal also uses the first wearable device that the first cipher-text information is decrypted, can To improve the safety of key and information, the leakage of specify information is further effectively prevented.
Figure 11 is the block diagram of the device of another transmission information shown according to an exemplary embodiment, referring to Fig.1 1, it should The device for transmitting information includes Key Acquisition Module 901, information encrypting module 902 and information sending module 903.
The Key Acquisition Module 901 is configured as obtaining the corresponding first key of first terminal, and first key is first can Wearable device is generated according to the cipher instruction that the mark of the first wearable device and user input.
The information encrypting module 902 is configured with first key and encrypts to specify information, obtains the first ciphertext Information.
The information sending module 903 is configured as sending the first cipher-text information to first terminal, and first terminal is for using The first cipher-text information is decrypted in first wearable device.
In a kind of implementation of the present embodiment, when the device is second terminal, which can be with Including request-to-send submodule 901a and key reception submodule 901b.
Request-to-send submodule 901a is configured as sending key request to server, and key request is for obtaining first Key.
Key reception submodule 901b is configured as receiving first key, and first key is end of the server according to storage What the corresponding relationship of end and key obtained.
In another implementation of the present embodiment, when the device is second terminal, which can To include information sending submodule 902a and information receiving submodule 902b.
Information sending submodule 902a is configured as sending first key to the second wearable device.
Information receiving submodule 902b is configured as receiving the first cipher-text information, and the first cipher-text information is second wearable Equipment encrypts specify information using first key.
In another implementation of the present embodiment, which can further include first key receiving module, first close Key deciphering module and first key update module.
The first key receiving module is configured as receiving the second key of ciphertext form, and the second key of ciphertext form is First wearable device is encrypted using the second key of third key pair, and the second key and third key are first Wearable device is generated according to the cipher instruction that the mark of the first wearable device and user input, third key and first close Key is the same key used in a pair of secret keys used in rivest, shamir, adelman or symmetric encipherment algorithm.
The first key deciphering module is configured with first key and the second key of ciphertext form is decrypted, and obtains To the second key.
The first key update module is configured as the corresponding first key of first terminal being updated to the second key.
The embodiment of the present disclosure by obtain first terminal corresponding first key, using first key to specify information into Row encryption obtains the first cipher-text information, and sends the first cipher-text information to first terminal, even if specify information is in the process of transmission Middle to be intercepted and captured by third party, third party also can only obtain the specify information of ciphertext form, can not get real information, effectively avoid The leakage of specify information.Since wearable device is compared with terminal, it is hacked a possibility that low, therefore first key It is that the first wearable device generates, first terminal also uses the first wearable device that the first cipher-text information is decrypted, can To improve the safety of key and information, the leakage of specify information is further effectively prevented.
Figure 12 is the block diagram of the device of another transmission information shown according to an exemplary embodiment, referring to Fig.1 2, it should The device for transmitting information includes the first receiving module 1001, the first sending module 1002 and the second receiving module 1003.
First receiving module 1001 is configured as receiving the first cipher-text information, and the first cipher-text information is using first terminal What corresponding first key encrypted specify information, first key is that the first wearable device is wearable according to first What the mark of equipment and the cipher instruction of user's input generated.
First sending module 1002 is configured as sending the first cipher-text information to the first wearable device.
Second receiving module 1003 is configured as receiving specify information, and specify information, which is the first wearable device, uses the What three the first cipher-text informations of key pair were decrypted, third key is the first wearable device according to the first wearable device Mark and the cipher instruction of user's input generate, third key and first key be one used in rivest, shamir, adelman To the same key used in key or symmetric encipherment algorithm.
The embodiment of the present disclosure uses third key pair the by receiving the first cipher-text information, and by the first wearable device One cipher-text information is decrypted, and obtains specify information, even if specify information is intercepted and captured by third party during transmission, third party Also it can only obtain the specify information of ciphertext form, real information can not be got, effectively prevent the leakage of specify information.Due to Wearable device compared with terminal, it is hacked a possibility that it is low, therefore first key be the first wearable device generate , first terminal also uses the first wearable device that the first cipher-text information is decrypted, and the peace of key and information can be improved Quan Xing further effectively prevents the leakage of specify information.
Figure 13 is the block diagram of the device of another transmission information shown according to an exemplary embodiment, referring to Fig.1 3, it should The device for transmitting information includes the first receiving module 1101, the first sending module 1102 and the second receiving module 1103.
First receiving module 1101 is configured as receiving the first cipher-text information, and the first cipher-text information is using first terminal What corresponding first key encrypted specify information, first key is that the first wearable device is wearable according to first What the mark of equipment and the cipher instruction of user's input generated.
First sending module 1102 is configured as sending the first cipher-text information to the first wearable device.
Second receiving module 1103 is configured as receiving specify information, and specify information, which is the first wearable device, uses the What three the first cipher-text informations of key pair were decrypted, third key is the first wearable device according to the first wearable device Mark and the cipher instruction of user's input generate, third key and first key be one used in rivest, shamir, adelman To the same key used in key or symmetric encipherment algorithm.
In a kind of implementation of the present embodiment, which can also include that third receiving module 1104 and second send Module 1105.
The third receiving module 1104 is configured as receiving the second key of ciphertext form, and the second key of ciphertext form is First wearable device is encrypted using the second key of third key pair, and the second key is the first wearable device root It is generated according to the cipher instruction that the mark of the first wearable device and user input.
Second sending module 1105 is configured as sending the second key of ciphertext form to server, so that server makes It is decrypted with second key of the first key to ciphertext form, obtains the second key, and first terminal is corresponding first close Key is updated to the second key.
The embodiment of the present disclosure uses third key pair the by receiving the first cipher-text information, and by the first wearable device One cipher-text information is decrypted, and obtains specify information, even if specify information is intercepted and captured by third party during transmission, third party Also it can only obtain the specify information of ciphertext form, real information can not be got, effectively prevent the leakage of specify information.Due to Wearable device compared with terminal, it is hacked a possibility that it is low, therefore first key be the first wearable device generate , first terminal also uses the first wearable device that the first cipher-text information is decrypted, and the peace of key and information can be improved Quan Xing further effectively prevents the leakage of specify information.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method Embodiment in be described in detail, no detailed explanation will be given here.
Figure 14 is a kind of block diagram of device 1400 for being used for transmission information shown according to an exemplary embodiment.For example, Device 1400 can be mobile phone, computer, digital broadcasting terminal, messaging device, game console, tablet device, Medical Devices, body-building equipment, personal digital assistant etc..
Referring to Fig.1 4, device 1400 may include following one or more components:Processing component 1402, memory 1404, Electric power assembly 1406, multimedia component 1408, audio component 1410, the interface 1412 of input/output (I/O), sensor module 1414 and communication component 1416.
The integrated operation of the usual control device 1400 of processing component 1402, such as with display, telephone call, data communication, Camera operation and record operate associated operation.Processing component 1402 may include one or more processors 1420 to execute Instruction, to perform all or part of the steps of the methods described above.In addition, processing component 1402 may include one or more moulds Block, convenient for the interaction between processing component 1402 and other assemblies.For example, processing component 1402 may include multi-media module, To facilitate the interaction between multimedia component 1408 and processing component 1402.
Memory 1404 is configured as storing various types of data to support the operation in equipment 1400.These data Example includes the instruction of any application or method for operating on device 1400, contact data, telephone book data, Message, picture, video etc..Memory 1404 can by any kind of volatibility or non-volatile memory device or they Combination is realized, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), it is erasable can Program read-only memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash memory Reservoir, disk or CD.
Electric power assembly 1406 provides electric power for the various assemblies of device 1400.Electric power assembly 1406 may include power management System, one or more power supplys and other with for device 1400 generate, manage, and distribute the associated component of electric power.
Multimedia component 1408 includes the screen of one output interface of offer between described device 1400 and user.? In some embodiments, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, Screen may be implemented as touch screen, to receive input signal from the user.Touch panel includes that one or more touch passes Sensor is to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch or sliding is dynamic The boundary of work, but also detect duration and pressure associated with the touch or slide operation.In some embodiments, more Media component 1408 includes a front camera and/or rear camera.When equipment 1400 is in operation mode, as shot mould When formula or video mode, front camera and/or rear camera can receive external multi-medium data.Each preposition camera shooting Head and rear camera can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio component 1410 is configured as output and/or input audio signal.For example, audio component 1410 includes a wheat Gram wind (MIC), when device 1400 is in operation mode, when such as call mode, recording mode, and voice recognition mode, microphone quilt It is configured to receive external audio signal.The received audio signal can be further stored in memory 1404 or via communication Component 1416 is sent.In some embodiments, audio component 1410 further includes a loudspeaker, is used for output audio signal.
I/O interface 1412 provides interface, above-mentioned peripheral interface module between processing component 1402 and peripheral interface module It can be keyboard, click wheel, button etc..These buttons may include, but are not limited to:Home button, volume button, start button and Locking press button.
Sensor module 1414 includes one or more sensors, and the state for providing various aspects for device 1400 is commented Estimate.For example, sensor module 1414 can detecte the state that opens/closes of equipment 1400, the relative positioning of component, such as institute The display and keypad that component is device 1400 are stated, sensor module 1414 can be with detection device 1400 or device 1,400 1 The position change of a component, the existence or non-existence that user contacts with device 1400,1400 orientation of device or acceleration/deceleration and dress Set 1400 temperature change.Sensor module 1414 may include proximity sensor, be configured in not any physics It is detected the presence of nearby objects when contact.Sensor module 1414 can also include optical sensor, as CMOS or ccd image are sensed Device, for being used in imaging applications.In some embodiments, which can also include acceleration sensing Device, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 1416 is configured to facilitate the communication of wired or wireless way between device 1400 and other equipment.Dress The wireless network based on communication standard, such as WiFi can be accessed by setting 1400,2G or 3G or their combination.It is exemplary at one In embodiment, communication component 1416 receives broadcast singal or broadcast correlation from external broadcasting management system via broadcast channel Information.In one exemplary embodiment, the communication component 1416 further includes near-field communication (NFC) module, to promote short distance Communication.For example, radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band can be based in NFC module (UWB) technology, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 1400 can be by one or more application specific integrated circuit (ASIC), number Signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for executing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided It such as include the memory 1404 of instruction, above-metioned instruction can be executed by the processor 1420 of device 1400 to complete the above method.Example Such as, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, soft Disk and optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by the processing of mobile terminal When device executes, so that mobile terminal is able to carry out a kind of method for transmitting information, the method includes:
The corresponding first key of first terminal is obtained, the first key is that the first wearable device can according to described first What the mark of wearable device and the cipher instruction of user's input generated;
Specify information is encrypted using the first key, obtains the first cipher-text information;
First cipher-text information is sent to first terminal, the first terminal is used to use first wearable device First cipher-text information is decrypted.
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by the processing of mobile terminal When device executes, so that mobile terminal is able to carry out a kind of method for transmitting information, the method includes:
The first cipher-text information is received, first cipher-text information is using the corresponding first key of first terminal to specified letter What breath was encrypted, the first key is mark and use of first wearable device according to first wearable device What the cipher instruction of family input generated;
First cipher-text information is sent to first wearable device;
Receive the specify information, the specify information, which is first wearable device, uses described in third key pair the What one cipher-text information was decrypted, the third key is first wearable device wearable to be set according to described first What standby mark and the cipher instruction of user's input generated, the third key and the first key are rivest, shamir, adelman Used in the same key used in a pair of secret keys or symmetric encipherment algorithm.
Figure 15 is a kind of block diagram of device 1500 for being used for transmission information shown according to an exemplary embodiment.For example, Device 1500 may be provided as a server.Referring to Fig.1 5, it further comprises one that device 1500, which includes processing component 1522, A or multiple processors, and the memory resource as representated by memory 1532, can be by processing component 1522 for storing The instruction of execution, such as application program.The application program stored in memory 1532 may include one or more every One corresponds to the module of one group of instruction.In addition, processing component 1522 is configured as executing instruction, and to execute the above method, institute The method of stating includes:
The corresponding first key of first terminal is obtained, the first key is that the first wearable device can according to described first What the mark of wearable device and the cipher instruction of user's input generated;
Specify information is encrypted using the first key, obtains the first cipher-text information;
First cipher-text information is sent to first terminal, the first terminal is used to use first wearable device First cipher-text information is decrypted.
Device 1500 can also include that a power supply module 1526 be configured as the power management of executive device 1500, and one Wired or wireless network interface 1550 is configured as device 1500 being connected to network and input and output (I/O) interface 1558.Device 1500 can be operated based on the operating system for being stored in memory 1532, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM or similar.
Figure 16 is a kind of block diagram of system for transmitting information shown according to an exemplary embodiment, referring to Fig.1 6, the biography The system of defeated information includes the first wearable device 1601, first terminal 1602 and server 1603.
What first wearable device 1601 was configured as being inputted according to the mark of the first wearable device 1601 and user Cipher instruction generates the corresponding first key of first terminal 1602 and third key, and third key and first key are asymmetric add The same key used in a pair of secret keys used in close algorithm or symmetric encipherment algorithm.
The server 1603 is configured as obtaining first key;Specify information is encrypted using first key, is obtained First cipher-text information;The first cipher-text information is sent to first terminal 1602.
The first terminal 1602 is configured as receiving the first cipher-text information;It is close that first is sent to the first wearable device 1601 Literary information.
First wearable device 1601 is additionally configured to receive the first cipher-text information;Use the first ciphertext of third key pair Information is decrypted, and obtains specify information;Specify information is sent to first terminal 1602.
The first terminal 1602 is additionally configured to receive specify information.
In a kind of implementation of the present embodiment, which be can be configured as according to the terminal of storage and close The corresponding relationship of key obtains the corresponding first key of first terminal.
In another implementation of the present embodiment, which be can be additionally configured to according to The mark of one wearable device 1601 and the cipher instruction of user's input generate the second key;Use the second key of third key pair It is encrypted, obtains the second key of ciphertext form, third key is the first wearable device 1601 wearable to be set according to first What standby 1601 mark and the cipher instruction of user's input generated, third key is to make in rivest, shamir, adelman with first key The same key used in a pair of secret keys or symmetric encipherment algorithm;The of ciphertext form is sent to first terminal 1602 Two keys.
The first terminal 1602 is additionally configured to receive the second key of ciphertext form;Ciphertext shape is sent to server 1603 Second key of formula.
The server 1603 is additionally configured to receive the second key of ciphertext form;Using first key to ciphertext form Second key is decrypted, and obtains the second key;The corresponding first key of first terminal 1602 is updated to the second key.
The embodiment of the present disclosure by obtain first terminal corresponding first key, using first key to specify information into Row encryption obtains the first cipher-text information, and sends the first cipher-text information to first terminal, even if specify information is in the process of transmission Middle to be intercepted and captured by third party, third party also can only obtain the specify information of ciphertext form, can not get real information, effectively avoid The leakage of specify information.Since wearable device is compared with terminal, it is hacked a possibility that low, therefore first key It is that the first wearable device generates, first terminal also uses the first wearable device that the first cipher-text information is decrypted, can To improve the safety of key and information, the leakage of specify information is further effectively prevented.
Figure 17 is the block diagram of the system of another transmission information shown according to an exemplary embodiment, referring to Fig.1 7, it should The system for transmitting information includes the first wearable device 1701, first terminal 1702, server 1703, second terminal 1704 and the Two wearable devices 1705.
What first wearable device 1701 was configured as being inputted according to the mark of the first wearable device 1701 and user Cipher instruction generates the corresponding first key of first terminal 1702 and third key, and third key and first key are asymmetric add The same key used in a pair of secret keys used in close algorithm or symmetric encipherment algorithm.
The second terminal 1704 is configured as sending key request to server 1703, and key request is close for obtaining first Key.
The server 1703 is configured as receiving key request;According to the corresponding relationship of the terminal of storage and key, obtain First key;First key is sent to second terminal 1704.
The second terminal 1704 is additionally configured to receive first key;It is close that first is sent to the second wearable device 1705 Key.
Second wearable device 1705 is configured as receiving first key;Specify information is added using first key It is close, obtain the first cipher-text information;The first cipher-text information is sent to second terminal 1704.
The second terminal 1704 is additionally configured to receive the first cipher-text information;The first ciphertext letter is sent to first terminal 1702 Breath.
The first terminal 1702 is configured as receiving the first cipher-text information;The first ciphertext letter is sent to the first wearable device Breath.
First wearable device 1701 is additionally configured to receive the first cipher-text information;Use the first ciphertext of third key pair Information is decrypted, and obtains specify information;Specify information is sent to first terminal.
The first terminal 1702 is additionally configured to receive specify information.
In a kind of implementation of the present embodiment, which be can be additionally configured to according to first The mark of wearable device 1701 and the cipher instruction of user's input generate the second key;Using the second key of third key pair into Row encryption, obtains the second key of ciphertext form, third key is the first wearable device 1701 according to the first wearable device What 1701 mark and the cipher instruction of user's input generated, third key is to use in rivest, shamir, adelman with first key A pair of secret keys or symmetric encipherment algorithm used in the same key;The second of ciphertext form is sent to first terminal 1702 Key.
The first terminal 1702 is additionally configured to receive the second key of ciphertext form;Ciphertext shape is sent to server 1703 Second key of formula.
The server 1703 is additionally configured to receive the second key of ciphertext form;Using first key to ciphertext form Second key is decrypted, and obtains the second key;The corresponding first key of first terminal 1702 is updated to the second key.
The embodiment of the present disclosure by obtain first terminal corresponding first key, using first key to specify information into Row encryption obtains the first cipher-text information, and sends the first cipher-text information to first terminal, even if specify information is in the process of transmission Middle to be intercepted and captured by third party, third party also can only obtain the specify information of ciphertext form, can not get real information, effectively avoid The leakage of specify information.Since wearable device is compared with terminal, it is hacked a possibility that low, therefore first key It is that the first wearable device generates, first terminal also uses the first wearable device that the first cipher-text information is decrypted, can To improve the safety of key and information, the leakage of specify information is further effectively prevented.
Figure 18 is the block diagram of the system of another transmission information shown according to an exemplary embodiment, referring to Fig.1 8, it should The system for transmitting information includes the first wearable device 1801, first terminal 1802, server 1803, second terminal 1804 and the Two wearable devices 1805.
What first wearable device 1801 was configured as being inputted according to the mark of the first wearable device 1801 and user Cipher instruction generates the corresponding first key of first terminal 1802 and third key, and third key and first key are asymmetric add The same key used in a pair of secret keys used in close algorithm or symmetric encipherment algorithm.
What second wearable device 1805 was configured as being inputted according to the mark of the second wearable device 1805 and user Cipher instruction generates corresponding 4th key of second terminal 1804, and the 4th key is key used in symmetry algorithm;Use Four key pair specify informations are encrypted, and the second cipher-text information is obtained;The second cipher-text information is sent to second terminal 1804.
The second terminal 1804 is configured as receiving the second cipher-text information;The second cipher-text information is sent to server 1803.
The server 1803 is configured as receiving the second cipher-text information;It is solved using the 4th the second cipher-text information of key pair It is close, obtain specify information;Obtain first key;Specify information is encrypted using first key, obtains the first cipher-text information; The first cipher-text information is sent to first terminal 1802.
The first terminal 1802 is configured as receiving the first cipher-text information;It is close that first is sent to the first wearable device 1801 Literary information.
First wearable device 1801 is additionally configured to receive the first cipher-text information;Use the first ciphertext of third key pair Information is decrypted, and obtains specify information;Specify information is sent to first terminal 1802.
The first terminal 1802 is additionally configured to receive specify information.
In a kind of implementation of the present embodiment, which be can be additionally configured to according to second The mark of wearable device 1805 and the cipher instruction of user's input generate the 5th key;Using the 5th key of the 4th key pair into Row encryption, obtains the 5th key of ciphertext form;The 5th key of ciphertext form is sent to second terminal 1804.
The first terminal 1802 is additionally configured to receive the 5th key of ciphertext form;Ciphertext shape is sent to server 1803 5th key of formula.
The server 1803 is additionally configured to receive the 5th key of ciphertext form;Use the 4th key pair ciphertext form 5th key is decrypted, and obtains the 5th key;It is the 5th key by corresponding 4th key updating of second terminal 1804.
In another implementation of the present embodiment, which be can be additionally configured to according to The mark of one wearable device 1801 and the cipher instruction of user's input generate the second key;Use the second key of third key pair It is encrypted, obtains the second key of ciphertext form, third key is the first wearable device 1801 wearable to be set according to first What standby 1801 mark and the cipher instruction of user's input generated, third key is to make in rivest, shamir, adelman with first key The same key used in a pair of secret keys or symmetric encipherment algorithm;The of ciphertext form is sent to first terminal 1802 Two keys.
The first terminal 1802 is additionally configured to receive the second key of ciphertext form;Ciphertext shape is sent to server 1803 Second key of formula.
The server 1803 is additionally configured to receive the second key of ciphertext form;Using first key to ciphertext form Second key is decrypted, and obtains the second key;The corresponding first key of first terminal 1802 is updated to the second key.
The embodiment of the present disclosure by obtain first terminal corresponding first key, using first key to specify information into Row encryption obtains the first cipher-text information, and sends the first cipher-text information to first terminal, even if specify information is in the process of transmission Middle to be intercepted and captured by third party, third party also can only obtain the specify information of ciphertext form, can not get real information, effectively avoid The leakage of specify information.Since wearable device is compared with terminal, it is hacked a possibility that low, therefore first key It is that the first wearable device generates, first terminal also uses the first wearable device that the first cipher-text information is decrypted, can To improve the safety of key and information, the leakage of specify information is further effectively prevented.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to of the invention its Its embodiment.This application is intended to cover any variations, uses, or adaptations of the invention, these modifications, purposes or Person's adaptive change follows general principle of the invention and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.The description and examples are only to be considered as illustrative, and true scope and spirit of the invention are by following Claim is pointed out.
It should be understood that the present invention is not limited to the precise structure already described above and shown in the accompanying drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present invention is limited only by the attached claims.

Claims (23)

1. a kind of method for transmitting information, which is characterized in that including:
The corresponding first key of first terminal is obtained, the first key is that the first wearable device is wearable according to described first What the mark of equipment and the cipher instruction of user's input generated;
Specify information is encrypted using the first key, obtains the first cipher-text information;
First cipher-text information is sent to the first terminal, the first terminal is used to use first wearable device First cipher-text information is decrypted, the specify information is obtained.
It is described to obtain the 2. the method according to claim 1, wherein when the method is executed by server The corresponding first key of one terminal, including:
According to the corresponding relationship of the terminal of storage and key, the corresponding first key of the first terminal is obtained.
3. according to the method described in claim 2, it is characterized in that, the method also includes:
The second key of ciphertext form is received, the second key of the ciphertext form is that first wearable device uses third The second key of key pair is encrypted, and second key and the third key are first wearable devices It is generated according to the cipher instruction that the mark of first wearable device and user input, the third key and described first Key is the same key used in a pair of secret keys used in rivest, shamir, adelman or symmetric encipherment algorithm;
It is decrypted using second key of the first key to the ciphertext form, obtains second key;
The corresponding first key of the first terminal is updated to second key.
4. the method according to claim 1, wherein the method is also when the method is executed by server Including:
Receive the second cipher-text information, it is corresponding 4th close using second terminal that second cipher-text information is the second wearable device Key encrypts the specify information, and the 4th key is that second wearable device can according to described second What the mark of wearable device and the cipher instruction of user's input generated, the 4th key is key used in symmetry algorithm;
It is decrypted using the second cipher-text information described in the 4th key pair, obtains the specify information.
5. according to the method described in claim 4, it is characterized in that, the method also includes:
The 5th key of ciphertext form is received, the 5th key of the ciphertext form is described in the second wearable device use The 5th key of 4th key pair is encrypted, and the 5th key is second wearable device according to described second What the mark of wearable device and the cipher instruction of user's input generated;
It is decrypted using the 5th key of ciphertext form described in the 4th key pair, obtains the 5th key;
It is the 5th key by corresponding 4th key updating of the second terminal.
6. the method according to claim 1, wherein when the method is executed by second terminal, the acquisition The corresponding first key of first terminal, including:
Key request is sent to server, the key request is for obtaining the first key;
The first key is received, the first key is that the server is obtained according to the terminal of storage and the corresponding relationship of key It takes.
7. the method according to claim 1, wherein when the method is executed by second terminal, the use The first key encrypts the specify information, obtains the first cipher-text information, including:
The first key and the specify information are sent to the second wearable device;
First cipher-text information is received, first cipher-text information is that second wearable device uses the first key The specify information is encrypted.
8. a method of transmission information, which is characterized in that including:
Receive the first cipher-text information, first cipher-text information be using the corresponding first key of first terminal to specify information into Row encryption obtains, and the first key is that the first wearable device is defeated according to the mark of first wearable device and user What the cipher instruction entered generated;
First cipher-text information is sent to first wearable device;
The specify information is received, the specify information is that first wearable device is close using described in third key pair first What literary information was decrypted, the third key is first wearable device according to first wearable device What mark and the cipher instruction of user's input generated, the third key is to make in rivest, shamir, adelman with the first key The same key used in a pair of secret keys or symmetric encipherment algorithm.
9. according to the method described in claim 8, it is characterized in that, the method also includes:
The second key of ciphertext form is received, the second key of the ciphertext form is described in the first wearable device use The second key of third key pair is encrypted, and second key is first wearable device according to described first What the mark of wearable device and the cipher instruction of user's input generated;
The second key of the ciphertext form is sent to server, so that the server is using the first key to described close Second key of literary form is decrypted, and obtains second key, and the corresponding first key of the first terminal is updated For second key.
10. a kind of device for transmitting information, which is characterized in that including:
Key Acquisition Module, for obtaining the corresponding first key of first terminal, the first key is the first wearable device It is generated according to the cipher instruction that the mark of first wearable device and user input;
Information encrypting module obtains the first cipher-text information for encrypting using the first key to specify information;
Information sending module, for sending first cipher-text information to the first terminal, the first terminal is for using First cipher-text information is decrypted in first wearable device, obtains the specify information.
11. device according to claim 10, which is characterized in that when described device is server, the key is obtained Module is used for,
According to the corresponding relationship of the terminal of storage and key, the corresponding first key of the first terminal is obtained.
12. device according to claim 11, which is characterized in that described device further includes:
First key receiving module, for receiving the second key of ciphertext form, the second key of the ciphertext form is described First wearable device is encrypted using the second key of third key pair, second key and the third key It is that first wearable device is generated according to the cipher instruction that the mark of first wearable device and user input, The third key and the first key are in a pair of secret keys used in rivest, shamir, adelman or symmetric encipherment algorithm The same key used;
First key deciphering module is obtained for being decrypted using the second key of the first key to the ciphertext form To second key;
First key update module, for the corresponding first key of the first terminal to be updated to second key.
13. device according to claim 10, which is characterized in that when described device is server, described device is also wrapped It includes:
Information receiving module, for receiving the second cipher-text information, second cipher-text information, which is the second wearable device, uses the What specify information described in corresponding 4th key pair of two terminals was encrypted, the 4th key is described second wearable Equipment is generated according to the cipher instruction that the mark of second wearable device and user input, and the 4th key is symmetrical Key used in algorithm;
Information deciphering module is obtained described specified for being decrypted using the second cipher-text information described in the 4th key pair Information.
14. device according to claim 13, which is characterized in that described device further includes:
Second key reception module, for receiving the 5th key of ciphertext form, the 5th key of the ciphertext form is described Second wearable device is encrypted using the 5th key of the 4th key pair, and the 5th key is described second Wearable device is generated according to the cipher instruction that the mark of second wearable device and user input;
Second cipher key decryption block is obtained for being decrypted using the 5th key of ciphertext form described in the 4th key pair To the 5th key;
Second key updating module, for being the 5th key by corresponding 4th key updating of the second terminal.
15. device according to claim 10, which is characterized in that when described device is second terminal, the key is obtained Modulus block includes:
Request-to-send submodule, for sending key request to server, the key request is for obtaining the first key;
Key reception submodule, for receiving the first key, the first key is end of the server according to storage What the corresponding relationship of end and key obtained.
16. device according to claim 10, which is characterized in that when described device is second terminal, the information adds Close module includes:
Information sending submodule, for sending the first key and the specify information to the second wearable device;
Information receiving submodule, for receiving first cipher-text information, first cipher-text information is described second wearable Equipment encrypts the specify information using the first key.
17. a kind of device for transmitting information, which is characterized in that including:
First receiving module, for receiving the first cipher-text information, first cipher-text information is using first terminal corresponding the What one key pair specify information was encrypted, the first key is that the first wearable device is wearable according to described first What the mark of equipment and the cipher instruction of user's input generated;
First sending module, for sending first cipher-text information to first wearable device;
Second receiving module, for receiving the specify information, the specify information, which is first wearable device, uses the First cipher-text information described in three key pairs is decrypted, and the third key is first wearable device according to institute What the cipher instruction of the mark and user's input of stating the first wearable device generated, the third key is with the first key The same key used in a pair of secret keys or symmetric encipherment algorithm used in rivest, shamir, adelman.
18. device according to claim 17, which is characterized in that described device further includes:
Third receiving module, for receiving the second key of ciphertext form, the second key of the ciphertext form is described first Wearable device is encrypted using second key of third key pair, and second key is described first can to wear Wear what equipment was generated according to the cipher instruction that the mark of first wearable device and user input;
Second sending module, for sending the second key of the ciphertext form to server, so that the server uses institute It states first key the second key of the ciphertext form is decrypted, obtains second key, and by the first terminal Corresponding first key is updated to second key.
19. a kind of device for transmitting information, which is characterized in that including:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
The corresponding first key of first terminal is obtained, the first key is that the first wearable device is wearable according to described first What the mark of equipment and the cipher instruction of user's input generated;
Specify information is encrypted using the first key, obtains the first cipher-text information;
First cipher-text information is sent to the first terminal, the first terminal is used to use first wearable device First cipher-text information is decrypted, the specify information is obtained.
20. a kind of device for transmitting information, which is characterized in that including:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
Receive the first cipher-text information, first cipher-text information be using the corresponding first key of first terminal to specify information into Row encryption obtains, and the first key is that the first wearable device is defeated according to the mark of first wearable device and user What the cipher instruction entered generated;
First cipher-text information is sent to first wearable device;
The specify information is received, the specify information is that first wearable device is close using described in third key pair first What literary information was decrypted, the third key is first wearable device according to first wearable device What mark and the cipher instruction of user's input generated, the third key is to make in rivest, shamir, adelman with the first key The same key used in a pair of secret keys or symmetric encipherment algorithm.
21. a kind of system for transmitting information, which is characterized in that including:
First wearable device, for generating the according to the cipher instruction of the mark of first wearable device and user's input The corresponding first key of one terminal and third key, the third key are to make in rivest, shamir, adelman with the first key The same key used in a pair of secret keys or symmetric encipherment algorithm;
Server, for obtaining the first key;Specify information is encrypted using the first key, it is close to obtain first Literary information;First cipher-text information is sent to the first terminal;
The first terminal, for receiving first cipher-text information;It is close that described first is sent to first wearable device Literary information;
First wearable device is also used to, and receives first cipher-text information;Using first described in the third key pair Cipher-text information is decrypted, and obtains the specify information;The specify information is sent to the first terminal;
The first terminal is also used to, and receives the specify information.
22. a kind of system for transmitting information, which is characterized in that including:
First wearable device, for generating the according to the cipher instruction of the mark of first wearable device and user's input The corresponding first key of one terminal and third key, the third key are to make in rivest, shamir, adelman with the first key The same key used in a pair of secret keys or symmetric encipherment algorithm;
Second terminal, for sending key request to server, the key request is for obtaining the first key;
The server, for receiving the key request;According to the corresponding relationship of the terminal of storage and key, described the is obtained One key;The first key is sent to the second terminal;
The second terminal is also used to, and receives the first key;The first key is sent to the second wearable device;
Second wearable device, for receiving the first key;Specify information is added using the first key It is close, obtain the first cipher-text information;First cipher-text information is sent to the second terminal;
The second terminal is also used to, and receives first cipher-text information;The first ciphertext letter is sent to the first terminal Breath;
The first terminal, for receiving first cipher-text information;It is close that described first is sent to first wearable device Literary information;
First wearable device is also used to, and receives first cipher-text information;Using first described in the third key pair Cipher-text information is decrypted, and obtains the specify information;The specify information is sent to the first terminal;
The first terminal is also used to, and receives the specify information.
23. a kind of system for transmitting information, which is characterized in that including:
First wearable device, for generating the according to the cipher instruction of the mark of first wearable device and user's input The corresponding first key of one terminal and third key, the third key are to make in rivest, shamir, adelman with the first key The same key used in a pair of secret keys or symmetric encipherment algorithm;
Second wearable device, for generating the according to the cipher instruction of the mark of second wearable device and user's input Corresponding 4th key of two terminals, the 4th key are key used in symmetry algorithm;Referred to using the 4th key pair Determine information to be encrypted, obtains the second cipher-text information;Second cipher-text information is sent to the second terminal;
The second terminal, for receiving second cipher-text information;Second cipher-text information is sent to server;
The server, for receiving second cipher-text information;Using the second cipher-text information described in the 4th key pair into Row decryption, obtains the specify information;Obtain the first key;The specify information is added using the first key It is close, obtain the first cipher-text information;First cipher-text information is sent to the first terminal;
The first terminal, for receiving first cipher-text information;It is close that described first is sent to first wearable device Literary information;
First wearable device is also used to, and receives first cipher-text information;Using first described in the third key pair Cipher-text information is decrypted, and obtains the specify information;The specify information is sent to the first terminal;
The first terminal is also used to, and receives the specify information.
CN201510373613.4A 2015-06-30 2015-06-30 Transmit the method, apparatus and system of information Active CN105120452B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510373613.4A CN105120452B (en) 2015-06-30 2015-06-30 Transmit the method, apparatus and system of information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510373613.4A CN105120452B (en) 2015-06-30 2015-06-30 Transmit the method, apparatus and system of information

Publications (2)

Publication Number Publication Date
CN105120452A CN105120452A (en) 2015-12-02
CN105120452B true CN105120452B (en) 2018-11-23

Family

ID=54668287

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510373613.4A Active CN105120452B (en) 2015-06-30 2015-06-30 Transmit the method, apparatus and system of information

Country Status (1)

Country Link
CN (1) CN105120452B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106804062A (en) * 2015-12-03 2017-06-06 青岛海信移动通信技术股份有限公司 A kind of method and apparatus of networking
CN107743063A (en) * 2017-10-31 2018-02-27 北京小米移动软件有限公司 Data processing method and device
CN109787955B (en) * 2018-12-12 2021-07-16 东软集团股份有限公司 Information transmission method, device and storage medium
CN110012447A (en) * 2019-04-28 2019-07-12 国网新疆电力有限公司 The system and method for network security control function is realized in substation based on wireless sensor

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102497465A (en) * 2011-10-26 2012-06-13 潘铁军 High-secrecy mobile information safety system and safety method for distributed secret keys
US20130166456A1 (en) * 2010-09-07 2013-06-27 Zte Corporation System and Method for Remote Payment Based on Mobile Terminal
CN103473514A (en) * 2013-09-06 2013-12-25 宇龙计算机通信科技(深圳)有限公司 Data storage access method and device
CN104144049A (en) * 2014-03-11 2014-11-12 腾讯科技(深圳)有限公司 Encryption communication method, system and device
CN104243484A (en) * 2014-09-25 2014-12-24 小米科技有限责任公司 Information interaction method and device and electronic equipment
CN104510132A (en) * 2013-09-30 2015-04-15 大连民族学院 Portable pencil-box capable of being clamped onto book

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130166456A1 (en) * 2010-09-07 2013-06-27 Zte Corporation System and Method for Remote Payment Based on Mobile Terminal
CN102497465A (en) * 2011-10-26 2012-06-13 潘铁军 High-secrecy mobile information safety system and safety method for distributed secret keys
CN103473514A (en) * 2013-09-06 2013-12-25 宇龙计算机通信科技(深圳)有限公司 Data storage access method and device
CN104510132A (en) * 2013-09-30 2015-04-15 大连民族学院 Portable pencil-box capable of being clamped onto book
CN104144049A (en) * 2014-03-11 2014-11-12 腾讯科技(深圳)有限公司 Encryption communication method, system and device
CN104243484A (en) * 2014-09-25 2014-12-24 小米科技有限责任公司 Information interaction method and device and electronic equipment

Also Published As

Publication number Publication date
CN105120452A (en) 2015-12-02

Similar Documents

Publication Publication Date Title
EP3001640B1 (en) Secure information exchange methods and wearable device
WO2020103284A1 (en) Smart card authentication method, smart lock, smart card, system and device
Jin et al. Magpairing: Pairing smartphones in close proximity using magnetometers
WO2016050037A1 (en) Operation authorization method and device
CN104955031A (en) Information transmission method and device
KR20080063130A (en) A method for exchanging strong encryption keys between devices using alternate input methods in wireless personal area networks(wpan)
CN104967511A (en) Processing method for enciphered data, and apparatus thereof
WO2017128719A1 (en) Method, apparatus and system for accessing wireless local area network
CN106453052A (en) Message interaction method and apparatus thereof
CN110738778B (en) Access control method and device, equipment and storage medium
CN105120452B (en) Transmit the method, apparatus and system of information
CN106060098B (en) Processing method, processing unit and the processing system of identifying code
CN109246110B (en) Data sharing method and device and computer readable storage medium
CN105491250A (en) Incoming call number authenticity identification method and device as well as equipment
CN105281907A (en) Encrypted data processing method and apparatus
CN104852800B (en) Data transmission method and device
CN104869001A (en) Short message authentication method and device
CN104980919B (en) The acquisition methods and equipment of information of network service
CN106534083B (en) Brush machine Tool validation method and device
CN105376399B (en) For controlling the method and device of smart machine
CN105812339A (en) Encryption and decryption method and device
WO2018018636A1 (en) Information writing method and device
CN113868505A (en) Data processing method and device, electronic equipment, server and storage medium
CN104954344A (en) Data exchange method and device thereof based on HTTP protocol
TW202009774A (en) Method for securely transmitting picture file in which an encrypted version of an original picture file and a deformed picture file are transmitted from a first terminal device through a communication server to a second terminal device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20180821

Address after: 100176 Beijing Beijing economic and Technological Development Zone, Chuang Chuang fourteen Street 99, 33 D Building 2 level 2243 (centralized office area)

Applicant after: Beijing millet Payment Technology Co., Ltd.

Address before: 100085 Beijing Haidian District Qinghe middle street 68 Huarun colorful shopping mall two phase 13 level.

Applicant before: Xiaomi Technology Co., Ltd.

GR01 Patent grant
GR01 Patent grant