CN106657122A - Data processing method and device as well as terminal device - Google Patents
Data processing method and device as well as terminal device Download PDFInfo
- Publication number
- CN106657122A CN106657122A CN201611271123.4A CN201611271123A CN106657122A CN 106657122 A CN106657122 A CN 106657122A CN 201611271123 A CN201611271123 A CN 201611271123A CN 106657122 A CN106657122 A CN 106657122A
- Authority
- CN
- China
- Prior art keywords
- packet
- communication module
- wireless communication
- subnet
- public
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/22—Parsing or analysis of headers
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Embodiments of the invention relate to the technical field of communication and disclose a data processing method and device as well as terminal device. The method comprises the following steps that a wireless communication module of the terminal device obtains a public key of a target access point; the wireless communication module utilizes the public key to encrypt a to-be-transmitted first data packet to obtain a second data packet; and the wireless communication module carries out transmission processing on the second data packet. Through implementation of the embodiments of the invention, the work which is originally executed by a processor of the terminal device is transferred to the wireless communication module, so that the computational load of the processor is reduced.
Description
Technical field
The present invention relates to communication technical field, more particularly to a kind of data processing method, device and terminal device.
Background technology
It is widely available with wireless network, people can whenever and wherever possible access network being entertained, be handled official business and be exchanged
It is that the life of people brings great convenience Deng activity.However, the easy access of network and high popularity rate also bring it is increasingly tight
The problem of data safety of weight.
The data that user is sent by wireless network, it is easy to stolen by lawless person during transmission.For example, it is pseudo-
Dress up data receiver and obtain the data that user sends.Therefore, leaking data is caused in order to prevent the data for sending to be stolen, it is right
Data are encrypted becomes especially necessary.
Terminal device is entered using CPU (Central Processing Unit, central processing unit) to sent packet
Row encryption.On the one hand, CPU is in addition to performing the operation of Data Packet Encryption, in addition it is also necessary to carry out hardware resource management, media information
The operation such as process;On the other hand and, terminal device carries out that data interaction is very frequent with the external world, therefore the data packet number of transmission
It is more;Therefore, carrying out Data Packet Encryption using CPU can greatly increase the computational burden of CPU.
The content of the invention
A kind of data processing method, device and terminal device are embodiments provided, can be by script terminal device
Computing device, the work that the data to sending are encrypted is transferred to wireless communication module to be carried out, and reduces processor
Computational burden.
Embodiment of the present invention first aspect discloses a kind of data processing method, including:
The wireless communication module of terminal device obtains the public-key cryptography of target access;
The wireless communication module is encrypted to obtain using the public-key cryptography to the first packet waiting for transmission
Two packets;
Second packet is transmitted process by the wireless communication module.
Used as a kind of optional embodiment, the wireless communication module is using the public-key cryptography to waiting for transmission first
Before packet is encrypted to obtain the second packet, methods described also includes:
The wireless communication module parses first packet to obtain the internet protocol address of data receiver;
The wireless communication module determines that the data receiver is the mesh according to the IP address of the data receiver
Terminal device in the subnet that tag splice access point is set up;
Second packet is transmitted process by the wireless communication module, including:
The wireless communication module sends second packet to the target access, so that the target is accessed
Point using the corresponding private cipher key of the public-key cryptography decrypt second packet and by decryption after second packet
Send to the data receiver.
Used as a kind of optional embodiment, the wireless communication module of the terminal device obtains the disclosure of target access
After key, methods described also includes:
The wireless communication module to the target access sends request message, is set up with obtaining the target access
Subnet subnet IP;
The wireless communication module determines that the data receiver is the mesh according to the IP address of the data receiver
Terminal device in the subnet that tag splice access point is set up, including:
The IP address of the data receiver is calculated according to default subnet mask, to obtain the data receiver
The subnet IP of the subnet that side accesses;
Check the subnet of the subnet that the subnet IP of the subnet that the target access is set up is accessed with the data receiver
Whether IP is consistent, to determine that whether the data access side is the terminal device in the subnet that the target access is set up.
Used as a kind of optional embodiment, the public-key cryptography and the corresponding private cipher key of the public-key cryptography are every pre-
If time interval once updated.
Used as a kind of optional embodiment, the wireless communication module is using the public-key cryptography to waiting for transmission first
Before packet is encrypted to obtain the second packet, methods described also includes:
The wireless communication module carries out keyword extraction to first packet, to determine first packet in
Comprising account number cipher information.
Embodiment of the present invention second aspect discloses a kind of data processing method, including:
Terminal device is received using the packet of public key encryption;
The wireless communication module of the terminal device obtains private cipher key corresponding with the public-key cryptography;
The wireless communication module is decrypted using packet described in the private cipher key pair.
The embodiment of the present invention third aspect discloses a kind of data processing equipment, including:
Acquiring unit, for obtaining the public-key cryptography of target access;
Ciphering unit, for being encrypted to obtain the second number to the first packet waiting for transmission using the public-key cryptography
According to bag;
First transmitting element, for second packet to be transmitted into process.
Used as a kind of optional embodiment, described device also includes:
Resolution unit, for parsing first packet to obtain the internet protocol address of data receiver;
Determining unit, for determining that the data receiver connects for the target according to the IP address of the data receiver
Terminal device in the subnet that access point is set up;
First transmitting element, specifically for second packet is sent to the target access, so that institute
State target access and decrypt second packet and by described in after decryption using the corresponding private cipher key of the public-key cryptography
Second packet is sent to the data receiver.
Used as a kind of optional embodiment, described device also includes:
Second transmitting element, for sending request message to the target access, is built with obtaining the target access
The subnet IP of vertical subnet;
The determining unit, including:
Computation subunit, for being calculated the IP address of the data receiver according to default subnet mask, with
Obtain the subnet IP of the subnet that the data receiver accesses;
Verification subelement, the subnet IP for checking the subnet that the target access is set up connects with the data receiver
Whether the subnet IP of the subnet for entering is consistent, to determine whether the data access side is in the subnet that the target access is set up
Terminal device.
Used as a kind of optional embodiment, the public-key cryptography and the corresponding private cipher key of the public-key cryptography are every pre-
If time interval once updated.
Used as a kind of optional embodiment, described device also includes:
Extraction unit, for carrying out keyword extraction to first packet, to determine first packet in wrap
Information containing account number cipher.
Embodiment of the present invention fourth aspect discloses a kind of terminal device, including processor and memory, including channel radio
Letter module;
Wherein, the wireless communication module is used to perform the method disclosed in above-mentioned first aspect.
The aspect of the embodiment of the present invention the 5th discloses a kind of terminal device, including processor and memory, including channel radio
Letter module;
Wherein, the wireless communication module is used to perform the method disclosed in above-mentioned second aspect.
The aspect of the embodiment of the present invention the 6th discloses a kind of electronic equipment, including:Application processor and wireless communication module,
Communicably connect between the application processor and the wireless communication module, the wireless communication module has independent
The function that ground is encrypted to electronic equipment data waiting for transmission;Or, with independently to electronic equipment reception
The function that is decrypted of data.
As can be seen from the above technical solutions, the embodiment of the present invention has advantages below:
In the embodiment of the present invention, the wireless communication module of terminal device obtains the public-key cryptography of target access;The nothing
Line communication module is encrypted to obtain the second packet using the public-key cryptography to the first packet waiting for transmission;The nothing
Second packet is transmitted process by line communication module.Implement the embodiment of the present invention, can be by script terminal device
Computing device, the work that the data to sending are encrypted is transferred to wireless communication module to be carried out, and reduces the fortune of processor
Calculate burden.
Description of the drawings
Technical scheme in order to be illustrated more clearly that the embodiment of the present invention, below will be to making needed for embodiment description
Accompanying drawing is briefly introduced, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for this
For the those of ordinary skill in field, without having to pay creative labor, can be obtaining it according to these accompanying drawings
His accompanying drawing.
Fig. 1 is a kind of schematic flow sheet of data processing method disclosed in the embodiment of the present invention;
Fig. 2 is the schematic flow sheet of another kind of data processing method disclosed in the embodiment of the present invention;
Fig. 2A is the schematic flow sheet that a kind of wireless communication module disclosed in the embodiment of the present invention is interacted with target access;
Fig. 3 is a kind of structural representation of data processing equipment 300 disclosed in the embodiment of the present invention;
Fig. 4 is the structural representation of another kind of data processing equipment 400 disclosed in the embodiment of the present invention;
Fig. 4 A are a kind of structural representation of determining unit 306 disclosed in the embodiment of the present invention;
Fig. 5 is a kind of structural representation of wireless communication module 500 disclosed in the embodiment of the present invention;
Fig. 6 is a kind of structural representation of terminal device 600 disclosed in the embodiment of the present invention;
Fig. 7 is the schematic flow sheet of another data processing method disclosed in the embodiment of the present invention;
Fig. 8 is a kind of interaction diagrams for being encrypted to data, decrypting disclosed in the embodiment of the present invention.
Specific embodiment
In order that the object, technical solutions and advantages of the present invention are clearer, below in conjunction with accompanying drawing the present invention is made into
One step ground is described in detail, it is clear that described embodiment is only present invention some embodiments, rather than the enforcement of whole
Example.Based on the embodiment in the present invention, what those of ordinary skill in the art were obtained under the premise of creative work is not made
All other embodiment, belongs to the scope of protection of the invention.
Term " first ", " second " in description and claims of this specification and above-mentioned accompanying drawing etc. are for distinguishing
Different objects, rather than for describing particular order.Additionally, term " comprising " and " having " and their any deformations, meaning
Figure is to cover non-exclusive including.For example contain process, method, system, product or the equipment of series of steps or unit
The step of listing or unit are not limited to, but alternatively also include the step of not listing or unit, or alternatively also
Including other steps or unit intrinsic for these processes, method or equipment.
A kind of data processing method, device and terminal device are embodiments provided, can be by script terminal device
Computing device, the work that the data to sending are encrypted is transferred to wireless communication module to be carried out, and reduces processor
Computational burden.It is described in detail individually below.
Fig. 1 is referred to, Fig. 1 is a kind of schematic flow sheet of data processing method disclosed in the embodiment of the present invention.Wherein, scheme
Method shown in 1 may comprise steps of:
101st, the wireless communication module of terminal device obtains the public-key cryptography of target access.
In the embodiment of the present invention, above-mentioned terminal device can for operation Android operation system, iOS operating systems,
The terminal device of Windows operating system or other operating systems, such as mobile phone, removable computer, panel computer, desktop
Brain, personal digital assistant (Personal Digital Assistant, PDA), intelligent watch, intelligent glasses, Intelligent bracelet etc.
Terminal device, the embodiment of the present invention is not subsequently repeated.
In the embodiment of the present invention, it is possible to use the mode of unsymmetrical key is encrypted to the data that terminal device sends.
Asymmetric-key encryption algorithm needs two keys:Public-key cryptography (Public Key) and private cipher key (Private Key).It is public
Open key to exist in pairs with private cipher key, if be encrypted data with public-key cryptography, only with corresponding private cipher key
Can decryption;If be encrypted with private cipher key pair data, then only could be decrypted with corresponding public-key cryptography.Because encryption
Two different keys are used with decryption, so this algorithm is referred to as asymmetric-key encryption algorithm.
Asymmetric-key encryption algorithm realizes that the basic process that confidential information is exchanged is:Party A is (in embodiments of the present invention,
Can be target access) generate a pair of secret keys and disclose therein one to other data interaction sides as public-key cryptography;
Obtain Party B's (in embodiments of the present invention, can be terminal device) of the disclosure key is carried out using the key to confidential information
Party A is then forwarded to after encryption;Party A is decrypted again with the information after the corresponding private cipher key pair encryption for oneself preserving.
In addition, the mode of symmetric key can also be utilized in the embodiment of the present invention to carry out above-mentioned encryption, decryption processing.
Symmetric key encryption is called private key encryption, that is, send and receive the both sides of data carries out adding using identical key to plaintext
Close and decryption computing.
In the embodiment of the present invention, wireless communication module can receive the public-key cryptography of target access transmission;In addition,
Key disclosed above can also be previously stored in the terminal device, and wireless communication module is referred to by sending request to memory
Order, to obtain key disclosed above.
102nd, wireless communication module is encrypted to obtain using key disclosed above to the first packet waiting for transmission
Two packets.
In the embodiment of the present invention, wireless communication module can carry out selective encryption to the packet that needs send,
Compared with all packets are encrypted, carrying out selective encryption can reduce the power consumption of wireless communication module.
Used as a kind of optional embodiment, wireless communication module carries out keyword extraction to above-mentioned first packet, with
Determine and include in above-mentioned first packet account number cipher information.If account number cipher information is included in the first packet, to first
Packet is encrypted to obtain the second packet.
103rd, above-mentioned second packet is transmitted process by wireless communication module.
In the embodiment of the present invention, wireless communication module sends above-mentioned second packet to above-mentioned target access, target
After access point is decrypted using the packet of private cipher key pair second corresponding with key disclosed above, by decryption after second number
Data receiver is transmitted to according to bag.In this way, " camouflage " is even if access point is taken as above-mentioned target access, terminal to set
It is standby the second packet to be sent to above-mentioned " camouflage " access point, because the second packet is encrypted by unsymmetrical key,
Thus the second packet that cannot be received by " camouflage " access point of lawless person steals the information of user.
As can be seen here, using the method described by Fig. 1, can be by the computing device of script terminal device, to sending
The work that is encrypted of data be transferred to wireless communication module and carry out, reduce the computational burden of processor.
Fig. 2 is referred to, Fig. 2 is the schematic flow sheet of another kind of data processing method disclosed in the embodiment of the present invention.Such as Fig. 2
Shown, the method may comprise steps of:
201st, the wireless communication module of terminal device receives the public-key cryptography that target access sends.
In the embodiment of the present invention, the data that terminal device sends are encrypted using the mode of unsymmetrical key.It is non-right
Secret key cryptographic algorithm is claimed to need two keys:Public-key cryptography (Public Key) and private cipher key (Private Key).Disclose close
Key exists in pairs with private cipher key, if be encrypted to data with public-key cryptography, only could be solved with corresponding private cipher key
It is close;If be encrypted with private cipher key pair data, then only could be decrypted with corresponding public-key cryptography.Because encryption is conciliate
It is close to use two different keys, so this algorithm is referred to as asymmetric-key encryption algorithm.
Asymmetric-key encryption algorithm realizes that the basic process that confidential information is exchanged is:Party A is (in embodiments of the present invention,
Can be target access) generate a pair of secret keys and disclose therein one to other data interaction sides as public-key cryptography;
Obtain Party B's (in embodiments of the present invention, can be terminal device) of the disclosure key is carried out using the key to confidential information
Party A is then forwarded to after encryption;Party A is decrypted again with the information after the corresponding private cipher key pair encryption for oneself preserving.
202nd, wireless communication module parses the first packet waiting for transmission to obtain the Internet protocol IP of data receiver
Address.
203rd, wireless communication module determines that above-mentioned data receiver is above-mentioned mesh according to the IP address of above-mentioned data receiver
Terminal device in the subnet that tag splice access point is set up.
Used as a kind of optional embodiment, it is upper that the embodiment of the present invention is determined as follows above-mentioned data receiver
State the terminal device in the subnet of target access foundation:
Wireless communication module to above-mentioned target access sends request message, to obtain the son that above-mentioned target access is set up
The subnet IP of net;The IP address of above-mentioned data receiver is calculated according to default subnet mask, to obtain above-mentioned data
The subnet IP of the subnet that recipient accesses;Check the subnet IP and above-mentioned data receiver of the subnet that above-mentioned target access is set up
The subnet IP of the subnet of access is consistent, to determine that above-mentioned data access side is the terminal in the subnet that above-mentioned target access is set up
Equipment.
204th, wireless communication module is encrypted to obtain the second number using key disclosed above to above-mentioned first packet
According to bag.
End in the embodiment of the present invention, in the subnet that wireless communication module determines data receiver to be set up for target access
After end equipment, the key disclosed above provided using target access is encrypted to the first packet.
205th, wireless communication module sends above-mentioned second packet to above-mentioned target access.
Wireless communication module sends above-mentioned second packet to above-mentioned target access, so that above-mentioned target access is sharp
With the corresponding private cipher key of above-mentioned public-key cryptography decrypt above-mentioned second packet and by decryption after above-mentioned second packet send
To above-mentioned data receiver.
Used as a kind of optional embodiment, key disclosed above and the corresponding private cipher key of key disclosed above are every pre-
If time interval once updated, strengthened with the security to key, after preventing packet to be stolen utilize history
Key is cracked.
Fig. 2A is referred to, Fig. 2A connects for a kind of wireless communication module of terminal device disclosed in the embodiment of the present invention with target
The schematic flow sheet of access point interaction.As shown in Figure 2 A, target access generates a pair of secret keys according to asymmetric-key encryption algorithm:
Public-key cryptography and private cipher key, are then sent to terminal device by public-key cryptography;The wireless communication module of terminal device is obtained should
Public-key cryptography is simultaneously preserved;Wireless communication module obtains the first packet that the application processor transmission of terminal device comes, it
Parse above-mentioned first packet afterwards to obtain the IP address of data receiver;Wireless communication module determines number according to above-mentioned IP address
It is the terminal device in the subnet that target access is set up according to recipient, afterwards using above-mentioned first number of key disclosed above encryption
According to bag obtaining the second packet;Wireless communication module sends the second packet to target access;Target access is received
To after the second packet, be decrypted using the packet of above-mentioned private cipher key pair second, and by decryption after the second packet send out
Give data receiver.
As can be seen here, using the method described by Fig. 2, can be by the computing device of script terminal device, to sending
The work that is encrypted of data be transferred to wireless communication module and carry out, reduce the computational burden of processor.
Fig. 3 is referred to, Fig. 3 is a kind of structural representation of data processing equipment 300 disclosed in the embodiment of the present invention.As schemed
Shown in 3, the device can include:
Acquiring unit 301, for obtaining the public-key cryptography of target access.
Ciphering unit 302, for being encrypted to obtain to the first packet waiting for transmission using key disclosed above
Two packets.
First transmitting element 303, for above-mentioned second packet to be sent to above-mentioned target access.
As can be seen here, using the device described by Fig. 3, can be by the computing device of script terminal device, to sending
The work that is encrypted of data be transferred to wireless communication module and carry out, reduce the computational burden of processor.
Fig. 4 is seen also, Fig. 4 is the structural representation of another kind of data processing equipment 400 disclosed in the embodiment of the present invention
Figure.Wherein, the device shown in Fig. 4 is that device as shown in Figure 3 is optimized what is obtained, compared with the device shown in Fig. 3, Fig. 4
Shown device also includes:
Resolution unit 304, for parsing above-mentioned first packet to obtain the internet protocol address of data receiver.
Determining unit 305, for determining that above-mentioned data receiver is above-mentioned mesh according to the IP address of above-mentioned data receiver
Terminal device in the subnet that tag splice access point is set up.
As a kind of optional embodiment, above-mentioned first transmitting element 303, specifically for above-mentioned second packet is sent out
Above-mentioned target access is delivered to, so that above-mentioned target access is using key disclosed above corresponding private cipher key decryption above-mentioned the
Two packets and by decryption after above-mentioned second packet send to above-mentioned data receiver.
Used as a kind of optional embodiment, the device shown in Fig. 4 also includes:
Second transmitting element 306, for sending request message to above-mentioned target access, to obtain above-mentioned target access
The subnet IP of the subnet of foundation.
As shown in Figure 4 A, determining unit 305, including:Computation subunit 3051 and verification subelement 3052.
Wherein, computation subunit 3051, for being entered to the IP address of above-mentioned data receiver according to default subnet mask
Row is calculated, to obtain the subnet IP of the subnet that above-mentioned data receiver accesses;Verification subelement 3052, for checking above-mentioned target
The subnet IP of the subnet that access point is set up is consistent with the subnet IP of the subnet that above-mentioned data receiver accesses, to determine above-mentioned data
Access side is the terminal device in the subnet that above-mentioned target access is set up.
Used as a kind of optional embodiment, the device shown in Fig. 4 also includes:
Extraction unit 307, for carrying out keyword extraction to above-mentioned first packet, to determine above-mentioned first packet in
Comprising account number cipher information.
As can be seen here, using the device described by Fig. 4, can be by the computing device of script terminal device, to sending
The work that is encrypted of data be transferred to wireless communication module and carry out, reduce the computational burden of processor.
Fig. 5 is referred to, Fig. 5 is a kind of structural representation of wireless communication module 500 disclosed in the embodiment of the present invention.The nothing
Line communication module can be applicable to it is various need the terminal devices that communicated, for example mobile phone, removable computer, panel computer,
Desktop computer, personal digital assistant (Personal Digital Assistant, PDA), intelligent watch, intelligent glasses, intelligence
Bracelet etc..
As shown in figure 5, the wireless communication module includes:Processor 501 and memory 502;Wherein memory 502 can be with
The caching required for data processing is performed for processor 501, the offer execution data processing of processor 501 is provided and is called
Data and acquisition result data memory space.
In embodiments of the present invention, the processor 501 of wireless communication module 500 is stored in memory 502 by calling
Program code, for performing following operation:
Obtain the public-key cryptography of target access;
First packet waiting for transmission is encrypted using key disclosed above obtain the second packet;
Above-mentioned second packet is transmitted into process.
Used as a kind of optional embodiment, the processor 501 of wireless communication module 500 is stored in memory by calling
Program code in 502, is additionally operable to perform following operation:
Parse above-mentioned first packet to obtain the internet protocol address of data receiver;
Determine that above-mentioned data receiver is the son that above-mentioned target access is set up according to the IP address of above-mentioned data receiver
Terminal device in net.
Used as a kind of optional embodiment, the processor 501 of wireless communication module 500 is stored in memory by calling
Program code in 502, determines that above-mentioned data receiver is upper according to the IP address of above-mentioned data receiver in the following way
State the terminal device in the subnet of target access foundation:
Request message is sent to above-mentioned target access, to obtain the subnet IP of the subnet that above-mentioned target access is set up;
The IP address of above-mentioned data receiver is calculated according to default subnet mask, to obtain above-mentioned data receiver
The subnet IP of the subnet that side accesses;
Check the subnet of the subnet that the subnet IP of the subnet that above-mentioned target access is set up is accessed with above-mentioned data receiver
IP is consistent, to determine that above-mentioned data access side is the terminal device in the subnet that above-mentioned target access is set up.
As can be seen here, if the wireless communication module described by terminal device configuration Fig. 5, can be by the place of script terminal device
Reason device is performed, and the work that the data to sending are encrypted is transferred to wireless communication module to be carried out, and reduces the computing of processor
Burden.
Fig. 6 is referred to, Fig. 6 is a kind of structural representation of terminal device 600 disclosed in the embodiment of the present invention.The terminal sets
It is standby can be used as terminal device involved in the method described by above-mentioned Fig. 1 and Fig. 2.As shown in fig. 6, for convenience of description, only
The part related to the embodiment of the present invention is shown, particular technique details is not disclosed, and refer to present invention method portion
Point.The terminal can be to include that (Personal Digital Assistant, individual digital is helped for mobile phone, panel computer, PDA
Reason), POS (Point of Sales, point-of-sale terminal), the arbitrarily terminal device such as vehicle-mounted computer, so that terminal is as mobile phone as an example:
Fig. 6 is illustrated that the block diagram of the part-structure of the mobile phone related to terminal provided in an embodiment of the present invention.With reference to figure
6, mobile phone includes:Radio frequency (Radio Frequency, RF) circuit 601, memory 602, input block 603, display unit 604,
The parts such as sensor 605, voicefrequency circuit 606, wireless communication module 607, processor 608 and power supply 609.Art technology
Personnel are appreciated that the handset structure illustrated in Fig. 6 does not constitute the restriction to mobile phone, can include more more or less than illustrating
Part, or combine some parts, or different part arrangements.
Each component parts of mobile phone is specifically introduced with reference to Fig. 6:
RF circuits 601 can be used to receiving and sending messages or communication process in, the reception and transmission of signal, especially, by base station
After downlink information is received, process to processor 608;In addition, up data is activation will be designed to base station.Generally, RF circuits 601
Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise
Amplifier, LNA), duplexer etc..Additionally, RF circuits 601 can also be communicated by radio communication with network and other equipment.
Above-mentioned radio communication can be using arbitrary communication standard or agreement, including but not limited to global system for mobile communications (Global
System of Mobile communication, GSM), general packet radio service (General Packet Radio
Service, GPRS), CDMA (Code Division Multiple Access, CDMA), WCDMA
(Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution,
LTE), Email, Short Message Service (Short Messaging Service, SMS) etc..
Memory 602 can be used to store software program and module, and processor 608 is stored in memory 602 by operation
Software program and module, so as to perform various function application and the data processing of mobile phone.Memory 602 can mainly include
Storing program area and storage data field, wherein, the application journey that storing program area can be needed for storage program area, at least one function
Sequence (such as sound-playing function, image player function etc.) etc.;Storage data field can be stored and use what is created according to mobile phone
Data (such as voice data, phone directory etc.) etc..Additionally, memory 602 can include high-speed random access memory, can be with
Including nonvolatile memory, for example, at least one disk memory, flush memory device or other volatile solid-states
Part.
Input block 603 can be used for the numeral or character information of receives input, and produce with the user of mobile phone arrange with
And the key signals input that function control is relevant.Specifically, input block 603 may include that contact panel 6031 and other inputs set
Standby 6032.Contact panel 6031, also referred to as touch-screen, user can be collected thereon or neighbouring touch operation (such as user makes
With the operation of any suitable object such as finger, stylus or annex on contact panel 6031 or near contact panel 6031),
And corresponding attachment means are driven according to formula set in advance.Optionally, contact panel 6031 may include touch detecting apparatus
With two parts of touch controller.Wherein, touch detecting apparatus detect the touch orientation of user, and detect what touch operation brought
Signal, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and it is changed
Into contact coordinate, then processor 608 is given, and the order sent of receiving processor 608 and can be performed.Furthermore, it is possible to adopt
Contact panel 6031 is realized with polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except contact panel
6031, input block 603 can also include other input equipments 6032.Specifically, other input equipments 6032 can include but
One be not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc.
Plant or various.
Display unit 604 can be used for show by user input information or be supplied to user information and mobile phone it is various
Menu.Display unit 604 may include display floater 6041, optionally, can adopt liquid crystal display (Liquid Crystal
Display, LCD), the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure
Show panel 6041.Further, contact panel 6031 can cover display floater 6041, when contact panel 6031 is detected thereon
Or after neighbouring touch operation, processor 608 is sent to determine the type of touch event, with preprocessor 608 according to touch
The type of event provides corresponding visual output on display floater 6041.Although in figure 6, contact panel 6031 and display surface
Plate 6041 be as two independent parts realizing input and the input function of mobile phone, but in some embodiments it is possible to
Input that realize mobile phone and output function by contact panel 6031 and display floater 6041 be integrated.
Mobile phone may also include at least one sensor 605, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light
Light and shade adjusting the brightness of display floater 6041, proximity transducer can close display floater when mobile phone is moved in one's ear
6041 and/or backlight.Used as one kind of motion sensor, (generally three axles) add in the detectable all directions of accelerometer sensor
The size of speed, can detect that size and the direction of gravity when static, can be used to recognize application (the such as horizontal/vertical screen of mobile phone attitude
Switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;As for mobile phone also
The other sensors such as configurable gyroscope, barometer, hygrometer, thermometer, infrared ray sensor, will not be described here.
Voicefrequency circuit 606, loudspeaker 6061, microphone 6062 can provide the COBBAIF between user and mobile phone.Audio frequency
Electric signal after the voice data for receiving conversion can be transferred to loudspeaker 6061 by circuit 606, be converted to by loudspeaker 6061
Voice signal is exported;On the other hand, the voice signal of collection is converted to electric signal by microphone 6062, is connect by voicefrequency circuit 606
Voice data is converted to after receipts, then after voice data output processor 608 is processed, Jing RF circuits 601 are such as another to be sent to
One mobile phone, or voice data is exported to memory 602 so as to further process.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transmitting-receiving electricity by wireless communication module 607
Sub- mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and has accessed.
Processor 608 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone, is led to
Cross operation or perform the software program and/or module that are stored in memory 602, and call and be stored in memory 602
Data, perform the various functions and processing data of mobile phone, so as to carry out integral monitoring to mobile phone.Optionally, processor 608 can be wrapped
Include one or more processing units;Preferably, processor 608 can integrated application processor and modem processor, wherein, should
Operating system, user interface and application program etc. are mainly processed with processor, modem processor mainly processes radio communication.
It is understood that above-mentioned modem processor can not also be integrated into processor 608.
Mobile phone also includes the power supply 609 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe
Reason system is logically contiguous with processor 608, so as to realize management charging, electric discharge and power managed by power-supply management system
Etc. function.
Although not shown, mobile phone can also include camera, bluetooth module etc., will not be described here.
In the terminal device described by Fig. 6, the wireless communication module described by Fig. 5 can be configured, so as to by script
What reason device was performed is transferred to wireless communication module execution to the work that data are encrypted, and reduces the computational burden of processor.
Fig. 7 is referred to, Fig. 7 is the schematic flow sheet of another data processing method disclosed in the embodiment of the present invention.Wherein,
Method shown in Fig. 7 may comprise steps of:
701st, terminal device is received using the packet of public key encryption.
In the embodiment of the present invention, terminal device receives the number after the encryption that target access is sent as data receiver
According to bag, it is decrypted using private cipher key pair packet corresponding with key disclosed above, to obtain correct data content.
If lawless person obtains the packet after above-mentioned encryption, it is decrypted using the data key bag of mistake, then
Content after decryption is mess code, it is impossible to correct data content is obtained, so as to play a part of to prevent data to be stolen.
702nd, the wireless communication module of the terminal device obtains private cipher key corresponding with the public-key cryptography.
Used as a kind of optional embodiment, above-mentioned terminal device (data receiver) passes through target access access network
Network, target access generates a pair of secret keys using asymmetric encryption mode:Public-key cryptography and private cipher key, afterwards by public-key cryptography
Data sender is sent to encryption data bag, private cipher key is sent into this terminal device as data receiver.
703rd, the wireless communication module is decrypted using packet described in the private cipher key pair.
In the embodiment of the present invention, wireless communication module is entered using private cipher key pair packet corresponding with key disclosed above
Row decryption, to obtain correct data content.
As can be seen here, using the method described by Fig. 7, can be by the computing device of script terminal device, to receiving
The work that is decrypted of packet be transferred to wireless communication module and carry out, reduce the computational burden of processor.
Fig. 8 is referred to, Fig. 8 is a kind of interaction diagrams for being encrypted to data, decrypting disclosed in the embodiment of the present invention.
In the embodiment of the present invention, using target access, the wireless communication module A of data sender and the radio communication of data receiver
Module B sets up data encryption, decryption mechanisms jointly.Wherein, connect by above-mentioned target as the terminal device of data receiver
Access point access network.
In the embodiment of the present invention, target access generates a pair of secret keys according to asymmetric-key encryption algorithm:Public-key cryptography
And private cipher key, then public-key cryptography is sent into data sender, private cipher key is sent into data receiver;Data is activation
The wireless communication module A of side obtains the disclosure key and is preserved;It is privately owned that the wireless communication module B of data receiver obtains this
Key is simultaneously preserved;Wireless communication module A parses the first packet waiting for transmission to obtain the IP address of data receiver, it
Afterwards data receiver is determined for the terminal device in the subnet of target access foundation according to above-mentioned IP address;Wireless communication module
Second packet is sent to target and is connect by A using key encrypted primary data bag disclosed above to obtain the second packet, afterwards
Access point;Second packet is transmitted to data receiver by target access;The wireless communication module B of data receiver obtain with it is upper
The corresponding private cipher key of public-key cryptography is stated, is decrypted to obtain in correct data using the packet of private cipher key pair second
Hold.
As can be seen here, in the scene described by Fig. 8, the computing device of script terminal device, packet is carried out
The work encrypt, decrypted is transferred to wireless communication module to be carried out, and can reduce the computational burden of processor.
It should be noted that in wireless communication module and terminal device embodiment, included unit simply according to
What function logic was divided, but above-mentioned division is not limited to, as long as corresponding function can be realized;In addition, each
The specific name of functional unit is also only to facilitate mutually differentiation, is not limited to protection scope of the present invention.
In addition, one of ordinary skill in the art will appreciate that realizing all or part of step in above-mentioned each method embodiment
The hardware that program be can be by instruct correlation is completed, and corresponding program can be stored in a kind of computer-readable recording medium
In, storage medium mentioned above can be read-only storage, disk or CD etc..
The present invention preferably specific embodiment is these are only, but protection scope of the present invention is not limited thereto, it is any
Those familiar with the art the change that can readily occur in or replaces in the technical scope that the embodiment of the present invention is disclosed
Change, all should be included within the scope of the present invention.Therefore, protection scope of the present invention should be with the protection model of claim
Enclose and be defined.
Claims (14)
1. a kind of data processing method, it is characterised in that include:
The wireless communication module of terminal device obtains the public-key cryptography of target access;
The wireless communication module is encrypted to obtain the second number using the public-key cryptography to the first packet waiting for transmission
According to bag;
Second packet is transmitted process by the wireless communication module.
2. method according to claim 1, it is characterised in that the wireless communication module is using the public-key cryptography to be passed
Before the first defeated packet is encrypted to obtain the second packet, methods described also includes:
The wireless communication module parses first packet to obtain the internet protocol address of data receiver;
The wireless communication module determines that the data receiver connects for the target according to the IP address of the data receiver
Terminal device in the subnet that access point is set up;
Second packet is transmitted process by the wireless communication module, including:
The wireless communication module sends second packet to the target access, so that the target access is sharp
With the corresponding private cipher key of the public-key cryptography decrypt second packet and by decryption after second packet send
To the data receiver.
3. method according to claim 2, it is characterised in that the wireless communication module of the terminal device obtains target and accesses
After the public-key cryptography of point, methods described also includes:
The wireless communication module to the target access sends request message, to obtain the son that the target access is set up
The subnet IP of net;
The wireless communication module determines that the data receiver connects for the target according to the IP address of the data receiver
Terminal device in the subnet that access point is set up, including:
The IP address of the data receiver is calculated according to default subnet mask, is connect with obtaining the data receiver
The subnet IP of the subnet for entering;
Checking the subnet IP of the subnet that the subnet IP of the subnet that the target access is set up is accessed with the data receiver is
It is no consistent, to determine that whether the data access side is the terminal device in the subnet that the target access is set up.
4. according to Claims 2 or 3 methods described, it is characterised in that the public-key cryptography and the corresponding private of the public-key cryptography
There is key once to be updated every default time interval.
5. according to any one methods described in claims 1 to 3, it is characterised in that the wireless communication module is using described
Before public-key cryptography is encrypted to obtain the second packet to the first packet waiting for transmission, methods described also includes:
The wireless communication module carries out keyword extraction to first packet, to determine first packet in include
Account number cipher information.
6. a kind of data processing method, it is characterised in that include:
Terminal device is received using the packet of public key encryption;
The wireless communication module of the terminal device obtains private cipher key corresponding with the public-key cryptography;
The wireless communication module is decrypted using packet described in the private cipher key pair.
7. a kind of data processing equipment, it is characterised in that include:
Acquiring unit, for obtaining the public-key cryptography of target access;
Ciphering unit, for being encrypted to obtain the second data to the first packet waiting for transmission using the public-key cryptography
Bag;
First transmitting element, for second packet to be transmitted into process.
8. device according to claim 7, it is characterised in that described device also includes:
Resolution unit, for parsing first packet to obtain the internet protocol address of data receiver;
Determining unit, for determining that the data receiver is the target access according to the IP address of the data receiver
Terminal device in the subnet of foundation;
First transmitting element, specifically for second packet is sent to the target access, so that the mesh
Tag splice access point using the corresponding private cipher key of the public-key cryptography decrypt second packet and by decryption after described second
Packet is sent to the data receiver.
9. device according to claim 8, it is characterised in that described device also includes:
Second transmitting element, for sending request message to the target access, to obtain what the target access was set up
The subnet IP of subnet;
The determining unit, including:
Computation subunit, for being calculated the IP address of the data receiver according to default subnet mask, to obtain
The subnet IP of the subnet that the data receiver accesses;
Verification subelement, for checking what the subnet IP of the subnet that the target access is set up and the data receiver accessed
Whether the subnet IP of subnet is consistent, to determine that whether the data access side is the end in the subnet that the target access is set up
End equipment.
10. device according to claim 8 or claim 9, it is characterised in that the public-key cryptography and the public-key cryptography are corresponding
Private cipher key is once updated every default time interval.
11. devices according to any one in claim 7~9, it is characterised in that described device also includes:
Extraction unit, for carrying out keyword extraction to first packet, to determine first packet in include account
Number encrypted message.
A kind of 12. terminal devices, including processor and memory, it is characterised in that including wireless communication module;
Wherein, the wireless communication module is used to perform the method as described in claim 1 to any one of claim 5.
A kind of 13. terminal devices, including processor and memory, it is characterised in that including wireless communication module;
Wherein, the wireless communication module is used to perform method as claimed in claim 6.
14. a kind of electronic equipment, including:Application processor and wireless communication module, the application processor and the channel radio
Communicably connect between letter module, it is characterised in that
The wireless communication module has the function being independently encrypted to electronic equipment data waiting for transmission;Or,
With the function being independently decrypted to the data that the electronic equipment is received.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611271123.4A CN106657122A (en) | 2016-12-30 | 2016-12-30 | Data processing method and device as well as terminal device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611271123.4A CN106657122A (en) | 2016-12-30 | 2016-12-30 | Data processing method and device as well as terminal device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106657122A true CN106657122A (en) | 2017-05-10 |
Family
ID=58838408
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611271123.4A Pending CN106657122A (en) | 2016-12-30 | 2016-12-30 | Data processing method and device as well as terminal device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106657122A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020147139A1 (en) * | 2019-01-16 | 2020-07-23 | 展讯通信(上海)有限公司 | Wireless roaming method, access point apparatus, and mobile station |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101159729A (en) * | 2007-09-05 | 2008-04-09 | 杭州华三通信技术有限公司 | Method and device for fast processing packet |
CN101420792A (en) * | 2007-10-23 | 2009-04-29 | 华为技术有限公司 | Gateway anchor point distributing method, network side device and user terminal |
CN104955044A (en) * | 2015-05-29 | 2015-09-30 | 北京奇虎科技有限公司 | Target network access method and target network access guiding method thereof and corresponding terminal |
CN105007163A (en) * | 2015-07-15 | 2015-10-28 | 普联技术有限公司 | Pre-shared key (PSK) transmitting and acquiring methods and transmitting and acquiring devices |
CN105025472A (en) * | 2014-04-25 | 2015-11-04 | Tcl集团股份有限公司 | Method and system for encrypting, hiding and discovering of WIFI access point |
-
2016
- 2016-12-30 CN CN201611271123.4A patent/CN106657122A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101159729A (en) * | 2007-09-05 | 2008-04-09 | 杭州华三通信技术有限公司 | Method and device for fast processing packet |
CN101420792A (en) * | 2007-10-23 | 2009-04-29 | 华为技术有限公司 | Gateway anchor point distributing method, network side device and user terminal |
CN105025472A (en) * | 2014-04-25 | 2015-11-04 | Tcl集团股份有限公司 | Method and system for encrypting, hiding and discovering of WIFI access point |
CN104955044A (en) * | 2015-05-29 | 2015-09-30 | 北京奇虎科技有限公司 | Target network access method and target network access guiding method thereof and corresponding terminal |
CN105007163A (en) * | 2015-07-15 | 2015-10-28 | 普联技术有限公司 | Pre-shared key (PSK) transmitting and acquiring methods and transmitting and acquiring devices |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020147139A1 (en) * | 2019-01-16 | 2020-07-23 | 展讯通信(上海)有限公司 | Wireless roaming method, access point apparatus, and mobile station |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109257740B (en) | Profile downloading method, mobile terminal and readable storage medium | |
CN104580167B (en) | A kind of methods, devices and systems transmitting data | |
CN104836664B (en) | A kind of methods, devices and systems executing business processing | |
EP3200487B1 (en) | Message processing method and apparatus | |
CN104683301B (en) | Password storage method and device | |
CN104967601A (en) | Data processing method and apparatus | |
CN106550361B (en) | Data transmission method, equipment and computer readable storage medium | |
US10454905B2 (en) | Method and apparatus for encrypting and decrypting picture, and device | |
CN109905380A (en) | Node control method and relevant apparatus in a kind of distributed system | |
CN107145794A (en) | A kind of data processing method and device and mobile terminal | |
CN104954126A (en) | Sensitive operation verification method, device and system | |
CN107154935A (en) | service request method and device | |
CN104901806B (en) | A kind of virtual resource processing method, device and system | |
CN106341809A (en) | Data transmission method and apparatus | |
CN107590397A (en) | A kind of method and apparatus for showing embedded webpage | |
CN106709282A (en) | Resource file decryption method and device | |
CN106658354A (en) | Data transmission method and equipment | |
CN106685948A (en) | Data processing method, terminal, communication device and data processing system | |
CN114553612B (en) | Data encryption and decryption method and device, storage medium and electronic equipment | |
CN104639394B (en) | Statistical method, the device and system of client number of users | |
CN113238868A (en) | Task processing method, device, server, equipment, system and storage medium | |
CN116541865A (en) | Password input method, device, equipment and storage medium based on data security | |
CN106303085B (en) | Mobile terminal and method and device for secure call | |
CN109525666A (en) | A kind of data back up method and mobile terminal | |
CN106658360A (en) | Data transmission method and data transmission device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170510 |