CN109446234A - Data processing method, device and electronic equipment - Google Patents

Data processing method, device and electronic equipment Download PDF

Info

Publication number
CN109446234A
CN109446234A CN201811191590.5A CN201811191590A CN109446234A CN 109446234 A CN109446234 A CN 109446234A CN 201811191590 A CN201811191590 A CN 201811191590A CN 109446234 A CN109446234 A CN 109446234A
Authority
CN
China
Prior art keywords
service identification
electronic equipment
encryption
decryption
code key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811191590.5A
Other languages
Chinese (zh)
Other versions
CN109446234B (en
Inventor
蔚宝珠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201811191590.5A priority Critical patent/CN109446234B/en
Publication of CN109446234A publication Critical patent/CN109446234A/en
Application granted granted Critical
Publication of CN109446234B publication Critical patent/CN109446234B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the present application discloses a kind of data processing method, device and electronic equipment.The described method includes: receiving service identification write request, the service identification is for making the electronic equipment only open business function corresponding with the service identification;The service identification that encryption whether is carried in the service identification write request detected;If detecting the service identification of encryption, the service identification of the encryption is decrypted according to the rule of setting, if successful decryption, the service identification is written to the region set in the electronic equipment;If decryption failure is forbidden carrying out service identification write-in.This method realizes by way of encrypting to service identification, it realizes after receiving service identification write request, for the service identification obtained after successful decryption, just allows to be written in electronic equipment, it is illegally rewritten to avoid the service identification of electronic equipment, service identification is caused to fail.

Description

Data processing method, device and electronic equipment
Technical field
This application involves technical field of electronic equipment, more particularly, to a kind of data processing method, device and electronics Equipment.
Background technique
In order to adapt to the functional requirement of different regions or different operators, carrier network can be linked into some Operator identifier is equipped in electronic equipment, usually to meet different regions or different fortune based on the operator identifier Seek the functional requirement of quotient.However, the operator identifier configured in electronic equipment has the risk being cracked, operator identifier is caused It can not play the role of limitation function.
Summary of the invention
In view of the above problems, present applicant proposes a kind of data processing method, device and electronic equipments, are improved with realizing The above problem.
In a first aspect, being applied to electronic equipment, which comprises connect this application provides a kind of data processing method Service identification write request is received, the service identification is for making the electronic equipment only open industry corresponding with the service identification Business function;The service identification that encryption whether is carried in the service identification write request detected;If detecting the industry of encryption Business mark is decrypted the service identification of the encryption according to the rule of setting, if successful decryption, the service identification is write Enter the region set into the electronic equipment;If decryption failure is forbidden carrying out service identification write-in.
Second aspect, this application provides a kind of data processing equipments, run on electronic equipment, and described device includes: number According to communication unit, for receiving service identification write request, the service identification is only opened and institute for making the electronic equipment State the corresponding business function of service identification;Whether data detecting unit carries for detecting in the service identification write request There is the service identification of encryption;Decryption unit, if detecting the service identification of encryption for the data detecting unit, according to setting The service identification of the encryption is decrypted in fixed rule, data write unit, if successful decryption is used for, by the business mark Knowledge is written to the region set in the electronic equipment;The data write unit is forbidden carrying out industry if being also used to decrypt failure Business mark write-in.
The third aspect, this application provides a kind of electronic equipment, including one or more processors and memory;One Or multiple programs are stored in the memory and are configured as being executed by one or more of processors, it is one or Multiple programs are configured to carry out above-mentioned method.
Fourth aspect, a kind of computer readable storage medium provided by the present application, in the computer readable storage medium It is stored with program code, wherein execute above-mentioned method in said program code operation.
A kind of data processing method, device and electronic equipment provided by the present application are being received for setting the electronics After the standby service identification write request for only opening business function corresponding with the service identification, the service identification write-in is detected Whether the service identification of encryption is carried in request, and if in the service identification for detecting encryption, according to the rule of setting The service identification of the encryption is decrypted, if successful decryption, the service identification is written in the electronic equipment and is set Forbid carrying out service identification write-in if decryption failure in fixed region.To realize the side by being encrypted to service identification Formula realizes after receiving service identification write request, for the service identification obtained after successful decryption, just allows to be written to In electronic equipment, is illegally rewritten to avoid the service identification of electronic equipment, service identification is caused to fail.
Detailed description of the invention
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, the drawings in the following description are only some examples of the present application, for For those skilled in the art, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
The a kind of electronic equipment that Fig. 1 shows the application proposition is in the schematic diagram of multiple carrier networks;
Fig. 2 shows a kind of flow charts for data processing method that the application proposes;
Fig. 3 shows the flow chart of another data processing method of the application proposition;
Fig. 4 shows a kind of structural block diagram of data processing equipment of the application proposition;
Fig. 5 shows the structural block diagram that the application proposes another data processing equipment;
Fig. 6 shows the structural block diagram of a kind of electronic equipment of the application proposition;
Fig. 7 is the embodiment of the present application for saving or carrying the data processing method realized according to the embodiment of the present application Program code storage unit.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation description.Based on the embodiment in the application, those of ordinary skill in the art institute without creative efforts The every other embodiment obtained, shall fall in the protection scope of this application.
With the development of electronic technology and network technology, electronic equipment can support more functions.For example, intelligent hand The electronic equipments such as machine, tablet computer can support the whole network section to be linked into mobile communications network.For another example electronic equipment can be with base Server in the data communication function access all parts of the world of mobile communications network.
However, the rules and regulations by some areas are influenced or the need of the different operators of limited the same area It asks, electronic equipment will limit its partial function.For example, the communication frequency that the operator of the mobile communications network of different zones is supported Section can have any different.By taking the 4G network of movement, telecommunications and connection as an example, band limits that connection FDD-LTE is used: upper line frequency Rate: 1755-1765MHz, downstream frequency: 1850-1860MHz;The band limits that connection TD-LTE is used: uplink and downlink frequency: 2300-2320MHz,2555-2575MHz(bands:40bands:41);The band limits that mobile TD-LTE is used: uplink and downlink Frequency: 1880-1890MHz, 2320-2370MHz, 2575-2635MHz (bands:39bands:40bands:41);Telecommunications frequency Section are as follows: 2370-2390MHz, 2635-2655MHz;(bands:40bands:41).
And the electronics that each operator has access to oneself institute's Operation Network in order to which respective interests usually will limit is set It is standby to remove the network for being linked into other operators, then a service identification can be written into electronic equipment in this case, with Just each operator is distinguished for electronic equipment.For example, as shown in Figure 1, electronic equipment 100 be in base station 99, base station 98 and In the wireless signal coverage area that base station 97 emits, wherein base station 99 belongs to movement, and base station 98 belongs to telecommunications, and base station 97 belongs to In connection, if the service identification is mobile operator identifier, then electronic equipment can only just access mobile runed network, It can only be communicated by base station 99, and the network that connection or telecommunications are runed can not be accessed.For another example some regions are wanted CA (carrier wave polymerization) ability of support, and CA is not supported in some areas.Service identification so in electronic equipment may be used for Whether characterization current electronic device can execute CA function.For another example there is lock card demand in some areas, and other regions are not locked Card demand, then service identification can be used for limiting whether electronic equipment allows to carry out lock card.
And the limitation of above-mentioned business function is typically based on the service identification that is written in electronic equipment to distinguish.And Inventors have found that the service identification in electronic equipment may illegally be cracked by other people, legal service identification is caused to be tampered For illegal service identification, cause electronic equipment that can not limit the function of electronic equipment according to legal service identification.For example, with For smart phone, in the case where hardware supported, smart phone can multiple operators frequency range (for example, shifting above-mentioned The frequency range of dynamic, telecommunications and connection) it is communicated, being written into characterization in the smart phone can only be led to by mobile frequency range It can be written in the case where letter, in the smart phone and limit its service identification that can only be communicated by mobile frequency range.So In this case, it has cracked this if someone is illegal and limits its service identification that can only be communicated by mobile frequency range, And distort the service identification, so that the smart phone can be communicated by the network of other operators, from And cause the smart phone that can not work based on the legal service identification initially write.
Therefore, the safety that service identification can be promoted in the application is inventors herein proposed, to guarantee more may be used Data processing method, device and the electronic equipment according to legal service identification limitation electronic functionalities leaned on.
Present embodiments are specifically described below in conjunction with attached drawing.
Referring to Fig. 2, a kind of data processing method provided by the present application, is applied to electronic equipment, which comprises
Step S110: receive service identification write request, the service identification for make the electronic equipment only opens and The corresponding business function of the service identification.
It should be noted that service identification can be to be written in electronic equipment in the production phase of electronic equipment.? In this case, encryption equipment can get the service identification of current electronic equipment produced in advance, then by the business mark It is written in electronic equipment after knowing encryption.Wherein, which can be some on production line and has setting for data processing It is standby, or to have the server of data communication function with some equipment on production line.Wherein, encryption equipment can by USB, The wired modes such as serial ports send service identification write request.
Step S120: the service identification that encryption whether is carried in the service identification write request detected.
As a kind of mode, format that can be specified for the configuration of encrypted service identification in this application is so as to electronics Equipment can identify the service identification of encryption from service identification write request.For example, optionally encryption equipment can add Specific identifier is added before and after close service identification.So in this case, electronic equipment can receive business After identifying write request, specific identifier above-mentioned has been detected whether from the data that the service identification write request carries. If recognizing the specific identifier, then determining to detect the business mark for carrying encryption in the service identification write request Know.
For example, " abc " can be used as the specific identifier by encryption equipment, then the write device is generating business mark One section of content " abc "+" service identification of encryption "+" abc " can be generated during knowing write request.So electronic equipment is being known It is clipped in service identification write request there are two tools in the case where " abc ", then determining to detect the service identification write-in long The service identification of encryption is carried in request.It should be noted that " abc " above-mentioned is only exemplary, not to specific The content of identifier defines.
It is understood that equipment can there are ways to the specific marks in each ciphering process of determination for encryption Symbol.Corresponding, electronic equipment can also there are ways to get when entrained specific in time service identification write request Identifier.
For example, as a kind of mode, electronic equipment can in advance between encryption equipment based on the agreement negotiated in advance come Determine the specific identifier of the service identification write request received every time.Optionally, between electronic equipment and encryption equipment It can negotiate characteristic value using the date on the same day after Hash calculation as specific identifier.Optionally, electronic equipment with It can negotiate characteristic value using the content of particular text after Hash calculation between encryption equipment as specific identifier.Example Such as, the text file with same text content can be stored respectively by encrypting on equipment and electronic equipment, then encryption equipment Which can negotiate to use base of the content in specific region in text content as Hash calculation in advance between electronic equipment Then the content in the region is used as specific identifier by plinth after Hash calculation.
So in the case where encrypting equipment has the mode of the aforementioned specific identifier of a variety of determinations, encryption equipment can be with It will be written in the service identification write request of generation when cipher mode collected in time ciphering process, so that electronic equipment can In a manner of identifying and determine specific identifier used by time service identification write request.It optionally, can be in business mark One identifier of last addition for knowing write request, which characterizes, determines specific identifier used by the service identification write request Mode.For example, identifier " a " characteristic value using the date on the same day after Hash calculation for using of characterization can be used as special Fixed identifier, and use identifier " b " characterization using characteristic value of the content of particular text after Hash calculation as specifically Identifier.
Step S130: if detecting the service identification of encryption, according to the regular service identification to the encryption of setting It is decrypted.
It is understood that equipment is encrypted during encrypting to service identification, in addition to Encryption Algorithm can be used Outside, it also will use encryption code key.If it is secret using same set of encryption always so to encrypt equipment and electronic equipment in this case Key may be cracked.So for the safety for further promoting encryption code key, as a kind of mode, the business mark Know in write request and also carry key information, if the service identification for detecting encryption, according to the rule of setting to institute State the step of the service identification of encryption is decrypted include: obtained based on the key information it is corresponding with the key information secret Key storage region, wherein code key storage region corresponding to different key informations is different;It is obtained from the code key storage region Decrypt code key;The service identification of encryption described in decipherment algorithm and the decryption secret key pair based on setting is decrypted.
Wherein, as a kind of mode, encrypting code key can be made of multiple portions, and each part is stored in electronics and sets In standby different zones.For example, if code key is " a1b2c3 ", then the code key can be split as " a1 ", " b2 " by electronic equipment And " c3 " three parts.Then the three parts are respectively stored in different regions.So when electronic equipment receives business mark After knowing write request, the code key of part is read out from different regions in advance and then is combined.And in which way into Row combination, electronic equipment can be determined according to the content of key information, corresponding for each electronic equipment so as to make Service identification encrypted during can be using different cipher modes, and then further promote the safety of encryption Property.
For example, encryption equipment, which can still be used, adds identifier in the key information that service identification write request carries Mode come determine when time lock use encryption code key.For example, if the content of the identifier added in key information is " 3a ", that It can determine the current part code key for needing to read storage from three storage regions, and be spelled according to " a1b2c3 " mode It connects.And if the content of the identifier added in key information is " 3b ", is currently needed then can determine from three storage regions The part code key of storage is read, and is spliced according to " b2a1c3 " mode.And if the identifier added in key information is interior Holding is " 3c ", then can determine the current part code key for needing to read storage from three storage regions, and according to " c3b2a1 " mode is spliced.Furthermore and if the content of identifier added in key information is " 2a ", then can determine current It needs to read the part code key of storage from two storage regions, and splices according to " a1b2 " mode.
Wherein, as a kind of mode, reading priority can be respectively configured in the storage region different for three.For example, If three storage regions are respectively/code1/text1.txt/ ,/code2/text2.txt/ and/code3/text3.txt/. So be configured with read priority be followed successively by respectively/code1/text1.txt/ ,/code2/text2.txt/ and/ In the case where code3/text3.txt/, in the case where electronic equipment needs to read part code key from a storage region, electricity Sub- equipment can be from/code1/text1.txt/ reading part code key, and if electronic equipment is needed from two storage region reading parts In the case where point code key, electronic equipment can preferentially be read from/code1/text1.txt/ and/code2/text2.txt/ respectively Part code key.It should be noted that slave storage region involved in foregoing teachings reads the complete code key that part code key refers to A part, rather than a part of storage region.
It should be noted that having multiple portions code key in the case where only one physical storage areas of electronic equipment In the case where, the code key of multiple part can be stored in a physical storage areas.And it is more when having in electronic equipment In the case where a physical storage areas, multiple portions code key can be respectively stored in multiple physical storage areas.For example, in electricity In the case that sub- equipment has memory and disk the two physical storage areas, in multiple portions code key can be respectively stored in Deposit and disk in.For another example if electronic equipment has the case where disk and independent safety chip for having memory space Under, multiple portions code key can be respectively stored in disk and this has in the safety chip of memory space.
As a kind of mode, a setting text file can be stored in the electronic device.In this case, optionally, Described the step of obtaining code key storage region corresponding with the key information based on the key information includes: that acquisition is described secret It is text filed in the setting text file that key information is characterized;It is code key storage region by this paper region recognition;It is described The step of obtaining decryption code key from the code key storage region includes: using the text in the region this paper as decryption code key.
As a kind of mode, if the text file set as miyao.txt, and the content of key information be " line "+ " begin "+" end " (characterization reads " end " character since " begin " a character of line row), then electronics is set It is standby to be read since " begin " character of " line " row in miyao.txt, one after reading out miyao.txt Until " end " a character is got in direct-reading.Then using the text read out as decryption code key.
Furthermore some configuration files can inherently in some cases, be configured in the operating system of electronic equipment, for example, The configuration file of the system program of the pre-installation of electronic equipment.These configuration files are usually more general, in same batch Or by can all be installed in the electronic equipment of same operation system.It is so used as a kind of mode, it can be by electronic equipment The configuration file of the system program of pre-installation is as setting text file above-mentioned, so that not having to again individually in electronics As soon as the text file for storing a text file in equipment, and having because of the operating system itself for being the electronic equipment utilized, Further improve the safety of decryption code key.
Certainly, in the configuration file just having using electronic equipment operating system itself as the case where setting text file Under, equipment is encrypted during encrypting to service identification, can be inquired accordingly when time service identification of encryption is write-in Into the electronic equipment of the operating system of that version, then from the configuration file that the operating system of the version inquired has A configuration file is selected to make to obtain encryption code key.
Step S140: judge whether decryption succeeds.
It is understood that service identification is usually the generation that follows a certain form.For example, service identification one can be followed It altogether include how many data, wherein included data include the character etc. of that type.For example, service identification packet can be defined Include capitalization English character, number and small English character etc..For another example can define service identification includes English character, number Word and escape character etc..So in this case, the text that can be obtained based on decryption as a kind of mode, electronic equipment Data format determine whether successful decryption.So electronic equipment is after the text decrypted, by identifying that decryption obtains The data format of text determine whether successful decryption.
Wherein, as a kind of mode, a kind of mode of the data format as flexible determining service identification, encryption equipment can To increase an identifier in service identification write request, number used by current business mark is characterized using the identifier According to format.The value that so can first obtain the identifier in decrypting process when electronic equipment, then according to the value of the identifier The data format that is locally stored is got as reference, then using after decryption text and this as the data format referred into Row compares, if data format is consistent, decides that successful decryption.
Step S150: if successful decryption, the service identification is written to the region set in the electronic equipment.
Step S160: if decryption failure, forbid carrying out service identification write-in.
A kind of data processing method provided by the present application is being received for opening the electronic equipment only and the business After the service identification write request for identifying corresponding business function, detect whether carried in the service identification write request plus Close service identification, and if in the service identification for detecting encryption, according to the regular business mark to the encryption of setting Knowledge is decrypted, if successful decryption, the service identification is written to the region set in the electronic equipment, if decryption is lost It loses, forbids carrying out service identification write-in.To realize by way of being encrypted to service identification, realizes and receiving After service identification write request, for the service identification obtained after successful decryption, just allow to be written in electronic equipment, to avoid The service identification of electronic equipment is illegally rewritten, and service identification is caused to fail.
Referring to Fig. 3, a kind of data processing method provided by the present application, is applied to electronic equipment, which comprises
Step S210: receive service identification write request, the service identification for make the electronic equipment only opens and The corresponding business function of the service identification.
Step S220: the use state information of electronic equipment is obtained.
As a kind of mode, the service identification in electronic equipment can be electronic equipment production phase write-in.And And, it is to be understood that the service identification in electronic equipment is usually the presence of the risk being cracked after factory.It so can be After receiving service identification write request, current use state information is detected to judge electronic equipment currently whether in factory Before, namely judge whether electronic equipment meets service identification update condition.
Step S230: judge whether the use state information meets service identification update condition.
As described in foregoing teachings, detecting the use state information whether to meet service identification update condition is to judge Whether electronic equipment is currently also in the stage before factory.It should be noted that inventor has found that electronic equipment Before factory, can when in use long, electricity and electronic equipment using data traffic for the use of and electronic equipment by with There is apparent difference at family after.
Although there is test phase in long side when in use, the electronic equipment before factory, but whole use duration meeting The use duration for shorter than dispatching from the factory later.In terms of electricity, what electricity of the electronic equipment before factory would generally keep telling somebody what one's real intentions are again Electricity and supplement the state for being full of or being constantly in a high-order electricity.And in terms of data traffic, before factory, electronics Equipment may be because of test needs and receiving the data for perhaps sending a part of data but receiving or sending usually all is Lesser part, can be significantly less than the data traffic for receiving or sending in the service stage after factory.
So in this case, the service identification update condition includes at least one of the following conditions: electronics is set Standby use duration is less than setting duration;The electricity of electronic equipment is lower than setting electricity;And the received data flow of electronic equipment Amount is less than setting flow.
Wherein, it should be noted that if electronic equipment after just dispatching from the factory, the use state information of electronic equipment and factory Use state information before can relatively, in turn result in electronic equipment may misidentify currently also in factory before. It is so used as a kind of mode, whether electronic equipment can be further by detecting in electronic equipment inserted with SIM card Multiple location informations whether are stored in (Subscriber Identification Module) or electronic equipment to come into one Whether the verifying of the step electronic equipment has been in the state after factory.
If not satisfied, forbidding carrying out service identification write-in.
Step S240: if satisfied, the service identification for whether carrying encryption in the service identification write request detected.
Step S250: if detecting the service identification of encryption, according to the regular service identification to the encryption of setting It is decrypted.
Step S260: judge whether decryption succeeds.
Step S270: if successful decryption, the service identification is written to the region set in the electronic equipment.
Step S280: if decryption failure, forbid carrying out service identification write-in.
A kind of data processing method provided by the present application is being received for opening the electronic equipment only and the business After the service identification write request for identifying corresponding business function, meet business in the use state information for detecting electronic equipment In the case where identifying update condition, the service identification that encryption whether is carried in the service identification write request is detected, and If the service identification of the encryption is decrypted according to the rule of setting in the service identification for detecting encryption, if decryption The service identification, is written to the region set in the electronic equipment by success, if decryption failure, forbids carrying out service identification Write-in.To realize by way of being encrypted to service identification, realize after receiving service identification write request, For the service identification obtained after successful decryption, just allow to be written in electronic equipment, to avoid the service identification of electronic equipment It is illegally rewritten, service identification is caused to fail.
Referring to Fig. 4, a kind of data processing equipment 300 provided by the present application, runs on electronic equipment, described device 300 It include: data communication units 310, data detecting unit 320, decryption unit 330 and data write unit 340.
Data communication units 310, for receiving service identification write request, the service identification is for setting the electronics It is standby only to open business function corresponding with the service identification.
Data detecting unit 320, for detecting the business mark for whether carrying encryption in the service identification write request Know.
Decryption unit 330, if detecting the service identification of encryption for the data detecting unit, according to the rule of setting Then the service identification of the encryption is decrypted.
Wherein, as a kind of mode, key information is also carried in the service identification write request.The decryption unit 330 include:
Storage region obtains subelement 331, corresponding with the key information secret for being obtained based on the key information Key storage region, wherein code key storage region corresponding to different key informations is different.
Wherein, as a kind of mode, storage region obtains subelement 331, is specifically used for obtaining key information institute table It is text filed in the setting text file of sign;It is code key storage region by this paper region recognition;
Code key reading subunit 332, for obtaining decryption code key from the code key storage region.
Code key reading subunit 332, specifically for using the text in the region this paper as decryption code key.
Subelement 333 is decrypted, the business for encryption described in decipherment algorithm and the decryption secret key pair based on setting Mark is decrypted.
Wherein, as a kind of mode, the setting text file includes matching for the system program of the pre-installation of electronic equipment Set file.
The service identification is written in the electronic equipment and sets if being used for successful decryption by data write unit 340 Region.
The data write unit 340 is forbidden carrying out service identification write-in if being also used to decrypt failure.
A kind of data processing equipment provided by the present application is being received for opening the electronic equipment only and the business After the service identification write request for identifying corresponding business function, detect whether carried in the service identification write request plus Close service identification, and if in the service identification for detecting encryption, according to the regular business mark to the encryption of setting Knowledge is decrypted, if successful decryption, the service identification is written to the region set in the electronic equipment, if decryption is lost It loses, forbids carrying out service identification write-in.To realize by way of being encrypted to service identification, realizes and receiving After service identification write request, for the service identification obtained after successful decryption, just allow to be written in electronic equipment, to avoid The service identification of electronic equipment is illegally rewritten, and service identification is caused to fail.
Referring to Fig. 5, a kind of data processing equipment 400 provided by the present application, runs on electronic equipment, described device 400 Include: data communication units 410, state information acquisition unit 420, status information judging unit 430, data write unit 440, Data detecting unit 450 and decryption unit 460.
Data communication units 410, for receiving service identification write request, the service identification is for setting the electronics It is standby only to open business function corresponding with the service identification.
State information acquisition unit 420, for obtaining the use state information of electronic equipment.
Status information judging unit 430, for judging whether the use state information meets service identification update condition.
As a kind of mode, the service identification update condition includes at least one of the following conditions: electronic equipment It is less than setting duration using duration;The electricity of electronic equipment is lower than setting electricity;And the received data traffic of electronic equipment is small In setting flow.
Data write unit 440 is if not satisfied, forbid carrying out service identification write-in.
Data detecting unit 450, for if satisfied, detecting in the service identification write request whether carry encryption Service identification.
Decryption unit 460, if for detecting the service identification of encryption, according to the regular industry to the encryption of setting Business mark is decrypted.
The service identification is written in the electronic equipment and sets if being used for successful decryption by data write unit 440 Region.
Data write unit 440, if forbidding carrying out service identification write-in for decrypting failure.
A kind of data processing equipment provided by the present application is being received for opening the electronic equipment only and the business After the service identification write request for identifying corresponding business function, meet business in the use state information for detecting electronic equipment In the case where identifying update condition, the service identification that encryption whether is carried in the service identification write request is detected, and If the service identification of the encryption is decrypted according to the rule of setting in the service identification for detecting encryption, if decryption The service identification, is written to the region set in the electronic equipment by success, if decryption failure, forbids carrying out service identification Write-in.To realize by way of being encrypted to service identification, realize after receiving service identification write request, For the service identification obtained after successful decryption, just allow to be written in electronic equipment, to avoid the service identification of electronic equipment It is illegally rewritten, service identification is caused to fail.
It should be noted that it is apparent to those skilled in the art that, for convenience and simplicity of description, on The device of description and the specific work process of unit are stated, can refer to corresponding processes in the foregoing method embodiment, herein no longer It repeats.In several embodiments provided herein, the mutual coupling of module can be electrical property, mechanical or other forms Coupling.In addition, can integrate in a processing module in each functional module in each embodiment of the application, it is also possible to Modules physically exist alone, and can also be integrated in a module with two or more modules.Above-mentioned integrated module Both it can take the form of hardware realization, can also have been realized in the form of software function module.
In conclusion a kind of data processing method, device and electronic equipment provided by the present application, are receiving for making After stating the service identification write request that electronic equipment only opens business function corresponding with the service identification, the business is detected The service identification of encryption whether is carried in mark write request, and if in the service identification for detecting encryption, according to setting The service identification of the encryption is decrypted in fixed rule, if successful decryption, the service identification is written to the electronics Forbid carrying out service identification write-in if decryption failure in the region set in equipment.To realize by being carried out to service identification The mode of encryption realizes after receiving service identification write request, for the service identification obtained after successful decryption, just permits Permitted to be written in electronic equipment, is illegally rewritten to avoid the service identification of electronic equipment, service identification is caused to fail.
A kind of electronic equipment provided by the present application is illustrated below in conjunction with Fig. 6.
Referring to Fig. 6, based on above-mentioned data processing method, device, another kind that the embodiment of the present application also provides can be with Execute the electronic equipment 100 of aforementioned data processing method.Electronic equipment 100 include the one or more that intercouples (in figure only Show one) processor 102, memory 104 and wireless module 106.Wherein, it is stored with and can execute in the memory 104 The program of content in previous embodiment, and processor 102 can execute the program stored in the memory 104.
Wherein, processor 102 may include one or more processing core.Processor 102 utilizes various interfaces and route The various pieces in entire electronic equipment 100 are connected, by running or executing the instruction being stored in memory 104, program, generation Code collection or instruction set, and the data being stored in memory 104 are called, execute the various functions and processing of electronic equipment 100 Data.Optionally, processor 102 can be using Digital Signal Processing (Digital Signal Processing, DSP), scene Programmable gate array (Field-Programmable Gate Array, FPGA), programmable logic array (Programmable Logic Array, PLA) at least one of example, in hardware realize.Processor 102 can integrating central processor (Central Processing Unit, CPU), in image processor (Graphics Processing Unit, GPU) and modem etc. One or more of combinations.Wherein, the main processing operation system of CPU, user interface and destination application etc.;GPU is used for It is responsible for the rendering and drafting of display content;Modem is for handling wireless communication.It is understood that above-mentioned modulation /demodulation Device can not also be integrated into processor 102, be realized separately through one piece of communication chip.
Memory 104 may include random access memory (Random Access Memory, RAM), also may include read-only Memory (Read-Only Memory).Memory 104 can be used for store instruction, program, code, code set or instruction set.It deposits Reservoir 104 may include storing program area and storage data area, wherein the finger that storing program area can store for realizing operating system Enable, for realizing at least one function instruction (such as touch function, sound-playing function, image player function etc.), be used for Realize the instruction etc. of following each embodiments of the method.Storage data area can also store electronic equipment 100 and be created in use Data (than text document as the aforementioned) etc..
The wireless module 106 is used to receive and transmit electromagnetic wave, realizes the mutual conversion of electromagnetic wave and electric signal, from And it is communicated with communication network or other equipment, such as communicated based on mobile communication protocol and base station.It is described wireless Module 106 may include the various existing circuit elements for being used to execute these functions, for example, antenna, RF transceiver, number letter Number processor, encryption/deciphering chip, subscriber identity module (SIM) card, memory etc..The wireless module 106 can with it is various Network such as internet, intranet, wireless network communicate or led to by wireless network and other electronic equipments News.Above-mentioned wireless network may include cellular telephone networks, WLAN or Metropolitan Area Network (MAN).Above-mentioned wireless network can make With various communication standards, agreement and technology, including but not limited to WLAN protocol withAndBluetooth protocol, or even may include that those are worked as The preceding agreement not being developed yet.
Referring to FIG. 7, it illustrates a kind of structural block diagrams of computer readable storage medium provided by the embodiments of the present application. Program code is stored in the computer-readable medium 800, said program code can be called by processor and execute above method reality Apply method described in example.
Computer readable storage medium 800 can be such as flash memory, EEPROM (electrically erasable programmable read-only memory), The electronic memory of EPROM, hard disk or ROM etc.Optionally, computer readable storage medium 800 includes non-volatile meter Calculation machine readable medium (non-transitory computer-readable storage medium).Computer-readable storage Medium 800 has the memory space for the program code 810 for executing any method and step in the above method.These program codes can With from reading or be written in one or more computer program product in this one or more computer program product. Program code 810 can for example be compressed in a suitable form.
For the purpose of this specification, " computer-readable medium ", which can be, any may include, stores, communicates, propagates or pass Defeated program is for instruction execution system, device or equipment or the dress used in conjunction with these instruction execution systems, device or equipment It sets.The more specific example (non-exhaustive list) of computer-readable medium include the following: there is the electricity of one or more wirings Interconnecting piece (electronic equipment), portable computer diskette box (magnetic device), random access memory (RAM), read-only memory (ROM), erasable edit read-only storage (EPROM or flash memory), fiber device and portable optic disk is read-only deposits Reservoir (CDROM).In addition, computer-readable medium can even is that the paper that can print described program on it or other are suitable Medium, because can then be edited, be interpreted or when necessary with it for example by carrying out optical scanner to paper or other media His suitable method is handled electronically to obtain described program, is then stored in computer storage.
Finally, it should be noted that above embodiments are only to illustrate the technical solution of the application, rather than its limitations;Although The application is described in detail with reference to the foregoing embodiments, those skilled in the art are when understanding: it still can be with It modifies the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features;And These are modified or replaceed, do not drive corresponding technical solution essence be detached from each embodiment technical solution of the application spirit and Range.

Claims (10)

1. a kind of data processing method, which is characterized in that be applied to electronic equipment, which comprises
Service identification write request is received, the service identification is for opening the electronic equipment only and the service identification pair The business function answered;
The service identification that encryption whether is carried in the service identification write request detected;
If detecting the service identification of encryption, the service identification of the encryption is decrypted according to the rule of setting,
If successful decryption, the service identification is written to the region set in the electronic equipment;
If decryption failure is forbidden carrying out service identification write-in.
2. the method according to claim 1, wherein also carrying code key letter in the service identification write request Breath is decrypted the service identification of the encryption according to the rule of setting if the service identification for detecting encryption Step includes:
Code key storage region corresponding with the key information is obtained based on the key information, wherein different key informations Corresponding code key storage region is different;
Decryption code key is obtained from the code key storage region;
The service identification of encryption described in decipherment algorithm and the decryption secret key pair based on setting is decrypted.
3. according to the method described in claim 2, it is characterized in that, described obtained based on the key information is believed with the code key The step of ceasing corresponding code key storage region include:
It obtains text filed in the setting text file that the key information is characterized;
It is code key storage region by this paper region recognition;
It is described from the code key storage region obtain decryption code key the step of include:
Using the text in the region this paper as decryption code key.
4. according to the method described in claim 3, it is characterized in that, the setting text file includes the pre-installation of electronic equipment System program configuration file.
5. the method according to claim 1, wherein whether being taken in the detection service identification write request Before the step of service identification with encryption further include:
Obtain the use state information of electronic equipment;
Judge whether the use state information meets service identification update condition;
If satisfied, the service identification for whether carrying encryption in the detection service identification write request executed;
If not satisfied, being not responding to the reception service identification write request.
6. according to the method described in claim 5, it is characterized in that, the service identification update condition includes in the following conditions At least one:
The use duration of electronic equipment is less than setting duration;
The electricity of electronic equipment is lower than setting electricity;And
The received data traffic of electronic equipment is less than setting flow.
7. a kind of data processing equipment, which is characterized in that run on electronic equipment, described device includes:
Data communication units, for receiving service identification write request, the service identification is for opening the electronic equipment only Open business function corresponding with the service identification;
Data detecting unit, for detecting the service identification for whether carrying encryption in the service identification write request;
Decryption unit, if detecting the service identification of encryption for the data detecting unit, according to the rule of setting to institute The service identification for stating encryption is decrypted,
The service identification is written to the region set in the electronic equipment if being used for successful decryption by data write unit;
The data write unit is forbidden carrying out service identification write-in if being also used to decrypt failure.
8. device according to claim 7, which is characterized in that also carry code key letter in the service identification write request Breath;The decryption unit includes:
Storage region obtains subelement, for obtaining code key corresponding with key information memory block based on the key information Domain, wherein code key storage region corresponding to different key informations is different;
Code key reading subunit, for obtaining decryption code key from the code key storage region;
Subelement is decrypted, the service identification for encryption described in decipherment algorithm and the decryption secret key pair based on setting carries out Decryption.
9. a kind of electronic equipment, which is characterized in that including one or more processors and memory;
One or more programs are stored in the memory and are configured as being executed by one or more of processors, institute It states one or more programs and is configured to carry out any method of claim 1-6.
10. a kind of computer readable storage medium, which is characterized in that be stored with program generation in the computer readable storage medium Code, wherein perform claim requires any method of 1-6 in said program code operation.
CN201811191590.5A 2018-10-12 2018-10-12 Data processing method and device and electronic equipment Active CN109446234B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811191590.5A CN109446234B (en) 2018-10-12 2018-10-12 Data processing method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811191590.5A CN109446234B (en) 2018-10-12 2018-10-12 Data processing method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN109446234A true CN109446234A (en) 2019-03-08
CN109446234B CN109446234B (en) 2021-10-19

Family

ID=65546337

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811191590.5A Active CN109446234B (en) 2018-10-12 2018-10-12 Data processing method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN109446234B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110334140A (en) * 2019-05-24 2019-10-15 深圳绿米联创科技有限公司 The method, apparatus and server of processing equipment reported data
CN110602692A (en) * 2019-08-23 2019-12-20 RealMe重庆移动通信有限公司 Data updating method and device and electronic equipment
CN111756737A (en) * 2020-06-24 2020-10-09 中国平安财产保险股份有限公司 Data transmission method, device, system, computer equipment and readable storage medium
CN111836197A (en) * 2020-06-29 2020-10-27 广西东信易联科技有限公司 Electronic card sensitive area use management system

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103701757A (en) * 2012-09-27 2014-04-02 中国电信股份有限公司 Identity authentication method and system for service access
CN104836796A (en) * 2015-04-14 2015-08-12 百度在线网络技术(北京)有限公司 Method and apparatus for acquiring network content information
US20160283937A1 (en) * 2015-03-27 2016-09-29 Kenneth W. Reese Technologies for split key security
CN106792637A (en) * 2016-12-13 2017-05-31 广东欧珀移动通信有限公司 International mobile equipment identification number wiring method, device and mobile terminal
CN107294707A (en) * 2017-06-22 2017-10-24 四川思安特科技有限公司 A kind of cellphone shield signature key guard method
US20170324566A1 (en) * 2016-05-06 2017-11-09 Pacific Star Communications, Inc. Unified encryption configuration management and setup system
CN107408255A (en) * 2015-02-17 2017-11-28 维萨国际服务协会 Cloud encryption key mediation device, method and system
CN108156152A (en) * 2017-12-22 2018-06-12 北京百度网讯科技有限公司 Streaming Media downloads method, apparatus, storage medium and the terminal device with playing
CN108282330A (en) * 2017-12-29 2018-07-13 平安科技(深圳)有限公司 Key preserves and acquisition device, method and computer readable storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103701757A (en) * 2012-09-27 2014-04-02 中国电信股份有限公司 Identity authentication method and system for service access
CN107408255A (en) * 2015-02-17 2017-11-28 维萨国际服务协会 Cloud encryption key mediation device, method and system
US20160283937A1 (en) * 2015-03-27 2016-09-29 Kenneth W. Reese Technologies for split key security
CN104836796A (en) * 2015-04-14 2015-08-12 百度在线网络技术(北京)有限公司 Method and apparatus for acquiring network content information
US20170324566A1 (en) * 2016-05-06 2017-11-09 Pacific Star Communications, Inc. Unified encryption configuration management and setup system
CN106792637A (en) * 2016-12-13 2017-05-31 广东欧珀移动通信有限公司 International mobile equipment identification number wiring method, device and mobile terminal
CN107294707A (en) * 2017-06-22 2017-10-24 四川思安特科技有限公司 A kind of cellphone shield signature key guard method
CN108156152A (en) * 2017-12-22 2018-06-12 北京百度网讯科技有限公司 Streaming Media downloads method, apparatus, storage medium and the terminal device with playing
CN108282330A (en) * 2017-12-29 2018-07-13 平安科技(深圳)有限公司 Key preserves and acquisition device, method and computer readable storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
QU ZHIMING 等: "Application of Parameter Modulation in High Assurance Data Transmission Based on Chaotic Encryption", 《2008 INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND TRAINING & 2008 INTERNATIONAL WORKSHOP ON GEOSCIENCE AND REMOTE SENSING》 *
刘培鹤等: "基于Android 的密钥分存方案", 《计算机应用与软件》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110334140A (en) * 2019-05-24 2019-10-15 深圳绿米联创科技有限公司 The method, apparatus and server of processing equipment reported data
CN110602692A (en) * 2019-08-23 2019-12-20 RealMe重庆移动通信有限公司 Data updating method and device and electronic equipment
CN110602692B (en) * 2019-08-23 2023-08-22 RealMe重庆移动通信有限公司 Data updating method and device and electronic equipment
CN111756737A (en) * 2020-06-24 2020-10-09 中国平安财产保险股份有限公司 Data transmission method, device, system, computer equipment and readable storage medium
CN111756737B (en) * 2020-06-24 2023-10-13 中国平安财产保险股份有限公司 Data transmission method, device, system, computer equipment and readable storage medium
CN111836197A (en) * 2020-06-29 2020-10-27 广西东信易联科技有限公司 Electronic card sensitive area use management system

Also Published As

Publication number Publication date
CN109446234B (en) 2021-10-19

Similar Documents

Publication Publication Date Title
CN109446234A (en) Data processing method, device and electronic equipment
EP3698535B1 (en) Privacy preserving tag
US8832441B2 (en) Mobile terminal, data communication method, and computer program
US20040240671A1 (en) Method for remote loading of an encryption key in a telecommunication network station
US7340276B2 (en) System for downloading program to general-purpose subscriber identification module
CN104660589B (en) Method, system and terminal for encrypting control and information analysis of information
US20080085001A1 (en) Method of mutual authentication between a communication interface and a host processor of an nfc chipset
US20080219444A1 (en) Method for the secure loading in a NFC chipset of data allowing access to a service
CN101325485A (en) A method for processing information in an electronic device, a system, an electronic device and a processing block
CN104507080A (en) File processing method and terminal
CN103366140A (en) Card writing method and card writing device based on NFC (Near Field Communication)
US20110213978A1 (en) Secure methods of transmitting and receiving data between terminals comprising near-field communication, and corresponding terminals
CN106060762B (en) Information pushing method, information pushing device and information pushing system
FR2996328A1 (en) METHOD FOR PROTECTING SENSITIVE DATA TRANSMITTED IN AN NFC SYSTEM
KR20070030231A (en) Method of choosing one of a multitude of data sets being registered with a device and corresponding device
KR101524818B1 (en) Mobile terminal and method for operating a mobile terminal
KR101379711B1 (en) Method for file encryption and decryption using telephone number
US10511946B2 (en) Dynamic secure messaging
CN107111707A (en) Smart card, mobile terminal and the method that network ID authentication is carried out using smart card
CN109863494A (en) Data protection system
Francis et al. On the security issues of NFC enabled mobile phones
FI121196B (en) Method and system for charging an intelligent card
CN106487796A (en) Identity card reads the safe ciphering unit in equipment and its application process
CN101489227A (en) Host device, mobile terminal, method for processing mobile communication service and system thereof
KR102088499B1 (en) Method and system for secure communication between mobile unit and server interworking with smartphone

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant