CN111800273B - Information processing method, electronic device, and storage medium - Google Patents

Information processing method, electronic device, and storage medium Download PDF

Info

Publication number
CN111800273B
CN111800273B CN202010622942.9A CN202010622942A CN111800273B CN 111800273 B CN111800273 B CN 111800273B CN 202010622942 A CN202010622942 A CN 202010622942A CN 111800273 B CN111800273 B CN 111800273B
Authority
CN
China
Prior art keywords
information
key information
electronic device
key
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010622942.9A
Other languages
Chinese (zh)
Other versions
CN111800273A (en
Inventor
尹翠然
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN202010622942.9A priority Critical patent/CN111800273B/en
Publication of CN111800273A publication Critical patent/CN111800273A/en
Application granted granted Critical
Publication of CN111800273B publication Critical patent/CN111800273B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage

Abstract

The application discloses an information processing method, electronic equipment and a storage medium, wherein the method is applied to first electronic equipment, receives a key information acquisition request, acquires key information from a target firmware if associated information corresponding to the key information acquisition request meets an information output condition, and outputs the key information. The key information is stored in the special storage area of the first electronic device, namely the target firmware, and the target firmware is separated from the application layer of the first electronic device, so that the key information of the target firmware cannot be obtained through an application system of the electronic device, and even if the key information needs to be obtained, the associated information corresponding to the request needs to be verified, the security of the key information is ensured, and the security of the information corresponding to the key information is improved.

Description

Information processing method, electronic device, and storage medium
Technical Field
The present application relates to the field of information processing technologies, and in particular, to an information processing method, an electronic device, and a storage medium.
Background
With the development of network technology, information security is particularly important. In order to ensure the security of the personal computer, many users choose to encrypt files and folders on the personal computer in an encryption manner. The encryption means that are common today are usually implemented by encrypting certificates or keys.
Taking EFS (encrypted File System) of Windows System as an example, after a user encrypts a File or a folder for the first time, the System generates an encryption certificate, and when the encryption certificate is generated, the System prompts the user to input a password to store the encryption certificate. If the encryption certificate is lost or the user forgets the password of the encryption certificate, the encrypted file cannot be used, and how to ensure the security of the encryption certificate and/or the password of the encryption certificate is also a key problem for ensuring the security of the personal computer.
Disclosure of Invention
In view of this, the present application provides the following technical solutions:
an information processing method applied to a first electronic device comprises the following steps:
receiving a key information acquisition request;
if the associated information corresponding to the key information acquisition request meets the information output condition, acquiring key information from target firmware of the first electronic device, wherein the key information is stored in the target firmware, and the target firmware is divided from an application layer of the first electronic device;
and outputting the key information.
Optionally, the method further comprises:
generating key information in response to the first electronic equipment, and determining target information matched with the key information;
storing the key information and the target information to target firmware of the first electronic device.
Optionally, the relevant information corresponding to the key information obtaining request satisfies an information output condition, and includes: and the associated information corresponding to the key information acquisition request is matched with the target information.
Optionally, the acquiring the key information from the target firmware of the first electronic device includes, if the associated information corresponding to the key acquisition request satisfies an information output condition, acquiring the key information from the target firmware of the first electronic device, where the acquiring the key information includes:
identifying equipment which can be connected with the first electronic equipment to obtain equipment identification information;
and if the equipment identification information comprises the second electronic equipment information, acquiring key information from the target firmware of the first electronic equipment.
Optionally, the outputting the key information includes:
generating verification information and sending the verification information to the second electronic equipment;
receiving feedback information which is sent by the second electronic equipment and matched with the verification information;
and if the feedback information meets the target condition, outputting the key information.
Optionally, the generating verification information includes:
acquiring signal intensity data of the second electronic equipment;
determining a distance value of the first electronic device from the second electronic device based on the signal strength data of the second electronic device;
and if the distance value is greater than the distance threshold value, generating verification information.
Optionally, the associated information includes a request interface, and if the associated information corresponding to the key information obtaining request meets an information output condition, obtaining the key information from the target firmware of the first electronic device includes:
acquiring a request interface corresponding to the key request;
and if the request interface is matched with the specific access interface of the target firmware, acquiring key information from the target firmware of the first electronic equipment.
Optionally, the outputting the key information includes:
identifying operation information of the first electronic equipment;
determining a target security mode matched with the operation information;
and outputting the key information by using an output mode corresponding to the target security mode.
A first electronic device, comprising:
a receiving unit configured to receive a key information acquisition request;
an obtaining unit, configured to obtain key information from a target firmware of the first electronic device if associated information corresponding to the key information obtaining request meets an information output condition, where the key information is stored in the target firmware and the target firmware is partitioned from an application layer of the first electronic device;
an output unit for outputting the key information.
A storage medium having stored thereon a computer program which, when executed by a processor, implements an information processing method as described in any one of the above.
According to the technical scheme, the method is applied to the first electronic device, receives a key information acquisition request, acquires the key information from the target firmware if the associated information corresponding to the key information acquisition request meets the information output condition, and outputs the key information. The key information is stored in the special storage area of the first electronic device, namely the target firmware, and the target firmware is separated from the application layer of the first electronic device, so that the key information of the target firmware cannot be obtained through an application system of the electronic device, and even if the key information needs to be obtained, the associated information corresponding to the request needs to be verified, the security of the key information is ensured, and the security of the information corresponding to the key information is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on the provided drawings without creative efforts.
Fig. 1 is a schematic flowchart of an information processing method according to an embodiment of the present application;
fig. 2 is a schematic flowchart of another information processing method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of an encryption certificate importing method according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a first electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The application provides an information processing method which is applied to the field of data processing needing to encrypt data. In order to ensure the security of data in a personal computer, a user usually chooses to encrypt the data on the computer by using an encryption technology, such as encrypting information of files, folders, and the like in the computer, so as to prevent the related data from being lost when the computer is abnormally lost or illegally accessed. That is, after data is encrypted, a user needs to call corresponding information such as an encryption certificate and a password to decrypt the encrypted data to obtain the corresponding information. In the embodiments of the present application, information such as an encryption certificate and a password is collectively referred to as key information. How to guarantee the security of the key information, and the key information is not easy to lose, etc. is an important problem for guaranteeing the data security.
In view of this, an embodiment of the present application provides an information processing method, which is applied to a first electronic device, where the first electronic device is an electronic device capable of processing a key acquisition request and storing key information, and may be a mobile terminal such as a mobile phone, or a fixed terminal such as a computer. Referring to fig. 1, the method may include the steps of:
s101, receiving a key information acquisition request.
The key information acquisition request refers to a request for acquiring the key information under a normal condition, wherein the normal condition represents a condition of normally using the key information, for example, a certain file is encrypted by using a key, a user can remember the password under a normal condition, and the password is input when the file is opened to acquire the content of the file. However, when the user forgets the password, or loses the password, the content of the file cannot be obtained. At this time, the user generates a key information obtaining request through the electronic device, which corresponds to the request for obtaining the password in the above example. And the corresponding key information is obtained through the key information obtaining request, so that the corresponding encrypted document is decrypted through the key information to obtain the corresponding information.
And S102, if the associated information corresponding to the key information acquisition request meets the information output condition, acquiring the key information from the target firmware of the first electronic equipment.
And S103, outputting the key information.
The key information generated in the embodiment of the present application is stored in the target firmware of the first electronic device. The target firmware is a storage area of the first electronic device dedicated for storing the key information. And the division of the target firmware and the application layer of the first electronic device means that the information stored by the target firmware is not affected by the failure of the application system of the first electronic device or the destruction of the application layer generating the key information in the electronic device. I.e. the target firmware may provide a secure and reliable storage area for the key information. For example, the key information may be stored in Firmware (Firmware) or may be stored in UEFI Firmware.
In the embodiment of the application, the corresponding key information is acquired from the target firmware without receiving the key information acquisition request. Besides verifying the information contained in the key information request, the associated information corresponding to the key information acquisition request needs to be determined, whether the associated information meets the information output condition is judged, and if the associated information meets the information output condition, the key information is acquired from the target firmware of the first electronic device. The association information may refer to information having a specific relationship with the key acquisition request, for example, information having a specific access relationship with the key acquisition request, or information having a connection relationship with the first electronic device corresponding to the key acquisition request. The verification process of the information contained in the key information request mainly comprises verification of the legality of the key information request, verification of user authority and the like.
And when the associated information meets the information output condition, acquiring the key information from the target firmware and outputting the key information. When the key information is output, the first electronic device may output the key information, for example, the key information is displayed by a display unit of the first electronic device, or the transmission unit of the first electronic device may output the key information to a specific electronic device, such as a second electronic device.
The application discloses an information processing method which is applied to first electronic equipment, receives a key information acquisition request, acquires key information from a target firmware if associated information corresponding to the key information acquisition request meets an information output condition, and outputs the key information. The key information is stored in the special storage area of the first electronic device, namely the target firmware, and the target firmware is separated from the application layer of the first electronic device, so that the key information of the target firmware cannot be obtained through an application system of the electronic device, and even if the key information needs to be obtained, the associated information corresponding to the request needs to be verified, the security of the key information is ensured, and the security of the information corresponding to the key information is improved.
The key information stored in the target firmware of the first electronic device in the embodiment of the present application may be key information generated when a file or the like is encrypted, that is, the target firmware stored in the first electronic device may be directly backed up when the key information is generated. Or when the first electronic device generates the key information, corresponding prompt information is generated to prompt whether the key information is stored in the target firmware.
In one possible implementation manner, in response to the first electronic device generating the key information, determining target information matched with the key information; and storing the key information and the target information to the target firmware of the first electronic equipment. When outputting information, it is necessary to verify not only the user authority and the user validity of the key information request but also the related information corresponding to the key information request. Therefore, when storing the key information, it is also necessary to determine target information that matches the key information. The target information may refer to information having a specific association relationship with the key information, such as user right information corresponding to the key information, access right information corresponding to the key information, trigger information for information output corresponding to the key information, and the like. And associating the key information with the target information after the target information is determined, and storing the key information and the target information in target firmware of the first electronic device. For example, the information output condition includes that the first electronic device outputs the key information only after the target device is successfully paired with the first electronic device. At this time, the corresponding target information is the identification information of the target device.
Specifically, the step of satisfying the information output condition by the associated information corresponding to the key information acquisition request includes: and matching the associated information corresponding to the key information acquisition request with the target information. For example, the target information is corresponding user authority information capable of obtaining the key information, the associated information is user information sent by a key information obtaining request, and when the user information sent by the key information obtaining request meets the user authority information, the associated information is proved to be matched with the target information, and the key information is obtained from the target firmware of the first electronic device.
In a possible implementation manner of the present application, the target information includes second electronic device information, and the association information includes device identification information, refer to fig. 2, which shows a flowchart of another information processing method provided in an embodiment of the present application, where the method is applied to a first electronic device, and includes the following steps:
s201, receiving a key information acquisition request;
s202, identifying equipment which can be connected with first electronic equipment to obtain equipment identification information;
s203, if the equipment identification information comprises second electronic equipment information, key information is obtained from the target firmware of the first electronic equipment;
and S204, outputting the key information.
Upon receiving the key information acquisition request, a trigger condition for generating the key information acquisition request is identified, for example, an apparatus capable of connecting with the first electronic apparatus is identified, and identification information is obtained. The device capable of being connected with the first electronic device may be a device capable of being paired with the first electronic device in a corresponding pairing manner. For example, the pairing mode is a bluetooth pairing mode. The device identification information is information of the relevant device capable of bluetooth connection with the first electronic device.
And when the key information is stored, the corresponding storage can trigger the first electronic equipment to output the second electronic equipment information corresponding to the key information. That is, when the first electronic device recognizes that the second electronic device is included in the devices to which the first electronic device can connect, the first electronic device acquires the key information from the target firmware and then outputs the key information. Specifically, if the first electronic device and the second electronic device can perform bluetooth connection, the stored target information may be bluetooth address information of the second electronic device. Namely, the bluetooth address information recognized by the first electronic device includes the bluetooth address information of the second electronic device, the key information is obtained from the target firmware of the first electronic device.
When the device identification information includes the second electronic device information, key information is acquired from the target firmware of the first electronic device. Two processing modes can be included when outputting the key information: first, when the second electronic device information is included in the device identification information, the key information may be directly acquired and output. Secondly, when the equipment identification information comprises second electronic equipment information, generating verification information and sending the verification information to the second electronic equipment; receiving feedback information which is sent by the second electronic equipment and matched with the verification information; and if the feedback information meets the target condition, outputting the key information. That is, when the first electronic device recognizes that the device capable of being connected to the first electronic device includes the second electronic device, it may generate the verification information, where the verification information may be to-be-confirmed information that is expected to be obtained for determination by the second electronic device, or may be verification information that requires the second electronic device to input the pairing password. When the feedback information sent by the second electronic device meets the target condition, namely if the feedback information sent by the second electronic device is confirmation information or a correct pairing password, the first electronic device outputs the key information.
Correspondingly, when the device connection module of the first electronic device has different functions, the device connection module can correspond to different verification information. If the device connection module of the first electronic device can identify the signal strength information of the device that can be connected with the first electronic device, and can calculate the distance information between the first electronic device and the information that can be connected with the first electronic device according to the signal strength information. So that corresponding authentication information can be generated from the distance information. Taking bluetooth connection as an example, if the second electronic device is a mobile device, the first electronic device is a computer. When the mobile device and the computer are close to each other through the Bluetooth connection module, the probability that the mobile device is held by other people is generally considered to be small, and at the moment, the key information can be directly output.
In another possible implementation, when the distance between the two is large, corresponding verification information is generated, and feedback information of the received verification information is used as a verification condition for outputting the key information. Specifically, the process of generating the verification information may include:
s301, acquiring signal intensity data of second electronic equipment;
s302, determining a distance value between the first electronic device and the second electronic device based on signal intensity data of the second electronic device;
and S303, if the distance value is larger than the distance threshold value, generating verification information.
And determining a distance value through the signal strength data, and then determining whether the second equipment has a risk according to the distance value, namely determining corresponding verification information according to the distance value. The verification information generated when the distance value is greater than the distance threshold may be information that requires the pairing key to be input, and the verification information generated when the distance value is less than the distance threshold may be information that requires the confirmation to be input.
It should be noted that, in the embodiment of the present application, the key information is stored in the specific secure target firmware in the first device, and the key information of the target firmware may be obtained by verifying whether the request interface for accessing the target firmware satisfies the access interface defined by the request interface. Specifically, the associated information corresponding to the key information obtaining request may include a request interface, and if the associated information corresponding to the key information obtaining request satisfies an information output condition, obtaining the key information from the target firmware of the first electronic device includes:
acquiring a request interface corresponding to the key request;
and if the request interface is matched with the specific access interface of the target firmware, acquiring key information from the target firmware of the first electronic equipment.
For example, the target Firmware is Firmware (Firmware) of a computer system, such as a BIOS (basic input/output system). The key information acquisition request needs to enter a request generated by a BIOS Setup interface after the BIOS in the computer system is started, namely, the information of the target firmware can be accessed only when the BIOS Setup interface is entered, and the key information acquisition requests generated by other request interfaces cannot acquire the key information of the target firmware.
Further to ensure the security of the key information output, in this embodiment of the present application, the outputting the key information further includes:
s401, identifying operation information of first electronic equipment;
s402, determining a target security mode matched with the operation information;
s403, outputting the key information by using the output mode corresponding to the target safety mode.
The operation information of the first electronic device includes information of a currently operating application of the first electronic device, information of a currently displayed interface, and the like. The target security mode of the current device is determined by the running information, such as whether the key information can be output or not, or whether the key information can be directly output. For example, the key information may be output after the specific information is obtained after the hint information for key information output is generated. If the current operation information indicates that other information is being processed, the key information may be output to the designated device instead of being displayed by the first electronic device.
The following describes an information processing method in an embodiment of the present application in a specific application scenario in which a first electronic device has a bluetooth connection module, and a device capable of performing bluetooth connection with the first electronic device is verified as a condition for outputting key information.
When a user encrypts a File through an EFS (encryption File System) in a first electronic device, an encryption certificate is generated, and then the first electronic device prompts the user whether to store the encryption certificate in a target firmware. If the user selects yes, the first electronic device simultaneously generates Bluetooth list information, the Bluetooth list comprises device information capable of performing Bluetooth connection with the first electronic device, and then the user is prompted to select a certain device in the list as a registered Bluetooth device. Correspondingly, the user may directly input the bluetooth address information of the triggering bluetooth device that the user desires to output as information. When the first electronic device and the Bluetooth device selected by the user are successfully paired, the Bluetooth address of the Bluetooth device is recorded, a random password is generated, then a certificate is encrypted everywhere, and the Bluetooth address, the random password and the derived encrypted certificate are stored in the target firmware. Wherein the random password can be used for subsequent information for authenticating the bluetooth device.
Referring to fig. 3, a schematic flowchart of an encryption certificate importing method provided in an embodiment of the present application is shown. The method may comprise the steps of:
s501, responding to the fact that the user is denied to access the encrypted file, and generating prompt information for prompting the user to import the encrypted certificate;
s502, starting a Bluetooth searching function, judging whether registered Bluetooth equipment is searched, if so, executing S503, and if not, executing S504;
s503, deriving an encryption certificate from the target firmware;
s504, generating prompt information for prompting the registration of the Bluetooth equipment.
Specifically, in the process of exporting the encryption certificate, the embodiment of the application supports two modes, namely a high security mode and a low security mode, and if a user selects the high security mode, the user needs to input a pairing password through a registered bluetooth device (such as a mobile phone) to complete pairing with a first electronic device (such as a computer), and then the encryption certificate is imported. If the user selects the low security mode, the Bluetooth device which is searched and paired by the user can encrypt the certificate everywhere. Since the searchable range of bluetooth is only 10 meters, since it is the registered device of the user, the probability that the mobile phone is held by others is very small within the range of 10 meters. In addition, some mobile phones are low-power-consumption Bluetooth, the processor can read the rssi (Received Signal Strength Indication) of the low-power-consumption Bluetooth in the range, and the distance between the mobile phone and a computer is probably less than 1 m according to the rssi value, so that the certificate can be led in more quickly.
In an application scene, the safety can be improved according to the information processing method, and meanwhile, the experience effect of a user is also improved. Specifically, the encryption certificate or the key is lost due to carelessness of the user or due to reinstallation of the system, and related key information can be quickly imported in the mode. The mobile phone can be used as a trigger condition for deriving the key information in the target firmware, and the trouble that the user loses the key information can be solved. And the user does not need to record the mail-free information, only needs to remember the EFS encryption of a mobile phone or other Bluetooth equipment matched with a computer, such as a Windows system, and randomly generates a password and records the password in the target firmware, so that the user does not need to input and record the password, the password can be automatically derived when deriving the certificate, and the requirement of Windows on the password is avoided. Meanwhile, the function is low in hardware requirement, the existing notebook almost has a Bluetooth pairing function, and the mobile phone is also a common device. Moreover, it is almost impossible for a user to lose both the handset and the computer, and even if the computer is lost, others cannot derive the encrypted key or certificate through this function.
Referring to fig. 4, an embodiment of the present application provides a first electronic device, including:
a receiving unit 10 configured to receive a key information acquisition request;
an obtaining unit 20, configured to obtain key information from a target firmware of the first electronic device if associated information corresponding to the key information obtaining request meets an information output condition, where the key information is stored in the target firmware and the target firmware is partitioned from an application layer of the first electronic device;
an output unit 30 for outputting the key information.
On the basis of the above embodiment, the first electronic device further includes:
a determination unit configured to determine target information that matches key information in response to the first electronic device generating the key information;
a storage unit, configured to store the key information and the target information to a target firmware of the first electronic device.
On the basis of the above embodiment, the step of satisfying the information output condition by the associated information corresponding to the key information obtaining request includes: and the associated information corresponding to the key information acquisition request is matched with the target information.
On the basis of the above embodiment, when the target information includes the fineness of the second electronic device, and the associated fineness includes device identification information, the acquiring unit is specifically configured to:
identifying equipment which can be connected with the first electronic equipment to obtain equipment identification information;
and if the equipment identification information comprises the second electronic equipment information, acquiring key information from the target firmware of the first electronic equipment.
On the basis of the above embodiment, the output unit includes:
the generating subunit is used for generating verification information and sending the verification information to the second electronic equipment;
the receiving subunit is configured to receive feedback information that is sent by the second electronic device and matches the verification information;
and the output subunit is used for outputting the key information if the feedback information meets the target condition.
On the basis of the foregoing embodiment, the generating unit is specifically configured to:
acquiring signal intensity data of the second electronic equipment;
determining a distance value of the first electronic device from the second electronic device based on the signal strength data of the second electronic device;
and if the distance value is greater than the distance threshold value, generating verification information.
On the basis of the above embodiment, when the association information includes a request interface, the obtaining unit is specifically configured to:
acquiring a request interface corresponding to the key request;
and if the request interface is matched with the specific access interface of the target firmware, acquiring key information from the target firmware of the first electronic equipment.
On the basis of the above embodiment, the output unit includes:
the identification subunit is used for identifying the operation information of the first electronic equipment;
the mode determining subunit is used for determining a target safety mode matched with the operation information;
a mode output subunit configured to output the key information using an output mode corresponding to the target security mode.
There is also provided in an embodiment of the present application an electronic device, including:
a memory for storing a program;
a processor configured to execute the program, the program specifically configured to:
receiving a key information acquisition request;
if the associated information corresponding to the key information acquisition request meets the information output condition, acquiring key information from target firmware of the first electronic device, wherein the key information is stored in the target firmware, and the target firmware is divided from an application layer of the first electronic device;
and outputting the key information.
Correspondingly, the program is also used for executing the information processing method described in any of the above embodiments, and the method and steps associated with the information processing method.
In an embodiment of the present application, a storage medium is further provided, where the storage medium stores computer program code, and the computer program code realizes the information processing method according to any one of the above items when executed.
The storage medium refers to a computer storage medium that may contain a propagated data signal with computer program code embodied therewith, for example, on a baseband or as part of a carrier wave. The propagated signal may take any of a variety of forms, including electromagnetic, optical, etc., or any suitable combination. A computer storage medium may be any computer-readable medium that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code located on a computer storage medium may be propagated over any suitable medium, including radio, cable, fiber optic cable, RF, or the like, or any combination of the preceding.
The emphasis of each embodiment in the present specification is on the difference from the other embodiments, and the same and similar parts among the various embodiments may be referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. An information processing method applied to a first electronic device comprises the following steps:
receiving a key information acquisition request;
if the associated information corresponding to the key information acquisition request meets the information output condition, acquiring key information from target firmware of the first electronic device, wherein the key information is stored in the target firmware, the target firmware is divided from an application layer of the first electronic device, and the information stored in the target firmware is not affected by the failure of an application system of the first electronic device or the damage of the application layer of the first electronic device, which generates the key information;
and outputting the key information.
2. The method of claim 1, further comprising:
generating key information in response to the first electronic equipment, and determining target information matched with the key information;
storing the key information and the target information to target firmware of the first electronic device.
3. The method according to claim 2, wherein the association information corresponding to the key information obtaining request satisfies an information output condition, and includes: and the associated information corresponding to the key information acquisition request is matched with the target information.
4. The method of claim 3, wherein the target information includes second electronic device information, the associated information includes device identification information, and if the associated information corresponding to the key information obtaining request satisfies an information output condition, obtaining key information from the target firmware of the first electronic device includes:
identifying equipment which can be connected with the first electronic equipment to obtain equipment identification information;
and if the equipment identification information comprises the second electronic equipment information, acquiring key information from the target firmware of the first electronic equipment.
5. The method of claim 4, the outputting the key information, comprising:
generating verification information and sending the verification information to the second electronic equipment;
receiving feedback information which is sent by the second electronic equipment and matched with the verification information;
and if the feedback information meets the target condition, outputting the key information.
6. The method of claim 5, the generating authentication information comprising:
acquiring signal intensity data of the second electronic equipment;
determining a distance value of the first electronic device from the second electronic device based on the signal strength data of the second electronic device;
and if the distance value is greater than the distance threshold value, generating verification information.
7. The method of claim 1, wherein the associated information includes a request interface, and if the associated information corresponding to the key information obtaining request satisfies an information output condition, obtaining key information from a target firmware of the first electronic device includes:
acquiring a request interface corresponding to the key information acquisition request;
and if the request interface is matched with the specific access interface of the target firmware, acquiring key information from the target firmware of the first electronic equipment.
8. The method of claim 1, the outputting the key information, comprising:
identifying operation information of the first electronic equipment;
determining a target security mode matched with the operation information;
and outputting the key information by using an output mode corresponding to the target security mode.
9. A first electronic device, comprising:
a receiving unit configured to receive a key information acquisition request;
an obtaining unit, configured to obtain key information from a target firmware of the first electronic device if associated information corresponding to the key information obtaining request meets an information output condition, where the key information is stored in the target firmware, and the target firmware is partitioned from an application layer of the first electronic device, and information stored in the target firmware is not affected by a failure of an application system of the first electronic device or a destruction of the application layer of the first electronic device, where the application layer generates the key information;
an output unit for outputting the key information.
10. A storage medium having stored thereon a computer program which, when executed by a processor, implements an information processing method according to any one of claims 1 to 8.
CN202010622942.9A 2020-06-30 2020-06-30 Information processing method, electronic device, and storage medium Active CN111800273B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010622942.9A CN111800273B (en) 2020-06-30 2020-06-30 Information processing method, electronic device, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010622942.9A CN111800273B (en) 2020-06-30 2020-06-30 Information processing method, electronic device, and storage medium

Publications (2)

Publication Number Publication Date
CN111800273A CN111800273A (en) 2020-10-20
CN111800273B true CN111800273B (en) 2021-12-24

Family

ID=72809954

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010622942.9A Active CN111800273B (en) 2020-06-30 2020-06-30 Information processing method, electronic device, and storage medium

Country Status (1)

Country Link
CN (1) CN111800273B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112613058A (en) * 2020-12-30 2021-04-06 绿盟科技集团股份有限公司 Method and device for retrieving encryption key, electronic equipment and storage medium
CN113343215A (en) * 2021-07-20 2021-09-03 厦门锐骐物联技术股份有限公司 Embedded software authorization and authentication method and electronic equipment
CN116011000B (en) * 2023-03-27 2023-06-20 北京信安世纪科技股份有限公司 Access method, device and computing equipment
CN116614806B (en) * 2023-07-18 2023-10-20 荣耀终端有限公司 Bluetooth pairing method and device, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103198247A (en) * 2013-04-15 2013-07-10 加弘科技咨询(上海)有限公司 Computer safety protection method and computer safety protection system
CN104092550A (en) * 2014-07-23 2014-10-08 三星电子(中国)研发中心 Password protection method, system and device
CN111079124A (en) * 2019-12-21 2020-04-28 广州小鹏汽车科技有限公司 Security chip activation method and device, terminal equipment and server

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101995251B1 (en) * 2012-10-08 2019-09-30 삼성전자주식회사 Apparatus and method for controlling a power in near field communication device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103198247A (en) * 2013-04-15 2013-07-10 加弘科技咨询(上海)有限公司 Computer safety protection method and computer safety protection system
CN104092550A (en) * 2014-07-23 2014-10-08 三星电子(中国)研发中心 Password protection method, system and device
CN111079124A (en) * 2019-12-21 2020-04-28 广州小鹏汽车科技有限公司 Security chip activation method and device, terminal equipment and server

Also Published As

Publication number Publication date
CN111800273A (en) 2020-10-20

Similar Documents

Publication Publication Date Title
CN111800273B (en) Information processing method, electronic device, and storage medium
US11323260B2 (en) Method and device for identity verification
CN112771826B (en) Application program login method, application program login device and mobile terminal
CN109150548B (en) Digital certificate signing and signature checking method and system and digital certificate system
US10303868B2 (en) Secure user authentication for Bluetooth enabled computer storage devices
CN109328348B (en) Service authentication method, system and related equipment
EP2702719B1 (en) Method and system for managing information on mobile devices
US20090298468A1 (en) System and method for deleting data in a communication device
KR20160097323A (en) Near field communication authentication mechanism
EP3525181B1 (en) Identity validity verification method and electronic terminal
US20230353363A1 (en) Login authentication method, apparatus, and system
US20210266171A1 (en) Method and system for operating internet of things device
US10713381B2 (en) Method and apparatus for securely calling fingerprint information, and mobile terminal
CN108335105B (en) Data processing method and related equipment
CN107818253B (en) Face template data entry control method and related product
CN111080857B (en) Vehicle digital key management and use method and device, mobile terminal and storage medium
CN105577619B (en) Client login method, client and system
CN111814132B (en) Security authentication method and device, security authentication chip and storage medium
US20110154436A1 (en) Provider Management Methods and Systems for a Portable Device Running Android Platform
US20140025946A1 (en) Audio-security storage apparatus and method for managing certificate using the same
CN107548542B (en) User authentication method with enhanced integrity and security
CN105516136A (en) Authority management method, device and system
CN110602700B (en) Seed key processing method and device and electronic equipment
CN110717770A (en) Anti-counterfeiting detection method, device, equipment and storage medium for vehicle parts
CN106533685B (en) Identity authentication method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant