CN110401677A - Acquisition methods, device, storage medium and the electronic equipment of digital publishing rights key - Google Patents

Acquisition methods, device, storage medium and the electronic equipment of digital publishing rights key Download PDF

Info

Publication number
CN110401677A
CN110401677A CN201910782454.1A CN201910782454A CN110401677A CN 110401677 A CN110401677 A CN 110401677A CN 201910782454 A CN201910782454 A CN 201910782454A CN 110401677 A CN110401677 A CN 110401677A
Authority
CN
China
Prior art keywords
key
digital publishing
publishing rights
acquisition request
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910782454.1A
Other languages
Chinese (zh)
Other versions
CN110401677B (en
Inventor
姚坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Realme Chongqing Mobile Communications Co Ltd
Original Assignee
Realme Chongqing Mobile Communications Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Realme Chongqing Mobile Communications Co Ltd filed Critical Realme Chongqing Mobile Communications Co Ltd
Priority to CN201910782454.1A priority Critical patent/CN110401677B/en
Publication of CN110401677A publication Critical patent/CN110401677A/en
Application granted granted Critical
Publication of CN110401677B publication Critical patent/CN110401677B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/103Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for protecting copy right

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

This application discloses acquisition methods, device, electronic equipment and the media of a kind of digital publishing rights key.Wherein, in the application, cipher key acquisition request is sent to server;Wherein, the device identification of the cipher key acquisition request carried terminal equipment;It receives the server and obtains response in response to the key that the cipher key acquisition request is sent;It parses the key acquisition response and obtains the digital publishing rights key, and store the digital publishing rights key.So as to avoid, when terminal device does not carry digital publishing rights key, needing to return on terminal device present in the relevant technologies to the problem of manually rewriting at Xian Xia manufacturer.

Description

Acquisition methods, device, storage medium and the electronic equipment of digital publishing rights key
Technical field
This application involves copyright protection field more particularly to a kind of acquisition methods of digital publishing rights key, device, storage Jie Matter and electronic equipment.
Background technique
With communication with society development, smart electronics terminal with more and more people use and it is extensive Development.
Further, it in order to meet the viewing demands of most users, is usually needed on intelligent terminal preset Widevine key information.Wherein, widevine is a kind of DRM digital rights management function, can be from manufacturer by the function On specified server, downloading by manufacturer encryption rights file, such as video, using etc..Widevine encryption technology Working principle be to establish data grant center.It is encrypted using widevine key, user is playing network video When, it can be decrypted by sending out relevant key after the verifying authorization at data grant center, content can play.Due to every end The widevine Key data of end equipment are unique.Therefore it may be implemented that video to be protected is needed to be encrypted, even if by user Downloading saves, and the verifying authorization for not obtaining data grant center can not also play, to closely protect the copyright of video.
However, in the related technology when smart machine when leaving the factory carelessness etc. due to cause it is not preset in advance When widevine key, then need for smart machine to be back at manufacturer carry out line under reset widevine key, thus greatly Expend the time.
Summary of the invention
The embodiment of the present application provides acquisition methods, device, storage medium and the electronic equipment of digital publishing rights key, can be with Solving the relevant technologies, by the way that bring is written under line, time-consuming and at high cost when digital publishing rights key missing in terminal device Problem.The technical solution is as follows:
In a first aspect, the embodiment of the present application provides a kind of acquisition methods of digital publishing rights key, which comprises
Cipher key acquisition request is sent to server;Wherein, the device identification of the cipher key acquisition request carried terminal equipment;
It receives the server and obtains response in response to the key that the cipher key acquisition request is sent;Wherein, the key It obtains response and carries digital publishing rights key;
It parses the key acquisition response and obtains the digital publishing rights key, and store the digital publishing rights key.
Second aspect, the embodiment of the present application provide a kind of acquisition methods of digital publishing rights key, comprising:
Receive the cipher key acquisition request from terminal device;Wherein, the cipher key acquisition request carries setting for the terminal Standby mark;
It parses the cipher key acquisition request and obtains the device identification, and inquiry and the associated number of the device identification Copyright key.
Key, which is sent, to the terminal device obtains response;Wherein, the cipher key acquisition request carries the digital publishing rights Key.
The third aspect, the embodiment of the present application provide a kind of acquisition device of digital publishing rights key, the acquisition device packet It includes:
Transmit-Receive Unit, for sending cipher key acquisition request to server;Wherein, the cipher key acquisition request carried terminal is set Standby device identification;
The Transmit-Receive Unit is also used to receive the server and obtains in response to the key that the cipher key acquisition request is sent Response;Wherein, the key obtains response and carries digital publishing rights key;
Processing unit obtains the digital publishing rights key for parsing the key acquisition response, and storage will be described Digital publishing rights key.
Fourth aspect, the embodiment of the present application provide a kind of acquisition device of digital publishing rights key, comprising:
Transmit-Receive Unit, for receiving the cipher key acquisition request from terminal device;Wherein, the cipher key acquisition request carries The device identification of the terminal;
Processing unit obtains the device identification, and inquiry and the equipment for parsing the cipher key acquisition request Identify associated digital publishing rights key.
The Transmit-Receive Unit is also used to send key acquisition response to the terminal device;Wherein, the key acquisition is asked It asks and carries the digital publishing rights key.
5th aspect, the embodiment of the present application provide a kind of computer storage medium, and the computer storage medium is stored with A plurality of instruction, described instruction are suitable for being loaded by processor and executing above-mentioned method and step.
6th aspect, the embodiment of the present application provide a kind of electronic equipment, it may include: processor and memory;Wherein, described Memory is stored with computer program, and the computer program is suitable for being loaded by the processor and being executed above-mentioned method step Suddenly.
The technical solution bring beneficial effect that some embodiments of the application provide includes at least:
Terminal to server sends cipher key acquisition request, the device identification of cipher key acquisition request carried terminal equipment, key Acquisition request is used to request the associated digital publishing rights key of device identification to server, and server is based on key and obtains response to end End equipment sending device identifies associated digital publishing rights key.It, can be in terminal device by the technical solution of application the application Portion is there are when digital publishing rights key, and the server of Xiang Yuancheng requests digital publishing rights key, so as to avoid existing in the related technology In terminal device when digital publishing rights key is not present, need to return to equipment to manually being rewritten at Xian Xia manufacturer The problem of, the embodiment of the present application can reduce the cost of maintenance digital publishing rights key.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is a kind of network architecture diagram provided by the embodiments of the present application;
Fig. 2 is the flow diagram of the acquisition methods of digital publishing rights key provided by the embodiments of the present application;
Fig. 3 is another flow diagram of the acquisition methods of digital publishing rights key provided by the embodiments of the present application;
Fig. 4 is a kind of structural schematic diagram of acquisition device provided by the embodiments of the present application;
Fig. 5 is the structural schematic diagram of a kind of electronic equipment provided by the embodiments of the present application.
Specific embodiment
To keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with attached drawing to the embodiment of the present application Mode is described in further detail.
Fig. 1 shows the acquisition methods or digital publishing rights key that can apply the digital publishing rights key of the embodiment of the present application The schematic diagram of the exemplary system architecture 100 of acquisition device.
As shown in Figure 1, system architecture 100 may include one of terminal device 101,102,103 or a variety of, network 104 and server 105.Network 104 between terminal device 101,102,103 and server 105 to provide communication link Medium.Network 104 may include various types of wired communications links or wireless communication link, such as: wired communications links packet Optical fiber, twisted pair or coaxial cable are included, wireless communication link includes bluetooth communications link, Wireless Fidelity (WIreless- FIdelity, Wi-Fi) communication link or microwave communications link etc..
It should be understood that the number of terminal device, network and server in Fig. 1 is only schematical.According to realization need It wants, can have any number of terminal device, network and server.For example server 105 can be multiple server compositions Server cluster etc..
User can be used terminal device 101,102,103 and be interacted by network 104 with server 105, to receive or send out Send message etc..Terminal device 101,102,103 can be the various electronic equipments with display screen, including but not limited to intelligent hand Machine, tablet computer, portable computer and desktop computer etc..
Terminal device 101,102,103 in the application can be to provide the terminal device of various services.Such as user is logical Cross terminal device 103 (being also possible to terminal device 101 or 102)
Wherein, various communication customer end applications can be installed on terminal device 101~103, such as: video record is answered With the application of, video playing, interactive voice application, searching class application, timely means of communication, mailbox client, social platform software Deng.
Terminal device 101~103 can be the various terminal equipment with display screen, including but not limited to smart phone, Tablet computer, laptop portable computer and desktop computer etc..Wherein, display screen can be cathode-ray tube display (cathode ray tubedisplay, abbreviation CR), light emitting diode indicator (light-emitting diode Display, abbreviation LED), electronic ink screen, liquid crystal display (liquid crystal display, abbreviation LCD), plasma Display panel (plasma display panel, abbreviation PDP) etc..User can use first terminal equipment 100 and second eventually Display equipment in end equipment 104, come information such as the texts, picture, video of checking display.
Server 105 can be to provide the server of various services, and server 105 can be hardware, be also possible to software. When server 105 is hardware, the distributed server cluster of multiple server compositions may be implemented into, list also may be implemented into A server.When server 105 is software, multiple softwares or software module may be implemented into (such as providing distribution Service), single software or software module also may be implemented into, be not specifically limited herein.
Wherein, to include: terminal device send key to server to the interactive process in Fig. 1 between terminal device and server Acquisition request, cipher key acquisition request can be with the device identifications of carried terminal equipment, and cipher key acquisition request is for requesting digital publishing rights Key, server receive the cipher key acquisition request from terminal device, the equipment that parsing cipher key acquisition request obtains terminal device Mark, query facility identify associated digital publishing rights key, then send key to terminal device and obtain response, terminal device solution It analyses the key acquisition response from server and obtains digital publishing rights key, digital publishing rights key is written to memory by terminal device In.
It should be understood that the number of terminal device, network and server in Fig. 1 is only illustrative.It, can according to needs are realized To be any number of terminal device, network and server.
Below in conjunction with attached drawing 2- attached drawing 5, to the acquisition methods sum number of digital publishing rights key provided by the embodiments of the present application The acquisition device of letter power key describes in detail.
Fig. 2 is referred to, a kind of flow diagram of the acquisition methods of digital publishing rights key is provided for the embodiment of the present application. As shown in Fig. 2, the embodiment of the present application the method may include following steps:
S201, terminal device send cipher key acquisition request to server, and server receives the key from terminal device and obtains Take request.
Wherein, cipher key acquisition request is used to provide media content for obtaining digital publishing rights key, digital publishing rights key The media file of person's publication carries out copyright protection, and media file includes but is not limited to audio file, video file or picture etc.;No Same equipment has different digital publishing rights keys.It can be with the device identification of carried terminal equipment, equipment in cipher key acquisition request Mark is used for the identity of unique identification terminal device, and different equipment has different device identifications, and device identification can be state Border mobile device identification code (international mobile equipment identity, IMEI).
In one or more embodiments, digital publishing rights key can be widevine key, wherein widevine is one Kind DRM digital copyright management solution.At present site for service such as Yutube, Netflix of many video classes, HBO, Disney video service website and video display company all use this technical protection copyright side from pirate infringement.Google, three Also there is corresponding hardware supported in the ODM such as star, Intel, SONY, LG, Realme manufacturer.
The working principle of widevine encryption technology is to establish data grant center.It is encrypted, is used using key Family, according to the KeyID and URL information on video head, can be awarded when playing network video by the verifying at data grant center Relevant key decryption is sent out after power, content can play.It needs video to be protected to be encrypted, is saved even if being downloaded by user, The verifying authorization for not obtaining data grant center can not also play, to closely protect the copyright of video.What is used is close Key has two, and one public key, and one private key;Public key is used for encrypted video content itself, and private key is for decrypting video.
Further, carrying private key information to be preset to the data of terminal device is then widevine Key, and every terminal is set Standby Key data are unique.Since the encipherment scheme of widevine, domestic market pin are not applied in internal video website The complete machine sold is not necessarily to preset Key, but the mobile phone for selling on overseas market, then has to preset widevineKey Video content on the video providers such as energy normal play Yutube, Netflix.Manufacturer can be before factory to need under normal conditions The mobile phone of export trade is wanted to carry out the preset of widevineKey.
In one or more embodiments, the type of message of cipher key acquisition request can be hypertext transfer protocol (hypertext transfer protocol), User Datagram Protocol (user datagram protocol, UDP) message, Transmission control protocol (transmission control protocol, TCP) message.Carried terminal is removed in cipher key acquisition request Except the device identification of equipment, it can also carry APPID (application program identification and main key), APPID is the mark of application program, Main key and APPID have a corresponding relationship, and main key can be what APPID obtain after hash algorithm, and APPID and main key can be What the developer of application program applied on the server in advance, server verifies the legal of application program according to APPID and main key Property.
In one or more embodiments, terminal device can be encrypted and be signed to device identification, be set for guaranteeing The safety of standby mark and the legitimacy in source, the method for encryption can be symmetric cryptography and/or asymmetric encryption, the side of signature Method can use hash algorithm.Such as: terminal using Advanced Encryption Standard (advanced encryption standard, AES) algorithm and RSA cryptographic algorithms encrypt device identification, and encrypted device identification is sent to server.
In one or more embodiments, before S201, further includes:
Terminal device is detected there is no when digital publishing rights key, sends cipher key acquisition request to server;Or
Terminal device detection digital publishing rights cipher key integrity verification is obstructed out-of-date, sends cipher key acquisition request to server.
Further, terminal device is before sending cipher key acquisition request, can also monitor terminal device and server it Between network communication quality, when network communication quality meets preset condition, Cai Huixiang server send cipher key acquisition request.Net Network communication quality includes but is not limited to time delay, packet loss, bandwidth etc..
Such as: when terminal device monitors that the time delay between terminal device and server is less than 5ms, sent to server close Key acquisition request;
Another example is: when terminal device monitors the packet loss between terminal device and server less than 0.01%, to service Device sends cipher key acquisition request.
Another example is: being sent when terminal device detects that the band between terminal device and server is wider than 50M to server Cipher key acquisition request.
S202, server parsing cipher key acquisition request obtain device identification.
In general, cipher key acquisition request includes message header and message body, message header includes message-length, protocol type, IP The parameters such as five-tuple, include the data for being actually subjected to send in message body, and server can parse in message body to be obtained terminal and set Standby device identification.
Wherein, the device identification of terminal device be encryption after ciphertext, server can to encrypted device identification into Row decryption, the process of decryption and the ciphering process of terminal device are opposite processes, and details are not described herein again.
S203, server inquiry and the associated digital publishing rights key of device identification.
Wherein, server is pre-stored with the mapping relations between device identification and digital publishing rights key, different equipment marks Knowledge is associated with different digital publishing rights keys.Such as: it is deployed with database in server, includes that multiple equipment identifies in database With the associated digital publishing rights key of each device identification, server is according to the device identification of the terminal device in S201 in database In inquired, obtain the associated digital publishing rights key of the device identification.
In one or more embodiments, the digital publishing rights key inquired can be encrypted and be signed by server, To guarantee the legitimacy of safety and source of the digital publishing rights key in transmission process, server can be based on symmetric cryptography And/or asymmetric encryption encrypts digital publishing rights key to obtain encrypted digital publishing rights key.Server can be used Hash algorithm signs to encrypted digital publishing rights key, guarantees to distort in data transmission procedure.
S204, server send cipher key acquisition request to terminal device, and terminal device receives the key from server and obtains Take request.
Wherein, key obtains and carries digital publishing rights key in response, which can be by encryption and signature Processing, the type of message that key obtains response can be with HTTP message, TCP message or UDP message or other kinds of message, this Apply for embodiment with no restriction.
When being executed, terminal to server sends cipher key acquisition request, cipher key acquisition request to the scheme of the embodiment of the present application The device identification of carried terminal equipment, cipher key acquisition request are used for close to the server request associated digital publishing rights of device identification Key, server are based on key and obtain response to the associated digital publishing rights key of terminal device sending device mark.Originally by application The technical solution of application, can be in terminal device portion there are when digital publishing rights key, and the server of Xiang Yuancheng requests digital publishing rights Key needs so as to avoid when digital publishing rights key is not present in terminal device in the middle present in the relevant technologies by equipment weight Newly be back to the problem of manually being rewritten Xian Xia manufacturer at, the embodiment of the present application can reduce safeguard digital publishing rights key at This.
Fig. 3 is referred to, a kind of flow diagram of the acquisition methods of digital publishing rights key is provided for the embodiment of the present application. The present embodiment is applied to come between terminal device and server for example, the digital publishing rights in the method for digital publishing rights key The acquisition methods of key may comprise steps of:
Digital publishing rights key is not present in S301, terminal device detection.
In one or more embodiments, the designated position inspection that terminal device can be when monitoring booting in memory It surveys and whether there is digital publishing rights key, if it is, executing the subsequent process to server request digital publishing rights key.
In one or more embodiments, terminal device can receive user and broadcast for the media file of application program When putting operation, the digital publishing rights key there are the application program is detected whether, different application programs has different digital versions Key is weighed, the multiple application programs installed on the same terminal device are respectively necessary for distributing different digital publishing rights keys, different Terminal device have different digital publishing rights keys.
S302, random key is generated.
Wherein, the random key that random algorithm generates a designated length can be used in terminal device, and random key is used for Progress symmetric cryptography, random key can be disposable key, carry out requiring to generate before symmetric cryptography one every time newly Random key.
S303, device identification is encrypted using random key to obtain the first ciphertext.
Wherein, terminal device obtains device identification, and device identification can be IMEI, and terminal device is based on symmetric encipherment algorithm Device identification is encrypted based on random key to obtain the first ciphertext, such as: symmetric encipherment algorithm is AES encryption algorithm, AES Ciphering process can be mainly divided into following several operations, be byte substitution respectively, row displacement, column obscure and InvAddRoundKey.Decryption Process is respectively corresponding inverse operation.Since every single stepping is all reversible, being decrypted in a reverse order can be extensive Recover lost eyesight text.The key of every wheel is extended to obtain by initial key respectively in encryption and decryption.The plaintext of 16 bytes, ciphertext and wheel in algorithm Key is all indicated with the matrix of a 4x4.Terminal device encrypts device identification using random key to obtain the first ciphertext, First ciphertext, that is, encrypted device identification.
S304, random key is encrypted using server public key to obtain the second ciphertext.
Wherein, server public key and privacy key are that a pair for asymmetric encryption that server is issued in advance is close Key, server public key be on network it is disclosed, privacy key cannot disclose, and be retained by server.Terminal device can be Server public key is obtained in the digital certificate of server publication, or obtains server public key by other means, server public key With no restriction with generation method the embodiment of the present application of privacy key.Terminal device using server public key in S302 with Secret key is encrypted to obtain the second ciphertext, the second ciphertext, that is, encrypted random key.Rivest, shamir, adelman can be RSA, des encryption algorithm (data encryption standard algorithm Data Encryption Standard) and IDEA encryption algorithm are (international Data encryption algorithm International Data Encryption Algorithm) etc..
S305, device identification and random key are signed to obtain the first signature.
Wherein, terminal device can merge device identification and random key, and combined method may is that equipment Mark is spliced to behind random key, or random key is spliced to behind device identification, random key and equipment mark Preset mark position can be used between knowledge to be isolated.Signature is for being converted to fixation for the device identification after merging and random key The character string of length avoids device identification and random key from distorting in transmission process.The signature of the embodiment of the present application is calculated Method can not depend on private key, directly by the device identification and random key progress Hash operation after merging, such as: signature algorithm is MD5 (message-digest algorithm, Message Digest 5).
S306, cipher key acquisition request is generated according to the first ciphertext, the second ciphertext and the first signature.
Wherein, cipher key acquisition request may include message header and message body, and the first ciphertext, the second ciphertext are carried in message body With the first signature, message header is for carrying the parameters such as length, protocol type, the IP five-tuple of cipher key acquisition request.
In one or more embodiments, cipher key acquisition request further includes APPID and main key, the explanation of APPIID and main key It can refer to the explanation in the embodiment of Fig. 2, terminal device can sign APPID, random key, device identification and main key The first signature is obtained, then terminal device is based on the first ciphertext, the second ciphertext, the first signature, APPID and main key and generates key hair Send request.
S307, terminal device send cipher key acquisition request to server.
In general, terminal device can monitor terminal device and service before sending cipher key acquisition request to server Communication network quality between device sends cipher key acquisition request to server, leads to when communication network quality meets preset condition Communication network quality includes one of time delay, bandwidth and packet loss or a variety of.
S308, server parsing cipher key acquisition request obtain the first ciphertext, the second ciphertext and the first signature.
Wherein, server parsing cipher key acquisition request obtains the first ciphertext, the second ciphertext and first is signed, the first ciphertext, Second ciphertext and the generating process of the first signature can refer to the description of S301~S307.
S309, the second ciphertext is decrypted to obtain random key using privacy key.
Wherein, server is pre-stored with privacy key, and the server public key in privacy key and S304 partners For the key pair of asymmetric encryption, server is decrypted to obtain random key using privacy key to the second ciphertext.
S310, the first ciphertext is decrypted to obtain device identification using random key.
Wherein, random key obtained in server by utilizing S309 is decrypted to obtain device identification to the first ciphertext, if Standby mark can be IMEI.
S311, device identification and random key are signed to obtain the second signature.
Wherein, server signs to random key obtained in S309 and S310 and device identification based on hash algorithm The second signature is obtained, the type of the hash algorithm in S311 is identical with the type of the hash algorithm in S305.Such as: in S305 eventually End equipment MD5 signs, and server is also signed using MD5 in S311.
S312, the first signature of verifying and the second signature are identical.
Wherein, whether the signature of server authentication first and the second signature are identical, if they are the same, show random key and equipment mark Knowledge is not distorted in transmission process, executes S313;If server authentication first signature and second signature it is not identical, show with Secret key and device identification are distorted in transmission process, and server returns to miscue information to terminal device, and mistake mentions Show information for indicating that random key and/or device identification are distorted, instruction terminal equipment is retransmitted.
S313, inquiry and the associated digital publishing rights key of device identification.
Wherein, server is stored with the mapping relations between device identification and digital publishing rights key, different device identifications It is mapped with different digital publishing rights keys, such as: it is deployed with database in server, multiple equipment mark is stored in database With the respective associated digital publishing rights key of each device identification, equipment of the server according to being parsed in cipher key acquisition request Mark inquires associated digital publishing rights key in the database.
S314, digital publishing rights key and random key are signed to obtain third signature.
Wherein, server merges digital publishing rights key and random key, and combined method may is that digital version Power key is spliced to random key behind, or random key is spliced to behind digital publishing rights key, random key with Default indicator can be used between digital publishing rights key to be isolated.Server using signature algorithm by digital publishing rights key and Random key is signed, and the signature algorithm of the embodiment of the present application can not use private key, will directly be merged using hash algorithm Digital publishing rights key and random key afterwards carries out Hash budget and obtains the character string of a regular length as third signature.
S315, digital publishing rights key is encrypted using random key to obtain third ciphertext.
Wherein, server uses the random key that parses in cipher key acquisition request to carry out pair digital publishing rights key Claim encryption, the algorithm of symmetric cryptography can be the symmetric encipherment algorithm of AES encryption algorithm or other forms, and the embodiment of the present application is not It is restricted.
S316, random key is encrypted using client public key to obtain the 4th ciphertext.
Wherein, client public key and client private key are that a pair that terminal device generates is used for the key of asymmetric encryption Right, terminal device generates method the embodiment of the present application of the key pair with no restriction, and client public key is disclosed, client private Key is then the underground key that terminal device retains, the client public key of the available terminal device publication of server, service Device encrypts the random key parsed in cipher key acquisition request using client public key, obtains third ciphertext.
S317, key acquisition response is generated according to third signature, third ciphertext and the 4th ciphertext.
Wherein, it includes message header and message body that key, which obtains response, may include in message body third signature, third ciphertext and 4th ciphertext.The type of message that key obtains response can be HTTP message, TCP message or UDP message.
S318, server send key to terminal device and obtain response.
S319, parsing key obtain response and obtain third ciphertext, the 4th ciphertext and third signature.
Wherein, server parsing from the message body that key obtains response obtains third ciphertext, the 4th ciphertext and third label Name.
S320, the 4th ciphertext is decrypted to obtain random key using client private key.
Wherein, terminal device is pre-stored with client private key, and client private key and client public key are a pair of for non-right Claim the key pair of encryption, terminal device is decrypted to obtain random key using client private key to the 4th ciphertext.
S321, third ciphertext is decrypted using random key to obtain digital publishing rights key.
Wherein, terminal device is decrypted to obtain digital version using the random key decrypted in S320 to third ciphertext Weigh key.
S322, digital publishing rights key and random key are signed to obtain the 4th signature.
Wherein, terminal device is close to the random key and digital publishing rights decrypted in S320 and S321 using signature algorithm Key merges, and combined method is identical with merging method used in S314, terminal device using signature algorithm to merging after Random key and digital publishing rights key signed to obtain the 4th signature, sign used in the type and S314 of signature algorithm Algorithm is identical.
S323, verifying third signature and the 4th signature are identical.
Wherein, terminal device verifying third signature and the 4th signature it is whether identical, if they are the same, show server send with Secret key and/or digital publishing rights key are not distorted in transmission process, execute S324;If not identical, show random key And/or digital publishing rights key is distorted in transmission process, terminal device can send miscue information to server, refer to Show that server retransmits digital publishing rights key and random key.
S324, storage digital publishing rights key.
Wherein, terminal device verify third signature it is identical with third signature when, the digital version that will be parsed in S321 Power key is written in nonvolatile memory.
When being executed, terminal to server sends cipher key acquisition request, cipher key acquisition request to the scheme of the embodiment of the present application The device identification of carried terminal equipment, cipher key acquisition request are used for close to the server request associated digital publishing rights of device identification Key, server are based on key and obtain response to the associated digital publishing rights key of terminal device sending device mark.Originally by application The technical solution of application, can be in terminal device portion there are when digital publishing rights key, and the server of Xiang Yuancheng requests digital publishing rights Key needs so as to avoid when digital publishing rights key is not present in terminal device in the middle present in the relevant technologies by equipment weight Newly be back to the problem of manually being rewritten Xian Xia manufacturer at, the embodiment of the present application can reduce safeguard digital publishing rights key at This.
Following is the application Installation practice, can be used for executing the application embodiment of the method.It is real for the application device Undisclosed details in example is applied, the application embodiment of the method is please referred to.
In another embodiment of the application, as shown in figure 4, the application also provides a kind of digital publishing rights key Acquisition device, the acquisition device include Transmit-Receive Unit 401 and processing unit 402.
Embodiment A:
Transmit-Receive Unit 401, for sending cipher key acquisition request to server;Wherein, the cipher key acquisition request carries eventually The device identification of end equipment.
The Transmit-Receive Unit 401 is also used to receive the key that the server is sent in response to the cipher key acquisition request Obtain response;Wherein, the key obtains response and carries digital publishing rights key;
Processing unit 402 obtains the digital publishing rights key for parsing the key acquisition response, and stores institute State digital publishing rights key.
In one or more embodiments, processing unit 402 is also used to:
The device identification is encrypted, and the device identification based on encryption generates cipher key acquisition request.
In one or more embodiments, described that the device identification is encrypted, and the equipment mark based on encryption Know and generate cipher key acquisition request, comprising:
Generate random key;
The device identification is encrypted using the random key to obtain the first ciphertext;
The random key is encrypted using server public key to obtain the second ciphertext;
It is signed the random key and the device identification to obtain the first signature;
The cipher key acquisition request is generated according to first ciphertext, second ciphertext and first signature.
It is in one or more embodiments, described to send cipher key acquisition request to server, comprising:
Monitor the network communication quality between the terminal device and the server;
When the network communication quality meets preset condition, by Transmit-Receive Unit 401 to described in server transmission Cipher key acquisition request.
In one or more embodiments, the parsing key obtains response and obtains the digital publishing rights key, wraps It includes:
It parses the key acquisition response and obtains third ciphertext, the 4th ciphertext and third signature;
The 4th ciphertext is decrypted to obtain random key using client private key;
The third ciphertext is decrypted using the random key to obtain the digital publishing rights key;
The digital publishing rights key and the random key are signed to obtain the 4th signature;
It is identical for verifying the third signature and the 4th signature.
Embodiment B:
Transmit-Receive Unit 401, for receiving the cipher key acquisition request from terminal device;Wherein, the cipher key acquisition request Carry the device identification of the terminal.
Processing unit 402 obtains the device identification for parsing the cipher key acquisition request, and inquiry is set with described It is standby to identify associated digital publishing rights key.
The Transmit-Receive Unit 401 is also used to send key acquisition response to the terminal device;Wherein, the key obtains Request is taken to carry the digital publishing rights key.
In one or more embodiments, the parsing cipher key acquisition request obtains the device identification and includes:
It parses the cipher key acquisition request and obtains the first ciphertext, the second ciphertext and the first signature;
The second ciphertext is decrypted to obtain random key using privacy key;
Secret is carried out to first ciphertext using the random key and obtains the device identification;
The device identification and the random key are signed to obtain the second signature;
It is identical for verifying first signature and second signature.
In one or more embodiments, processing unit 402 is also used to:
The digital publishing rights key is encrypted, response is obtained based on encrypted digital publishing rights key production key.
In one or more embodiments, described that the digital publishing rights key is encrypted, it is based on encrypted number Copyright key production key obtains response, comprising:
The digital publishing rights key and the random key are signed to obtain third signature;
The digital publishing rights key is encrypted to obtain third ciphertext using the random key;
The random key is encrypted using client public key to obtain the 4th ciphertext;
Key, which is generated, according to third signature, the third ciphertext and the 4th ciphertext obtains response.
It should be noted that acquisition device 4 provided by the above embodiment execute digital publishing rights key acquisition methods when, Only the example of the division of the above functional modules, it in practical application, can according to need and by above-mentioned function distribution It is completed by different functional modules, i.e., the internal structure of equipment is divided into different functional modules, it is described above to complete All or part of function.In addition, the playback method embodiment of courseware provided by the above embodiment belongs to same design, embody Realization process is detailed in embodiment of the method, and which is not described herein again.
Above-mentioned the embodiment of the present application serial number is for illustration only, does not represent the advantages or disadvantages of the embodiments.
Fig. 5 is a kind of electronic equipment structural schematic diagram provided by the embodiments of the present application, and electronic equipment can be end above-mentioned End equipment or server, as shown in figure 5, the device includes: memory 502, processor 501, input unit 503, output device 504 and communication interface.
Memory 502 can be independent physical unit, can with processor 501, input unit 503 and output device 504 To be connected by bus.Together with memory 502, processor 501, input unit 503 also can integrate with output device 504, Pass through hardware realization etc..
Memory 502 is used to store the program for realizing above method embodiment or Installation practice modules, processing Device 501 calls the program, executes the method in figure 2 above and the embodiment of Fig. 3.
Input unit 502 includes but is not limited to keyboard, mouse, touch panel, camera and microphone;Output device includes But it is limited to display screen.
For receiving and dispatching various types of message, communication interface includes but is not limited to wireless interface or wired connects communication interface Mouthful.
Optionally, when passing through software realization some or all of in the distributed task dispatching method of above-described embodiment, Device can also only include processor.Memory for storing program is located at except device, processor by circuit/electric wire with Memory connection, for reading and executing the program stored in memory.
Processor can be central processing unit (central processing unit, CPU), network processing unit The combination of (network processor, NP) or CPU and NP.
Processor can further include hardware chip.Above-mentioned hardware chip can be specific integrated circuit (application-specific integrated circuit, ASIC), programmable logic device (programmable Logic device, PLD) or combinations thereof.Above-mentioned PLD can be Complex Programmable Logic Devices (complex Programmable logic device, CPLD), field programmable gate array (field-programmable gate Array, FPGA), Universal Array Logic (generic array logic, GAL) or any combination thereof.
Memory may include volatile memory (volatile memory), such as access memory (random- Access memory, RAM);Memory also may include nonvolatile memory (non-volatile memory), such as fastly Flash memory (flash memory), hard disk (hard disk drive, HDD) or solid state hard disk (solid-state drive, SSD);Memory can also include the combination of the memory of mentioned kind.
Wherein, processor 501 calls the program code in memory 502 for executing following steps:
The embodiment of the present application also provides a kind of computer program products comprising instruction, when it runs on computers When, so that computer executes the voice data processing method provided by the above embodiment based on Key for Reference.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
The application is referring to method, the process of equipment (system) and computer program product according to the embodiment of the present application Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.

Claims (13)

1. a kind of acquisition methods of digital publishing rights key, which is characterized in that the described method includes:
Cipher key acquisition request is sent to server;Wherein, the device identification of the cipher key acquisition request carried terminal equipment;
It receives the server and obtains response in response to the key that the cipher key acquisition request is sent;Wherein, the key obtains Response carries digital publishing rights key;
It parses the key acquisition response and obtains the digital publishing rights key, and store the digital publishing rights key.
2. the method according to claim 1, wherein the terminal to server send cipher key acquisition request it Before, further includes:
The device identification is encrypted, and the device identification based on encryption generates cipher key acquisition request.
3. according to the method described in claim 2, it is characterized in that, described encrypt the device identification, and being based on The device identification of encryption generates cipher key acquisition request, comprising:
Generate random key;
The device identification is encrypted using the random key to obtain the first ciphertext;
The random key is encrypted using server public key to obtain the second ciphertext;
It is signed the random key and the device identification to obtain the first signature;
The cipher key acquisition request is generated according to first ciphertext, second ciphertext and first signature.
4. according to claim 1 to method described in 3 any one, which is characterized in that described to send key acquisition to server Request, comprising:
Monitor the network communication quality between the terminal device and the server;
When the network communication quality meets preset condition, Xiang Suoshu server sends the cipher key acquisition request.
5. according to the method described in claim 4, it is characterized in that, the parsing key obtains response and obtains the number Copyright key, comprising:
It parses the key acquisition response and obtains third ciphertext, the 4th ciphertext and third signature;
The 4th ciphertext is decrypted to obtain random key using client private key;
The third ciphertext is decrypted using the random key to obtain the digital publishing rights key;
The digital publishing rights key and the random key are signed to obtain the 4th signature;
It is identical for verifying the third signature and the 4th signature.
6. a kind of acquisition methods of digital publishing rights key characterized by comprising
Receive the cipher key acquisition request from terminal device;Wherein, the cipher key acquisition request carries the equipment mark of the terminal Know;
It parses the cipher key acquisition request and obtains the device identification, and inquiry and the associated digital publishing rights of the device identification Key.
Key, which is sent, to the terminal device obtains response;Wherein, the cipher key acquisition request carries the digital publishing rights key.
7. according to the method described in claim 6, it is characterized in that, the parsing cipher key acquisition request obtains the equipment Mark includes:
It parses the cipher key acquisition request and obtains the first ciphertext, the second ciphertext and the first signature;
The second ciphertext is decrypted to obtain random key using privacy key;
Secret is carried out to first ciphertext using the random key and obtains the device identification;
The device identification and the random key are signed to obtain the second signature;
It is identical for verifying first signature and second signature.
8. the method according to the description of claim 7 is characterized in that described send key acquisition response to the terminal device Before, further includes:
The digital publishing rights key is encrypted, response is obtained based on encrypted digital publishing rights key production key.
9. according to the method described in claim 8, being based on it is characterized in that, described encrypt the digital publishing rights key Encrypted digital publishing rights key production key obtains response, comprising:
The digital publishing rights key and the random key are signed to obtain third signature;
The digital publishing rights key is encrypted to obtain third ciphertext using the random key;
The random key is encrypted using client public key to obtain the 4th ciphertext;
Key, which is generated, according to third signature, the third ciphertext and the 4th ciphertext obtains response.
10. a kind of acquisition device of digital publishing rights key, which is characterized in that the acquisition device includes:
Transmit-Receive Unit, for sending cipher key acquisition request to server;Wherein, the cipher key acquisition request carried terminal equipment Device identification;
The Transmit-Receive Unit is also used to receive the server and obtains in response to the key that the cipher key acquisition request is sent and rings It answers;Wherein, the key obtains response and carries digital publishing rights key;
Processing unit obtains the digital publishing rights key for parsing the key acquisition response, and stores the number Copyright key.
11. a kind of acquisition device of digital publishing rights key, which is characterized in that the acquisition device includes:
Transmit-Receive Unit, for receiving the cipher key acquisition request from terminal device;Wherein, described in the cipher key acquisition request carries The device identification of terminal;
Processing unit obtains the device identification, and inquiry and the device identification for parsing the cipher key acquisition request Associated digital publishing rights key.
The Transmit-Receive Unit is also used to send key acquisition response to the terminal device;Wherein, the cipher key acquisition request is taken With the digital publishing rights key.
12. a kind of computer storage medium, which is characterized in that the computer storage medium is stored with a plurality of instruction, the finger It enables and is suitable for being loaded by processor and being executed the method and step such as claim 1~9 any one.
13. a kind of electronic equipment characterized by comprising processor and memory;Wherein, the memory is stored with calculating Machine program, the computer program are suitable for being loaded by the processor and being executed the method step such as claim 1~9 any one Suddenly.
CN201910782454.1A 2019-08-23 2019-08-23 Method and device for acquiring digital copyright key, storage medium and electronic equipment Active CN110401677B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910782454.1A CN110401677B (en) 2019-08-23 2019-08-23 Method and device for acquiring digital copyright key, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910782454.1A CN110401677B (en) 2019-08-23 2019-08-23 Method and device for acquiring digital copyright key, storage medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN110401677A true CN110401677A (en) 2019-11-01
CN110401677B CN110401677B (en) 2022-05-17

Family

ID=68328897

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910782454.1A Active CN110401677B (en) 2019-08-23 2019-08-23 Method and device for acquiring digital copyright key, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN110401677B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111030827A (en) * 2019-12-06 2020-04-17 深圳乐信软件技术有限公司 Information interaction method and device, electronic equipment and storage medium
CN111339501A (en) * 2020-02-20 2020-06-26 百度在线网络技术(北京)有限公司 Copyright protection method, device, equipment and medium based on block chain
CN111741268A (en) * 2020-06-30 2020-10-02 中国建设银行股份有限公司 Video transmission method, device, server, equipment and medium
CN112187726A (en) * 2020-09-04 2021-01-05 宇龙计算机通信科技(深圳)有限公司 Data transmission method, device, storage medium and terminal
CN112235103A (en) * 2020-09-30 2021-01-15 银盛支付服务股份有限公司 Secure network communication method for dynamically generating secret key
CN113572763A (en) * 2021-07-22 2021-10-29 中国工商银行股份有限公司 Data processing method and device, electronic equipment and storage medium
CN114584299A (en) * 2022-03-02 2022-06-03 中国建设银行股份有限公司 Data processing method and device, electronic equipment and storage medium
CN114584299B (en) * 2022-03-02 2024-04-26 中国建设银行股份有限公司 Data processing method, device, electronic equipment and storage medium

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101425898A (en) * 2007-10-31 2009-05-06 上海交通大学 Digital signature, method, system, device and generator for digital signature verification
CN101958793A (en) * 2010-03-03 2011-01-26 北京唐朝科技股份有限公司 Double public key cryptograph identity identification, secrete key verification and digital signing integrated solution
CN102281300A (en) * 2011-08-24 2011-12-14 中国联合网络通信集团有限公司 digital rights management license distribution method and system, server and terminal
CN103218570A (en) * 2011-11-08 2013-07-24 三星电子株式会社 Apparatus and method of portable terminal for application data protection
CN103649962A (en) * 2011-05-02 2014-03-19 英赛瑟库尔公司 System and method for protecting digital contents with digital rights management (DRM)
CN104426649A (en) * 2013-08-22 2015-03-18 中国电信股份有限公司 Automatic secret key synchronization method and system, and secret key management platform
CN105227300A (en) * 2015-08-27 2016-01-06 北京百度网讯科技有限公司 A kind of acquisition methods of key and system
CN106033503A (en) * 2015-03-19 2016-10-19 阿里巴巴集团控股有限公司 Method, device and system of online writing application secret key into digital content equipment
CN106535184A (en) * 2016-10-18 2017-03-22 深圳市金立通信设备有限公司 Key management method and system
CN106603485A (en) * 2016-10-31 2017-04-26 美的智慧家居科技有限公司 Secret key negotiation method and device
CN106941406A (en) * 2017-05-02 2017-07-11 深圳奥联信息安全技术有限公司 Identify-based encryption endorsement method, decryption sign test method and its device
CN107070909A (en) * 2017-04-01 2017-08-18 广东欧珀移动通信有限公司 Method for sending information, message receiving method, apparatus and system
CN107276756A (en) * 2017-07-27 2017-10-20 深圳市金立通信设备有限公司 A kind of method and server for obtaining root key
CN107809311A (en) * 2017-09-30 2018-03-16 飞天诚信科技股份有限公司 The method and system that a kind of unsymmetrical key based on mark is signed and issued

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101425898A (en) * 2007-10-31 2009-05-06 上海交通大学 Digital signature, method, system, device and generator for digital signature verification
CN101958793A (en) * 2010-03-03 2011-01-26 北京唐朝科技股份有限公司 Double public key cryptograph identity identification, secrete key verification and digital signing integrated solution
CN103649962A (en) * 2011-05-02 2014-03-19 英赛瑟库尔公司 System and method for protecting digital contents with digital rights management (DRM)
CN102281300A (en) * 2011-08-24 2011-12-14 中国联合网络通信集团有限公司 digital rights management license distribution method and system, server and terminal
CN103218570A (en) * 2011-11-08 2013-07-24 三星电子株式会社 Apparatus and method of portable terminal for application data protection
CN104426649A (en) * 2013-08-22 2015-03-18 中国电信股份有限公司 Automatic secret key synchronization method and system, and secret key management platform
CN106033503A (en) * 2015-03-19 2016-10-19 阿里巴巴集团控股有限公司 Method, device and system of online writing application secret key into digital content equipment
CN105227300A (en) * 2015-08-27 2016-01-06 北京百度网讯科技有限公司 A kind of acquisition methods of key and system
CN106535184A (en) * 2016-10-18 2017-03-22 深圳市金立通信设备有限公司 Key management method and system
CN106603485A (en) * 2016-10-31 2017-04-26 美的智慧家居科技有限公司 Secret key negotiation method and device
CN107070909A (en) * 2017-04-01 2017-08-18 广东欧珀移动通信有限公司 Method for sending information, message receiving method, apparatus and system
CN106941406A (en) * 2017-05-02 2017-07-11 深圳奥联信息安全技术有限公司 Identify-based encryption endorsement method, decryption sign test method and its device
CN107276756A (en) * 2017-07-27 2017-10-20 深圳市金立通信设备有限公司 A kind of method and server for obtaining root key
CN107809311A (en) * 2017-09-30 2018-03-16 飞天诚信科技股份有限公司 The method and system that a kind of unsymmetrical key based on mark is signed and issued

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111030827A (en) * 2019-12-06 2020-04-17 深圳乐信软件技术有限公司 Information interaction method and device, electronic equipment and storage medium
CN111339501A (en) * 2020-02-20 2020-06-26 百度在线网络技术(北京)有限公司 Copyright protection method, device, equipment and medium based on block chain
CN111339501B (en) * 2020-02-20 2022-10-14 百度在线网络技术(北京)有限公司 Copyright protection method, device, equipment and medium based on block chain
CN111741268A (en) * 2020-06-30 2020-10-02 中国建设银行股份有限公司 Video transmission method, device, server, equipment and medium
CN111741268B (en) * 2020-06-30 2022-07-05 中国建设银行股份有限公司 Video transmission method, device, server, equipment and medium
CN112187726A (en) * 2020-09-04 2021-01-05 宇龙计算机通信科技(深圳)有限公司 Data transmission method, device, storage medium and terminal
CN112235103A (en) * 2020-09-30 2021-01-15 银盛支付服务股份有限公司 Secure network communication method for dynamically generating secret key
CN113572763A (en) * 2021-07-22 2021-10-29 中国工商银行股份有限公司 Data processing method and device, electronic equipment and storage medium
CN113572763B (en) * 2021-07-22 2022-10-14 中国工商银行股份有限公司 Data processing method and device, electronic equipment and storage medium
CN114584299A (en) * 2022-03-02 2022-06-03 中国建设银行股份有限公司 Data processing method and device, electronic equipment and storage medium
CN114584299B (en) * 2022-03-02 2024-04-26 中国建设银行股份有限公司 Data processing method, device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN110401677B (en) 2022-05-17

Similar Documents

Publication Publication Date Title
US11750591B2 (en) Key attestation statement generation providing device anonymity
CN110401677A (en) Acquisition methods, device, storage medium and the electronic equipment of digital publishing rights key
US11520912B2 (en) Methods, media, apparatuses and computing devices of user data authorization based on blockchain
CN1985466B (en) Method of delivering direct proof private keys in signed groups to devices using a distribution CD
CN110460439A (en) Information transferring method, device, client, server-side and storage medium
CN105007279A (en) Authentication method and authentication system
US20200374272A1 (en) Data exchange system, method and device
CN110414190B (en) Signature method of application installation package, related device, storage medium and electronic equipment
CN107005407A (en) Use the TPM of server remote password service
CN108600222A (en) The communication means of client application and trusted application, system and terminal
CN107920060A (en) Data access method and device based on account
JP6690346B2 (en) Security risk management system, server, control method, program
CN110414269B (en) Processing method, related device, storage medium and system of application installation package
CN110263563A (en) By means of the ad click data cochain method and its equipment of block chain
US8929555B2 (en) Data encryption systems and methods
CN114124440A (en) Secure transmission method, device, computer equipment and storage medium
CN108958771B (en) Application program updating method, device, server and storage medium
CN113922976A (en) Equipment log transmission method and device, electronic equipment and storage medium
CN113810779B (en) Code stream signature verification method, device, electronic equipment and computer readable medium
JP7468717B2 (en) Terminal, control method, and program
CN114826616B (en) Data processing method, device, electronic equipment and medium
Singh et al. Performance analysis of middleware distributed and clustered systems (PAMS) concept in mobile communication devices using Android operating system
CN110263560A (en) By means of the ad click data cochain method and its equipment of block chain
CN116248662A (en) Electronic file transmission method and device, storage medium and computer equipment
CN115296934A (en) Information transmission method and device based on industrial control network intrusion and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant