CN110298184A - Information processing method and terminal device - Google Patents
Information processing method and terminal device Download PDFInfo
- Publication number
- CN110298184A CN110298184A CN201910575531.6A CN201910575531A CN110298184A CN 110298184 A CN110298184 A CN 110298184A CN 201910575531 A CN201910575531 A CN 201910575531A CN 110298184 A CN110298184 A CN 110298184A
- Authority
- CN
- China
- Prior art keywords
- password
- target information
- terminal equipment
- information
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephonic Communication Services (AREA)
Abstract
The present invention relates to field of communication technology, a kind of information processing method and terminal device are provided, to solve to store the poor problem of the safety of information beyond the clouds in the prior art.This method comprises: being encrypted according to first password and the second password to target information;The encrypted target information is sent to server.Since the target information of storage on the server is that, in this way, target information not will be leaked in server, can be improved the safety of information according to the information after first password and the second password encryption.
Description
Technical field
The present invention relates to field of communication technology more particularly to a kind of information processing methods and terminal device.
Background technique
With the development of terminal device, the information storage function of terminal device is become stronger day by day.In order to obtain terminal device
More sufficient memory space and prevent information from losing, local information would generally be backed up to cloud by terminal device.In this way, with
Family can at any time delete the information on terminal device, can be by downloading from cloud when needing to obtain information again
Mode obtain.
However, storing in information to cloud, if cloud service quotient needs to obtain the information of user's storage, cloud service quotient
Also the information being able to access that on server seriously threatens the information security of user.As it can be seen that the safety of the information of storage beyond the clouds
Property is poor.
Summary of the invention
The embodiment of the present invention provides a kind of information processing method and terminal device, to solve to be stored in cloud in the prior art
The poor problem of the safety of the information at end.
In order to solve the above-mentioned technical problem, the present invention is implemented as follows:
In a first aspect, the embodiment of the present invention provides a kind of information processing method, it is applied to first terminal equipment, comprising:
Target information is encrypted according to first password and the second password;
The encrypted target information is sent to server.
Second aspect, the embodiment of the present invention also provide a kind of information processing method, are applied to second terminal equipment, comprising:
Target information is obtained from server;
Receive the third input of user;
It is inputted in the third under inputted password and the matched situation of first password, the target information is solved
It is close;
Wherein, the target information is according to the information after the first password and the second password encryption.
The third aspect, the embodiment of the present invention provide a kind of information processing method, are applied to server, comprising:
Receive the target information that first terminal equipment is sent;
The target information is sent to second terminal equipment;
Wherein, the target information is the first terminal equipment according to the letter after first password and the second password encryption
Breath.
Fourth aspect, the embodiment of the present invention provide a kind of terminal device, are applied to first terminal equipment, comprising:
Encrypting module, for being encrypted according to first password and the second password to target information;
First sending module, for the encrypted target information to be sent to server.
5th aspect, the embodiment of the present invention provide a kind of terminal device, are applied to second terminal equipment, comprising:
Second obtains module, for obtaining target information from server;
Third receiving module, the third for receiving user input;
Second deciphering module, it is right for being inputted under inputted password and the matched situation of first password in the third
The target information is decrypted;
Wherein, the target information is according to the information after the first password and the second password encryption.
6th aspect, the embodiment of the present invention provide a kind of server, comprising:
4th receiving module, for receiving the target information of first terminal equipment transmission;
4th sending module, for sending the target information to second terminal equipment;
Wherein, the target information is the first terminal equipment according to the letter after first password and the second password encryption
Breath.
7th aspect, the embodiment of the present invention also provides a kind of terminal device, comprising: memory, processor and is stored in
On reservoir and the computer program that can run on a processor, the processor realize institute as above when executing the computer program
The step in the corresponding information processing method in first terminal equipment side or second terminal equipment side stated.
Eighth aspect, the embodiment of the present invention also provide a kind of server, comprising: memory, processor and are stored in storage
On device and the computer program that can run on a processor, the processor are realized as described above when executing the computer program
The corresponding information processing method of server side in step.
9th aspect, the embodiment of the present invention also provide a kind of computer readable storage medium, the computer-readable storage
Store computer program on medium, the computer program realized when being executed by processor terminal equipment side as described above or
Step in the corresponding information processing method of server side.
In the embodiment of the present invention, target information is encrypted according to first password and the second password;By the encrypted mesh
Mark information is sent to server.Due to store target information on the server be according to first password and the second password encryption after
Information can be improved the safety of information in this way, target information not will be leaked in server.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, needed in being described below to the embodiment of the present invention
Attached drawing to be used is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention,
For those of ordinary skill in the art, without any creative labor, it can also obtain according to these attached drawings
Obtain other attached drawings.
Fig. 1 is one of the flow chart of information processing method provided in an embodiment of the present invention;
Fig. 2 is the interface schematic diagram of terminal device provided in an embodiment of the present invention;
Fig. 3 is the two of the flow chart of information processing method provided in an embodiment of the present invention;
Fig. 4 is the three of the flow chart of information processing method provided in an embodiment of the present invention;
Fig. 5 is the structure chart of first terminal equipment provided in an embodiment of the present invention;
Fig. 6 is the structure chart of second terminal equipment provided in an embodiment of the present invention;
Fig. 7 is one of the structure chart of server provided in an embodiment of the present invention;
Fig. 8 is the structure chart of terminal device provided in an embodiment of the present invention;
Fig. 9 is the two of the structure chart of server provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall within the protection scope of the present invention.
It is the flow chart of information processing method provided in an embodiment of the present invention referring to Fig. 1, Fig. 1, which answers
For first terminal equipment.As shown in Figure 1, comprising the following steps:
Step 101 encrypts target information according to first password and the second password.
Wherein, first password can be the password inputted according to user's operation, and first password can store in first terminal
Equipment, for example, password, the finger-print cipher etc. that are inputted by keyboard.
Second password can be the password of first terminal equipment generation, for example, the key that first terminal equipment generates at random,
Or the key that first terminal equipment is generated according to first password according to preset rules.Second password can be sent to server.
Target information can be the data of first terminal equipment storage, for example, photo, address list, short message, browser save
Website password etc..First terminal equipment can export prompt information to prompt the user whether to encrypt target information,
If encrypting to target information, encrypted target information, user can not check the particular content of target information.
First terminal equipment encrypts target information according to first password, and according to the second password encryption, i.e. target information
It is encrypted twice.
The encrypted target information is sent to server by step 102.
Encrypted target information is sent to server by first terminal equipment, no in the server while storage first
In the case where password and the second password, server cannot decrypt target information.In this way, being stored in the target information of server not
It will be leaked, can be improved the safety of information.
Optionally, it is described target information is encrypted according to first password and the second password after, the method also includes:
Receive the first input to destination application;
In response to first input, on the interface of the destination application, the encrypted target letter is shown
Breath.
In this embodiment, the first input can be the operation by destination application access target information, specifically
It can be clicking operation, pressing operation or slide etc. on destination application interface.The response of first terminal equipment
First input, shows encrypted target information on destination application interface, for example, display hides target information
Information after gear, Fuzzy processing.Since target information is encrypted, destination application cannot check the target information of encryption.
For example, the Part of photos taken in photograph album is encrypted as shown in Fig. 2, user passes through social application routine access photograph album, use
Family can only check the photo not encrypted, and the photo encrypted is predetermined picture and blocks, the tool for the picture that user cannot check
Body information.First terminal equipment can export prompt information at the photograph album interface, to prompt user to input the password of decryption.
In specific implementation, first terminal equipment can develop decryption API (Application Programming
Interface, application programming interface) application program is given, it is decrypted, applies after user inputs correct Crypted password
Program could access the photo content of encryption.
In such manner, it is possible to prevent information leakage, the safety of information can be improved.
Optionally, described on the interface of the destination application, after showing the encrypted target information, institute
State method further include:
Receive the second input of user;
Under second input inputted password and the matched situation of the first password, to the target information solution
It is close;
The target information on the interface of the destination application, after display decryption.
In this embodiment, in the case where first terminal equipment shows interface for password input, user can input close
Code, i.e., the second input.First terminal equipment obtains the second inputted password of input, and carries out with the first password of storage
Match, under the password and the matched situation of first password of user's input, first terminal equipment decrypts target information.Believe in target
After breath decryption, user can pass through destination application access target information.
In specific implementation, first terminal equipment can be according to first password, i.e. cryptographic calculations one of user's input
Encrypted characters string unite as the second password.Second password can be saved by first terminal equipment, and user can not obtain, the second password
Server can also be uploaded to.When encrypting target information, first password can be then recycled first with the second password encryption
Encryption.Since server can not obtain first password, target information can not be decrypted, can be improved the safety of target information.
When decryption, first terminal equipment first can decrypt first password, then when the password that user inputs is matched with first password
Target information is decrypted using the second password of storage.
In this way, user passes through the target information after the accessible decryption of destination application, energy in first terminal equipment
Enough improve the privacy of target information.
Optionally, second password is the key that the first terminal equipment generates;It is described according to first password and
After two passwords encrypt target information, the method also includes:
The key is sent to server.
In this embodiment, the second password can be the password of first terminal equipment generation, for example, first terminal equipment
The key that the key or first terminal equipment generated at random is generated according to first password according to preset rules.First terminal is set
It is standby that key is sent to server, it, can when user is by other terminal devices, such as when second terminal device downloads target information
Target information to be decrypted by second terminal equipment utilization key, thus access target information.
In the case where key is to be generated according to first password according to preset rules, if the key stored in server is lost
It loses, can be generated to obtain key according to above-mentioned preset rules according to first password again.
In the embodiment, key is sent to server, user can access on server by other terminal devices
Target information, when user's replacement terminal equipment or terminal device are lost, still accessible target information.Due to target
Information carries out double layer encryption using key and password, and key can be stored in server, and user in terminal device by inputting just
True password can decrypt target information, can be improved the safety of information, and can prevent target information on the server
Leakage.
Optionally, it is described target information is encrypted according to first password and the second password before, the method also includes:
The first Hash codes of the target information are obtained, first Hash codes are corresponding with the first password;
It is described target information is encrypted according to first password and the second password after, the method also includes:
First Hash codes are sent to server.
In this embodiment, before being encrypted to target information, the first Hash codes of available target information.First
Hash codes, which can be, to be generated according to preset rules according to the feature of first password and target information.First terminal equipment
The first Hash codes are sent to server, in this way, server cannot obtain first password according to the first Hash codes, server cannot be visited
The content for asking target information can be improved the safety of target information.And when user's replacement terminal equipment, other can be passed through
Terminal device decrypts target information, improves the flexibility of information.
In the embodiment of the present invention, above- mentioned information processing method can be applied to terminal device, such as: mobile phone, tablet computer
(Tablet Personal Computer), laptop computer (Laptop Computer), personal digital assistant (personal
Digital assistant, abbreviation PDA), mobile Internet access device (Mobile Internet Device, MID) or wearable
Equipment (Wearable Device) etc..
The information processing method of the embodiment of the present invention encrypts target information according to first password and the second password;It will add
The target information after close is sent to server.It is according to first password and the due to storing target information on the server
Information after two password encryptions can be improved the safety of information in this way, target information not will be leaked in server.
Referring to Fig. 3, the main distinction of the present embodiment and above-described embodiment is, realizes from the angle of second terminal equipment
Method.
Fig. 3 is the flow chart of information processing method provided in an embodiment of the present invention, as shown in Figure 3, comprising the following steps:
Step 301 obtains target information from server.
In this step, target information, which can be, directly obtains from the mode that server is downloaded, and can also be from server
After downloading multiple target informations and being stored in local terminal, from local acquisition.
Second terminal equipment can be other terminal devices in addition to first terminal equipment.
Step 302, the third input for receiving user.
In this step, third input can be used for inputting password.
Step 303 inputs in the inputted matched situation of password and first password in the third, believes the target
Breath is decrypted;
Wherein, the target information is according to the information after the first password and the second password encryption.
In this step, second terminal equipment can match the password that user inputs with first password, thus
Under the password and the matched situation of first password of user's input, target information is decrypted.
Wherein, first password can be second terminal equipment receive first terminal equipment send and store, in this feelings
Under condition, second terminal equipment can directly be compared the password that user inputs with first password;Or first terminal equipment
First password can be calculated after generating Hash codes according to preset rules, be sent to server, second terminal is obtained from server
The Hash codes, and the password based on user's input and information characteristics generate another Hash codes, so as to according to two Hash
The mode of code comparison carries out password match.
Optionally, carry the first Hash codes of the target information in the target information, first Hash codes with
The first password is corresponding;
After the third input for receiving user, the method also includes:
Obtain the second Hash codes of the target information, wherein second Hash codes are inputted with the third
Password it is corresponding;
It is described in the case where the third inputs inputted password and the matched situation of first password, to the target information into
Row decryption, comprising:
Under second Hash codes and the matched situation of the first Hash codes, the target information is decrypted.
In this embodiment, it is defeated can to input institute according to third after user carries out third input for second terminal equipment
The feature of the password entered and target information generates the second Hash codes, and the second Hash codes are able to reflect the feature of target information.?
Under second Hash codes and the matched situation of the first Hash codes, illustrate that the information for being currently at encrypted state is user in first terminal
The information of equipment encryption, and user's third inputs inputted password and matches with first password.Therefore, target information is solved
It is close.
In this way, target information is decrypted using Hash codes, server access target information can be prevented, and convenient for using
Target information is decrypted in other terminal devices in family, improves access flexibility.
Optionally, second password is the key that first terminal equipment generates, and is carried in the target information described
Key;It is described to be inputted in the third under inputted password and the matched situation of first password, the target information is carried out
Decryption, comprising:
It inputs in the third under inputted password and the matched situation of the first password, is inputted based on the third
Target information described in the password inputted and the key pair is decrypted.
Second password is the system key that first terminal equipment generates, which can be decrypted based on the operation of user, is used
Family, which needs to input correct first password, to decrypt target information.That is, close in the inputted password of third input and first
In the matched situation of code, it is decrypted according to the password that third inputs, and be decrypted according to system key.In such manner, it is possible to anti-
Only server access target information, and can be improved the flexibility of user's access target information.
In specific implementation, if user needs in second terminal equipment access target information, user can be by logging in eventually
End equipment service provider website, and authorize and target information is synchronized to second terminal equipment, at this point, server is by the second password and mesh
Mark information is sent to second terminal equipment, can be improved the safety of information.
The information processing method of the embodiment of the present invention, target information carry out double-deck add by first password and the second password
Close, user can decrypt target information, can either improve target in the input of second terminal equipment and the matched password of first password
The safety of information, and can be improved the flexibility of user's access target information.
Fig. 4 is the flow chart of information processing method provided in an embodiment of the present invention, the relatively above-mentioned implementation of the embodiment of the present invention
The difference of example is that the embodiment of the present invention is the method that the angle of server is realized.As shown in Figure 4, comprising the following steps:
Step 401 receives the target information that first terminal equipment is sent.
Wherein, the target information is the first terminal equipment according to the letter after first password and the second password encryption
Breath.
Step 402 sends the target information to second terminal equipment.
Relevant explanation in above-mentioned steps may refer to the description in above-described embodiment.
Since target information carries out double layer encryption by first password and the second password, server is unable to access target information
Content, can be improved the safety of target information.
Optionally, second password is the key that the first terminal equipment generates, and is carried in the target information
The key;
After the target information for receiving the transmission of first terminal equipment, the method also includes:
The key is sent to the second terminal equipment.
In this embodiment, server sends key to second terminal equipment, and second terminal equipment can be based on key
One layer of decryption is carried out to target information, and the password that can be inputted based on user carries out another layer of decryption.In this way, eventually convenient for second
Target information is decrypted in end equipment, thus quickly access target information.
Optionally, carry the first Hash codes of the target information in the target information, first Hash codes with
The first password is corresponding;
After the target information for receiving the transmission of first terminal equipment, the method also includes:
First Hash codes are sent to the second terminal equipment.
In this embodiment, server sends the first Hash codes to second terminal equipment, and second terminal equipment can be with base
The second Hash codes are calculated in the password and target information of user's input, and according to the matching degree of the second Hash codes and the first Hash codes
Carry out one layer of decryption.And another layer of decryption can be carried out based on key pair target information.In this way, convenient for second terminal equipment to mesh
Mark information is decrypted, thus quickly access target information.
The information processing method of the embodiment of the present invention, target information carry out double-deck add by first password and the second password
Close, server is unable to the content of access target information, can be improved the safety of target information.
It is the structure chart of terminal device provided in an embodiment of the present invention referring to Fig. 5, Fig. 5, is applied to first terminal equipment.Such as
Shown in Fig. 5, first terminal equipment 500 includes:
Encrypting module 501, for being encrypted according to first password and the second password to target information;
First sending module 502, for the encrypted target information to be sent to server.
Optionally, the terminal device further include:
First receiving module, for receiving the first input to destination application;
First display module, in response to first input, on the interface of the destination application, display to add
The target information after close.
Optionally, the terminal device further include:
Second receiving module, for receiving the second input of user;
First deciphering module, for the case where the inputted password of second input is matched with the first password
Under, the target information is decrypted;
Second display module, for the target information behind the interface of the destination application, display decryption.
Optionally, second password is the key that the first terminal equipment generates;It is described according to first password and
After two passwords encrypt target information, the terminal device further include:
Second sending module, for sending the key to server.
Optionally, the terminal device further include:
First obtains module, for obtaining the first Hash codes of the target information, first Hash codes and described the
One password is corresponding;
The terminal device further include:
Third sending module, for sending first Hash codes to server.
First terminal equipment 500 can be realized each process that first terminal equipment is realized in above method embodiment, be
It avoids repeating, which is not described herein again.
The first terminal equipment 500 of the embodiment of the present invention, target information not will be leaked in server, can be improved information
Safety.
It is the structure chart of another terminal device provided in an embodiment of the present invention referring to Fig. 6, Fig. 6, is set applied to second terminal
It is standby.As shown in fig. 6, second terminal equipment 600 includes:
Second obtains module 601, for obtaining target information from server;
Third receiving module 602, the third for receiving user input;
Second deciphering module 603, for being inputted under inputted password and the matched situation of first password in the third,
The target information is decrypted;
Wherein, the target information is according to the information after the first password and the second password encryption.
Optionally, carry the first Hash codes of the target information in the target information, first Hash codes with
The first password is corresponding;
The terminal device further include:
Third obtains module, for obtaining the second Hash codes of the target information, wherein second Hash codes and institute
It is corresponding to state the inputted password of third input;
Second deciphering module is specifically used for:
Under second Hash codes and the matched situation of the first Hash codes, the target information is decrypted.
Optionally, second password is the key that first terminal equipment generates, and is carried in the target information described
Key;Second deciphering module is specifically used for:
It inputs in the third under inputted password and the matched situation of the first password, is inputted based on the third
Target information described in the password inputted and the key pair is decrypted.
Second terminal equipment 600 can be realized each process that second terminal equipment is realized in above method embodiment, be
It avoids repeating, which is not described herein again.
The second terminal equipment 600 of the embodiment of the present invention, user input matched with first password in second terminal equipment
Password can decrypt target information, can either improve the safety of target information, and can be improved user's access target information
Flexibility.
It is the structure chart of server provided in an embodiment of the present invention referring to Fig. 7, Fig. 7, if Fig. 7 shows, server 700 includes:
4th receiving module 701, for receiving the target information of first terminal equipment transmission;
4th sending module 702, for sending the target information to second terminal equipment;
Wherein, the target information is the first terminal equipment according to the letter after first password and the second password encryption
Breath.
Optionally, second password is the key that the first terminal equipment generates, and is carried in the target information
The key;
The server further include:
5th sending module, for sending the key to the second terminal equipment.
Optionally, carry the first Hash codes of the target information in the target information, first Hash codes with
The first password is corresponding;
The server further include:
6th sending module, for sending first Hash codes to the second terminal equipment.
Server 700 can be realized each process that server is realized in above method embodiment, to avoid repeating, here
It repeats no more.
The server 700 of the embodiment of the present invention, target information carry out double layer encryption, clothes by first password and the second password
Business device is unable to the content of access target information, can be improved the safety of target information.
A kind of hardware structural diagram of Fig. 8 terminal device of each embodiment to realize the present invention, which can
To be the first terminal equipment in above-described embodiment.The terminal device 800 includes but is not limited to: radio frequency unit 801, network module
802, audio output unit 803, input unit 804, sensor 805, display unit 806, user input unit 807, interface list
The components such as member 808, memory 809, processor 810 and power supply 811.It will be understood by those skilled in the art that being shown in Fig. 8
Terminal device structure do not constitute the restriction to terminal device, terminal device may include than illustrating more or fewer portions
Part perhaps combines certain components or different component layouts.In embodiments of the present invention, terminal device includes but is not limited to
Mobile phone, tablet computer, laptop, palm PC, vehicle mobile terminals, wearable device and pedometer etc..
Wherein, processor 810, for being encrypted according to first password and the second password to target information;
The encrypted target information is sent to server.
In this way, target information not will be leaked in server, the safety of information can be improved.
Optionally, processor 810 is used for, and control user input unit 807 receives the first input to destination application;
In response to first input, on the interface of the destination application, control display unit 806 shows encrypted described
Target information.
Optionally, processor 810 is also used to control the second input that user input unit 807 receives user;
Under second input inputted password and the matched situation of the first password, to the target information solution
It is close;
Display unit 806 is controlled on the interface of the destination application, the target information after display decryption.
Optionally, second password is the key that the first terminal equipment generates;Processor 810 executes the basis
After first password and the second password encrypt target information, it is also used to:
The key is sent to server.
Optionally, processor 810 execute it is described target information is encrypted according to first password and the second password before, also use
In:
The first Hash codes of the target information are obtained, first Hash codes are corresponding with the first password;
Execute it is described target information is encrypted according to first password and the second password after, be also used to:
First Hash codes are sent to server.
It should be understood that the embodiment of the present invention in, radio frequency unit 801 can be used for receiving and sending messages or communication process in, signal
Send and receive, specifically, by from base station downlink data receive after, to processor 810 handle;In addition, by uplink
Data are sent to base station.In general, radio frequency unit 801 includes but is not limited to antenna, at least one amplifier, transceiver, coupling
Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 801 can also by wireless communication system and network and other set
Standby communication.
Terminal device provides wireless broadband internet by network module 802 for user and accesses, and such as user is helped to receive
It sends e-mails, browse webpage and access streaming video etc..
Audio output unit 803 can be received by radio frequency unit 801 or network module 802 or in memory 809
The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 803 can also provide and end
The relevant audio output of specific function that end equipment 800 executes is (for example, call signal receives sound, message sink sound etc.
Deng).Audio output unit 803 includes loudspeaker, buzzer and receiver etc..
Input unit 804 is for receiving audio or video signal.Input unit 804 may include graphics processor
(Graphics Processing Unit, GPU) 8041 and microphone 8042, graphics processor 8041 is in video acquisition mode
Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out
Reason.Treated, and picture frame may be displayed on display unit 806.Through graphics processor 8041, treated that picture frame can be deposited
Storage is sent in memory 809 (or other storage mediums) or via radio frequency unit 801 or network module 802.Mike
Wind 8042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be
The format output that mobile communication base station can be sent to via radio frequency unit 801 is converted in the case where telephone calling model.
Terminal device 800 further includes at least one sensor 805, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 8061, and proximity sensor can close when terminal device 800 is moved in one's ear
Display panel 8061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general
For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify terminal device posture (ratio
Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);It passes
Sensor 805 can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, wet
Meter, thermometer, infrared sensor etc. are spent, details are not described herein.
Display unit 806 is for showing information input by user or being supplied to the information of user.Display unit 806 can wrap
Display panel 8061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used
Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 8061.
User input unit 807 can be used for receiving the number or character information of input, and generate the use with terminal device
Family setting and the related key signals input of function control.Specifically, user input unit 807 include touch panel 8071 and
Other input equipments 8072.Touch panel 8071, also referred to as touch screen collect the touch operation of user on it or nearby
(for example user uses any suitable objects or attachment such as finger, stylus on touch panel 8071 or in touch panel 8071
Neighbouring operation).Touch panel 8071 may include both touch detecting apparatus and touch controller.Wherein, touch detection
Device detects the touch orientation of user, and detects touch operation bring signal, transmits a signal to touch controller;Touch control
Device processed receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 810, receiving area
It manages the order that device 810 is sent and is executed.Furthermore, it is possible to more using resistance-type, condenser type, infrared ray and surface acoustic wave etc.
Seed type realizes touch panel 8071.In addition to touch panel 8071, user input unit 807 can also include other input equipments
8072.Specifically, other input equipments 8072 can include but is not limited to physical keyboard, function key (such as volume control button,
Switch key etc.), trace ball, mouse, operating stick, details are not described herein.
Further, touch panel 8071 can be covered on display panel 8061, when touch panel 8071 is detected at it
On or near touch operation after, send processor 810 to determine the type of touch event, be followed by subsequent processing device 810 according to touching
The type for touching event provides corresponding visual output on display panel 8061.Although in fig. 8, touch panel 8071 and display
Panel 8061 is the function that outputs and inputs of realizing terminal device as two independent components, but in some embodiments
In, can be integrated by touch panel 8071 and display panel 8061 and realize the function that outputs and inputs of terminal device, it is specific this
Place is without limitation.
Interface unit 808 is the interface that external device (ED) is connect with terminal device 800.For example, external device (ED) may include having
Line or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end
Mouth, port, the port audio input/output (I/O), video i/o port, earphone end for connecting the device with identification module
Mouthful etc..Interface unit 808 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and
By one or more elements that the input received is transferred in terminal device 800 or can be used in 800 He of terminal device
Data are transmitted between external device (ED).
Memory 809 can be used for storing software program and various data.Memory 809 can mainly include storing program area
The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function
Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as
Audio data, phone directory etc.) etc..In addition, memory 809 may include high-speed random access memory, it can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 810 is the control centre of terminal device, utilizes each of various interfaces and the entire terminal device of connection
A part by running or execute the software program and/or module that are stored in memory 809, and calls and is stored in storage
Data in device 809 execute the various functions and processing data of terminal device, to carry out integral monitoring to terminal device.Place
Managing device 810 may include one or more processing units;Preferably, processor 810 can integrate application processor and modulatedemodulate is mediated
Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main
Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 810.
Terminal device 800 can also include the power supply 811 (such as battery) powered to all parts, it is preferred that power supply 811
Can be logically contiguous by power-supply management system and processor 810, to realize management charging by power-supply management system, put
The functions such as electricity and power managed.
In addition, terminal device 800 includes some unshowned functional modules, details are not described herein.
Above-mentioned terminal device 800 can also be the second terminal equipment in above-described embodiment.When terminal device 800 is second
When terminal device, processor 810 is used for, and obtains target information from server;
Control the third input that user input unit 807 receives user;
It is inputted in the third under inputted password and the matched situation of first password, the target information is solved
It is close;
Wherein, the target information is according to the information after the first password and the second password encryption.
Optionally, carry the first Hash codes of the target information in the target information, first Hash codes with
The first password is corresponding;Processor 810 is also used to:
Obtain the second Hash codes of the target information, wherein second Hash codes are inputted with the third
Password it is corresponding;
Processor 810 executes under the password and the matched situation of first password inputted in third input, right
The target information is decrypted, comprising:
Under second Hash codes and the matched situation of the first Hash codes, the target information is decrypted.
Optionally, second password is the key that first terminal equipment generates, and is carried in the target information described
Key;Processor 810 executes under the password and the matched situation of first password inputted in third input, to described
Target information is decrypted, comprising:
It inputs in the third under inputted password and the matched situation of the first password, is inputted based on the third
Target information described in the password inputted and the key pair is decrypted.
Preferably, the embodiment of the present invention also provides a kind of terminal device, including processor 810, and memory 809 is stored in
On memory 809 and the computer program that can run on the processor 810, the computer program are executed by processor 810
Each process of first terminal equipment side or second terminal equipment side in Shi Shixian above- mentioned information processing method embodiment, and can reach
To identical technical effect, to avoid repeating, which is not described herein again.
It is the structure chart of server provided in an embodiment of the present invention referring to Fig. 9, Fig. 9.As shown in figure 9, the server 900 wraps
It includes: processor 901, transceiver 902, memory 903 and bus interface, in which:
Transceiver 902 is used for:
Receive the target information that first terminal equipment is sent;
The target information is sent to second terminal equipment;
Wherein, the target information is the first terminal equipment according to the letter after first password and the second password encryption
Breath.
Optionally, second password is the key that the first terminal equipment generates, and is carried in the target information
The key;Transceiver 902 is also used to: Xiang Suoshu second terminal equipment sends the key.
Optionally, carry the first Hash codes of the target information in the target information, first Hash codes with
The first password is corresponding;Transceiver 902 is also used to: Xiang Suoshu second terminal equipment sends first Hash codes.
In Fig. 9, bus architecture may include the bus and bridge of any number of interconnection, specifically be represented by processor 901
One or more processors and the various circuits of memory that represent of memory 903 link together.Bus architecture can be with
Various other circuits of such as peripheral equipment, voltage-stablizer and management circuit or the like are linked together, these are all these
Well known to field, therefore, it will not be further described herein.Bus interface provides interface.Transceiver 902 can be
Multiple element includes transmitter and receiver, provides the unit for communicating over a transmission medium with various other devices.Needle
To different user equipmenies, user interface 904, which can also be, external the interface for needing equipment is inscribed, and the equipment of connection includes
But be not limited to keypad, display, loudspeaker, microphone, control stick etc..
Processor 901, which is responsible for management bus architecture and common processing, memory 903, can store processor 901 and is holding
Used data when row operation.
It should be noted that above-mentioned server 900 can be in the embodiment of the present invention in embodiment of the method in the present embodiment
The server of any embodiment, any embodiment of server can be by this in embodiment of the method in the embodiment of the present invention
Above-mentioned server 900 in embodiment is realized, and reaches identical beneficial effect, and details are not described herein again.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium
Calculation machine program realizes first terminal equipment side in above- mentioned information processing method embodiment when the computer program is executed by processor
Or each process of second terminal equipment side or server side, and identical technical effect can be reached, to avoid repeating, here not
It repeats again.Wherein, the computer readable storage medium, as read-only memory (Read-Only Memory, abbreviation ROM),
Random access memory (Random Access Memory, abbreviation RAM), magnetic or disk etc..
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, computer, clothes
Business device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific
Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art
Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much
Form belongs within protection of the invention.
Claims (16)
1. a kind of information processing method is applied to first terminal equipment characterized by comprising
Target information is encrypted according to first password and the second password;
The encrypted target information is sent to server.
2. the method according to claim 1, wherein it is described according to first password and the second password to target information
After encryption, the method also includes:
Receive the first input to destination application;
The encrypted target information is shown on the interface of the destination application in response to first input.
3. according to the method described in claim 2, it is characterized in that, described on the interface of the destination application, display
After the encrypted target information, the method also includes:
Receive the second input of user;
Under second input inputted password and the matched situation of the first password, the target information is decrypted;
The target information on the interface of the destination application, after display decryption.
4. the method according to claim 1, wherein second password is what the first terminal equipment generated
Key;It is described target information is encrypted according to first password and the second password after, the method also includes:
The key is sent to server.
5. the method according to claim 1, wherein it is described according to first password and the second password to target information
Before encryption, the method also includes:
The first Hash codes of the target information are obtained, first Hash codes are corresponding with the first password;
It is described target information is encrypted according to first password and the second password after, the method also includes:
First Hash codes are sent to server.
6. a kind of information processing method is applied to second terminal equipment, comprising:
Target information is obtained from server;
Receive the third input of user;
It is inputted in the third under inputted password and the matched situation of first password, the target information is decrypted;
Wherein, the target information is according to the information after the first password and the second password encryption.
7. according to the method described in claim 6, it is characterized in that, carrying the of the target information in the target information
One Hash codes, first Hash codes are corresponding with the first password;
After the third input for receiving user, the method also includes:
Obtain the second Hash codes of the target information, wherein second Hash codes are inputted close with the third
Code is corresponding;
It is described to be inputted in the third under inputted password and the matched situation of first password, the target information is solved
It is close, comprising:
Under second Hash codes and the matched situation of the first Hash codes, the target information is decrypted.
8. according to the method described in claim 6, it is characterized in that, second password is the close of first terminal equipment generation
Key carries the key in the target information;The password inputted in third input is matched with first password
In the case where, the target information is decrypted, comprising:
It is inputted in the third under inputted password and the matched situation of the first password, based on third input, institute is defeated
Target information described in the password entered and the key pair is decrypted.
9. a kind of information processing method is applied to server characterized by comprising
Receive the target information that first terminal equipment is sent;
The target information is sent to second terminal equipment;
Wherein, the target information is the first terminal equipment according to the information after first password and the second password encryption.
10. according to the method described in claim 9, it is characterized in that, second password is first terminal equipment generation
Key, carry the key in the target information;
After the target information for receiving the transmission of first terminal equipment, the method also includes:
The key is sent to the second terminal equipment.
11. according to the method described in claim 9, it is characterized in that, carrying the target information in the target information
First Hash codes, first Hash codes are corresponding with the first password;
After the target information for receiving the transmission of first terminal equipment, the method also includes:
First Hash codes are sent to the second terminal equipment.
12. a kind of terminal device is applied to first terminal equipment characterized by comprising
Encrypting module, for being encrypted according to first password and the second password to target information;
First sending module, for the encrypted target information to be sent to server.
13. a kind of terminal device is applied to second terminal equipment, comprising:
Second obtains module, for obtaining target information from server;
Third receiving module, the third for receiving user input;
Second deciphering module, for being inputted under inputted password and the matched situation of first password in the third, to described
Target information is decrypted;
Wherein, the target information is according to the information after the first password and the second password encryption.
14. a kind of server characterized by comprising
4th receiving module, for receiving the target information of first terminal equipment transmission;
4th sending module, for sending the target information to second terminal equipment;
Wherein, the target information is the first terminal equipment according to the information after first password and the second password encryption.
15. a kind of terminal device characterized by comprising memory, processor and storage are on a memory and can be in processor
The computer program of upper operation, the processor are realized as described in any one of claim 1 to 5 when executing the computer program
Information processing method in step, or realize such as the step in the described in any item information processing methods of claim 6 to 8.
16. a kind of server characterized by comprising memory, processor and storage are on a memory and can be on a processor
The computer program of operation, the processor are realized as described in any one of claim 9 to 11 when executing the computer program
Information processing method in step.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910575531.6A CN110298184A (en) | 2019-06-28 | 2019-06-28 | Information processing method and terminal device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910575531.6A CN110298184A (en) | 2019-06-28 | 2019-06-28 | Information processing method and terminal device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110298184A true CN110298184A (en) | 2019-10-01 |
Family
ID=68029488
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910575531.6A Pending CN110298184A (en) | 2019-06-28 | 2019-06-28 | Information processing method and terminal device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110298184A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110929238A (en) * | 2019-10-29 | 2020-03-27 | 维沃移动通信有限公司 | Information processing method and device |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101639928A (en) * | 2009-08-20 | 2010-02-03 | 无敌科技(西安)有限公司 | Image data encryption and decryption method and system thereof |
CN102316214A (en) * | 2011-07-26 | 2012-01-11 | 上海优思通信科技有限公司 | Privacy method for personal information and system |
CN105005731A (en) * | 2015-06-30 | 2015-10-28 | 广东欧珀移动通信有限公司 | Data encryption and decryption methods and mobile terminal |
CN105279447A (en) * | 2014-06-23 | 2016-01-27 | 中兴通讯股份有限公司 | Method and device for data encryption, and method and device for data decryption |
CN105868647A (en) * | 2016-03-28 | 2016-08-17 | 乐视控股(北京)有限公司 | File signing system and method |
CN106534324A (en) * | 2016-11-18 | 2017-03-22 | 广东欧珀移动通信有限公司 | Data sharing method and cloud server |
CN107181873A (en) * | 2017-06-22 | 2017-09-19 | 上海传英信息技术有限公司 | Method, device and terminal that short message session is shown |
CN108763888A (en) * | 2018-05-31 | 2018-11-06 | 平安医疗科技有限公司 | Files on each of customers processing method, device, computer equipment and storage medium |
-
2019
- 2019-06-28 CN CN201910575531.6A patent/CN110298184A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101639928A (en) * | 2009-08-20 | 2010-02-03 | 无敌科技(西安)有限公司 | Image data encryption and decryption method and system thereof |
CN102316214A (en) * | 2011-07-26 | 2012-01-11 | 上海优思通信科技有限公司 | Privacy method for personal information and system |
CN105279447A (en) * | 2014-06-23 | 2016-01-27 | 中兴通讯股份有限公司 | Method and device for data encryption, and method and device for data decryption |
CN105005731A (en) * | 2015-06-30 | 2015-10-28 | 广东欧珀移动通信有限公司 | Data encryption and decryption methods and mobile terminal |
CN105868647A (en) * | 2016-03-28 | 2016-08-17 | 乐视控股(北京)有限公司 | File signing system and method |
CN106534324A (en) * | 2016-11-18 | 2017-03-22 | 广东欧珀移动通信有限公司 | Data sharing method and cloud server |
CN107181873A (en) * | 2017-06-22 | 2017-09-19 | 上海传英信息技术有限公司 | Method, device and terminal that short message session is shown |
CN108763888A (en) * | 2018-05-31 | 2018-11-06 | 平安医疗科技有限公司 | Files on each of customers processing method, device, computer equipment and storage medium |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110929238A (en) * | 2019-10-29 | 2020-03-27 | 维沃移动通信有限公司 | Information processing method and device |
CN110929238B (en) * | 2019-10-29 | 2022-02-01 | 维沃移动通信有限公司 | Information processing method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108510022B (en) | Two-dimensional code generation and verification method and server | |
CN107608514A (en) | Information processing method and mobile terminal | |
CN110188524B (en) | Information encryption method, information decryption method and terminal | |
CN108629171B (en) | Unread message processing method and terminal | |
CN109257336A (en) | It is a kind of based on the encrypted message processing method of block chain, terminal device | |
CN107748848A (en) | A kind of information processing method and mobile terminal | |
CN109145552A (en) | Information ciphering method and terminal device | |
CN107786569A (en) | A kind of identifying code sending method, method of reseptance and relevant device | |
CN110149628A (en) | A kind of information processing method and terminal device | |
CN110457879A (en) | Object displaying method and terminal device | |
CN109376519A (en) | A kind of unlocked by fingerprint method and terminal device | |
CN109981891A (en) | A kind of terminal control method, device and terminal device | |
CN110035183A (en) | Information sharing method and terminal | |
CN108229139A (en) | A kind of cipher-code input method and mobile terminal | |
CN109525666A (en) | A kind of data back up method and mobile terminal | |
CN110213438A (en) | A kind of processing method and terminal device of application program | |
CN109639706A (en) | A kind of request processing method, server, user terminal and system | |
CN113238868A (en) | Task processing method, device, server, equipment, system and storage medium | |
CN107835297A (en) | Information updating method and mobile terminal | |
CN108540645A (en) | A kind of operating method and mobile terminal of mobile terminal | |
CN109451011B (en) | Information storage method based on block chain and mobile terminal | |
CN111310250A (en) | Application sharing method and electronic equipment | |
CN110298184A (en) | Information processing method and terminal device | |
CN110191106A (en) | A kind of data transmission method for uplink, terminal and communication system | |
CN109547330A (en) | A kind of information sharing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191001 |
|
RJ01 | Rejection of invention patent application after publication |