CN109981275B - Data transmission method, device, system, equipment and storage medium - Google Patents

Data transmission method, device, system, equipment and storage medium Download PDF

Info

Publication number
CN109981275B
CN109981275B CN201910369667.1A CN201910369667A CN109981275B CN 109981275 B CN109981275 B CN 109981275B CN 201910369667 A CN201910369667 A CN 201910369667A CN 109981275 B CN109981275 B CN 109981275B
Authority
CN
China
Prior art keywords
terminal
key
symmetric key
data
wearable device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910369667.1A
Other languages
Chinese (zh)
Other versions
CN109981275A (en
Inventor
贺洪恩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiede China Technology Co ltd
Original Assignee
Jiede China Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiede China Technology Co ltd filed Critical Jiede China Technology Co ltd
Priority to CN201910369667.1A priority Critical patent/CN109981275B/en
Publication of CN109981275A publication Critical patent/CN109981275A/en
Application granted granted Critical
Publication of CN109981275B publication Critical patent/CN109981275B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Abstract

The invention provides a data transmission method, a device, a system, equipment and a storage medium. The method comprises the following steps: acquiring a key request sent by a terminal; wherein the key request includes a data type of the user data; determining a symmetric key from a preset symmetric key mapping table according to the data type; the symmetric key mapping table is a one-to-one mapping relation table of data types and symmetric keys; encrypting the symmetric key by using the terminal public key to obtain a first ciphertext; and sending the first ciphertext to the terminal so that the terminal decrypts the first ciphertext by using a terminal private key to obtain a symmetric key, and decrypts the encrypted data by using the symmetric key to obtain the user data. According to the method, the user data is stored outside the wearable device in a ciphertext mode, the symmetric key is stored on the wearable device, the user data and the symmetric key are stored separately, and the symmetric key is transmitted to the wearable device in the ciphertext mode.

Description

Data transmission method, device, system, equipment and storage medium
Technical Field
The present invention relates to the field of data transmission technologies, and in particular, to a data transmission method, apparatus, system, device, and storage medium.
Background
The wearable device, the terminal device and the server form a wearable device data network. Wherein, wearable equipment is used for detecting functions such as user's rhythm of the heart, measurement user's step number, looking over credit card score, sedentary warning and sleep detection.
In the wearable device data network, the wearable device acquires user data, transmits the user data to the terminal device, and transmits the data to the server by the terminal device, or uploads the user data to the terminal device and the server respectively by the wearable device. The terminal device may also read user data stored in the server. The data in the terminal device and the server are encrypted through the public key and then stored, but the secret key corresponding to the public key is stored in the terminal device and the server at the same time, so that the encrypted data can be decrypted conveniently.
However, in the existing data transmission method, a key and encrypted data are stored in a terminal device or a server, which easily causes data loss and has potential safety hazard.
Disclosure of Invention
The invention provides a data transmission method, a device, a system, equipment and a storage medium, which aim to solve the technical problems that a secret key and encrypted data are stored in terminal equipment or a server in the existing data transmission method, so that data loss is easily caused and potential safety hazards exist.
In a first aspect, the present invention provides a data transmission method applied to a wearable device, including: acquiring a key request sent by a terminal; wherein the key request includes a data type of the user data; determining a symmetric key from a preset symmetric key mapping table according to the data type; the symmetric key mapping table is a one-to-one mapping relation table of data types and symmetric keys; encrypting the symmetric key by using the terminal public key to obtain a first ciphertext; and sending the first ciphertext to the terminal so that the terminal decrypts the first ciphertext by using a terminal private key to obtain a symmetric key, and decrypts the encrypted data by using the symmetric key to obtain the user data.
Optionally, before acquiring the key request sent by the terminal, the method further includes: encrypting user data by using a symmetric key to obtain encrypted data; and sending the encrypted data to the terminal.
Optionally, the wearable device further includes a security chip, and the encrypting the symmetric key by using the terminal public key to obtain a first ciphertext specifically includes: and encrypting the symmetric key by using the terminal public key in the security chip to obtain a first ciphertext.
Optionally, before acquiring the key request sent by the terminal, the method further includes: acquiring a handshake instruction sent by a terminal; sending a response instruction to the terminal so as to enable the terminal and the wearable device to be bound with each other; and acquiring a terminal public key sent by the terminal, wherein the terminal public key and the terminal private key form a pair of asymmetric key pairs.
In a second aspect, the present invention provides a data transmission method, applied to a terminal, the method including: sending a key request to the wearable device so that the wearable device obtains a symmetric key from a preset symmetric key mapping table, and encrypting the symmetric key by using a terminal public key to obtain a first ciphertext; the symmetric key mapping table is a one-to-one mapping relation table of data types and symmetric keys; receiving a first ciphertext, and decrypting the first ciphertext by using a terminal private key to obtain a symmetric key; acquiring encrypted data; the wearable device encrypts user data by using a symmetric key to obtain encrypted data; and decrypting the encrypted data by using the symmetric key to obtain the user data.
In a third aspect, the present invention provides a wearable device comprising: the first acquisition module is used for acquiring a key request sent by a terminal; wherein the key request includes a data type of the user data; the determining module is used for determining a symmetric key from a preset symmetric key mapping table according to the data type; the symmetric key mapping table is a one-to-one mapping relation table of user data types and symmetric keys; the encryption module is used for encrypting the symmetric key by using the terminal public key to obtain a first ciphertext; and the first sending module is used for sending the first ciphertext to the terminal so that the terminal decrypts the first ciphertext by using a terminal private key to obtain a symmetric key and decrypts the encrypted data by using the symmetric key to obtain the user data.
Optionally, the encryption module is further configured to encrypt the user data by using the symmetric key to obtain encrypted data; the first sending module is further used for sending the encrypted data to the terminal.
Optionally, the wearable device further includes a security chip, and the encryption module is specifically configured to: and encrypting the symmetric key by using the terminal public key in the security chip to obtain a first ciphertext.
Optionally, the first obtaining module is further configured to obtain a handshake instruction sent by the terminal; the first sending module is further used for sending a response instruction to the terminal so that the terminal and the wearable device can be bound with each other; and acquiring a terminal public key sent by the terminal, wherein the terminal public key and the terminal private key form a pair of asymmetric key pairs.
In a fourth aspect, the present invention provides a terminal, comprising: the second sending module is used for sending a key request to the wearable device so that the wearable device can obtain a symmetric key from a preset symmetric key mapping table, and the symmetric key is encrypted by using the terminal public key to obtain a first ciphertext; the symmetric key mapping table is a one-to-one mapping relation table of user data types and symmetric keys; the receiving module is used for receiving the first ciphertext and decrypting the first ciphertext by using a terminal private key to obtain a symmetric key; the second acquisition module is used for acquiring the encrypted data; the wearable device encrypts user data by using a symmetric key to obtain encrypted data; and the decryption module is used for decrypting the encrypted data by using the symmetric key to obtain the user data.
In a fifth aspect, the invention provides a data transmission system, which includes the wearable device of the third aspect and the terminal of the fourth aspect.
In a sixth aspect, the present invention provides a wearable device comprising: at least one processor, a memory, and a security chip; wherein the memory stores computer execution instructions; the at least one processor and the secure chip execute computer-executable instructions stored by the memory, causing the at least one processor and the secure chip to perform the data transfer method as referred to in the first aspect and the alternatives.
In a seventh aspect, the present invention provides a computer-readable storage medium, in which computer-executable instructions are stored, and when the computer-executable instructions are executed by a processor, the data transmission method according to the first aspect and the optional embodiments is implemented.
The invention provides a data transmission method, a device, a system, equipment and a storage medium, wherein in the data transmission method, a terminal sends a key request of wearable equipment, the wearable equipment determines a symmetric key from a symmetric key mapping table according to the data type in the key request, encrypts the symmetric key by using a terminal public key to obtain a first ciphertext, sends the first ciphertext to the terminal, decrypts the first ciphertext by using a terminal private key to obtain the symmetric key, and decrypts encrypted data by using the symmetric key to obtain user data. According to the transmission method, the user data is stored outside the wearable device in a ciphertext mode, the symmetric key is stored on the wearable device, the user data and the symmetric key are stored separately, the symmetric key is transmitted to the wearable device in the ciphertext mode, and the safety of storage, symmetric key storage and transmission of the user data is improved.
Drawings
FIG. 1 is a block diagram of a data transmission system according to an exemplary embodiment of the present invention;
fig. 2 is a flow chart illustrating a data transmission method according to another exemplary embodiment of the present invention;
fig. 3 is a flow chart illustrating a data transmission method according to yet another exemplary embodiment of the present invention;
fig. 4 is a flowchart illustrating a data transmission method according to still another exemplary embodiment of the present invention;
FIG. 5 is a schematic structural diagram of a wearable device according to yet another exemplary embodiment of the present invention;
fig. 6 is a schematic structural diagram of a terminal according to still another exemplary embodiment of the present invention;
fig. 7 is a schematic structural diagram of an electronic device according to another exemplary embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention provides a data transmission method, a device, a system, equipment and a storage medium, which aim to solve the technical problems that a secret key and encrypted data are stored in terminal equipment or a server in the existing data transmission method, so that data loss is easily caused and potential safety hazards exist.
Fig. 1 is a schematic structural diagram of a data transmission system according to an exemplary embodiment of the present invention. As shown in fig. 1, the data transmission system provided by the present embodiment includes a wearable device 110, a terminal 120, and a server 130.
In the data transmission system, the wearable device 110 and the terminal 120 are bound to each other, and the terminal 120 transmits the terminal public key stored therein to the wearable device 110. After initialization of the wearable device 110 and the terminal 120, the wearable device 110 collects user data, such as: credit card records, beats per minute, body temperature data, sleep data, and exercise amount data. Wearable device 110 stores a plurality of sets of symmetric keys, the symmetric keys are used for encrypting user data, and the symmetric keys are selected according to data types of the user data. The wearable device 110 encrypts the user data with the symmetric key, and transmits the encrypted data to the terminal 120, so that the terminal 120 can check the user data, analyze and process the user data, and synchronize the user data with the server 130. When the terminal 120 needs to call the user data, the user data can be downloaded from the server.
When the terminal 120 needs to check the encrypted user data, the terminal 120 sends a key request to the wearable device 110, so that the wearable device 110 obtains a symmetric key according to the data type of the user data, encrypts the symmetric key by using a terminal public key to obtain a first ciphertext, sends the first ciphertext to the terminal 120, decrypts the first ciphertext by using a terminal private key to obtain the symmetric key, and decrypts the encrypted user data by using the symmetric key to obtain the user data.
The wearable device is embedded with the security chip, the security chip is used for encrypting user data and storing a symmetric key for encrypting the user data, when other chip units in the wearable device need to communicate with the security chip, the data can be transmitted only through a plurality of protocols, and if the data is transmitted through other protocols, the security chip does not perform data communication with other chips in the wearable device. And the security chip is provided with sensors such as a temperature sensor and a frequency sensor, so that data is prevented from being leaked when the security chip is damaged.
The terminal is internally provided with technologies such as fingerprint identification, face identification, iris and the like, so that a terminal private key and encrypted data stored in the terminal are prevented from being stolen.
In the data transmission system, the user data is stored in the form of ciphertext in the terminal and the server, the symmetric key for encrypting the user data is stored in the wearable device, and the encrypted data and the symmetric key are stored separately, so that the data security is improved. And when the terminal needs to read the user data, the symmetric key is sent to the terminal equipment in an encrypted form, so that the security of key transmission is improved.
Fig. 2 is a flowchart illustrating a data transmission method according to another exemplary embodiment of the present invention. As shown in fig. 2, the data transmission method provided in this embodiment includes the following steps:
s201, the terminal sends a key request.
More specifically, the wearable device may generate and store multiple sets of symmetric keys for cryptographic processing of different types of user data. For example: a first set of symmetric keys is generated and the credit card record data is encrypted using the first set of symmetric keys. A second set of symmetric keys is generated and the heartbeat number data is encrypted using the second set of symmetric keys. When the wearable device encrypts user data with the symmetric key, a symmetric key mapping table is generated.
The symmetric key mapping table is a one-to-one mapping relation table of data types and symmetric keys. For example: the credit card record data type corresponds to a first group of symmetric keys K001, and the heartbeat data type corresponds to a second group of symmetric keys K002.
The key request includes a data type of the user data to cause the wearable device to extract the symmetric key from the symmetric-key mapping table according to the data type.
S202, the wearable device acquires a key request.
S203, the wearable device determines a symmetric key from a preset symmetric key mapping table according to the data type.
More specifically, the symmetric key mapping table is a one-to-one mapping relationship table of data types and symmetric keys. The symmetric key used to encrypt the user data may be determined from a symmetric key map based on the data type.
For example: for the credit card record data type, a first group of symmetric keys K001 is determined from the symmetric key mapping table as symmetric keys for encrypting user data.
S204, the wearable device encrypts the symmetric key by using the terminal public key to obtain a first ciphertext.
More specifically, after the wearable device determines the symmetric key according to the symmetric key mapping table, the wearable device encrypts the symmetric key by using the terminal public key to obtain a first ciphertext.
S205, the wearable device sends the first ciphertext.
S206, the terminal decrypts the first ciphertext by using the terminal private key to obtain the symmetric key.
More specifically, the terminal private key and the terminal public key are a pair of asymmetric keys, wherein the terminal private key is stored in the terminal, and the terminal public key is stored in the wearable device. And after the terminal receives the first ciphertext encrypted by the terminal public key, the terminal private key is used for decrypting the first ciphertext to obtain the symmetric key.
S207, the terminal acquires the encrypted data.
More specifically, the encrypted data is data obtained by encrypting user data with a symmetric key. The encrypted data may be obtained in two embodiments as follows.
The first embodiment is as follows: if the encrypted data is stored in the data storage unit of the terminal, S207b may be directly executed to directly obtain the encrypted data from the data storage unit of the terminal.
The second embodiment is as follows: if the encrypted data is stored on the server, S207a and S207b are performed. S207a, the server transmits the encrypted data to the terminal. S207b, the terminal obtains the encrypted data.
The present invention is not limited to the above two data acquisition methods.
S208, the terminal decrypts the encrypted data by using the symmetric key to obtain the user data.
More specifically, the wearable device encrypts the user data using the symmetric key to obtain encrypted data. And after the terminal obtains the symmetric key, the terminal decrypts the encrypted data by using the symmetric key to obtain the user data.
In this embodiment, the symmetric key is stored in the wearable device, the user data is stored in the terminal or the server in an encrypted form, the encrypted data and the symmetric key are separately stored, the security of the user data is improved, and when the terminal needs to use the user data, the wearable device encrypts the symmetric key by using the terminal public key, so that the symmetric key is transmitted in an encrypted form, and the transmission security of the symmetric key is improved.
Fig. 3 is a flowchart illustrating a data transmission method according to another exemplary embodiment of the present invention. As shown in fig. 3, the data transmission method provided in this embodiment includes the following steps:
s301, the wearable device encrypts the user data by using the symmetric key to obtain encrypted data.
More specifically, after the wearable device receives the user data, a symmetric key is generated, the user data is encrypted by using the symmetric key, encrypted data is obtained, and a symmetric key mapping table is updated.
S302, the wearable device sends the encrypted data.
More specifically, the wearable device may send data in two ways, such that both the terminal and the server can receive the user data.
The first mode is as follows: s302a, the wearable device sends the encrypted data to the terminal device. S302b, the terminal device sends the encrypted data to the server. Namely, the wearable device does not directly send the encrypted data to the server.
The second way is: s302a, the wearable device sends the encrypted data to the terminal device. S302c, the wearable device sends the encrypted data to the server. The wearable device directly sends the encrypted data to the server.
The present invention is not limited to the two data transmission methods.
S303, the terminal sends a key request.
S304, the wearable device acquires the key request.
S305, the wearable device determines a symmetric key from a preset symmetric key mapping table according to the data type.
S306, the wearable device encrypts the symmetric key by using the terminal public key to obtain a first ciphertext.
S307, the wearable device sends the first ciphertext.
S308, the terminal decrypts the first ciphertext by using the terminal private key to obtain a symmetric key.
S309, the terminal acquires the encrypted data.
S310, the terminal decrypts the encrypted data by using the symmetric key to obtain the user data.
In the data transmission method provided by this embodiment, the wearable device encrypts the user data acquired by the wearable device, so that the wearable device sends the user data to the terminal device in an encrypted form, thereby improving the security of user data transmission.
Fig. 4 is a flowchart illustrating a data transmission method according to still another exemplary embodiment of the present invention. As shown in fig. 4, the data transmission method provided in this embodiment includes the following steps:
s401, the wearable device receives a handshake instruction.
More specifically, the wearable device interacts with the terminal for the first time, and the terminal sends a handshake instruction to the wearable device, which belongs to an initialization phase and does not need to consider security issues.
S402, the wearable device sends a response instruction so that the terminal and the wearable device are bound with each other.
More specifically, after the terminal sends a handshake instruction to the wearable device and the wearable device sends a response instruction to the terminal, the terminal and the wearable device can be bound to each other.
S403, the wearable device obtains a terminal public key.
More specifically, the terminal possesses a pair of public keys that includes a terminal public key and a terminal private key. The terminal public key is named as appPub, and the terminal private key is named as appPri. The terminal sends the terminal public key to the wearable device, and the wearable device receives and stores the terminal public key.
S404, the wearable device encrypts user data in the security chip by using the symmetric key to obtain encrypted data.
More specifically, in this embodiment, the wearable device is provided with a Secure Element (SE). The SE has high safety performance and can prevent the data stored in the SE from being stolen.
After the wearable device collects user Data, the SE generates a symmetric key by using an Encryption Algorithm in the prior art, for example, a Triple Data Encryption Algorithm (Triple Data Encryption Algorithm, 3DES for short) or an Advanced Encryption Standard (AES for short) Algorithm is used, and both algorithms can be used for strong Encryption.
S405, the wearable device sends the encrypted data.
S406, the terminal sends a key request.
S407, the wearable device acquires the key request.
And S408, the wearable device determines a symmetric key from a preset symmetric key mapping table according to the data type.
S409, the wearable device encrypts the symmetric key in the security chip by using the terminal public key to obtain a first ciphertext.
More specifically, in the present embodiment, the symmetric key is encrypted by using the terminal public key in the SE to obtain the first ciphertext, so that the symmetric key and the first ciphertext can be prevented from being stolen when the symmetric key is encrypted.
Taking the example that the wearable device generates the symmetric key by using the AES algorithm, the SE generates a symmetric key AESkey by using the AES algorithm, encrypts the symmetric key AESkey by using the terminal public key appPub, then calculates a Hash value for the AESkey by using the Hash Hash algorithm, gives the Hash value behind the encrypted data to generate a first ciphertext, and sends the first ciphertext to the wearable device.
S410, the wearable device sends a first ciphertext.
S411, the terminal decrypts the first ciphertext by using the terminal private key to obtain a symmetric key.
More specifically, after receiving the first ciphertext, the terminal may decrypt the first ciphertext using a terminal private key stored in the terminal to obtain a symmetric key.
For example: and for the first ciphertext sent in the S409, after the terminal receives the first ciphertext, removing the Hash value, decrypting the remaining data by using the terminal private key appPri to obtain the symmetric key, then calculating the Hash value of the symmetric key, comparing the Hash value with the received Hash value, and if the Hash value is consistent, indicating that the data reception is complete.
S412, the terminal acquires the encrypted data.
And S413, the terminal decrypts the encrypted data by using the symmetric key to obtain the user data.
In the data transmission method provided by this embodiment, a handshake instruction and a response instruction are sent between the wearable device and the terminal device, and mutual binding between the terminal and the wearable device is realized, so that a terminal public key sent by the terminal is sent to the wearable device, and the wearable device can utilize the terminal public key to encrypt the symmetric key, so as to improve security of key storage and key transmission. In addition, the encryption unit for encrypting the symmetric key is different from the sending unit for sending the first ciphertext, and when the symmetric key is transmitted between the two units, the symmetric key is subjected to data encapsulation processing, so that the symmetric key can be prevented from being stolen, and the security performance of key data transmission and storage is improved.
The wearable device provided by the application can be used for executing the data transmission method, and the content and effect of the wearable device can be referred to the method part, which is not described herein again.
Fig. 5 is a schematic structural diagram of a wearable device according to still another exemplary embodiment of the present invention. As shown in fig. 5, the present embodiment provides a wearable device including: a first obtaining module 501, configured to obtain a key request sent by a terminal; wherein the key request includes a data type of the user data; a determining module 502, configured to determine a symmetric key from a preset symmetric key mapping table according to a data type; the symmetric key mapping table is a one-to-one mapping relation table of user data types and symmetric keys; the encryption module 503 is configured to encrypt the symmetric key with the terminal public key to obtain a first ciphertext; the first sending module 504 is configured to send the first ciphertext to the terminal, so that the terminal decrypts the first ciphertext by using the terminal private key to obtain a symmetric key, and decrypts the encrypted data by using the symmetric key to obtain the user data.
Optionally, the encryption module 503 is further configured to encrypt the user data with the symmetric key to obtain encrypted data; the first sending module 504 is further configured to send the encrypted data to the terminal.
Optionally, the wearable device further includes a security chip, and the encryption module 503 is specifically configured to: and encrypting the symmetric key by using the terminal public key in the security chip to obtain a first ciphertext.
Optionally, the first obtaining module 501 is further configured to obtain a handshake instruction sent by the terminal; the first sending module 504 is further configured to send a response instruction to the terminal, so that the terminal and the wearable device are bound to each other; and acquiring a terminal public key sent by the terminal, wherein the terminal public key and the terminal private key form a pair of asymmetric key pairs.
The terminal provided in the present application may be configured to execute the data transmission method, and the content and effect thereof may refer to the method part, which is not described herein again.
Fig. 6 is a schematic structural diagram of a terminal according to still another exemplary embodiment of the present invention. As shown in fig. 6, the present embodiment provides a terminal, including: a second sending module 601, configured to send a key request to the wearable device, so that the wearable device obtains a symmetric key from a preset symmetric key mapping table, and encrypts the symmetric key by using a terminal public key to obtain a first ciphertext; the symmetric key mapping table is a one-to-one mapping relation table of user data types and symmetric keys; a receiving module 602, configured to receive the first ciphertext, and decrypt the first ciphertext with a terminal private key to obtain a symmetric key; a second obtaining module 603, configured to obtain encrypted data; the wearable device encrypts user data by using a symmetric key to obtain encrypted data; and a decryption module 604, configured to decrypt the encrypted data with the symmetric key to obtain the user data.
The electronic device provided by the present application may be configured to execute the data transmission method, and the content and effect of the electronic device may refer to the method part, which is not described herein again.
Fig. 7 is a schematic structural diagram of an electronic device according to an exemplary embodiment of the present invention. As shown in fig. 7, the electronic device 700 of the present embodiment includes: a processor 701, a memory 702, and a secure chip 704, wherein,
a memory 702 for storing computer-executable instructions;
the processor 701 is configured to execute the computer-executable instructions stored in the memory to implement the steps performed by the receiving device in the above embodiments. Reference may be made in particular to the description relating to the method embodiments described above.
The secure chip 704 is configured to execute computer-executable instructions stored in the memory to implement the steps performed by the apparatus in the above embodiments. Reference may be made in particular to the description relating to the method embodiments described above.
Optionally, the memory 702 may be independent or integrated with the processor 701 and the security chip 703.
When the memory 702 is provided separately, the electronic device 700 further includes a bus 703 for connecting the memory 702, the secure chip 704, and the processor 701.
The embodiment of the invention also provides a computer-readable storage medium, wherein a computer execution instruction is stored in the computer-readable storage medium, and when a processor executes the computer execution instruction, the data transmission method is realized.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. A data transmission method is applied to a wearable device, and comprises the following steps:
acquiring a key request sent by a terminal; wherein the key request includes a data type of user data;
determining a symmetric key from a preset symmetric key mapping table according to the data type; the symmetric key mapping table is a one-to-one mapping relation table of the data type and the symmetric key; the symmetric key is stored in a security chip, and the wearable device comprises a security chip;
encrypting the symmetric key by using a terminal public key to obtain a first ciphertext;
sending the first ciphertext to the terminal, so that the terminal decrypts the first ciphertext by using the terminal private key to obtain a symmetric key, and decrypts the encrypted data by using the symmetric key to obtain the user data; wherein the encrypted data is obtained by the terminal from a server.
2. The method according to claim 1, wherein before the obtaining the key request sent by the terminal, further comprising:
encrypting the user data by using a symmetric key to obtain the encrypted data;
and sending the encrypted data to the terminal.
3. The method according to claim 1, wherein the wearable device further includes a security chip, and the encrypting the symmetric key with the terminal public key to obtain a first ciphertext specifically includes:
and encrypting the symmetric key by using the terminal public key in the security chip to obtain a first ciphertext.
4. The method according to claim 1, wherein before the obtaining the key request sent by the terminal, further comprising:
acquiring a handshake instruction sent by the terminal;
sending a response instruction to the terminal so as to enable the terminal and the wearable device to be bound with each other;
and acquiring a terminal public key sent by the terminal, wherein the terminal public key and the terminal private key are a pair of asymmetric key pairs.
5. A data transmission method, applied to a terminal, the method comprising:
sending a key request to wearable equipment so that the wearable equipment obtains a symmetric key from a preset symmetric key mapping table, and encrypting the symmetric key by using a terminal public key to obtain a first ciphertext; the symmetric key mapping table is a one-to-one mapping relation table of data types and symmetric keys; the symmetric key is stored in a security chip, and the wearable device comprises a security chip;
receiving the first ciphertext, and decrypting the first ciphertext by using the terminal private key to obtain a symmetric key;
acquiring encrypted data stored in a server; the wearable device encrypts user data by using the symmetric key to obtain the encrypted data;
and decrypting the encrypted data by using the symmetric key to obtain the user data.
6. A wearable device, comprising:
the first acquisition module is used for acquiring a key request sent by a terminal; wherein the key request includes a data type of user data;
the determining module is used for determining a symmetric key from a preset symmetric key mapping table according to the data type; the symmetric key mapping table is a one-to-one mapping relation table of user data types and symmetric keys; the symmetric key is stored in a security chip, and the wearable device comprises a security chip;
the encryption module is used for encrypting the symmetric key by using a terminal public key to obtain a first ciphertext;
the sending module is used for sending a first ciphertext to the terminal so that the terminal decrypts the first ciphertext by using the terminal private key to obtain a symmetric key, and decrypts the encrypted data by using the symmetric key to obtain the user data; wherein the encrypted data is obtained by the terminal from a server.
7. A terminal, comprising:
the wearable device comprises a sending module, a first cryptograph and a second cryptograph, wherein the sending module is used for sending a key request to the wearable device so that the wearable device obtains a symmetric key from a preset symmetric key mapping table, and the symmetric key is encrypted by using a terminal public key to obtain the first cryptograph; the symmetric key mapping table is a one-to-one mapping relation table of user data types and symmetric keys; the symmetric key is stored in a security chip, and the wearable device comprises a security chip;
the receiving module is used for receiving the first ciphertext and decrypting the first ciphertext by using the terminal private key to obtain a symmetric key;
the second acquisition module is used for acquiring the encrypted data stored in the server; the wearable device encrypts the user data by using the symmetric key to obtain the encrypted data;
and the decryption module is used for decrypting the encrypted data by using the symmetric key to obtain the user data.
8. A data transmission system comprising a wearable device according to claim 6, a terminal according to claim 7 and a server.
9. A wearable device, comprising: at least one processor, a memory, and a security chip;
wherein the memory stores computer-executable instructions;
the at least one processor and the secure chip execute the computer-executable instructions stored by the memory, causing the at least one processor and the secure chip to perform the data transfer method of any of claims 1 to 4.
10. A computer-readable storage medium having computer-executable instructions stored thereon, which when executed by a processor, implement the data transmission method of any one of claims 1 to 4.
CN201910369667.1A 2019-05-06 2019-05-06 Data transmission method, device, system, equipment and storage medium Active CN109981275B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910369667.1A CN109981275B (en) 2019-05-06 2019-05-06 Data transmission method, device, system, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910369667.1A CN109981275B (en) 2019-05-06 2019-05-06 Data transmission method, device, system, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109981275A CN109981275A (en) 2019-07-05
CN109981275B true CN109981275B (en) 2022-03-08

Family

ID=67072823

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910369667.1A Active CN109981275B (en) 2019-05-06 2019-05-06 Data transmission method, device, system, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109981275B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111767550A (en) * 2019-07-24 2020-10-13 北京沃东天骏信息技术有限公司 Data storage method and device
CN110677382A (en) * 2019-08-20 2020-01-10 中国平安财产保险股份有限公司 Data security processing method, device, computer system and storage medium
CN111400735B (en) * 2020-03-17 2023-06-16 阿波罗智联(北京)科技有限公司 Data transmission method, device, electronic equipment and computer readable storage medium
CN112272086A (en) * 2020-10-23 2021-01-26 安徽中科美络信息技术有限公司 Data encryption transmission method and system and intelligent terminal
CN113483827A (en) * 2021-07-26 2021-10-08 西安芯海微电子科技有限公司 Wearable device, and data processing method and device of wearable device
CN117376035B (en) * 2023-12-08 2024-02-23 中汽智联技术有限公司 Vehicle data transmission method, system, equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102802154A (en) * 2012-08-10 2012-11-28 中国联合网络通信集团有限公司 Certification method, device and system for data transmission in Internet of Things
CN103067158A (en) * 2012-12-27 2013-04-24 华为技术有限公司 Encryption and decryption method, terminal device, gateway device and key management system
CN103107995A (en) * 2013-02-06 2013-05-15 中电长城网际系统应用有限公司 Cloud computing environmental data secure storage system and method
CN103701594A (en) * 2014-01-03 2014-04-02 天地融科技股份有限公司 Data transmission method and system
CN108768972A (en) * 2018-05-16 2018-11-06 智车优行科技(北京)有限公司 Vehicle data stores and accesses method and device, system, electronic equipment
CN109361704A (en) * 2018-12-12 2019-02-19 深圳市网心科技有限公司 Cloud storage data encryption and transmission method, system, equipment and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102802154A (en) * 2012-08-10 2012-11-28 中国联合网络通信集团有限公司 Certification method, device and system for data transmission in Internet of Things
CN103067158A (en) * 2012-12-27 2013-04-24 华为技术有限公司 Encryption and decryption method, terminal device, gateway device and key management system
CN103107995A (en) * 2013-02-06 2013-05-15 中电长城网际系统应用有限公司 Cloud computing environmental data secure storage system and method
CN103701594A (en) * 2014-01-03 2014-04-02 天地融科技股份有限公司 Data transmission method and system
CN108768972A (en) * 2018-05-16 2018-11-06 智车优行科技(北京)有限公司 Vehicle data stores and accesses method and device, system, electronic equipment
CN109361704A (en) * 2018-12-12 2019-02-19 深圳市网心科技有限公司 Cloud storage data encryption and transmission method, system, equipment and storage medium

Also Published As

Publication number Publication date
CN109981275A (en) 2019-07-05

Similar Documents

Publication Publication Date Title
CN109981275B (en) Data transmission method, device, system, equipment and storage medium
CA3061233C (en) Provisioning a secure connection using a pre-shared key
CN109150835B (en) Cloud data access method, device, equipment and computer readable storage medium
CN109150519B (en) Anti-quantum computing cloud storage security control method and system based on public key pool
WO2017097041A1 (en) Data transmission method and device
CN106452770B (en) Data encryption method, data decryption method, device and system
CN107438230B (en) Safe wireless ranging
CN110399717B (en) Key acquisition method and device, storage medium and electronic device
EP3220573B1 (en) Method and system for controlling encryption of information and analyzing information as well as terminal
CN107317677B (en) Secret key storage and equipment identity authentication method and device
US20160197729A1 (en) Location aware cryptography
WO2017202025A1 (en) Terminal file encryption method, terminal file decryption method, and terminal
CN103124269A (en) Bidirectional identity authentication method based on dynamic password and biologic features under cloud environment
EP3644548B1 (en) Key exchange system and key exchange method
CN107005577B (en) Fingerprint data processing method and processing device
CN106874743B (en) Method and system for storing and extracting smart card password
CN209803788U (en) PCIE credible password card
US8327150B2 (en) System, method and program for managing information
CN107465665A (en) A kind of file encryption-decryption method based on fingerprint identification technology
CN105117658A (en) Password security management method and equipment based on fingerprint authentication
CN115314313A (en) Information encryption method and device, storage medium and computer equipment
CN109756451B (en) Information interaction method and device
CN112039922B (en) Encryption communication method and device
CN113722741A (en) Data encryption method and device and data decryption method and device
CN110278077B (en) Method, device, equipment and storage medium for acquiring data information of electric energy meter

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 330096 torch street, high tech Development Zone, Nanchang City, Jiangxi Province

Applicant after: Jiede (China) Technology Co.,Ltd.

Address before: 330096 torch street, high tech Development Zone, Nanchang City, Jiangxi Province

Applicant before: Jiede (China) Information Technology Co.,Ltd.

GR01 Patent grant
GR01 Patent grant