CN109446234A - Data processing method, device and electronic equipment - Google Patents
Data processing method, device and electronic equipment Download PDFInfo
- Publication number
- CN109446234A CN109446234A CN201811191590.5A CN201811191590A CN109446234A CN 109446234 A CN109446234 A CN 109446234A CN 201811191590 A CN201811191590 A CN 201811191590A CN 109446234 A CN109446234 A CN 109446234A
- Authority
- CN
- China
- Prior art keywords
- service identification
- electronic equipment
- encryption
- decryption
- code key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the present application discloses a kind of data processing method, device and electronic equipment.The described method includes: receiving service identification write request, the service identification is for making the electronic equipment only open business function corresponding with the service identification;The service identification that encryption whether is carried in the service identification write request detected;If detecting the service identification of encryption, the service identification of the encryption is decrypted according to the rule of setting, if successful decryption, the service identification is written to the region set in the electronic equipment;If decryption failure is forbidden carrying out service identification write-in.This method realizes by way of encrypting to service identification, it realizes after receiving service identification write request, for the service identification obtained after successful decryption, just allows to be written in electronic equipment, it is illegally rewritten to avoid the service identification of electronic equipment, service identification is caused to fail.
Description
Technical field
This application involves technical field of electronic equipment, more particularly, to a kind of data processing method, device and electronics
Equipment.
Background technique
In order to adapt to the functional requirement of different regions or different operators, carrier network can be linked into some
Operator identifier is equipped in electronic equipment, usually to meet different regions or different fortune based on the operator identifier
Seek the functional requirement of quotient.However, the operator identifier configured in electronic equipment has the risk being cracked, operator identifier is caused
It can not play the role of limitation function.
Summary of the invention
In view of the above problems, present applicant proposes a kind of data processing method, device and electronic equipments, are improved with realizing
The above problem.
In a first aspect, being applied to electronic equipment, which comprises connect this application provides a kind of data processing method
Service identification write request is received, the service identification is for making the electronic equipment only open industry corresponding with the service identification
Business function;The service identification that encryption whether is carried in the service identification write request detected;If detecting the industry of encryption
Business mark is decrypted the service identification of the encryption according to the rule of setting, if successful decryption, the service identification is write
Enter the region set into the electronic equipment;If decryption failure is forbidden carrying out service identification write-in.
Second aspect, this application provides a kind of data processing equipments, run on electronic equipment, and described device includes: number
According to communication unit, for receiving service identification write request, the service identification is only opened and institute for making the electronic equipment
State the corresponding business function of service identification;Whether data detecting unit carries for detecting in the service identification write request
There is the service identification of encryption;Decryption unit, if detecting the service identification of encryption for the data detecting unit, according to setting
The service identification of the encryption is decrypted in fixed rule, data write unit, if successful decryption is used for, by the business mark
Knowledge is written to the region set in the electronic equipment;The data write unit is forbidden carrying out industry if being also used to decrypt failure
Business mark write-in.
The third aspect, this application provides a kind of electronic equipment, including one or more processors and memory;One
Or multiple programs are stored in the memory and are configured as being executed by one or more of processors, it is one or
Multiple programs are configured to carry out above-mentioned method.
Fourth aspect, a kind of computer readable storage medium provided by the present application, in the computer readable storage medium
It is stored with program code, wherein execute above-mentioned method in said program code operation.
A kind of data processing method, device and electronic equipment provided by the present application are being received for setting the electronics
After the standby service identification write request for only opening business function corresponding with the service identification, the service identification write-in is detected
Whether the service identification of encryption is carried in request, and if in the service identification for detecting encryption, according to the rule of setting
The service identification of the encryption is decrypted, if successful decryption, the service identification is written in the electronic equipment and is set
Forbid carrying out service identification write-in if decryption failure in fixed region.To realize the side by being encrypted to service identification
Formula realizes after receiving service identification write request, for the service identification obtained after successful decryption, just allows to be written to
In electronic equipment, is illegally rewritten to avoid the service identification of electronic equipment, service identification is caused to fail.
Detailed description of the invention
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, the drawings in the following description are only some examples of the present application, for
For those skilled in the art, without creative efforts, it can also be obtained according to these attached drawings other attached
Figure.
The a kind of electronic equipment that Fig. 1 shows the application proposition is in the schematic diagram of multiple carrier networks;
Fig. 2 shows a kind of flow charts for data processing method that the application proposes;
Fig. 3 shows the flow chart of another data processing method of the application proposition;
Fig. 4 shows a kind of structural block diagram of data processing equipment of the application proposition;
Fig. 5 shows the structural block diagram that the application proposes another data processing equipment;
Fig. 6 shows the structural block diagram of a kind of electronic equipment of the application proposition;
Fig. 7 is the embodiment of the present application for saving or carrying the data processing method realized according to the embodiment of the present application
Program code storage unit.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation description.Based on the embodiment in the application, those of ordinary skill in the art institute without creative efforts
The every other embodiment obtained, shall fall in the protection scope of this application.
With the development of electronic technology and network technology, electronic equipment can support more functions.For example, intelligent hand
The electronic equipments such as machine, tablet computer can support the whole network section to be linked into mobile communications network.For another example electronic equipment can be with base
Server in the data communication function access all parts of the world of mobile communications network.
However, the rules and regulations by some areas are influenced or the need of the different operators of limited the same area
It asks, electronic equipment will limit its partial function.For example, the communication frequency that the operator of the mobile communications network of different zones is supported
Section can have any different.By taking the 4G network of movement, telecommunications and connection as an example, band limits that connection FDD-LTE is used: upper line frequency
Rate: 1755-1765MHz, downstream frequency: 1850-1860MHz;The band limits that connection TD-LTE is used: uplink and downlink frequency:
2300-2320MHz,2555-2575MHz(bands:40bands:41);The band limits that mobile TD-LTE is used: uplink and downlink
Frequency: 1880-1890MHz, 2320-2370MHz, 2575-2635MHz (bands:39bands:40bands:41);Telecommunications frequency
Section are as follows: 2370-2390MHz, 2635-2655MHz;(bands:40bands:41).
And the electronics that each operator has access to oneself institute's Operation Network in order to which respective interests usually will limit is set
It is standby to remove the network for being linked into other operators, then a service identification can be written into electronic equipment in this case, with
Just each operator is distinguished for electronic equipment.For example, as shown in Figure 1, electronic equipment 100 be in base station 99, base station 98 and
In the wireless signal coverage area that base station 97 emits, wherein base station 99 belongs to movement, and base station 98 belongs to telecommunications, and base station 97 belongs to
In connection, if the service identification is mobile operator identifier, then electronic equipment can only just access mobile runed network,
It can only be communicated by base station 99, and the network that connection or telecommunications are runed can not be accessed.For another example some regions are wanted
CA (carrier wave polymerization) ability of support, and CA is not supported in some areas.Service identification so in electronic equipment may be used for
Whether characterization current electronic device can execute CA function.For another example there is lock card demand in some areas, and other regions are not locked
Card demand, then service identification can be used for limiting whether electronic equipment allows to carry out lock card.
And the limitation of above-mentioned business function is typically based on the service identification that is written in electronic equipment to distinguish.And
Inventors have found that the service identification in electronic equipment may illegally be cracked by other people, legal service identification is caused to be tampered
For illegal service identification, cause electronic equipment that can not limit the function of electronic equipment according to legal service identification.For example, with
For smart phone, in the case where hardware supported, smart phone can multiple operators frequency range (for example, shifting above-mentioned
The frequency range of dynamic, telecommunications and connection) it is communicated, being written into characterization in the smart phone can only be led to by mobile frequency range
It can be written in the case where letter, in the smart phone and limit its service identification that can only be communicated by mobile frequency range.So
In this case, it has cracked this if someone is illegal and limits its service identification that can only be communicated by mobile frequency range,
And distort the service identification, so that the smart phone can be communicated by the network of other operators, from
And cause the smart phone that can not work based on the legal service identification initially write.
Therefore, the safety that service identification can be promoted in the application is inventors herein proposed, to guarantee more may be used
Data processing method, device and the electronic equipment according to legal service identification limitation electronic functionalities leaned on.
Present embodiments are specifically described below in conjunction with attached drawing.
Referring to Fig. 2, a kind of data processing method provided by the present application, is applied to electronic equipment, which comprises
Step S110: receive service identification write request, the service identification for make the electronic equipment only opens and
The corresponding business function of the service identification.
It should be noted that service identification can be to be written in electronic equipment in the production phase of electronic equipment.?
In this case, encryption equipment can get the service identification of current electronic equipment produced in advance, then by the business mark
It is written in electronic equipment after knowing encryption.Wherein, which can be some on production line and has setting for data processing
It is standby, or to have the server of data communication function with some equipment on production line.Wherein, encryption equipment can by USB,
The wired modes such as serial ports send service identification write request.
Step S120: the service identification that encryption whether is carried in the service identification write request detected.
As a kind of mode, format that can be specified for the configuration of encrypted service identification in this application is so as to electronics
Equipment can identify the service identification of encryption from service identification write request.For example, optionally encryption equipment can add
Specific identifier is added before and after close service identification.So in this case, electronic equipment can receive business
After identifying write request, specific identifier above-mentioned has been detected whether from the data that the service identification write request carries.
If recognizing the specific identifier, then determining to detect the business mark for carrying encryption in the service identification write request
Know.
For example, " abc " can be used as the specific identifier by encryption equipment, then the write device is generating business mark
One section of content " abc "+" service identification of encryption "+" abc " can be generated during knowing write request.So electronic equipment is being known
It is clipped in service identification write request there are two tools in the case where " abc ", then determining to detect the service identification write-in long
The service identification of encryption is carried in request.It should be noted that " abc " above-mentioned is only exemplary, not to specific
The content of identifier defines.
It is understood that equipment can there are ways to the specific marks in each ciphering process of determination for encryption
Symbol.Corresponding, electronic equipment can also there are ways to get when entrained specific in time service identification write request
Identifier.
For example, as a kind of mode, electronic equipment can in advance between encryption equipment based on the agreement negotiated in advance come
Determine the specific identifier of the service identification write request received every time.Optionally, between electronic equipment and encryption equipment
It can negotiate characteristic value using the date on the same day after Hash calculation as specific identifier.Optionally, electronic equipment with
It can negotiate characteristic value using the content of particular text after Hash calculation between encryption equipment as specific identifier.Example
Such as, the text file with same text content can be stored respectively by encrypting on equipment and electronic equipment, then encryption equipment
Which can negotiate to use base of the content in specific region in text content as Hash calculation in advance between electronic equipment
Then the content in the region is used as specific identifier by plinth after Hash calculation.
So in the case where encrypting equipment has the mode of the aforementioned specific identifier of a variety of determinations, encryption equipment can be with
It will be written in the service identification write request of generation when cipher mode collected in time ciphering process, so that electronic equipment can
In a manner of identifying and determine specific identifier used by time service identification write request.It optionally, can be in business mark
One identifier of last addition for knowing write request, which characterizes, determines specific identifier used by the service identification write request
Mode.For example, identifier " a " characteristic value using the date on the same day after Hash calculation for using of characterization can be used as special
Fixed identifier, and use identifier " b " characterization using characteristic value of the content of particular text after Hash calculation as specifically
Identifier.
Step S130: if detecting the service identification of encryption, according to the regular service identification to the encryption of setting
It is decrypted.
It is understood that equipment is encrypted during encrypting to service identification, in addition to Encryption Algorithm can be used
Outside, it also will use encryption code key.If it is secret using same set of encryption always so to encrypt equipment and electronic equipment in this case
Key may be cracked.So for the safety for further promoting encryption code key, as a kind of mode, the business mark
Know in write request and also carry key information, if the service identification for detecting encryption, according to the rule of setting to institute
State the step of the service identification of encryption is decrypted include: obtained based on the key information it is corresponding with the key information secret
Key storage region, wherein code key storage region corresponding to different key informations is different;It is obtained from the code key storage region
Decrypt code key;The service identification of encryption described in decipherment algorithm and the decryption secret key pair based on setting is decrypted.
Wherein, as a kind of mode, encrypting code key can be made of multiple portions, and each part is stored in electronics and sets
In standby different zones.For example, if code key is " a1b2c3 ", then the code key can be split as " a1 ", " b2 " by electronic equipment
And " c3 " three parts.Then the three parts are respectively stored in different regions.So when electronic equipment receives business mark
After knowing write request, the code key of part is read out from different regions in advance and then is combined.And in which way into
Row combination, electronic equipment can be determined according to the content of key information, corresponding for each electronic equipment so as to make
Service identification encrypted during can be using different cipher modes, and then further promote the safety of encryption
Property.
For example, encryption equipment, which can still be used, adds identifier in the key information that service identification write request carries
Mode come determine when time lock use encryption code key.For example, if the content of the identifier added in key information is " 3a ", that
It can determine the current part code key for needing to read storage from three storage regions, and be spelled according to " a1b2c3 " mode
It connects.And if the content of the identifier added in key information is " 3b ", is currently needed then can determine from three storage regions
The part code key of storage is read, and is spliced according to " b2a1c3 " mode.And if the identifier added in key information is interior
Holding is " 3c ", then can determine the current part code key for needing to read storage from three storage regions, and according to
" c3b2a1 " mode is spliced.Furthermore and if the content of identifier added in key information is " 2a ", then can determine current
It needs to read the part code key of storage from two storage regions, and splices according to " a1b2 " mode.
Wherein, as a kind of mode, reading priority can be respectively configured in the storage region different for three.For example,
If three storage regions are respectively/code1/text1.txt/ ,/code2/text2.txt/ and/code3/text3.txt/.
So be configured with read priority be followed successively by respectively/code1/text1.txt/ ,/code2/text2.txt/ and/
In the case where code3/text3.txt/, in the case where electronic equipment needs to read part code key from a storage region, electricity
Sub- equipment can be from/code1/text1.txt/ reading part code key, and if electronic equipment is needed from two storage region reading parts
In the case where point code key, electronic equipment can preferentially be read from/code1/text1.txt/ and/code2/text2.txt/ respectively
Part code key.It should be noted that slave storage region involved in foregoing teachings reads the complete code key that part code key refers to
A part, rather than a part of storage region.
It should be noted that having multiple portions code key in the case where only one physical storage areas of electronic equipment
In the case where, the code key of multiple part can be stored in a physical storage areas.And it is more when having in electronic equipment
In the case where a physical storage areas, multiple portions code key can be respectively stored in multiple physical storage areas.For example, in electricity
In the case that sub- equipment has memory and disk the two physical storage areas, in multiple portions code key can be respectively stored in
Deposit and disk in.For another example if electronic equipment has the case where disk and independent safety chip for having memory space
Under, multiple portions code key can be respectively stored in disk and this has in the safety chip of memory space.
As a kind of mode, a setting text file can be stored in the electronic device.In this case, optionally,
Described the step of obtaining code key storage region corresponding with the key information based on the key information includes: that acquisition is described secret
It is text filed in the setting text file that key information is characterized;It is code key storage region by this paper region recognition;It is described
The step of obtaining decryption code key from the code key storage region includes: using the text in the region this paper as decryption code key.
As a kind of mode, if the text file set as miyao.txt, and the content of key information be " line "+
" begin "+" end " (characterization reads " end " character since " begin " a character of line row), then electronics is set
It is standby to be read since " begin " character of " line " row in miyao.txt, one after reading out miyao.txt
Until " end " a character is got in direct-reading.Then using the text read out as decryption code key.
Furthermore some configuration files can inherently in some cases, be configured in the operating system of electronic equipment, for example,
The configuration file of the system program of the pre-installation of electronic equipment.These configuration files are usually more general, in same batch
Or by can all be installed in the electronic equipment of same operation system.It is so used as a kind of mode, it can be by electronic equipment
The configuration file of the system program of pre-installation is as setting text file above-mentioned, so that not having to again individually in electronics
As soon as the text file for storing a text file in equipment, and having because of the operating system itself for being the electronic equipment utilized,
Further improve the safety of decryption code key.
Certainly, in the configuration file just having using electronic equipment operating system itself as the case where setting text file
Under, equipment is encrypted during encrypting to service identification, can be inquired accordingly when time service identification of encryption is write-in
Into the electronic equipment of the operating system of that version, then from the configuration file that the operating system of the version inquired has
A configuration file is selected to make to obtain encryption code key.
Step S140: judge whether decryption succeeds.
It is understood that service identification is usually the generation that follows a certain form.For example, service identification one can be followed
It altogether include how many data, wherein included data include the character etc. of that type.For example, service identification packet can be defined
Include capitalization English character, number and small English character etc..For another example can define service identification includes English character, number
Word and escape character etc..So in this case, the text that can be obtained based on decryption as a kind of mode, electronic equipment
Data format determine whether successful decryption.So electronic equipment is after the text decrypted, by identifying that decryption obtains
The data format of text determine whether successful decryption.
Wherein, as a kind of mode, a kind of mode of the data format as flexible determining service identification, encryption equipment can
To increase an identifier in service identification write request, number used by current business mark is characterized using the identifier
According to format.The value that so can first obtain the identifier in decrypting process when electronic equipment, then according to the value of the identifier
The data format that is locally stored is got as reference, then using after decryption text and this as the data format referred into
Row compares, if data format is consistent, decides that successful decryption.
Step S150: if successful decryption, the service identification is written to the region set in the electronic equipment.
Step S160: if decryption failure, forbid carrying out service identification write-in.
A kind of data processing method provided by the present application is being received for opening the electronic equipment only and the business
After the service identification write request for identifying corresponding business function, detect whether carried in the service identification write request plus
Close service identification, and if in the service identification for detecting encryption, according to the regular business mark to the encryption of setting
Knowledge is decrypted, if successful decryption, the service identification is written to the region set in the electronic equipment, if decryption is lost
It loses, forbids carrying out service identification write-in.To realize by way of being encrypted to service identification, realizes and receiving
After service identification write request, for the service identification obtained after successful decryption, just allow to be written in electronic equipment, to avoid
The service identification of electronic equipment is illegally rewritten, and service identification is caused to fail.
Referring to Fig. 3, a kind of data processing method provided by the present application, is applied to electronic equipment, which comprises
Step S210: receive service identification write request, the service identification for make the electronic equipment only opens and
The corresponding business function of the service identification.
Step S220: the use state information of electronic equipment is obtained.
As a kind of mode, the service identification in electronic equipment can be electronic equipment production phase write-in.And
And, it is to be understood that the service identification in electronic equipment is usually the presence of the risk being cracked after factory.It so can be
After receiving service identification write request, current use state information is detected to judge electronic equipment currently whether in factory
Before, namely judge whether electronic equipment meets service identification update condition.
Step S230: judge whether the use state information meets service identification update condition.
As described in foregoing teachings, detecting the use state information whether to meet service identification update condition is to judge
Whether electronic equipment is currently also in the stage before factory.It should be noted that inventor has found that electronic equipment
Before factory, can when in use long, electricity and electronic equipment using data traffic for the use of and electronic equipment by with
There is apparent difference at family after.
Although there is test phase in long side when in use, the electronic equipment before factory, but whole use duration meeting
The use duration for shorter than dispatching from the factory later.In terms of electricity, what electricity of the electronic equipment before factory would generally keep telling somebody what one's real intentions are again
Electricity and supplement the state for being full of or being constantly in a high-order electricity.And in terms of data traffic, before factory, electronics
Equipment may be because of test needs and receiving the data for perhaps sending a part of data but receiving or sending usually all is
Lesser part, can be significantly less than the data traffic for receiving or sending in the service stage after factory.
So in this case, the service identification update condition includes at least one of the following conditions: electronics is set
Standby use duration is less than setting duration;The electricity of electronic equipment is lower than setting electricity;And the received data flow of electronic equipment
Amount is less than setting flow.
Wherein, it should be noted that if electronic equipment after just dispatching from the factory, the use state information of electronic equipment and factory
Use state information before can relatively, in turn result in electronic equipment may misidentify currently also in factory before.
It is so used as a kind of mode, whether electronic equipment can be further by detecting in electronic equipment inserted with SIM card
Multiple location informations whether are stored in (Subscriber Identification Module) or electronic equipment to come into one
Whether the verifying of the step electronic equipment has been in the state after factory.
If not satisfied, forbidding carrying out service identification write-in.
Step S240: if satisfied, the service identification for whether carrying encryption in the service identification write request detected.
Step S250: if detecting the service identification of encryption, according to the regular service identification to the encryption of setting
It is decrypted.
Step S260: judge whether decryption succeeds.
Step S270: if successful decryption, the service identification is written to the region set in the electronic equipment.
Step S280: if decryption failure, forbid carrying out service identification write-in.
A kind of data processing method provided by the present application is being received for opening the electronic equipment only and the business
After the service identification write request for identifying corresponding business function, meet business in the use state information for detecting electronic equipment
In the case where identifying update condition, the service identification that encryption whether is carried in the service identification write request is detected, and
If the service identification of the encryption is decrypted according to the rule of setting in the service identification for detecting encryption, if decryption
The service identification, is written to the region set in the electronic equipment by success, if decryption failure, forbids carrying out service identification
Write-in.To realize by way of being encrypted to service identification, realize after receiving service identification write request,
For the service identification obtained after successful decryption, just allow to be written in electronic equipment, to avoid the service identification of electronic equipment
It is illegally rewritten, service identification is caused to fail.
Referring to Fig. 4, a kind of data processing equipment 300 provided by the present application, runs on electronic equipment, described device 300
It include: data communication units 310, data detecting unit 320, decryption unit 330 and data write unit 340.
Data communication units 310, for receiving service identification write request, the service identification is for setting the electronics
It is standby only to open business function corresponding with the service identification.
Data detecting unit 320, for detecting the business mark for whether carrying encryption in the service identification write request
Know.
Decryption unit 330, if detecting the service identification of encryption for the data detecting unit, according to the rule of setting
Then the service identification of the encryption is decrypted.
Wherein, as a kind of mode, key information is also carried in the service identification write request.The decryption unit
330 include:
Storage region obtains subelement 331, corresponding with the key information secret for being obtained based on the key information
Key storage region, wherein code key storage region corresponding to different key informations is different.
Wherein, as a kind of mode, storage region obtains subelement 331, is specifically used for obtaining key information institute table
It is text filed in the setting text file of sign;It is code key storage region by this paper region recognition;
Code key reading subunit 332, for obtaining decryption code key from the code key storage region.
Code key reading subunit 332, specifically for using the text in the region this paper as decryption code key.
Subelement 333 is decrypted, the business for encryption described in decipherment algorithm and the decryption secret key pair based on setting
Mark is decrypted.
Wherein, as a kind of mode, the setting text file includes matching for the system program of the pre-installation of electronic equipment
Set file.
The service identification is written in the electronic equipment and sets if being used for successful decryption by data write unit 340
Region.
The data write unit 340 is forbidden carrying out service identification write-in if being also used to decrypt failure.
A kind of data processing equipment provided by the present application is being received for opening the electronic equipment only and the business
After the service identification write request for identifying corresponding business function, detect whether carried in the service identification write request plus
Close service identification, and if in the service identification for detecting encryption, according to the regular business mark to the encryption of setting
Knowledge is decrypted, if successful decryption, the service identification is written to the region set in the electronic equipment, if decryption is lost
It loses, forbids carrying out service identification write-in.To realize by way of being encrypted to service identification, realizes and receiving
After service identification write request, for the service identification obtained after successful decryption, just allow to be written in electronic equipment, to avoid
The service identification of electronic equipment is illegally rewritten, and service identification is caused to fail.
Referring to Fig. 5, a kind of data processing equipment 400 provided by the present application, runs on electronic equipment, described device 400
Include: data communication units 410, state information acquisition unit 420, status information judging unit 430, data write unit 440,
Data detecting unit 450 and decryption unit 460.
Data communication units 410, for receiving service identification write request, the service identification is for setting the electronics
It is standby only to open business function corresponding with the service identification.
State information acquisition unit 420, for obtaining the use state information of electronic equipment.
Status information judging unit 430, for judging whether the use state information meets service identification update condition.
As a kind of mode, the service identification update condition includes at least one of the following conditions: electronic equipment
It is less than setting duration using duration;The electricity of electronic equipment is lower than setting electricity;And the received data traffic of electronic equipment is small
In setting flow.
Data write unit 440 is if not satisfied, forbid carrying out service identification write-in.
Data detecting unit 450, for if satisfied, detecting in the service identification write request whether carry encryption
Service identification.
Decryption unit 460, if for detecting the service identification of encryption, according to the regular industry to the encryption of setting
Business mark is decrypted.
The service identification is written in the electronic equipment and sets if being used for successful decryption by data write unit 440
Region.
Data write unit 440, if forbidding carrying out service identification write-in for decrypting failure.
A kind of data processing equipment provided by the present application is being received for opening the electronic equipment only and the business
After the service identification write request for identifying corresponding business function, meet business in the use state information for detecting electronic equipment
In the case where identifying update condition, the service identification that encryption whether is carried in the service identification write request is detected, and
If the service identification of the encryption is decrypted according to the rule of setting in the service identification for detecting encryption, if decryption
The service identification, is written to the region set in the electronic equipment by success, if decryption failure, forbids carrying out service identification
Write-in.To realize by way of being encrypted to service identification, realize after receiving service identification write request,
For the service identification obtained after successful decryption, just allow to be written in electronic equipment, to avoid the service identification of electronic equipment
It is illegally rewritten, service identification is caused to fail.
It should be noted that it is apparent to those skilled in the art that, for convenience and simplicity of description, on
The device of description and the specific work process of unit are stated, can refer to corresponding processes in the foregoing method embodiment, herein no longer
It repeats.In several embodiments provided herein, the mutual coupling of module can be electrical property, mechanical or other forms
Coupling.In addition, can integrate in a processing module in each functional module in each embodiment of the application, it is also possible to
Modules physically exist alone, and can also be integrated in a module with two or more modules.Above-mentioned integrated module
Both it can take the form of hardware realization, can also have been realized in the form of software function module.
In conclusion a kind of data processing method, device and electronic equipment provided by the present application, are receiving for making
After stating the service identification write request that electronic equipment only opens business function corresponding with the service identification, the business is detected
The service identification of encryption whether is carried in mark write request, and if in the service identification for detecting encryption, according to setting
The service identification of the encryption is decrypted in fixed rule, if successful decryption, the service identification is written to the electronics
Forbid carrying out service identification write-in if decryption failure in the region set in equipment.To realize by being carried out to service identification
The mode of encryption realizes after receiving service identification write request, for the service identification obtained after successful decryption, just permits
Permitted to be written in electronic equipment, is illegally rewritten to avoid the service identification of electronic equipment, service identification is caused to fail.
A kind of electronic equipment provided by the present application is illustrated below in conjunction with Fig. 6.
Referring to Fig. 6, based on above-mentioned data processing method, device, another kind that the embodiment of the present application also provides can be with
Execute the electronic equipment 100 of aforementioned data processing method.Electronic equipment 100 include the one or more that intercouples (in figure only
Show one) processor 102, memory 104 and wireless module 106.Wherein, it is stored with and can execute in the memory 104
The program of content in previous embodiment, and processor 102 can execute the program stored in the memory 104.
Wherein, processor 102 may include one or more processing core.Processor 102 utilizes various interfaces and route
The various pieces in entire electronic equipment 100 are connected, by running or executing the instruction being stored in memory 104, program, generation
Code collection or instruction set, and the data being stored in memory 104 are called, execute the various functions and processing of electronic equipment 100
Data.Optionally, processor 102 can be using Digital Signal Processing (Digital Signal Processing, DSP), scene
Programmable gate array (Field-Programmable Gate Array, FPGA), programmable logic array (Programmable
Logic Array, PLA) at least one of example, in hardware realize.Processor 102 can integrating central processor (Central
Processing Unit, CPU), in image processor (Graphics Processing Unit, GPU) and modem etc.
One or more of combinations.Wherein, the main processing operation system of CPU, user interface and destination application etc.;GPU is used for
It is responsible for the rendering and drafting of display content;Modem is for handling wireless communication.It is understood that above-mentioned modulation /demodulation
Device can not also be integrated into processor 102, be realized separately through one piece of communication chip.
Memory 104 may include random access memory (Random Access Memory, RAM), also may include read-only
Memory (Read-Only Memory).Memory 104 can be used for store instruction, program, code, code set or instruction set.It deposits
Reservoir 104 may include storing program area and storage data area, wherein the finger that storing program area can store for realizing operating system
Enable, for realizing at least one function instruction (such as touch function, sound-playing function, image player function etc.), be used for
Realize the instruction etc. of following each embodiments of the method.Storage data area can also store electronic equipment 100 and be created in use
Data (than text document as the aforementioned) etc..
The wireless module 106 is used to receive and transmit electromagnetic wave, realizes the mutual conversion of electromagnetic wave and electric signal, from
And it is communicated with communication network or other equipment, such as communicated based on mobile communication protocol and base station.It is described wireless
Module 106 may include the various existing circuit elements for being used to execute these functions, for example, antenna, RF transceiver, number letter
Number processor, encryption/deciphering chip, subscriber identity module (SIM) card, memory etc..The wireless module 106 can with it is various
Network such as internet, intranet, wireless network communicate or led to by wireless network and other electronic equipments
News.Above-mentioned wireless network may include cellular telephone networks, WLAN or Metropolitan Area Network (MAN).Above-mentioned wireless network can make
With various communication standards, agreement and technology, including but not limited to WLAN protocol withAndBluetooth protocol, or even may include that those are worked as
The preceding agreement not being developed yet.
Referring to FIG. 7, it illustrates a kind of structural block diagrams of computer readable storage medium provided by the embodiments of the present application.
Program code is stored in the computer-readable medium 800, said program code can be called by processor and execute above method reality
Apply method described in example.
Computer readable storage medium 800 can be such as flash memory, EEPROM (electrically erasable programmable read-only memory),
The electronic memory of EPROM, hard disk or ROM etc.Optionally, computer readable storage medium 800 includes non-volatile meter
Calculation machine readable medium (non-transitory computer-readable storage medium).Computer-readable storage
Medium 800 has the memory space for the program code 810 for executing any method and step in the above method.These program codes can
With from reading or be written in one or more computer program product in this one or more computer program product.
Program code 810 can for example be compressed in a suitable form.
For the purpose of this specification, " computer-readable medium ", which can be, any may include, stores, communicates, propagates or pass
Defeated program is for instruction execution system, device or equipment or the dress used in conjunction with these instruction execution systems, device or equipment
It sets.The more specific example (non-exhaustive list) of computer-readable medium include the following: there is the electricity of one or more wirings
Interconnecting piece (electronic equipment), portable computer diskette box (magnetic device), random access memory (RAM), read-only memory
(ROM), erasable edit read-only storage (EPROM or flash memory), fiber device and portable optic disk is read-only deposits
Reservoir (CDROM).In addition, computer-readable medium can even is that the paper that can print described program on it or other are suitable
Medium, because can then be edited, be interpreted or when necessary with it for example by carrying out optical scanner to paper or other media
His suitable method is handled electronically to obtain described program, is then stored in computer storage.
Finally, it should be noted that above embodiments are only to illustrate the technical solution of the application, rather than its limitations;Although
The application is described in detail with reference to the foregoing embodiments, those skilled in the art are when understanding: it still can be with
It modifies the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features;And
These are modified or replaceed, do not drive corresponding technical solution essence be detached from each embodiment technical solution of the application spirit and
Range.
Claims (10)
1. a kind of data processing method, which is characterized in that be applied to electronic equipment, which comprises
Service identification write request is received, the service identification is for opening the electronic equipment only and the service identification pair
The business function answered;
The service identification that encryption whether is carried in the service identification write request detected;
If detecting the service identification of encryption, the service identification of the encryption is decrypted according to the rule of setting,
If successful decryption, the service identification is written to the region set in the electronic equipment;
If decryption failure is forbidden carrying out service identification write-in.
2. the method according to claim 1, wherein also carrying code key letter in the service identification write request
Breath is decrypted the service identification of the encryption according to the rule of setting if the service identification for detecting encryption
Step includes:
Code key storage region corresponding with the key information is obtained based on the key information, wherein different key informations
Corresponding code key storage region is different;
Decryption code key is obtained from the code key storage region;
The service identification of encryption described in decipherment algorithm and the decryption secret key pair based on setting is decrypted.
3. according to the method described in claim 2, it is characterized in that, described obtained based on the key information is believed with the code key
The step of ceasing corresponding code key storage region include:
It obtains text filed in the setting text file that the key information is characterized;
It is code key storage region by this paper region recognition;
It is described from the code key storage region obtain decryption code key the step of include:
Using the text in the region this paper as decryption code key.
4. according to the method described in claim 3, it is characterized in that, the setting text file includes the pre-installation of electronic equipment
System program configuration file.
5. the method according to claim 1, wherein whether being taken in the detection service identification write request
Before the step of service identification with encryption further include:
Obtain the use state information of electronic equipment;
Judge whether the use state information meets service identification update condition;
If satisfied, the service identification for whether carrying encryption in the detection service identification write request executed;
If not satisfied, being not responding to the reception service identification write request.
6. according to the method described in claim 5, it is characterized in that, the service identification update condition includes in the following conditions
At least one:
The use duration of electronic equipment is less than setting duration;
The electricity of electronic equipment is lower than setting electricity;And
The received data traffic of electronic equipment is less than setting flow.
7. a kind of data processing equipment, which is characterized in that run on electronic equipment, described device includes:
Data communication units, for receiving service identification write request, the service identification is for opening the electronic equipment only
Open business function corresponding with the service identification;
Data detecting unit, for detecting the service identification for whether carrying encryption in the service identification write request;
Decryption unit, if detecting the service identification of encryption for the data detecting unit, according to the rule of setting to institute
The service identification for stating encryption is decrypted,
The service identification is written to the region set in the electronic equipment if being used for successful decryption by data write unit;
The data write unit is forbidden carrying out service identification write-in if being also used to decrypt failure.
8. device according to claim 7, which is characterized in that also carry code key letter in the service identification write request
Breath;The decryption unit includes:
Storage region obtains subelement, for obtaining code key corresponding with key information memory block based on the key information
Domain, wherein code key storage region corresponding to different key informations is different;
Code key reading subunit, for obtaining decryption code key from the code key storage region;
Subelement is decrypted, the service identification for encryption described in decipherment algorithm and the decryption secret key pair based on setting carries out
Decryption.
9. a kind of electronic equipment, which is characterized in that including one or more processors and memory;
One or more programs are stored in the memory and are configured as being executed by one or more of processors, institute
It states one or more programs and is configured to carry out any method of claim 1-6.
10. a kind of computer readable storage medium, which is characterized in that be stored with program generation in the computer readable storage medium
Code, wherein perform claim requires any method of 1-6 in said program code operation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811191590.5A CN109446234B (en) | 2018-10-12 | 2018-10-12 | Data processing method and device and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811191590.5A CN109446234B (en) | 2018-10-12 | 2018-10-12 | Data processing method and device and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109446234A true CN109446234A (en) | 2019-03-08 |
CN109446234B CN109446234B (en) | 2021-10-19 |
Family
ID=65546337
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811191590.5A Active CN109446234B (en) | 2018-10-12 | 2018-10-12 | Data processing method and device and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109446234B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110334140A (en) * | 2019-05-24 | 2019-10-15 | 深圳绿米联创科技有限公司 | The method, apparatus and server of processing equipment reported data |
CN110602692A (en) * | 2019-08-23 | 2019-12-20 | RealMe重庆移动通信有限公司 | Data updating method and device and electronic equipment |
CN111756737A (en) * | 2020-06-24 | 2020-10-09 | 中国平安财产保险股份有限公司 | Data transmission method, device, system, computer equipment and readable storage medium |
CN111836197A (en) * | 2020-06-29 | 2020-10-27 | 广西东信易联科技有限公司 | Electronic card sensitive area use management system |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103701757A (en) * | 2012-09-27 | 2014-04-02 | 中国电信股份有限公司 | Identity authentication method and system for service access |
CN104836796A (en) * | 2015-04-14 | 2015-08-12 | 百度在线网络技术(北京)有限公司 | Method and apparatus for acquiring network content information |
US20160283937A1 (en) * | 2015-03-27 | 2016-09-29 | Kenneth W. Reese | Technologies for split key security |
CN106792637A (en) * | 2016-12-13 | 2017-05-31 | 广东欧珀移动通信有限公司 | International mobile equipment identification number wiring method, device and mobile terminal |
CN107294707A (en) * | 2017-06-22 | 2017-10-24 | 四川思安特科技有限公司 | A kind of cellphone shield signature key guard method |
US20170324566A1 (en) * | 2016-05-06 | 2017-11-09 | Pacific Star Communications, Inc. | Unified encryption configuration management and setup system |
CN107408255A (en) * | 2015-02-17 | 2017-11-28 | 维萨国际服务协会 | Cloud encryption key mediation device, method and system |
CN108156152A (en) * | 2017-12-22 | 2018-06-12 | 北京百度网讯科技有限公司 | Streaming Media downloads method, apparatus, storage medium and the terminal device with playing |
CN108282330A (en) * | 2017-12-29 | 2018-07-13 | 平安科技(深圳)有限公司 | Key preserves and acquisition device, method and computer readable storage medium |
-
2018
- 2018-10-12 CN CN201811191590.5A patent/CN109446234B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103701757A (en) * | 2012-09-27 | 2014-04-02 | 中国电信股份有限公司 | Identity authentication method and system for service access |
CN107408255A (en) * | 2015-02-17 | 2017-11-28 | 维萨国际服务协会 | Cloud encryption key mediation device, method and system |
US20160283937A1 (en) * | 2015-03-27 | 2016-09-29 | Kenneth W. Reese | Technologies for split key security |
CN104836796A (en) * | 2015-04-14 | 2015-08-12 | 百度在线网络技术(北京)有限公司 | Method and apparatus for acquiring network content information |
US20170324566A1 (en) * | 2016-05-06 | 2017-11-09 | Pacific Star Communications, Inc. | Unified encryption configuration management and setup system |
CN106792637A (en) * | 2016-12-13 | 2017-05-31 | 广东欧珀移动通信有限公司 | International mobile equipment identification number wiring method, device and mobile terminal |
CN107294707A (en) * | 2017-06-22 | 2017-10-24 | 四川思安特科技有限公司 | A kind of cellphone shield signature key guard method |
CN108156152A (en) * | 2017-12-22 | 2018-06-12 | 北京百度网讯科技有限公司 | Streaming Media downloads method, apparatus, storage medium and the terminal device with playing |
CN108282330A (en) * | 2017-12-29 | 2018-07-13 | 平安科技(深圳)有限公司 | Key preserves and acquisition device, method and computer readable storage medium |
Non-Patent Citations (2)
Title |
---|
QU ZHIMING 等: "Application of Parameter Modulation in High Assurance Data Transmission Based on Chaotic Encryption", 《2008 INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND TRAINING & 2008 INTERNATIONAL WORKSHOP ON GEOSCIENCE AND REMOTE SENSING》 * |
刘培鹤等: "基于Android 的密钥分存方案", 《计算机应用与软件》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110334140A (en) * | 2019-05-24 | 2019-10-15 | 深圳绿米联创科技有限公司 | The method, apparatus and server of processing equipment reported data |
CN110602692A (en) * | 2019-08-23 | 2019-12-20 | RealMe重庆移动通信有限公司 | Data updating method and device and electronic equipment |
CN110602692B (en) * | 2019-08-23 | 2023-08-22 | RealMe重庆移动通信有限公司 | Data updating method and device and electronic equipment |
CN111756737A (en) * | 2020-06-24 | 2020-10-09 | 中国平安财产保险股份有限公司 | Data transmission method, device, system, computer equipment and readable storage medium |
CN111756737B (en) * | 2020-06-24 | 2023-10-13 | 中国平安财产保险股份有限公司 | Data transmission method, device, system, computer equipment and readable storage medium |
CN111836197A (en) * | 2020-06-29 | 2020-10-27 | 广西东信易联科技有限公司 | Electronic card sensitive area use management system |
Also Published As
Publication number | Publication date |
---|---|
CN109446234B (en) | 2021-10-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109446234A (en) | Data processing method, device and electronic equipment | |
EP3698535B1 (en) | Privacy preserving tag | |
US8832441B2 (en) | Mobile terminal, data communication method, and computer program | |
US20040240671A1 (en) | Method for remote loading of an encryption key in a telecommunication network station | |
US7340276B2 (en) | System for downloading program to general-purpose subscriber identification module | |
CN104660589B (en) | Method, system and terminal for encrypting control and information analysis of information | |
US20080085001A1 (en) | Method of mutual authentication between a communication interface and a host processor of an nfc chipset | |
US20080219444A1 (en) | Method for the secure loading in a NFC chipset of data allowing access to a service | |
CN101325485A (en) | A method for processing information in an electronic device, a system, an electronic device and a processing block | |
CN104507080A (en) | File processing method and terminal | |
CN103366140A (en) | Card writing method and card writing device based on NFC (Near Field Communication) | |
US20110213978A1 (en) | Secure methods of transmitting and receiving data between terminals comprising near-field communication, and corresponding terminals | |
CN106060762B (en) | Information pushing method, information pushing device and information pushing system | |
FR2996328A1 (en) | METHOD FOR PROTECTING SENSITIVE DATA TRANSMITTED IN AN NFC SYSTEM | |
KR20070030231A (en) | Method of choosing one of a multitude of data sets being registered with a device and corresponding device | |
KR101524818B1 (en) | Mobile terminal and method for operating a mobile terminal | |
KR101379711B1 (en) | Method for file encryption and decryption using telephone number | |
US10511946B2 (en) | Dynamic secure messaging | |
CN107111707A (en) | Smart card, mobile terminal and the method that network ID authentication is carried out using smart card | |
CN109863494A (en) | Data protection system | |
Francis et al. | On the security issues of NFC enabled mobile phones | |
FI121196B (en) | Method and system for charging an intelligent card | |
CN106487796A (en) | Identity card reads the safe ciphering unit in equipment and its application process | |
CN101489227A (en) | Host device, mobile terminal, method for processing mobile communication service and system thereof | |
KR102088499B1 (en) | Method and system for secure communication between mobile unit and server interworking with smartphone |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |