CN106657122A - Data processing method and device as well as terminal device - Google Patents

Data processing method and device as well as terminal device Download PDF

Info

Publication number
CN106657122A
CN106657122A CN201611271123.4A CN201611271123A CN106657122A CN 106657122 A CN106657122 A CN 106657122A CN 201611271123 A CN201611271123 A CN 201611271123A CN 106657122 A CN106657122 A CN 106657122A
Authority
CN
China
Prior art keywords
packet
communication module
wireless communication
subnet
public
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611271123.4A
Other languages
Chinese (zh)
Inventor
白剑
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201611271123.4A priority Critical patent/CN106657122A/en
Publication of CN106657122A publication Critical patent/CN106657122A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Embodiments of the invention relate to the technical field of communication and disclose a data processing method and device as well as terminal device. The method comprises the following steps that a wireless communication module of the terminal device obtains a public key of a target access point; the wireless communication module utilizes the public key to encrypt a to-be-transmitted first data packet to obtain a second data packet; and the wireless communication module carries out transmission processing on the second data packet. Through implementation of the embodiments of the invention, the work which is originally executed by a processor of the terminal device is transferred to the wireless communication module, so that the computational load of the processor is reduced.

Description

Data processing method, device and terminal device
Technical field
The present invention relates to communication technical field, more particularly to a kind of data processing method, device and terminal device.
Background technology
It is widely available with wireless network, people can whenever and wherever possible access network being entertained, be handled official business and be exchanged It is that the life of people brings great convenience Deng activity.However, the easy access of network and high popularity rate also bring it is increasingly tight The problem of data safety of weight.
The data that user is sent by wireless network, it is easy to stolen by lawless person during transmission.For example, it is pseudo- Dress up data receiver and obtain the data that user sends.Therefore, leaking data is caused in order to prevent the data for sending to be stolen, it is right Data are encrypted becomes especially necessary.
Terminal device is entered using CPU (Central Processing Unit, central processing unit) to sent packet Row encryption.On the one hand, CPU is in addition to performing the operation of Data Packet Encryption, in addition it is also necessary to carry out hardware resource management, media information The operation such as process;On the other hand and, terminal device carries out that data interaction is very frequent with the external world, therefore the data packet number of transmission It is more;Therefore, carrying out Data Packet Encryption using CPU can greatly increase the computational burden of CPU.
The content of the invention
A kind of data processing method, device and terminal device are embodiments provided, can be by script terminal device Computing device, the work that the data to sending are encrypted is transferred to wireless communication module to be carried out, and reduces processor Computational burden.
Embodiment of the present invention first aspect discloses a kind of data processing method, including:
The wireless communication module of terminal device obtains the public-key cryptography of target access;
The wireless communication module is encrypted to obtain using the public-key cryptography to the first packet waiting for transmission Two packets;
Second packet is transmitted process by the wireless communication module.
Used as a kind of optional embodiment, the wireless communication module is using the public-key cryptography to waiting for transmission first Before packet is encrypted to obtain the second packet, methods described also includes:
The wireless communication module parses first packet to obtain the internet protocol address of data receiver;
The wireless communication module determines that the data receiver is the mesh according to the IP address of the data receiver Terminal device in the subnet that tag splice access point is set up;
Second packet is transmitted process by the wireless communication module, including:
The wireless communication module sends second packet to the target access, so that the target is accessed Point using the corresponding private cipher key of the public-key cryptography decrypt second packet and by decryption after second packet Send to the data receiver.
Used as a kind of optional embodiment, the wireless communication module of the terminal device obtains the disclosure of target access After key, methods described also includes:
The wireless communication module to the target access sends request message, is set up with obtaining the target access Subnet subnet IP;
The wireless communication module determines that the data receiver is the mesh according to the IP address of the data receiver Terminal device in the subnet that tag splice access point is set up, including:
The IP address of the data receiver is calculated according to default subnet mask, to obtain the data receiver The subnet IP of the subnet that side accesses;
Check the subnet of the subnet that the subnet IP of the subnet that the target access is set up is accessed with the data receiver Whether IP is consistent, to determine that whether the data access side is the terminal device in the subnet that the target access is set up.
Used as a kind of optional embodiment, the public-key cryptography and the corresponding private cipher key of the public-key cryptography are every pre- If time interval once updated.
Used as a kind of optional embodiment, the wireless communication module is using the public-key cryptography to waiting for transmission first Before packet is encrypted to obtain the second packet, methods described also includes:
The wireless communication module carries out keyword extraction to first packet, to determine first packet in Comprising account number cipher information.
Embodiment of the present invention second aspect discloses a kind of data processing method, including:
Terminal device is received using the packet of public key encryption;
The wireless communication module of the terminal device obtains private cipher key corresponding with the public-key cryptography;
The wireless communication module is decrypted using packet described in the private cipher key pair.
The embodiment of the present invention third aspect discloses a kind of data processing equipment, including:
Acquiring unit, for obtaining the public-key cryptography of target access;
Ciphering unit, for being encrypted to obtain the second number to the first packet waiting for transmission using the public-key cryptography According to bag;
First transmitting element, for second packet to be transmitted into process.
Used as a kind of optional embodiment, described device also includes:
Resolution unit, for parsing first packet to obtain the internet protocol address of data receiver;
Determining unit, for determining that the data receiver connects for the target according to the IP address of the data receiver Terminal device in the subnet that access point is set up;
First transmitting element, specifically for second packet is sent to the target access, so that institute State target access and decrypt second packet and by described in after decryption using the corresponding private cipher key of the public-key cryptography Second packet is sent to the data receiver.
Used as a kind of optional embodiment, described device also includes:
Second transmitting element, for sending request message to the target access, is built with obtaining the target access The subnet IP of vertical subnet;
The determining unit, including:
Computation subunit, for being calculated the IP address of the data receiver according to default subnet mask, with Obtain the subnet IP of the subnet that the data receiver accesses;
Verification subelement, the subnet IP for checking the subnet that the target access is set up connects with the data receiver Whether the subnet IP of the subnet for entering is consistent, to determine whether the data access side is in the subnet that the target access is set up Terminal device.
Used as a kind of optional embodiment, the public-key cryptography and the corresponding private cipher key of the public-key cryptography are every pre- If time interval once updated.
Used as a kind of optional embodiment, described device also includes:
Extraction unit, for carrying out keyword extraction to first packet, to determine first packet in wrap Information containing account number cipher.
Embodiment of the present invention fourth aspect discloses a kind of terminal device, including processor and memory, including channel radio Letter module;
Wherein, the wireless communication module is used to perform the method disclosed in above-mentioned first aspect.
The aspect of the embodiment of the present invention the 5th discloses a kind of terminal device, including processor and memory, including channel radio Letter module;
Wherein, the wireless communication module is used to perform the method disclosed in above-mentioned second aspect.
The aspect of the embodiment of the present invention the 6th discloses a kind of electronic equipment, including:Application processor and wireless communication module, Communicably connect between the application processor and the wireless communication module, the wireless communication module has independent The function that ground is encrypted to electronic equipment data waiting for transmission;Or, with independently to electronic equipment reception The function that is decrypted of data.
As can be seen from the above technical solutions, the embodiment of the present invention has advantages below:
In the embodiment of the present invention, the wireless communication module of terminal device obtains the public-key cryptography of target access;The nothing Line communication module is encrypted to obtain the second packet using the public-key cryptography to the first packet waiting for transmission;The nothing Second packet is transmitted process by line communication module.Implement the embodiment of the present invention, can be by script terminal device Computing device, the work that the data to sending are encrypted is transferred to wireless communication module to be carried out, and reduces the fortune of processor Calculate burden.
Description of the drawings
Technical scheme in order to be illustrated more clearly that the embodiment of the present invention, below will be to making needed for embodiment description Accompanying drawing is briefly introduced, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for this For the those of ordinary skill in field, without having to pay creative labor, can be obtaining it according to these accompanying drawings His accompanying drawing.
Fig. 1 is a kind of schematic flow sheet of data processing method disclosed in the embodiment of the present invention;
Fig. 2 is the schematic flow sheet of another kind of data processing method disclosed in the embodiment of the present invention;
Fig. 2A is the schematic flow sheet that a kind of wireless communication module disclosed in the embodiment of the present invention is interacted with target access;
Fig. 3 is a kind of structural representation of data processing equipment 300 disclosed in the embodiment of the present invention;
Fig. 4 is the structural representation of another kind of data processing equipment 400 disclosed in the embodiment of the present invention;
Fig. 4 A are a kind of structural representation of determining unit 306 disclosed in the embodiment of the present invention;
Fig. 5 is a kind of structural representation of wireless communication module 500 disclosed in the embodiment of the present invention;
Fig. 6 is a kind of structural representation of terminal device 600 disclosed in the embodiment of the present invention;
Fig. 7 is the schematic flow sheet of another data processing method disclosed in the embodiment of the present invention;
Fig. 8 is a kind of interaction diagrams for being encrypted to data, decrypting disclosed in the embodiment of the present invention.
Specific embodiment
In order that the object, technical solutions and advantages of the present invention are clearer, below in conjunction with accompanying drawing the present invention is made into One step ground is described in detail, it is clear that described embodiment is only present invention some embodiments, rather than the enforcement of whole Example.Based on the embodiment in the present invention, what those of ordinary skill in the art were obtained under the premise of creative work is not made All other embodiment, belongs to the scope of protection of the invention.
Term " first ", " second " in description and claims of this specification and above-mentioned accompanying drawing etc. are for distinguishing Different objects, rather than for describing particular order.Additionally, term " comprising " and " having " and their any deformations, meaning Figure is to cover non-exclusive including.For example contain process, method, system, product or the equipment of series of steps or unit The step of listing or unit are not limited to, but alternatively also include the step of not listing or unit, or alternatively also Including other steps or unit intrinsic for these processes, method or equipment.
A kind of data processing method, device and terminal device are embodiments provided, can be by script terminal device Computing device, the work that the data to sending are encrypted is transferred to wireless communication module to be carried out, and reduces processor Computational burden.It is described in detail individually below.
Fig. 1 is referred to, Fig. 1 is a kind of schematic flow sheet of data processing method disclosed in the embodiment of the present invention.Wherein, scheme Method shown in 1 may comprise steps of:
101st, the wireless communication module of terminal device obtains the public-key cryptography of target access.
In the embodiment of the present invention, above-mentioned terminal device can for operation Android operation system, iOS operating systems, The terminal device of Windows operating system or other operating systems, such as mobile phone, removable computer, panel computer, desktop Brain, personal digital assistant (Personal Digital Assistant, PDA), intelligent watch, intelligent glasses, Intelligent bracelet etc. Terminal device, the embodiment of the present invention is not subsequently repeated.
In the embodiment of the present invention, it is possible to use the mode of unsymmetrical key is encrypted to the data that terminal device sends. Asymmetric-key encryption algorithm needs two keys:Public-key cryptography (Public Key) and private cipher key (Private Key).It is public Open key to exist in pairs with private cipher key, if be encrypted data with public-key cryptography, only with corresponding private cipher key Can decryption;If be encrypted with private cipher key pair data, then only could be decrypted with corresponding public-key cryptography.Because encryption Two different keys are used with decryption, so this algorithm is referred to as asymmetric-key encryption algorithm.
Asymmetric-key encryption algorithm realizes that the basic process that confidential information is exchanged is:Party A is (in embodiments of the present invention, Can be target access) generate a pair of secret keys and disclose therein one to other data interaction sides as public-key cryptography; Obtain Party B's (in embodiments of the present invention, can be terminal device) of the disclosure key is carried out using the key to confidential information Party A is then forwarded to after encryption;Party A is decrypted again with the information after the corresponding private cipher key pair encryption for oneself preserving.
In addition, the mode of symmetric key can also be utilized in the embodiment of the present invention to carry out above-mentioned encryption, decryption processing. Symmetric key encryption is called private key encryption, that is, send and receive the both sides of data carries out adding using identical key to plaintext Close and decryption computing.
In the embodiment of the present invention, wireless communication module can receive the public-key cryptography of target access transmission;In addition, Key disclosed above can also be previously stored in the terminal device, and wireless communication module is referred to by sending request to memory Order, to obtain key disclosed above.
102nd, wireless communication module is encrypted to obtain using key disclosed above to the first packet waiting for transmission Two packets.
In the embodiment of the present invention, wireless communication module can carry out selective encryption to the packet that needs send, Compared with all packets are encrypted, carrying out selective encryption can reduce the power consumption of wireless communication module.
Used as a kind of optional embodiment, wireless communication module carries out keyword extraction to above-mentioned first packet, with Determine and include in above-mentioned first packet account number cipher information.If account number cipher information is included in the first packet, to first Packet is encrypted to obtain the second packet.
103rd, above-mentioned second packet is transmitted process by wireless communication module.
In the embodiment of the present invention, wireless communication module sends above-mentioned second packet to above-mentioned target access, target After access point is decrypted using the packet of private cipher key pair second corresponding with key disclosed above, by decryption after second number Data receiver is transmitted to according to bag.In this way, " camouflage " is even if access point is taken as above-mentioned target access, terminal to set It is standby the second packet to be sent to above-mentioned " camouflage " access point, because the second packet is encrypted by unsymmetrical key, Thus the second packet that cannot be received by " camouflage " access point of lawless person steals the information of user.
As can be seen here, using the method described by Fig. 1, can be by the computing device of script terminal device, to sending The work that is encrypted of data be transferred to wireless communication module and carry out, reduce the computational burden of processor.
Fig. 2 is referred to, Fig. 2 is the schematic flow sheet of another kind of data processing method disclosed in the embodiment of the present invention.Such as Fig. 2 Shown, the method may comprise steps of:
201st, the wireless communication module of terminal device receives the public-key cryptography that target access sends.
In the embodiment of the present invention, the data that terminal device sends are encrypted using the mode of unsymmetrical key.It is non-right Secret key cryptographic algorithm is claimed to need two keys:Public-key cryptography (Public Key) and private cipher key (Private Key).Disclose close Key exists in pairs with private cipher key, if be encrypted to data with public-key cryptography, only could be solved with corresponding private cipher key It is close;If be encrypted with private cipher key pair data, then only could be decrypted with corresponding public-key cryptography.Because encryption is conciliate It is close to use two different keys, so this algorithm is referred to as asymmetric-key encryption algorithm.
Asymmetric-key encryption algorithm realizes that the basic process that confidential information is exchanged is:Party A is (in embodiments of the present invention, Can be target access) generate a pair of secret keys and disclose therein one to other data interaction sides as public-key cryptography; Obtain Party B's (in embodiments of the present invention, can be terminal device) of the disclosure key is carried out using the key to confidential information Party A is then forwarded to after encryption;Party A is decrypted again with the information after the corresponding private cipher key pair encryption for oneself preserving.
202nd, wireless communication module parses the first packet waiting for transmission to obtain the Internet protocol IP of data receiver Address.
203rd, wireless communication module determines that above-mentioned data receiver is above-mentioned mesh according to the IP address of above-mentioned data receiver Terminal device in the subnet that tag splice access point is set up.
Used as a kind of optional embodiment, it is upper that the embodiment of the present invention is determined as follows above-mentioned data receiver State the terminal device in the subnet of target access foundation:
Wireless communication module to above-mentioned target access sends request message, to obtain the son that above-mentioned target access is set up The subnet IP of net;The IP address of above-mentioned data receiver is calculated according to default subnet mask, to obtain above-mentioned data The subnet IP of the subnet that recipient accesses;Check the subnet IP and above-mentioned data receiver of the subnet that above-mentioned target access is set up The subnet IP of the subnet of access is consistent, to determine that above-mentioned data access side is the terminal in the subnet that above-mentioned target access is set up Equipment.
204th, wireless communication module is encrypted to obtain the second number using key disclosed above to above-mentioned first packet According to bag.
End in the embodiment of the present invention, in the subnet that wireless communication module determines data receiver to be set up for target access After end equipment, the key disclosed above provided using target access is encrypted to the first packet.
205th, wireless communication module sends above-mentioned second packet to above-mentioned target access.
Wireless communication module sends above-mentioned second packet to above-mentioned target access, so that above-mentioned target access is sharp With the corresponding private cipher key of above-mentioned public-key cryptography decrypt above-mentioned second packet and by decryption after above-mentioned second packet send To above-mentioned data receiver.
Used as a kind of optional embodiment, key disclosed above and the corresponding private cipher key of key disclosed above are every pre- If time interval once updated, strengthened with the security to key, after preventing packet to be stolen utilize history Key is cracked.
Fig. 2A is referred to, Fig. 2A connects for a kind of wireless communication module of terminal device disclosed in the embodiment of the present invention with target The schematic flow sheet of access point interaction.As shown in Figure 2 A, target access generates a pair of secret keys according to asymmetric-key encryption algorithm: Public-key cryptography and private cipher key, are then sent to terminal device by public-key cryptography;The wireless communication module of terminal device is obtained should Public-key cryptography is simultaneously preserved;Wireless communication module obtains the first packet that the application processor transmission of terminal device comes, it Parse above-mentioned first packet afterwards to obtain the IP address of data receiver;Wireless communication module determines number according to above-mentioned IP address It is the terminal device in the subnet that target access is set up according to recipient, afterwards using above-mentioned first number of key disclosed above encryption According to bag obtaining the second packet;Wireless communication module sends the second packet to target access;Target access is received To after the second packet, be decrypted using the packet of above-mentioned private cipher key pair second, and by decryption after the second packet send out Give data receiver.
As can be seen here, using the method described by Fig. 2, can be by the computing device of script terminal device, to sending The work that is encrypted of data be transferred to wireless communication module and carry out, reduce the computational burden of processor.
Fig. 3 is referred to, Fig. 3 is a kind of structural representation of data processing equipment 300 disclosed in the embodiment of the present invention.As schemed Shown in 3, the device can include:
Acquiring unit 301, for obtaining the public-key cryptography of target access.
Ciphering unit 302, for being encrypted to obtain to the first packet waiting for transmission using key disclosed above Two packets.
First transmitting element 303, for above-mentioned second packet to be sent to above-mentioned target access.
As can be seen here, using the device described by Fig. 3, can be by the computing device of script terminal device, to sending The work that is encrypted of data be transferred to wireless communication module and carry out, reduce the computational burden of processor.
Fig. 4 is seen also, Fig. 4 is the structural representation of another kind of data processing equipment 400 disclosed in the embodiment of the present invention Figure.Wherein, the device shown in Fig. 4 is that device as shown in Figure 3 is optimized what is obtained, compared with the device shown in Fig. 3, Fig. 4 Shown device also includes:
Resolution unit 304, for parsing above-mentioned first packet to obtain the internet protocol address of data receiver.
Determining unit 305, for determining that above-mentioned data receiver is above-mentioned mesh according to the IP address of above-mentioned data receiver Terminal device in the subnet that tag splice access point is set up.
As a kind of optional embodiment, above-mentioned first transmitting element 303, specifically for above-mentioned second packet is sent out Above-mentioned target access is delivered to, so that above-mentioned target access is using key disclosed above corresponding private cipher key decryption above-mentioned the Two packets and by decryption after above-mentioned second packet send to above-mentioned data receiver.
Used as a kind of optional embodiment, the device shown in Fig. 4 also includes:
Second transmitting element 306, for sending request message to above-mentioned target access, to obtain above-mentioned target access The subnet IP of the subnet of foundation.
As shown in Figure 4 A, determining unit 305, including:Computation subunit 3051 and verification subelement 3052.
Wherein, computation subunit 3051, for being entered to the IP address of above-mentioned data receiver according to default subnet mask Row is calculated, to obtain the subnet IP of the subnet that above-mentioned data receiver accesses;Verification subelement 3052, for checking above-mentioned target The subnet IP of the subnet that access point is set up is consistent with the subnet IP of the subnet that above-mentioned data receiver accesses, to determine above-mentioned data Access side is the terminal device in the subnet that above-mentioned target access is set up.
Used as a kind of optional embodiment, the device shown in Fig. 4 also includes:
Extraction unit 307, for carrying out keyword extraction to above-mentioned first packet, to determine above-mentioned first packet in Comprising account number cipher information.
As can be seen here, using the device described by Fig. 4, can be by the computing device of script terminal device, to sending The work that is encrypted of data be transferred to wireless communication module and carry out, reduce the computational burden of processor.
Fig. 5 is referred to, Fig. 5 is a kind of structural representation of wireless communication module 500 disclosed in the embodiment of the present invention.The nothing Line communication module can be applicable to it is various need the terminal devices that communicated, for example mobile phone, removable computer, panel computer, Desktop computer, personal digital assistant (Personal Digital Assistant, PDA), intelligent watch, intelligent glasses, intelligence Bracelet etc..
As shown in figure 5, the wireless communication module includes:Processor 501 and memory 502;Wherein memory 502 can be with The caching required for data processing is performed for processor 501, the offer execution data processing of processor 501 is provided and is called Data and acquisition result data memory space.
In embodiments of the present invention, the processor 501 of wireless communication module 500 is stored in memory 502 by calling Program code, for performing following operation:
Obtain the public-key cryptography of target access;
First packet waiting for transmission is encrypted using key disclosed above obtain the second packet;
Above-mentioned second packet is transmitted into process.
Used as a kind of optional embodiment, the processor 501 of wireless communication module 500 is stored in memory by calling Program code in 502, is additionally operable to perform following operation:
Parse above-mentioned first packet to obtain the internet protocol address of data receiver;
Determine that above-mentioned data receiver is the son that above-mentioned target access is set up according to the IP address of above-mentioned data receiver Terminal device in net.
Used as a kind of optional embodiment, the processor 501 of wireless communication module 500 is stored in memory by calling Program code in 502, determines that above-mentioned data receiver is upper according to the IP address of above-mentioned data receiver in the following way State the terminal device in the subnet of target access foundation:
Request message is sent to above-mentioned target access, to obtain the subnet IP of the subnet that above-mentioned target access is set up;
The IP address of above-mentioned data receiver is calculated according to default subnet mask, to obtain above-mentioned data receiver The subnet IP of the subnet that side accesses;
Check the subnet of the subnet that the subnet IP of the subnet that above-mentioned target access is set up is accessed with above-mentioned data receiver IP is consistent, to determine that above-mentioned data access side is the terminal device in the subnet that above-mentioned target access is set up.
As can be seen here, if the wireless communication module described by terminal device configuration Fig. 5, can be by the place of script terminal device Reason device is performed, and the work that the data to sending are encrypted is transferred to wireless communication module to be carried out, and reduces the computing of processor Burden.
Fig. 6 is referred to, Fig. 6 is a kind of structural representation of terminal device 600 disclosed in the embodiment of the present invention.The terminal sets It is standby can be used as terminal device involved in the method described by above-mentioned Fig. 1 and Fig. 2.As shown in fig. 6, for convenience of description, only The part related to the embodiment of the present invention is shown, particular technique details is not disclosed, and refer to present invention method portion Point.The terminal can be to include that (Personal Digital Assistant, individual digital is helped for mobile phone, panel computer, PDA Reason), POS (Point of Sales, point-of-sale terminal), the arbitrarily terminal device such as vehicle-mounted computer, so that terminal is as mobile phone as an example:
Fig. 6 is illustrated that the block diagram of the part-structure of the mobile phone related to terminal provided in an embodiment of the present invention.With reference to figure 6, mobile phone includes:Radio frequency (Radio Frequency, RF) circuit 601, memory 602, input block 603, display unit 604, The parts such as sensor 605, voicefrequency circuit 606, wireless communication module 607, processor 608 and power supply 609.Art technology Personnel are appreciated that the handset structure illustrated in Fig. 6 does not constitute the restriction to mobile phone, can include more more or less than illustrating Part, or combine some parts, or different part arrangements.
Each component parts of mobile phone is specifically introduced with reference to Fig. 6:
RF circuits 601 can be used to receiving and sending messages or communication process in, the reception and transmission of signal, especially, by base station After downlink information is received, process to processor 608;In addition, up data is activation will be designed to base station.Generally, RF circuits 601 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..Additionally, RF circuits 601 can also be communicated by radio communication with network and other equipment. Above-mentioned radio communication can be using arbitrary communication standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution, LTE), Email, Short Message Service (Short Messaging Service, SMS) etc..
Memory 602 can be used to store software program and module, and processor 608 is stored in memory 602 by operation Software program and module, so as to perform various function application and the data processing of mobile phone.Memory 602 can mainly include Storing program area and storage data field, wherein, the application journey that storing program area can be needed for storage program area, at least one function Sequence (such as sound-playing function, image player function etc.) etc.;Storage data field can be stored and use what is created according to mobile phone Data (such as voice data, phone directory etc.) etc..Additionally, memory 602 can include high-speed random access memory, can be with Including nonvolatile memory, for example, at least one disk memory, flush memory device or other volatile solid-states Part.
Input block 603 can be used for the numeral or character information of receives input, and produce with the user of mobile phone arrange with And the key signals input that function control is relevant.Specifically, input block 603 may include that contact panel 6031 and other inputs set Standby 6032.Contact panel 6031, also referred to as touch-screen, user can be collected thereon or neighbouring touch operation (such as user makes With the operation of any suitable object such as finger, stylus or annex on contact panel 6031 or near contact panel 6031), And corresponding attachment means are driven according to formula set in advance.Optionally, contact panel 6031 may include touch detecting apparatus With two parts of touch controller.Wherein, touch detecting apparatus detect the touch orientation of user, and detect what touch operation brought Signal, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and it is changed Into contact coordinate, then processor 608 is given, and the order sent of receiving processor 608 and can be performed.Furthermore, it is possible to adopt Contact panel 6031 is realized with polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except contact panel 6031, input block 603 can also include other input equipments 6032.Specifically, other input equipments 6032 can include but One be not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc. Plant or various.
Display unit 604 can be used for show by user input information or be supplied to user information and mobile phone it is various Menu.Display unit 604 may include display floater 6041, optionally, can adopt liquid crystal display (Liquid Crystal Display, LCD), the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure Show panel 6041.Further, contact panel 6031 can cover display floater 6041, when contact panel 6031 is detected thereon Or after neighbouring touch operation, processor 608 is sent to determine the type of touch event, with preprocessor 608 according to touch The type of event provides corresponding visual output on display floater 6041.Although in figure 6, contact panel 6031 and display surface Plate 6041 be as two independent parts realizing input and the input function of mobile phone, but in some embodiments it is possible to Input that realize mobile phone and output function by contact panel 6031 and display floater 6041 be integrated.
Mobile phone may also include at least one sensor 605, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light Light and shade adjusting the brightness of display floater 6041, proximity transducer can close display floater when mobile phone is moved in one's ear 6041 and/or backlight.Used as one kind of motion sensor, (generally three axles) add in the detectable all directions of accelerometer sensor The size of speed, can detect that size and the direction of gravity when static, can be used to recognize application (the such as horizontal/vertical screen of mobile phone attitude Switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;As for mobile phone also The other sensors such as configurable gyroscope, barometer, hygrometer, thermometer, infrared ray sensor, will not be described here.
Voicefrequency circuit 606, loudspeaker 6061, microphone 6062 can provide the COBBAIF between user and mobile phone.Audio frequency Electric signal after the voice data for receiving conversion can be transferred to loudspeaker 6061 by circuit 606, be converted to by loudspeaker 6061 Voice signal is exported;On the other hand, the voice signal of collection is converted to electric signal by microphone 6062, is connect by voicefrequency circuit 606 Voice data is converted to after receipts, then after voice data output processor 608 is processed, Jing RF circuits 601 are such as another to be sent to One mobile phone, or voice data is exported to memory 602 so as to further process.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transmitting-receiving electricity by wireless communication module 607 Sub- mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and has accessed.
Processor 608 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone, is led to Cross operation or perform the software program and/or module that are stored in memory 602, and call and be stored in memory 602 Data, perform the various functions and processing data of mobile phone, so as to carry out integral monitoring to mobile phone.Optionally, processor 608 can be wrapped Include one or more processing units;Preferably, processor 608 can integrated application processor and modem processor, wherein, should Operating system, user interface and application program etc. are mainly processed with processor, modem processor mainly processes radio communication. It is understood that above-mentioned modem processor can not also be integrated into processor 608.
Mobile phone also includes the power supply 609 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe Reason system is logically contiguous with processor 608, so as to realize management charging, electric discharge and power managed by power-supply management system Etc. function.
Although not shown, mobile phone can also include camera, bluetooth module etc., will not be described here.
In the terminal device described by Fig. 6, the wireless communication module described by Fig. 5 can be configured, so as to by script What reason device was performed is transferred to wireless communication module execution to the work that data are encrypted, and reduces the computational burden of processor.
Fig. 7 is referred to, Fig. 7 is the schematic flow sheet of another data processing method disclosed in the embodiment of the present invention.Wherein, Method shown in Fig. 7 may comprise steps of:
701st, terminal device is received using the packet of public key encryption.
In the embodiment of the present invention, terminal device receives the number after the encryption that target access is sent as data receiver According to bag, it is decrypted using private cipher key pair packet corresponding with key disclosed above, to obtain correct data content.
If lawless person obtains the packet after above-mentioned encryption, it is decrypted using the data key bag of mistake, then Content after decryption is mess code, it is impossible to correct data content is obtained, so as to play a part of to prevent data to be stolen.
702nd, the wireless communication module of the terminal device obtains private cipher key corresponding with the public-key cryptography.
Used as a kind of optional embodiment, above-mentioned terminal device (data receiver) passes through target access access network Network, target access generates a pair of secret keys using asymmetric encryption mode:Public-key cryptography and private cipher key, afterwards by public-key cryptography Data sender is sent to encryption data bag, private cipher key is sent into this terminal device as data receiver.
703rd, the wireless communication module is decrypted using packet described in the private cipher key pair.
In the embodiment of the present invention, wireless communication module is entered using private cipher key pair packet corresponding with key disclosed above Row decryption, to obtain correct data content.
As can be seen here, using the method described by Fig. 7, can be by the computing device of script terminal device, to receiving The work that is decrypted of packet be transferred to wireless communication module and carry out, reduce the computational burden of processor.
Fig. 8 is referred to, Fig. 8 is a kind of interaction diagrams for being encrypted to data, decrypting disclosed in the embodiment of the present invention. In the embodiment of the present invention, using target access, the wireless communication module A of data sender and the radio communication of data receiver Module B sets up data encryption, decryption mechanisms jointly.Wherein, connect by above-mentioned target as the terminal device of data receiver Access point access network.
In the embodiment of the present invention, target access generates a pair of secret keys according to asymmetric-key encryption algorithm:Public-key cryptography And private cipher key, then public-key cryptography is sent into data sender, private cipher key is sent into data receiver;Data is activation The wireless communication module A of side obtains the disclosure key and is preserved;It is privately owned that the wireless communication module B of data receiver obtains this Key is simultaneously preserved;Wireless communication module A parses the first packet waiting for transmission to obtain the IP address of data receiver, it Afterwards data receiver is determined for the terminal device in the subnet of target access foundation according to above-mentioned IP address;Wireless communication module Second packet is sent to target and is connect by A using key encrypted primary data bag disclosed above to obtain the second packet, afterwards Access point;Second packet is transmitted to data receiver by target access;The wireless communication module B of data receiver obtain with it is upper The corresponding private cipher key of public-key cryptography is stated, is decrypted to obtain in correct data using the packet of private cipher key pair second Hold.
As can be seen here, in the scene described by Fig. 8, the computing device of script terminal device, packet is carried out The work encrypt, decrypted is transferred to wireless communication module to be carried out, and can reduce the computational burden of processor.
It should be noted that in wireless communication module and terminal device embodiment, included unit simply according to What function logic was divided, but above-mentioned division is not limited to, as long as corresponding function can be realized;In addition, each The specific name of functional unit is also only to facilitate mutually differentiation, is not limited to protection scope of the present invention.
In addition, one of ordinary skill in the art will appreciate that realizing all or part of step in above-mentioned each method embodiment The hardware that program be can be by instruct correlation is completed, and corresponding program can be stored in a kind of computer-readable recording medium In, storage medium mentioned above can be read-only storage, disk or CD etc..
The present invention preferably specific embodiment is these are only, but protection scope of the present invention is not limited thereto, it is any Those familiar with the art the change that can readily occur in or replaces in the technical scope that the embodiment of the present invention is disclosed Change, all should be included within the scope of the present invention.Therefore, protection scope of the present invention should be with the protection model of claim Enclose and be defined.

Claims (14)

1. a kind of data processing method, it is characterised in that include:
The wireless communication module of terminal device obtains the public-key cryptography of target access;
The wireless communication module is encrypted to obtain the second number using the public-key cryptography to the first packet waiting for transmission According to bag;
Second packet is transmitted process by the wireless communication module.
2. method according to claim 1, it is characterised in that the wireless communication module is using the public-key cryptography to be passed Before the first defeated packet is encrypted to obtain the second packet, methods described also includes:
The wireless communication module parses first packet to obtain the internet protocol address of data receiver;
The wireless communication module determines that the data receiver connects for the target according to the IP address of the data receiver Terminal device in the subnet that access point is set up;
Second packet is transmitted process by the wireless communication module, including:
The wireless communication module sends second packet to the target access, so that the target access is sharp With the corresponding private cipher key of the public-key cryptography decrypt second packet and by decryption after second packet send To the data receiver.
3. method according to claim 2, it is characterised in that the wireless communication module of the terminal device obtains target and accesses After the public-key cryptography of point, methods described also includes:
The wireless communication module to the target access sends request message, to obtain the son that the target access is set up The subnet IP of net;
The wireless communication module determines that the data receiver connects for the target according to the IP address of the data receiver Terminal device in the subnet that access point is set up, including:
The IP address of the data receiver is calculated according to default subnet mask, is connect with obtaining the data receiver The subnet IP of the subnet for entering;
Checking the subnet IP of the subnet that the subnet IP of the subnet that the target access is set up is accessed with the data receiver is It is no consistent, to determine that whether the data access side is the terminal device in the subnet that the target access is set up.
4. according to Claims 2 or 3 methods described, it is characterised in that the public-key cryptography and the corresponding private of the public-key cryptography There is key once to be updated every default time interval.
5. according to any one methods described in claims 1 to 3, it is characterised in that the wireless communication module is using described Before public-key cryptography is encrypted to obtain the second packet to the first packet waiting for transmission, methods described also includes:
The wireless communication module carries out keyword extraction to first packet, to determine first packet in include Account number cipher information.
6. a kind of data processing method, it is characterised in that include:
Terminal device is received using the packet of public key encryption;
The wireless communication module of the terminal device obtains private cipher key corresponding with the public-key cryptography;
The wireless communication module is decrypted using packet described in the private cipher key pair.
7. a kind of data processing equipment, it is characterised in that include:
Acquiring unit, for obtaining the public-key cryptography of target access;
Ciphering unit, for being encrypted to obtain the second data to the first packet waiting for transmission using the public-key cryptography Bag;
First transmitting element, for second packet to be transmitted into process.
8. device according to claim 7, it is characterised in that described device also includes:
Resolution unit, for parsing first packet to obtain the internet protocol address of data receiver;
Determining unit, for determining that the data receiver is the target access according to the IP address of the data receiver Terminal device in the subnet of foundation;
First transmitting element, specifically for second packet is sent to the target access, so that the mesh Tag splice access point using the corresponding private cipher key of the public-key cryptography decrypt second packet and by decryption after described second Packet is sent to the data receiver.
9. device according to claim 8, it is characterised in that described device also includes:
Second transmitting element, for sending request message to the target access, to obtain what the target access was set up The subnet IP of subnet;
The determining unit, including:
Computation subunit, for being calculated the IP address of the data receiver according to default subnet mask, to obtain The subnet IP of the subnet that the data receiver accesses;
Verification subelement, for checking what the subnet IP of the subnet that the target access is set up and the data receiver accessed Whether the subnet IP of subnet is consistent, to determine that whether the data access side is the end in the subnet that the target access is set up End equipment.
10. device according to claim 8 or claim 9, it is characterised in that the public-key cryptography and the public-key cryptography are corresponding Private cipher key is once updated every default time interval.
11. devices according to any one in claim 7~9, it is characterised in that described device also includes:
Extraction unit, for carrying out keyword extraction to first packet, to determine first packet in include account Number encrypted message.
A kind of 12. terminal devices, including processor and memory, it is characterised in that including wireless communication module;
Wherein, the wireless communication module is used to perform the method as described in claim 1 to any one of claim 5.
A kind of 13. terminal devices, including processor and memory, it is characterised in that including wireless communication module;
Wherein, the wireless communication module is used to perform method as claimed in claim 6.
14. a kind of electronic equipment, including:Application processor and wireless communication module, the application processor and the channel radio Communicably connect between letter module, it is characterised in that
The wireless communication module has the function being independently encrypted to electronic equipment data waiting for transmission;Or, With the function being independently decrypted to the data that the electronic equipment is received.
CN201611271123.4A 2016-12-30 2016-12-30 Data processing method and device as well as terminal device Pending CN106657122A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611271123.4A CN106657122A (en) 2016-12-30 2016-12-30 Data processing method and device as well as terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611271123.4A CN106657122A (en) 2016-12-30 2016-12-30 Data processing method and device as well as terminal device

Publications (1)

Publication Number Publication Date
CN106657122A true CN106657122A (en) 2017-05-10

Family

ID=58838408

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611271123.4A Pending CN106657122A (en) 2016-12-30 2016-12-30 Data processing method and device as well as terminal device

Country Status (1)

Country Link
CN (1) CN106657122A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020147139A1 (en) * 2019-01-16 2020-07-23 展讯通信(上海)有限公司 Wireless roaming method, access point apparatus, and mobile station

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101159729A (en) * 2007-09-05 2008-04-09 杭州华三通信技术有限公司 Method and device for fast processing packet
CN101420792A (en) * 2007-10-23 2009-04-29 华为技术有限公司 Gateway anchor point distributing method, network side device and user terminal
CN104955044A (en) * 2015-05-29 2015-09-30 北京奇虎科技有限公司 Target network access method and target network access guiding method thereof and corresponding terminal
CN105007163A (en) * 2015-07-15 2015-10-28 普联技术有限公司 Pre-shared key (PSK) transmitting and acquiring methods and transmitting and acquiring devices
CN105025472A (en) * 2014-04-25 2015-11-04 Tcl集团股份有限公司 Method and system for encrypting, hiding and discovering of WIFI access point

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101159729A (en) * 2007-09-05 2008-04-09 杭州华三通信技术有限公司 Method and device for fast processing packet
CN101420792A (en) * 2007-10-23 2009-04-29 华为技术有限公司 Gateway anchor point distributing method, network side device and user terminal
CN105025472A (en) * 2014-04-25 2015-11-04 Tcl集团股份有限公司 Method and system for encrypting, hiding and discovering of WIFI access point
CN104955044A (en) * 2015-05-29 2015-09-30 北京奇虎科技有限公司 Target network access method and target network access guiding method thereof and corresponding terminal
CN105007163A (en) * 2015-07-15 2015-10-28 普联技术有限公司 Pre-shared key (PSK) transmitting and acquiring methods and transmitting and acquiring devices

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020147139A1 (en) * 2019-01-16 2020-07-23 展讯通信(上海)有限公司 Wireless roaming method, access point apparatus, and mobile station

Similar Documents

Publication Publication Date Title
CN109257740B (en) Profile downloading method, mobile terminal and readable storage medium
CN104580167B (en) A kind of methods, devices and systems transmitting data
CN104836664B (en) A kind of methods, devices and systems executing business processing
EP3200487B1 (en) Message processing method and apparatus
CN104683301B (en) Password storage method and device
CN104967601A (en) Data processing method and apparatus
CN106550361B (en) Data transmission method, equipment and computer readable storage medium
US10454905B2 (en) Method and apparatus for encrypting and decrypting picture, and device
CN109905380A (en) Node control method and relevant apparatus in a kind of distributed system
CN107145794A (en) A kind of data processing method and device and mobile terminal
CN104954126A (en) Sensitive operation verification method, device and system
CN107154935A (en) service request method and device
CN104901806B (en) A kind of virtual resource processing method, device and system
CN106341809A (en) Data transmission method and apparatus
CN107590397A (en) A kind of method and apparatus for showing embedded webpage
CN106709282A (en) Resource file decryption method and device
CN106658354A (en) Data transmission method and equipment
CN106685948A (en) Data processing method, terminal, communication device and data processing system
CN114553612B (en) Data encryption and decryption method and device, storage medium and electronic equipment
CN104639394B (en) Statistical method, the device and system of client number of users
CN113238868A (en) Task processing method, device, server, equipment, system and storage medium
CN116541865A (en) Password input method, device, equipment and storage medium based on data security
CN106303085B (en) Mobile terminal and method and device for secure call
CN109525666A (en) A kind of data back up method and mobile terminal
CN106658360A (en) Data transmission method and data transmission device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170510