CN110298184A - Information processing method and terminal device - Google Patents

Information processing method and terminal device Download PDF

Info

Publication number
CN110298184A
CN110298184A CN201910575531.6A CN201910575531A CN110298184A CN 110298184 A CN110298184 A CN 110298184A CN 201910575531 A CN201910575531 A CN 201910575531A CN 110298184 A CN110298184 A CN 110298184A
Authority
CN
China
Prior art keywords
password
target information
terminal equipment
information
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910575531.6A
Other languages
Chinese (zh)
Inventor
杨超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201910575531.6A priority Critical patent/CN110298184A/en
Publication of CN110298184A publication Critical patent/CN110298184A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention relates to field of communication technology, a kind of information processing method and terminal device are provided, to solve to store the poor problem of the safety of information beyond the clouds in the prior art.This method comprises: being encrypted according to first password and the second password to target information;The encrypted target information is sent to server.Since the target information of storage on the server is that, in this way, target information not will be leaked in server, can be improved the safety of information according to the information after first password and the second password encryption.

Description

Information processing method and terminal device
Technical field
The present invention relates to field of communication technology more particularly to a kind of information processing methods and terminal device.
Background technique
With the development of terminal device, the information storage function of terminal device is become stronger day by day.In order to obtain terminal device More sufficient memory space and prevent information from losing, local information would generally be backed up to cloud by terminal device.In this way, with Family can at any time delete the information on terminal device, can be by downloading from cloud when needing to obtain information again Mode obtain.
However, storing in information to cloud, if cloud service quotient needs to obtain the information of user's storage, cloud service quotient Also the information being able to access that on server seriously threatens the information security of user.As it can be seen that the safety of the information of storage beyond the clouds Property is poor.
Summary of the invention
The embodiment of the present invention provides a kind of information processing method and terminal device, to solve to be stored in cloud in the prior art The poor problem of the safety of the information at end.
In order to solve the above-mentioned technical problem, the present invention is implemented as follows:
In a first aspect, the embodiment of the present invention provides a kind of information processing method, it is applied to first terminal equipment, comprising:
Target information is encrypted according to first password and the second password;
The encrypted target information is sent to server.
Second aspect, the embodiment of the present invention also provide a kind of information processing method, are applied to second terminal equipment, comprising:
Target information is obtained from server;
Receive the third input of user;
It is inputted in the third under inputted password and the matched situation of first password, the target information is solved It is close;
Wherein, the target information is according to the information after the first password and the second password encryption.
The third aspect, the embodiment of the present invention provide a kind of information processing method, are applied to server, comprising:
Receive the target information that first terminal equipment is sent;
The target information is sent to second terminal equipment;
Wherein, the target information is the first terminal equipment according to the letter after first password and the second password encryption Breath.
Fourth aspect, the embodiment of the present invention provide a kind of terminal device, are applied to first terminal equipment, comprising:
Encrypting module, for being encrypted according to first password and the second password to target information;
First sending module, for the encrypted target information to be sent to server.
5th aspect, the embodiment of the present invention provide a kind of terminal device, are applied to second terminal equipment, comprising:
Second obtains module, for obtaining target information from server;
Third receiving module, the third for receiving user input;
Second deciphering module, it is right for being inputted under inputted password and the matched situation of first password in the third The target information is decrypted;
Wherein, the target information is according to the information after the first password and the second password encryption.
6th aspect, the embodiment of the present invention provide a kind of server, comprising:
4th receiving module, for receiving the target information of first terminal equipment transmission;
4th sending module, for sending the target information to second terminal equipment;
Wherein, the target information is the first terminal equipment according to the letter after first password and the second password encryption Breath.
7th aspect, the embodiment of the present invention also provides a kind of terminal device, comprising: memory, processor and is stored in On reservoir and the computer program that can run on a processor, the processor realize institute as above when executing the computer program The step in the corresponding information processing method in first terminal equipment side or second terminal equipment side stated.
Eighth aspect, the embodiment of the present invention also provide a kind of server, comprising: memory, processor and are stored in storage On device and the computer program that can run on a processor, the processor are realized as described above when executing the computer program The corresponding information processing method of server side in step.
9th aspect, the embodiment of the present invention also provide a kind of computer readable storage medium, the computer-readable storage Store computer program on medium, the computer program realized when being executed by processor terminal equipment side as described above or Step in the corresponding information processing method of server side.
In the embodiment of the present invention, target information is encrypted according to first password and the second password;By the encrypted mesh Mark information is sent to server.Due to store target information on the server be according to first password and the second password encryption after Information can be improved the safety of information in this way, target information not will be leaked in server.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, needed in being described below to the embodiment of the present invention Attached drawing to be used is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, For those of ordinary skill in the art, without any creative labor, it can also obtain according to these attached drawings Obtain other attached drawings.
Fig. 1 is one of the flow chart of information processing method provided in an embodiment of the present invention;
Fig. 2 is the interface schematic diagram of terminal device provided in an embodiment of the present invention;
Fig. 3 is the two of the flow chart of information processing method provided in an embodiment of the present invention;
Fig. 4 is the three of the flow chart of information processing method provided in an embodiment of the present invention;
Fig. 5 is the structure chart of first terminal equipment provided in an embodiment of the present invention;
Fig. 6 is the structure chart of second terminal equipment provided in an embodiment of the present invention;
Fig. 7 is one of the structure chart of server provided in an embodiment of the present invention;
Fig. 8 is the structure chart of terminal device provided in an embodiment of the present invention;
Fig. 9 is the two of the structure chart of server provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
It is the flow chart of information processing method provided in an embodiment of the present invention referring to Fig. 1, Fig. 1, which answers For first terminal equipment.As shown in Figure 1, comprising the following steps:
Step 101 encrypts target information according to first password and the second password.
Wherein, first password can be the password inputted according to user's operation, and first password can store in first terminal Equipment, for example, password, the finger-print cipher etc. that are inputted by keyboard.
Second password can be the password of first terminal equipment generation, for example, the key that first terminal equipment generates at random, Or the key that first terminal equipment is generated according to first password according to preset rules.Second password can be sent to server.
Target information can be the data of first terminal equipment storage, for example, photo, address list, short message, browser save Website password etc..First terminal equipment can export prompt information to prompt the user whether to encrypt target information, If encrypting to target information, encrypted target information, user can not check the particular content of target information.
First terminal equipment encrypts target information according to first password, and according to the second password encryption, i.e. target information It is encrypted twice.
The encrypted target information is sent to server by step 102.
Encrypted target information is sent to server by first terminal equipment, no in the server while storage first In the case where password and the second password, server cannot decrypt target information.In this way, being stored in the target information of server not It will be leaked, can be improved the safety of information.
Optionally, it is described target information is encrypted according to first password and the second password after, the method also includes:
Receive the first input to destination application;
In response to first input, on the interface of the destination application, the encrypted target letter is shown Breath.
In this embodiment, the first input can be the operation by destination application access target information, specifically It can be clicking operation, pressing operation or slide etc. on destination application interface.The response of first terminal equipment First input, shows encrypted target information on destination application interface, for example, display hides target information Information after gear, Fuzzy processing.Since target information is encrypted, destination application cannot check the target information of encryption.
For example, the Part of photos taken in photograph album is encrypted as shown in Fig. 2, user passes through social application routine access photograph album, use Family can only check the photo not encrypted, and the photo encrypted is predetermined picture and blocks, the tool for the picture that user cannot check Body information.First terminal equipment can export prompt information at the photograph album interface, to prompt user to input the password of decryption.
In specific implementation, first terminal equipment can develop decryption API (Application Programming Interface, application programming interface) application program is given, it is decrypted, applies after user inputs correct Crypted password Program could access the photo content of encryption.
In such manner, it is possible to prevent information leakage, the safety of information can be improved.
Optionally, described on the interface of the destination application, after showing the encrypted target information, institute State method further include:
Receive the second input of user;
Under second input inputted password and the matched situation of the first password, to the target information solution It is close;
The target information on the interface of the destination application, after display decryption.
In this embodiment, in the case where first terminal equipment shows interface for password input, user can input close Code, i.e., the second input.First terminal equipment obtains the second inputted password of input, and carries out with the first password of storage Match, under the password and the matched situation of first password of user's input, first terminal equipment decrypts target information.Believe in target After breath decryption, user can pass through destination application access target information.
In specific implementation, first terminal equipment can be according to first password, i.e. cryptographic calculations one of user's input Encrypted characters string unite as the second password.Second password can be saved by first terminal equipment, and user can not obtain, the second password Server can also be uploaded to.When encrypting target information, first password can be then recycled first with the second password encryption Encryption.Since server can not obtain first password, target information can not be decrypted, can be improved the safety of target information. When decryption, first terminal equipment first can decrypt first password, then when the password that user inputs is matched with first password Target information is decrypted using the second password of storage.
In this way, user passes through the target information after the accessible decryption of destination application, energy in first terminal equipment Enough improve the privacy of target information.
Optionally, second password is the key that the first terminal equipment generates;It is described according to first password and After two passwords encrypt target information, the method also includes:
The key is sent to server.
In this embodiment, the second password can be the password of first terminal equipment generation, for example, first terminal equipment The key that the key or first terminal equipment generated at random is generated according to first password according to preset rules.First terminal is set It is standby that key is sent to server, it, can when user is by other terminal devices, such as when second terminal device downloads target information Target information to be decrypted by second terminal equipment utilization key, thus access target information.
In the case where key is to be generated according to first password according to preset rules, if the key stored in server is lost It loses, can be generated to obtain key according to above-mentioned preset rules according to first password again.
In the embodiment, key is sent to server, user can access on server by other terminal devices Target information, when user's replacement terminal equipment or terminal device are lost, still accessible target information.Due to target Information carries out double layer encryption using key and password, and key can be stored in server, and user in terminal device by inputting just True password can decrypt target information, can be improved the safety of information, and can prevent target information on the server Leakage.
Optionally, it is described target information is encrypted according to first password and the second password before, the method also includes:
The first Hash codes of the target information are obtained, first Hash codes are corresponding with the first password;
It is described target information is encrypted according to first password and the second password after, the method also includes:
First Hash codes are sent to server.
In this embodiment, before being encrypted to target information, the first Hash codes of available target information.First Hash codes, which can be, to be generated according to preset rules according to the feature of first password and target information.First terminal equipment The first Hash codes are sent to server, in this way, server cannot obtain first password according to the first Hash codes, server cannot be visited The content for asking target information can be improved the safety of target information.And when user's replacement terminal equipment, other can be passed through Terminal device decrypts target information, improves the flexibility of information.
In the embodiment of the present invention, above- mentioned information processing method can be applied to terminal device, such as: mobile phone, tablet computer (Tablet Personal Computer), laptop computer (Laptop Computer), personal digital assistant (personal Digital assistant, abbreviation PDA), mobile Internet access device (Mobile Internet Device, MID) or wearable Equipment (Wearable Device) etc..
The information processing method of the embodiment of the present invention encrypts target information according to first password and the second password;It will add The target information after close is sent to server.It is according to first password and the due to storing target information on the server Information after two password encryptions can be improved the safety of information in this way, target information not will be leaked in server.
Referring to Fig. 3, the main distinction of the present embodiment and above-described embodiment is, realizes from the angle of second terminal equipment Method.
Fig. 3 is the flow chart of information processing method provided in an embodiment of the present invention, as shown in Figure 3, comprising the following steps:
Step 301 obtains target information from server.
In this step, target information, which can be, directly obtains from the mode that server is downloaded, and can also be from server After downloading multiple target informations and being stored in local terminal, from local acquisition.
Second terminal equipment can be other terminal devices in addition to first terminal equipment.
Step 302, the third input for receiving user.
In this step, third input can be used for inputting password.
Step 303 inputs in the inputted matched situation of password and first password in the third, believes the target Breath is decrypted;
Wherein, the target information is according to the information after the first password and the second password encryption.
In this step, second terminal equipment can match the password that user inputs with first password, thus Under the password and the matched situation of first password of user's input, target information is decrypted.
Wherein, first password can be second terminal equipment receive first terminal equipment send and store, in this feelings Under condition, second terminal equipment can directly be compared the password that user inputs with first password;Or first terminal equipment First password can be calculated after generating Hash codes according to preset rules, be sent to server, second terminal is obtained from server The Hash codes, and the password based on user's input and information characteristics generate another Hash codes, so as to according to two Hash The mode of code comparison carries out password match.
Optionally, carry the first Hash codes of the target information in the target information, first Hash codes with The first password is corresponding;
After the third input for receiving user, the method also includes:
Obtain the second Hash codes of the target information, wherein second Hash codes are inputted with the third Password it is corresponding;
It is described in the case where the third inputs inputted password and the matched situation of first password, to the target information into Row decryption, comprising:
Under second Hash codes and the matched situation of the first Hash codes, the target information is decrypted.
In this embodiment, it is defeated can to input institute according to third after user carries out third input for second terminal equipment The feature of the password entered and target information generates the second Hash codes, and the second Hash codes are able to reflect the feature of target information.? Under second Hash codes and the matched situation of the first Hash codes, illustrate that the information for being currently at encrypted state is user in first terminal The information of equipment encryption, and user's third inputs inputted password and matches with first password.Therefore, target information is solved It is close.
In this way, target information is decrypted using Hash codes, server access target information can be prevented, and convenient for using Target information is decrypted in other terminal devices in family, improves access flexibility.
Optionally, second password is the key that first terminal equipment generates, and is carried in the target information described Key;It is described to be inputted in the third under inputted password and the matched situation of first password, the target information is carried out Decryption, comprising:
It inputs in the third under inputted password and the matched situation of the first password, is inputted based on the third Target information described in the password inputted and the key pair is decrypted.
Second password is the system key that first terminal equipment generates, which can be decrypted based on the operation of user, is used Family, which needs to input correct first password, to decrypt target information.That is, close in the inputted password of third input and first In the matched situation of code, it is decrypted according to the password that third inputs, and be decrypted according to system key.In such manner, it is possible to anti- Only server access target information, and can be improved the flexibility of user's access target information.
In specific implementation, if user needs in second terminal equipment access target information, user can be by logging in eventually End equipment service provider website, and authorize and target information is synchronized to second terminal equipment, at this point, server is by the second password and mesh Mark information is sent to second terminal equipment, can be improved the safety of information.
The information processing method of the embodiment of the present invention, target information carry out double-deck add by first password and the second password Close, user can decrypt target information, can either improve target in the input of second terminal equipment and the matched password of first password The safety of information, and can be improved the flexibility of user's access target information.
Fig. 4 is the flow chart of information processing method provided in an embodiment of the present invention, the relatively above-mentioned implementation of the embodiment of the present invention The difference of example is that the embodiment of the present invention is the method that the angle of server is realized.As shown in Figure 4, comprising the following steps:
Step 401 receives the target information that first terminal equipment is sent.
Wherein, the target information is the first terminal equipment according to the letter after first password and the second password encryption Breath.
Step 402 sends the target information to second terminal equipment.
Relevant explanation in above-mentioned steps may refer to the description in above-described embodiment.
Since target information carries out double layer encryption by first password and the second password, server is unable to access target information Content, can be improved the safety of target information.
Optionally, second password is the key that the first terminal equipment generates, and is carried in the target information The key;
After the target information for receiving the transmission of first terminal equipment, the method also includes:
The key is sent to the second terminal equipment.
In this embodiment, server sends key to second terminal equipment, and second terminal equipment can be based on key One layer of decryption is carried out to target information, and the password that can be inputted based on user carries out another layer of decryption.In this way, eventually convenient for second Target information is decrypted in end equipment, thus quickly access target information.
Optionally, carry the first Hash codes of the target information in the target information, first Hash codes with The first password is corresponding;
After the target information for receiving the transmission of first terminal equipment, the method also includes:
First Hash codes are sent to the second terminal equipment.
In this embodiment, server sends the first Hash codes to second terminal equipment, and second terminal equipment can be with base The second Hash codes are calculated in the password and target information of user's input, and according to the matching degree of the second Hash codes and the first Hash codes Carry out one layer of decryption.And another layer of decryption can be carried out based on key pair target information.In this way, convenient for second terminal equipment to mesh Mark information is decrypted, thus quickly access target information.
The information processing method of the embodiment of the present invention, target information carry out double-deck add by first password and the second password Close, server is unable to the content of access target information, can be improved the safety of target information.
It is the structure chart of terminal device provided in an embodiment of the present invention referring to Fig. 5, Fig. 5, is applied to first terminal equipment.Such as Shown in Fig. 5, first terminal equipment 500 includes:
Encrypting module 501, for being encrypted according to first password and the second password to target information;
First sending module 502, for the encrypted target information to be sent to server.
Optionally, the terminal device further include:
First receiving module, for receiving the first input to destination application;
First display module, in response to first input, on the interface of the destination application, display to add The target information after close.
Optionally, the terminal device further include:
Second receiving module, for receiving the second input of user;
First deciphering module, for the case where the inputted password of second input is matched with the first password Under, the target information is decrypted;
Second display module, for the target information behind the interface of the destination application, display decryption.
Optionally, second password is the key that the first terminal equipment generates;It is described according to first password and After two passwords encrypt target information, the terminal device further include:
Second sending module, for sending the key to server.
Optionally, the terminal device further include:
First obtains module, for obtaining the first Hash codes of the target information, first Hash codes and described the One password is corresponding;
The terminal device further include:
Third sending module, for sending first Hash codes to server.
First terminal equipment 500 can be realized each process that first terminal equipment is realized in above method embodiment, be It avoids repeating, which is not described herein again.
The first terminal equipment 500 of the embodiment of the present invention, target information not will be leaked in server, can be improved information Safety.
It is the structure chart of another terminal device provided in an embodiment of the present invention referring to Fig. 6, Fig. 6, is set applied to second terminal It is standby.As shown in fig. 6, second terminal equipment 600 includes:
Second obtains module 601, for obtaining target information from server;
Third receiving module 602, the third for receiving user input;
Second deciphering module 603, for being inputted under inputted password and the matched situation of first password in the third, The target information is decrypted;
Wherein, the target information is according to the information after the first password and the second password encryption.
Optionally, carry the first Hash codes of the target information in the target information, first Hash codes with The first password is corresponding;
The terminal device further include:
Third obtains module, for obtaining the second Hash codes of the target information, wherein second Hash codes and institute It is corresponding to state the inputted password of third input;
Second deciphering module is specifically used for:
Under second Hash codes and the matched situation of the first Hash codes, the target information is decrypted.
Optionally, second password is the key that first terminal equipment generates, and is carried in the target information described Key;Second deciphering module is specifically used for:
It inputs in the third under inputted password and the matched situation of the first password, is inputted based on the third Target information described in the password inputted and the key pair is decrypted.
Second terminal equipment 600 can be realized each process that second terminal equipment is realized in above method embodiment, be It avoids repeating, which is not described herein again.
The second terminal equipment 600 of the embodiment of the present invention, user input matched with first password in second terminal equipment Password can decrypt target information, can either improve the safety of target information, and can be improved user's access target information Flexibility.
It is the structure chart of server provided in an embodiment of the present invention referring to Fig. 7, Fig. 7, if Fig. 7 shows, server 700 includes:
4th receiving module 701, for receiving the target information of first terminal equipment transmission;
4th sending module 702, for sending the target information to second terminal equipment;
Wherein, the target information is the first terminal equipment according to the letter after first password and the second password encryption Breath.
Optionally, second password is the key that the first terminal equipment generates, and is carried in the target information The key;
The server further include:
5th sending module, for sending the key to the second terminal equipment.
Optionally, carry the first Hash codes of the target information in the target information, first Hash codes with The first password is corresponding;
The server further include:
6th sending module, for sending first Hash codes to the second terminal equipment.
Server 700 can be realized each process that server is realized in above method embodiment, to avoid repeating, here It repeats no more.
The server 700 of the embodiment of the present invention, target information carry out double layer encryption, clothes by first password and the second password Business device is unable to the content of access target information, can be improved the safety of target information.
A kind of hardware structural diagram of Fig. 8 terminal device of each embodiment to realize the present invention, which can To be the first terminal equipment in above-described embodiment.The terminal device 800 includes but is not limited to: radio frequency unit 801, network module 802, audio output unit 803, input unit 804, sensor 805, display unit 806, user input unit 807, interface list The components such as member 808, memory 809, processor 810 and power supply 811.It will be understood by those skilled in the art that being shown in Fig. 8 Terminal device structure do not constitute the restriction to terminal device, terminal device may include than illustrating more or fewer portions Part perhaps combines certain components or different component layouts.In embodiments of the present invention, terminal device includes but is not limited to Mobile phone, tablet computer, laptop, palm PC, vehicle mobile terminals, wearable device and pedometer etc..
Wherein, processor 810, for being encrypted according to first password and the second password to target information;
The encrypted target information is sent to server.
In this way, target information not will be leaked in server, the safety of information can be improved.
Optionally, processor 810 is used for, and control user input unit 807 receives the first input to destination application; In response to first input, on the interface of the destination application, control display unit 806 shows encrypted described Target information.
Optionally, processor 810 is also used to control the second input that user input unit 807 receives user;
Under second input inputted password and the matched situation of the first password, to the target information solution It is close;
Display unit 806 is controlled on the interface of the destination application, the target information after display decryption.
Optionally, second password is the key that the first terminal equipment generates;Processor 810 executes the basis After first password and the second password encrypt target information, it is also used to:
The key is sent to server.
Optionally, processor 810 execute it is described target information is encrypted according to first password and the second password before, also use In:
The first Hash codes of the target information are obtained, first Hash codes are corresponding with the first password;
Execute it is described target information is encrypted according to first password and the second password after, be also used to:
First Hash codes are sent to server.
It should be understood that the embodiment of the present invention in, radio frequency unit 801 can be used for receiving and sending messages or communication process in, signal Send and receive, specifically, by from base station downlink data receive after, to processor 810 handle;In addition, by uplink Data are sent to base station.In general, radio frequency unit 801 includes but is not limited to antenna, at least one amplifier, transceiver, coupling Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 801 can also by wireless communication system and network and other set Standby communication.
Terminal device provides wireless broadband internet by network module 802 for user and accesses, and such as user is helped to receive It sends e-mails, browse webpage and access streaming video etc..
Audio output unit 803 can be received by radio frequency unit 801 or network module 802 or in memory 809 The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 803 can also provide and end The relevant audio output of specific function that end equipment 800 executes is (for example, call signal receives sound, message sink sound etc. Deng).Audio output unit 803 includes loudspeaker, buzzer and receiver etc..
Input unit 804 is for receiving audio or video signal.Input unit 804 may include graphics processor (Graphics Processing Unit, GPU) 8041 and microphone 8042, graphics processor 8041 is in video acquisition mode Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out Reason.Treated, and picture frame may be displayed on display unit 806.Through graphics processor 8041, treated that picture frame can be deposited Storage is sent in memory 809 (or other storage mediums) or via radio frequency unit 801 or network module 802.Mike Wind 8042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be The format output that mobile communication base station can be sent to via radio frequency unit 801 is converted in the case where telephone calling model.
Terminal device 800 further includes at least one sensor 805, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 8061, and proximity sensor can close when terminal device 800 is moved in one's ear Display panel 8061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify terminal device posture (ratio Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);It passes Sensor 805 can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, wet Meter, thermometer, infrared sensor etc. are spent, details are not described herein.
Display unit 806 is for showing information input by user or being supplied to the information of user.Display unit 806 can wrap Display panel 8061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 8061.
User input unit 807 can be used for receiving the number or character information of input, and generate the use with terminal device Family setting and the related key signals input of function control.Specifically, user input unit 807 include touch panel 8071 and Other input equipments 8072.Touch panel 8071, also referred to as touch screen collect the touch operation of user on it or nearby (for example user uses any suitable objects or attachment such as finger, stylus on touch panel 8071 or in touch panel 8071 Neighbouring operation).Touch panel 8071 may include both touch detecting apparatus and touch controller.Wherein, touch detection Device detects the touch orientation of user, and detects touch operation bring signal, transmits a signal to touch controller;Touch control Device processed receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 810, receiving area It manages the order that device 810 is sent and is executed.Furthermore, it is possible to more using resistance-type, condenser type, infrared ray and surface acoustic wave etc. Seed type realizes touch panel 8071.In addition to touch panel 8071, user input unit 807 can also include other input equipments 8072.Specifically, other input equipments 8072 can include but is not limited to physical keyboard, function key (such as volume control button, Switch key etc.), trace ball, mouse, operating stick, details are not described herein.
Further, touch panel 8071 can be covered on display panel 8061, when touch panel 8071 is detected at it On or near touch operation after, send processor 810 to determine the type of touch event, be followed by subsequent processing device 810 according to touching The type for touching event provides corresponding visual output on display panel 8061.Although in fig. 8, touch panel 8071 and display Panel 8061 is the function that outputs and inputs of realizing terminal device as two independent components, but in some embodiments In, can be integrated by touch panel 8071 and display panel 8061 and realize the function that outputs and inputs of terminal device, it is specific this Place is without limitation.
Interface unit 808 is the interface that external device (ED) is connect with terminal device 800.For example, external device (ED) may include having Line or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end Mouth, port, the port audio input/output (I/O), video i/o port, earphone end for connecting the device with identification module Mouthful etc..Interface unit 808 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and By one or more elements that the input received is transferred in terminal device 800 or can be used in 800 He of terminal device Data are transmitted between external device (ED).
Memory 809 can be used for storing software program and various data.Memory 809 can mainly include storing program area The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 809 may include high-speed random access memory, it can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 810 is the control centre of terminal device, utilizes each of various interfaces and the entire terminal device of connection A part by running or execute the software program and/or module that are stored in memory 809, and calls and is stored in storage Data in device 809 execute the various functions and processing data of terminal device, to carry out integral monitoring to terminal device.Place Managing device 810 may include one or more processing units;Preferably, processor 810 can integrate application processor and modulatedemodulate is mediated Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 810.
Terminal device 800 can also include the power supply 811 (such as battery) powered to all parts, it is preferred that power supply 811 Can be logically contiguous by power-supply management system and processor 810, to realize management charging by power-supply management system, put The functions such as electricity and power managed.
In addition, terminal device 800 includes some unshowned functional modules, details are not described herein.
Above-mentioned terminal device 800 can also be the second terminal equipment in above-described embodiment.When terminal device 800 is second When terminal device, processor 810 is used for, and obtains target information from server;
Control the third input that user input unit 807 receives user;
It is inputted in the third under inputted password and the matched situation of first password, the target information is solved It is close;
Wherein, the target information is according to the information after the first password and the second password encryption.
Optionally, carry the first Hash codes of the target information in the target information, first Hash codes with The first password is corresponding;Processor 810 is also used to:
Obtain the second Hash codes of the target information, wherein second Hash codes are inputted with the third Password it is corresponding;
Processor 810 executes under the password and the matched situation of first password inputted in third input, right The target information is decrypted, comprising:
Under second Hash codes and the matched situation of the first Hash codes, the target information is decrypted.
Optionally, second password is the key that first terminal equipment generates, and is carried in the target information described Key;Processor 810 executes under the password and the matched situation of first password inputted in third input, to described Target information is decrypted, comprising:
It inputs in the third under inputted password and the matched situation of the first password, is inputted based on the third Target information described in the password inputted and the key pair is decrypted.
Preferably, the embodiment of the present invention also provides a kind of terminal device, including processor 810, and memory 809 is stored in On memory 809 and the computer program that can run on the processor 810, the computer program are executed by processor 810 Each process of first terminal equipment side or second terminal equipment side in Shi Shixian above- mentioned information processing method embodiment, and can reach To identical technical effect, to avoid repeating, which is not described herein again.
It is the structure chart of server provided in an embodiment of the present invention referring to Fig. 9, Fig. 9.As shown in figure 9, the server 900 wraps It includes: processor 901, transceiver 902, memory 903 and bus interface, in which:
Transceiver 902 is used for:
Receive the target information that first terminal equipment is sent;
The target information is sent to second terminal equipment;
Wherein, the target information is the first terminal equipment according to the letter after first password and the second password encryption Breath.
Optionally, second password is the key that the first terminal equipment generates, and is carried in the target information The key;Transceiver 902 is also used to: Xiang Suoshu second terminal equipment sends the key.
Optionally, carry the first Hash codes of the target information in the target information, first Hash codes with The first password is corresponding;Transceiver 902 is also used to: Xiang Suoshu second terminal equipment sends first Hash codes.
In Fig. 9, bus architecture may include the bus and bridge of any number of interconnection, specifically be represented by processor 901 One or more processors and the various circuits of memory that represent of memory 903 link together.Bus architecture can be with Various other circuits of such as peripheral equipment, voltage-stablizer and management circuit or the like are linked together, these are all these Well known to field, therefore, it will not be further described herein.Bus interface provides interface.Transceiver 902 can be Multiple element includes transmitter and receiver, provides the unit for communicating over a transmission medium with various other devices.Needle To different user equipmenies, user interface 904, which can also be, external the interface for needing equipment is inscribed, and the equipment of connection includes But be not limited to keypad, display, loudspeaker, microphone, control stick etc..
Processor 901, which is responsible for management bus architecture and common processing, memory 903, can store processor 901 and is holding Used data when row operation.
It should be noted that above-mentioned server 900 can be in the embodiment of the present invention in embodiment of the method in the present embodiment The server of any embodiment, any embodiment of server can be by this in embodiment of the method in the embodiment of the present invention Above-mentioned server 900 in embodiment is realized, and reaches identical beneficial effect, and details are not described herein again.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program realizes first terminal equipment side in above- mentioned information processing method embodiment when the computer program is executed by processor Or each process of second terminal equipment side or server side, and identical technical effect can be reached, to avoid repeating, here not It repeats again.Wherein, the computer readable storage medium, as read-only memory (Read-Only Memory, abbreviation ROM), Random access memory (Random Access Memory, abbreviation RAM), magnetic or disk etc..
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, computer, clothes Business device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form belongs within protection of the invention.

Claims (16)

1. a kind of information processing method is applied to first terminal equipment characterized by comprising
Target information is encrypted according to first password and the second password;
The encrypted target information is sent to server.
2. the method according to claim 1, wherein it is described according to first password and the second password to target information After encryption, the method also includes:
Receive the first input to destination application;
The encrypted target information is shown on the interface of the destination application in response to first input.
3. according to the method described in claim 2, it is characterized in that, described on the interface of the destination application, display After the encrypted target information, the method also includes:
Receive the second input of user;
Under second input inputted password and the matched situation of the first password, the target information is decrypted;
The target information on the interface of the destination application, after display decryption.
4. the method according to claim 1, wherein second password is what the first terminal equipment generated Key;It is described target information is encrypted according to first password and the second password after, the method also includes:
The key is sent to server.
5. the method according to claim 1, wherein it is described according to first password and the second password to target information Before encryption, the method also includes:
The first Hash codes of the target information are obtained, first Hash codes are corresponding with the first password;
It is described target information is encrypted according to first password and the second password after, the method also includes:
First Hash codes are sent to server.
6. a kind of information processing method is applied to second terminal equipment, comprising:
Target information is obtained from server;
Receive the third input of user;
It is inputted in the third under inputted password and the matched situation of first password, the target information is decrypted;
Wherein, the target information is according to the information after the first password and the second password encryption.
7. according to the method described in claim 6, it is characterized in that, carrying the of the target information in the target information One Hash codes, first Hash codes are corresponding with the first password;
After the third input for receiving user, the method also includes:
Obtain the second Hash codes of the target information, wherein second Hash codes are inputted close with the third Code is corresponding;
It is described to be inputted in the third under inputted password and the matched situation of first password, the target information is solved It is close, comprising:
Under second Hash codes and the matched situation of the first Hash codes, the target information is decrypted.
8. according to the method described in claim 6, it is characterized in that, second password is the close of first terminal equipment generation Key carries the key in the target information;The password inputted in third input is matched with first password In the case where, the target information is decrypted, comprising:
It is inputted in the third under inputted password and the matched situation of the first password, based on third input, institute is defeated Target information described in the password entered and the key pair is decrypted.
9. a kind of information processing method is applied to server characterized by comprising
Receive the target information that first terminal equipment is sent;
The target information is sent to second terminal equipment;
Wherein, the target information is the first terminal equipment according to the information after first password and the second password encryption.
10. according to the method described in claim 9, it is characterized in that, second password is first terminal equipment generation Key, carry the key in the target information;
After the target information for receiving the transmission of first terminal equipment, the method also includes:
The key is sent to the second terminal equipment.
11. according to the method described in claim 9, it is characterized in that, carrying the target information in the target information First Hash codes, first Hash codes are corresponding with the first password;
After the target information for receiving the transmission of first terminal equipment, the method also includes:
First Hash codes are sent to the second terminal equipment.
12. a kind of terminal device is applied to first terminal equipment characterized by comprising
Encrypting module, for being encrypted according to first password and the second password to target information;
First sending module, for the encrypted target information to be sent to server.
13. a kind of terminal device is applied to second terminal equipment, comprising:
Second obtains module, for obtaining target information from server;
Third receiving module, the third for receiving user input;
Second deciphering module, for being inputted under inputted password and the matched situation of first password in the third, to described Target information is decrypted;
Wherein, the target information is according to the information after the first password and the second password encryption.
14. a kind of server characterized by comprising
4th receiving module, for receiving the target information of first terminal equipment transmission;
4th sending module, for sending the target information to second terminal equipment;
Wherein, the target information is the first terminal equipment according to the information after first password and the second password encryption.
15. a kind of terminal device characterized by comprising memory, processor and storage are on a memory and can be in processor The computer program of upper operation, the processor are realized as described in any one of claim 1 to 5 when executing the computer program Information processing method in step, or realize such as the step in the described in any item information processing methods of claim 6 to 8.
16. a kind of server characterized by comprising memory, processor and storage are on a memory and can be on a processor The computer program of operation, the processor are realized as described in any one of claim 9 to 11 when executing the computer program Information processing method in step.
CN201910575531.6A 2019-06-28 2019-06-28 Information processing method and terminal device Pending CN110298184A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910575531.6A CN110298184A (en) 2019-06-28 2019-06-28 Information processing method and terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910575531.6A CN110298184A (en) 2019-06-28 2019-06-28 Information processing method and terminal device

Publications (1)

Publication Number Publication Date
CN110298184A true CN110298184A (en) 2019-10-01

Family

ID=68029488

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910575531.6A Pending CN110298184A (en) 2019-06-28 2019-06-28 Information processing method and terminal device

Country Status (1)

Country Link
CN (1) CN110298184A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110929238A (en) * 2019-10-29 2020-03-27 维沃移动通信有限公司 Information processing method and device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101639928A (en) * 2009-08-20 2010-02-03 无敌科技(西安)有限公司 Image data encryption and decryption method and system thereof
CN102316214A (en) * 2011-07-26 2012-01-11 上海优思通信科技有限公司 Privacy method for personal information and system
CN105005731A (en) * 2015-06-30 2015-10-28 广东欧珀移动通信有限公司 Data encryption and decryption methods and mobile terminal
CN105279447A (en) * 2014-06-23 2016-01-27 中兴通讯股份有限公司 Method and device for data encryption, and method and device for data decryption
CN105868647A (en) * 2016-03-28 2016-08-17 乐视控股(北京)有限公司 File signing system and method
CN106534324A (en) * 2016-11-18 2017-03-22 广东欧珀移动通信有限公司 Data sharing method and cloud server
CN107181873A (en) * 2017-06-22 2017-09-19 上海传英信息技术有限公司 Method, device and terminal that short message session is shown
CN108763888A (en) * 2018-05-31 2018-11-06 平安医疗科技有限公司 Files on each of customers processing method, device, computer equipment and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101639928A (en) * 2009-08-20 2010-02-03 无敌科技(西安)有限公司 Image data encryption and decryption method and system thereof
CN102316214A (en) * 2011-07-26 2012-01-11 上海优思通信科技有限公司 Privacy method for personal information and system
CN105279447A (en) * 2014-06-23 2016-01-27 中兴通讯股份有限公司 Method and device for data encryption, and method and device for data decryption
CN105005731A (en) * 2015-06-30 2015-10-28 广东欧珀移动通信有限公司 Data encryption and decryption methods and mobile terminal
CN105868647A (en) * 2016-03-28 2016-08-17 乐视控股(北京)有限公司 File signing system and method
CN106534324A (en) * 2016-11-18 2017-03-22 广东欧珀移动通信有限公司 Data sharing method and cloud server
CN107181873A (en) * 2017-06-22 2017-09-19 上海传英信息技术有限公司 Method, device and terminal that short message session is shown
CN108763888A (en) * 2018-05-31 2018-11-06 平安医疗科技有限公司 Files on each of customers processing method, device, computer equipment and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110929238A (en) * 2019-10-29 2020-03-27 维沃移动通信有限公司 Information processing method and device
CN110929238B (en) * 2019-10-29 2022-02-01 维沃移动通信有限公司 Information processing method and device

Similar Documents

Publication Publication Date Title
CN108510022B (en) Two-dimensional code generation and verification method and server
CN107608514A (en) Information processing method and mobile terminal
CN110188524B (en) Information encryption method, information decryption method and terminal
CN108629171B (en) Unread message processing method and terminal
CN109257336A (en) It is a kind of based on the encrypted message processing method of block chain, terminal device
CN107748848A (en) A kind of information processing method and mobile terminal
CN109145552A (en) Information ciphering method and terminal device
CN107786569A (en) A kind of identifying code sending method, method of reseptance and relevant device
CN110149628A (en) A kind of information processing method and terminal device
CN110457879A (en) Object displaying method and terminal device
CN109376519A (en) A kind of unlocked by fingerprint method and terminal device
CN109981891A (en) A kind of terminal control method, device and terminal device
CN110035183A (en) Information sharing method and terminal
CN108229139A (en) A kind of cipher-code input method and mobile terminal
CN109525666A (en) A kind of data back up method and mobile terminal
CN110213438A (en) A kind of processing method and terminal device of application program
CN109639706A (en) A kind of request processing method, server, user terminal and system
CN113238868A (en) Task processing method, device, server, equipment, system and storage medium
CN107835297A (en) Information updating method and mobile terminal
CN108540645A (en) A kind of operating method and mobile terminal of mobile terminal
CN109451011B (en) Information storage method based on block chain and mobile terminal
CN111310250A (en) Application sharing method and electronic equipment
CN110298184A (en) Information processing method and terminal device
CN110191106A (en) A kind of data transmission method for uplink, terminal and communication system
CN109547330A (en) A kind of information sharing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191001

RJ01 Rejection of invention patent application after publication