CN116097621A - Data interaction method, device, electronic equipment and storage medium - Google Patents
Data interaction method, device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN116097621A CN116097621A CN202280004232.7A CN202280004232A CN116097621A CN 116097621 A CN116097621 A CN 116097621A CN 202280004232 A CN202280004232 A CN 202280004232A CN 116097621 A CN116097621 A CN 116097621A
- Authority
- CN
- China
- Prior art keywords
- data
- interaction
- data packets
- terminal equipment
- packets
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000003993 interaction Effects 0.000 title claims abstract description 220
- 238000000034 method Methods 0.000 title claims abstract description 76
- 230000002452 interceptive effect Effects 0.000 claims abstract description 121
- 238000004806 packaging method and process Methods 0.000 claims abstract description 21
- 238000012545 processing Methods 0.000 claims description 67
- 230000004044 response Effects 0.000 claims description 15
- 230000005540 biological transmission Effects 0.000 claims description 10
- 238000012795 verification Methods 0.000 claims description 8
- 238000004364 calculation method Methods 0.000 claims description 5
- 238000004590 computer program Methods 0.000 claims description 2
- 230000008569 process Effects 0.000 description 20
- 238000004891 communication Methods 0.000 description 10
- 238000010586 diagram Methods 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 4
- 230000005236 sound signal Effects 0.000 description 4
- 230000000903 blocking effect Effects 0.000 description 3
- 230000001133 acceleration Effects 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000005538 encapsulation Methods 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/14—Digital output to display device ; Cooperation and interconnection of the display device with other functional units
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/436—Interfacing a local distribution network, e.g. communicating with another STB or one or more peripheral devices inside the home
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The disclosure relates to a data interaction method, a device, an electronic device and a storage medium, wherein the method is applied to first terminal equipment, and the first terminal performs screen-projection interaction with second terminal, and the method comprises the following steps: acquiring key data in interactive data, and packaging the key data into M first data packets, wherein M is a natural number greater than 1; encrypting N first data packets in the M first data packets, and sequentially sending the M first data packets to the second terminal equipment, wherein N is greater than or equal to 1 and less than M; and receiving encryption information returned by the second terminal equipment, and determining whether to continue to send the interactive data according to the encryption information, wherein the encryption information is obtained by decrypting the encrypted first data packet by the second terminal equipment.
Description
Technical Field
The disclosure relates to the technical field of data interaction, and in particular relates to a data interaction method, a data interaction device, electronic equipment and a storage medium.
Background
In recent years, more and more data interaction forms, such as screen-throwing connection, between different terminal devices are provided. Under the scene of screen projection connection, one terminal device stores video, audio and other data into multi-frame data in a screen recording mode, a sound recording mode and the like, and then the multi-frame data is transmitted to the other terminal device in a wired connection mode or a wireless connection mode, and the other terminal device can analyze the multi-frame data to obtain original video, audio and other data, and further display or play and other display operations are carried out on the original video, audio and other data. In the process of continuously transmitting a large amount of data between two terminal devices, the data may be intercepted by malicious applications, i.e. the security of data interaction is poor.
Disclosure of Invention
To overcome the problems in the related art, embodiments of the present disclosure provide a data interaction method, apparatus, electronic device, and storage medium, which are used to solve the drawbacks in the related art.
According to a first aspect of embodiments of the present disclosure, a data interaction method is provided and applied to a first terminal device, where the first terminal performs screen-projection interaction with a second terminal, and the method includes:
acquiring key data in interactive data, and packaging the key data into M first data packets, wherein M is a natural number greater than 1;
encrypting N first data packets in the M first data packets, and sequentially sending the M first data packets to a second terminal device, wherein N is greater than or equal to 1 and less than M;
and receiving encryption information returned by the second terminal equipment, and determining whether to continue to send the interactive data according to the encryption information, wherein the encryption information is obtained by decrypting the encrypted first data packet by the second terminal equipment.
In one embodiment, further comprising:
determining interaction data according to an interaction control instruction, acquiring the interaction data, and determining whether key data exists in the interaction data, wherein the interaction control instruction is generated based on the operation of a user on the first terminal equipment or the second terminal equipment;
The obtaining the key data in the interaction data comprises the following steps:
and acquiring the key data in the interactive data in response to the key data in the interactive data.
In one embodiment, the determining the interaction data according to the interaction control instruction and acquiring the interaction data includes:
determining interaction data and an application program to which the interaction data belong according to an interaction control instruction;
and acquiring the interaction data from an application program to which the interaction data belongs.
In one embodiment, the determining whether critical data exists in the interaction data includes:
determining whether data belonging to a preset key data list exists in the interactive data;
determining that the key data exists in the interactive data in response to the fact that the data belonging to a preset key data list exists in the interactive data, and determining that the data belonging to the preset key data list in the interactive data is key data;
and determining that the key data does not exist in the interactive data in response to the fact that the data in the preset key data list does not exist in the interactive data.
In one embodiment, the encrypting N first data packets in the M first data packets includes:
Determining N according to the M and the encryption proportion;
and encrypting the first N first data packets in the M first data packets.
In one embodiment, further comprising:
and determining the encryption proportion according to the calculation power of the first terminal equipment and the quality parameters of a data transmission link.
In one embodiment, the encrypting N first data packets in the M first data packets includes:
and carrying out encryption processing on the encryption identifier, the encryption information and the first data packet to obtain an encrypted first data packet, wherein the encryption identifier is used for determining the first data packet subjected to encryption processing from the plurality of first data packets by the second terminal equipment.
In one embodiment, further comprising:
and acquiring non-critical data in the interactive data, packaging the critical data into a plurality of second data packets, and sending the second data packets to the second terminal equipment so that the second terminal equipment analyzes and displays the non-critical data.
In one embodiment, the interaction data comprises video and/or audio.
According to a second aspect of the embodiments of the present disclosure, there is provided a data interaction method, applied to a second terminal device, including:
Receiving M first data packets sent by a first terminal device, wherein the M first data packets are obtained by packaging key data in interactive data by the first terminal device, and N first data packets in the M first data packets are subjected to encryption processing by the first terminal device, wherein M is a natural number greater than 1, N is greater than or equal to 1 and less than M;
decrypting the N first data packets subjected to encryption processing to obtain encryption information;
and sending the encryption information to the first terminal equipment so that the first terminal equipment can continue to send the interaction data.
In one embodiment, before the decrypting the N encrypted first data packets to obtain encrypted information, the method further includes:
and determining at least one first data packet with encryption identification in the M first data packets as an encrypted first data packet.
In one embodiment, after the decrypting the N first data packets after the encrypting, the method further includes:
sequentially analyzing the M first data packets according to the receiving sequence to obtain the key data;
And displaying the key data according to the display mode of the key data.
In one embodiment, further comprising:
receiving a plurality of second data packets sent by a first terminal device, wherein the plurality of second data packets are obtained by packaging non-key data in interactive data by the first terminal device;
sequentially analyzing the plurality of second data packets according to the receiving sequence to obtain the non-key data;
and displaying the non-critical data according to the display mode of the non-critical data.
In one embodiment, further comprising:
generating an interaction control instruction based on the operation of the user on the display result of the interaction data;
and sending the interaction control instruction to the first terminal equipment so as to enable the terminal equipment to continuously return the interaction data.
According to a third aspect of embodiments of the present disclosure, there is provided a data interaction device, applied to a first terminal device, where the first terminal performs screen-projection interaction with a second terminal, the device includes:
the first acquisition module is used for acquiring key data in the interactive data and packaging the key data into M first data packets, wherein M is a natural number larger than 1;
The encryption module is used for carrying out encryption processing on N first data packets in the M first data packets and sequentially sending the M first data packets to the second terminal equipment, wherein N is greater than or equal to 1 and less than M;
and the verification module is used for receiving the encryption information returned by the second terminal equipment within a preset time period, and determining whether to continue to send the interactive data according to the encryption information, wherein the encryption information is obtained by decrypting the encrypted first data packet by the second terminal equipment.
In one embodiment, the method further comprises a determining module for:
determining interaction data according to an interaction control instruction, acquiring the interaction data, and determining whether key data exists in the interaction data, wherein the interaction control instruction is generated based on the operation of a user on the first terminal equipment or the second terminal equipment;
the first obtaining module is specifically configured to:
and acquiring the key data in the interactive data in response to the key data in the interactive data.
In one embodiment, the determining module is configured to determine interaction data according to the interaction control instruction, and when obtaining the interaction data, the determining module is specifically configured to:
Determining interaction data and an application program to which the interaction data belong according to an interaction control instruction;
and acquiring the interaction data from an application program to which the interaction data belongs.
In one embodiment, the determining module is configured to determine whether critical data exists in the interactive data, specifically configured to:
determining whether data belonging to a preset key data list exists in the interactive data;
determining that the key data exists in the interactive data in response to the fact that the data belonging to a preset key data list exists in the interactive data, and determining that the data belonging to the preset key data list in the interactive data is key data;
and determining that the key data does not exist in the interactive data in response to the fact that the data in the preset key data list does not exist in the interactive data.
In one embodiment, the encryption module is configured to, when performing encryption processing on N first data packets in the M first data packets, specifically:
determining N according to the M and the encryption proportion;
and encrypting the first N first data packets in the M first data packets.
In one embodiment, the system further comprises a scaling module for:
And determining the encryption proportion according to the calculation power of the first terminal equipment and the quality parameters of a data transmission link.
In one embodiment, the encryption module is configured to, when performing encryption processing on N first data packets in the M first data packets, specifically:
and carrying out encryption processing on the encryption identifier, the encryption information and the first data packet to obtain an encrypted first data packet, wherein the encryption identifier is used for determining the first data packet subjected to encryption processing from the plurality of first data packets by the second terminal equipment.
In one embodiment, the method further comprises a second acquisition module for:
and acquiring non-critical data in the interactive data, packaging the critical data into a plurality of second data packets, and sending the second data packets to the second terminal equipment so that the second terminal equipment analyzes and displays the non-critical data.
In one embodiment, the interaction data comprises video and/or audio.
According to a fourth aspect of embodiments of the present disclosure, there is provided a data interaction apparatus applied to a second terminal device, including:
the receiving module is used for receiving M first data packets sent by the first terminal equipment, wherein the M first data packets are obtained by packaging key data in the interactive data by the first terminal equipment, N first data packets in the M first data packets are subjected to encryption processing of the first terminal equipment, M is a natural number greater than 1, N is greater than or equal to 1 and less than M;
The decryption module is used for decrypting the N first data packets subjected to encryption processing to obtain encryption information;
and the sending module is used for sending the encryption information to the first terminal equipment so as to enable the first terminal equipment to continuously send the interactive data.
In one embodiment, the system further comprises an identification module for:
and before the N first data packets subjected to encryption processing are subjected to decryption processing to obtain encryption information, determining the first data packet with the encryption identifier in the M first data packets as the first data packet subjected to encryption processing.
In one embodiment, the display device further comprises a first display module for:
after the N first data packets subjected to encryption processing are subjected to decryption processing, sequentially analyzing the M first data packets according to a receiving sequence to obtain the key data;
and displaying the key data according to the display mode of the key data.
In one embodiment, the display device further comprises a first display module for:
receiving a plurality of second data packets sent by a first terminal device, wherein the plurality of second data packets are obtained by packaging non-key data in interactive data by the first terminal device;
Sequentially analyzing the plurality of second data packets according to the receiving sequence to obtain the non-key data;
and displaying the non-critical data according to the display mode of the non-critical data.
In one embodiment, the system further comprises a control module for:
generating an interaction control instruction based on the operation of the user on the display result of the interaction data;
and sending the interaction control instruction to the first terminal equipment so as to enable the terminal equipment to continuously return the interaction data.
According to a fifth aspect of embodiments of the present disclosure, there is provided an electronic device comprising a memory for storing computer instructions executable on a processor for, when executing the computer instructions, performing the data interaction method according to the first aspect.
According to a sixth aspect of embodiments of the present disclosure, there is provided a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method of the first aspect.
The technical scheme provided by the embodiment of the disclosure can comprise the following beneficial effects:
the method comprises the steps of obtaining key data in interactive data, packaging the key data into M first data packets, then encrypting N first data packets in the M first data packets, sequentially sending the M first data packets to second terminal equipment, finally receiving encryption information returned by the second terminal equipment, and determining whether to continue sending the interactive data according to the encryption information, wherein the encryption information is obtained by decrypting the encrypted first data packets by the second terminal equipment. Because the encryption processing is performed on N first data packets in M first data packets encapsulated by key data in the interactive data, after the M data packets are sent to the second terminal device, whether the second terminal device successfully decrypts the encrypted first data packets or not can be judged according to whether the second terminal device returns encryption information capable of being verified or not, whether the data sent to the second terminal device is safe or not can be judged, and the interactive data is stopped to be sent under unsafe conditions, so that data leakage is avoided, and data safety is ensured.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
Fig. 1 is a flowchart illustrating a data interaction method applied to a first terminal device according to an exemplary embodiment of the present disclosure;
FIG. 2 is a schematic diagram of an interaction process between a first terminal device and a second terminal device according to an exemplary embodiment of the present disclosure;
FIG. 3 is a schematic diagram of a process for encapsulating critical data shown in an exemplary embodiment of the present disclosure;
FIG. 4 is a schematic diagram of an encryption process for critical data shown in an exemplary embodiment of the present disclosure;
FIG. 5 is a schematic diagram of the encryption scheme of critical data shown in an exemplary embodiment of the present disclosure;
fig. 6 is a flowchart illustrating a data interaction method applied to a second terminal device according to an exemplary embodiment of the present disclosure;
FIG. 7 is a process flow of a second terminal device shown in an exemplary embodiment of the present disclosure after receiving interaction data;
fig. 8 is a schematic structural diagram of a data interaction device applied to a first terminal device according to an exemplary embodiment of the present disclosure;
fig. 9 is a schematic structural diagram of a data interaction device applied to a second terminal device according to an exemplary embodiment of the present disclosure;
Fig. 10 is a block diagram of an electronic device shown in an exemplary embodiment of the present disclosure.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims.
The terminology used in the present disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used in this disclosure and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any or all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used in this disclosure to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present disclosure. The word "if" as used herein may be interpreted as "at … …" or "at … …" or "responsive to a determination", depending on the context.
In recent years, more and more data interaction forms, such as screen-throwing connection, between different terminal devices are provided. Under the scene of screen projection connection, one terminal device stores video, audio and other data into multi-frame data in a screen recording mode, a sound recording mode and the like, and then the multi-frame data is transmitted to the other terminal device in a wired connection mode or a wireless connection mode, and the other terminal device can analyze the multi-frame data to obtain original video, audio and other data, and further display or play and other display operations are carried out on the original video, audio and other data. In the process of continuously transmitting a large amount of data between two terminal devices, the data is possibly intercepted by malicious applications, namely, the security of data interaction is poor, and if the data contains call data, contacts, account passwords and the like of a user, the information can be leaked, so that the personal information security of the user is seriously influenced.
In order to ensure the safety of data interaction, in the related art, one terminal device encrypts data before transmitting the data, and the other terminal device decrypts the data after receiving the data. However, the encryption and decryption processes not only reduce the efficiency of data interaction, but also increase the computational load of the terminal device. Taking the scene of screen connection as an example, the encryption and encryption process can greatly reduce the efficiency of video and audio transmission, and cause the problems of video picture blocking or blurring, audio blocking or distortion and the like. And if the malicious application intercepting the interactive data has decryption capability, the interactive data can be continuously acquired and decrypted, so that continuous leakage of important information is caused, and the influence on data security is larger.
Based on this, in a first aspect, at least one embodiment of the present disclosure provides a data interaction method, please refer to fig. 1, which illustrates a flow of the method, including step S101 and step S103.
The method can be applied to first terminal equipment, and the first terminal and the second terminal conduct screen projection interaction. The first terminal device may be a User Equipment (UE), a mobile device, a User terminal, a cellular phone, a cordless phone, a personal digital assistant (Personal Digital Assistant, PDA) handheld device, a computing device, a wearable device, etc. The first terminal device may be a data source in a data interaction scenario, that is, a side that sends data outwards, for example, in a scenario that the smart phone projects a screen to the television, the smart phone is a data source, and the television is a data terminal.
It will be appreciated that the method may be performed by a specific application or a specific module of the first terminal device, etc. For example, according to fig. 2, a terminal a as a first terminal device may have an application C for data interaction, where the application C may be communicatively connected to other application programs such as an application 1, an application 2, and an application 3, so as to obtain interactive data such as audio data and video data from the other application programs, encapsulate the interactive data and send the interactive data to a terminal B as a second terminal device, where the terminal B is a data destination of the data interaction, and may receive the data sent by the application C and decapsulate the received data, and may also control the application of the terminal a in a manner that the application C sends control instructions to the application C, and then the application C sends the control instructions to the corresponding application programs. These other applications may be music-like applications, video-like applications, navigation-like applications, social-like applications, etc.
In step S101, key data in the interactive data is acquired, and the key data is encapsulated into M first data packets, where M is a natural number greater than 1.
The interaction data is data aimed at by data interaction, namely data sent by the first terminal equipment to the second terminal equipment. Taking a screen-throwing scene as an example, the interactive data are video, audio and other data. The key data may be data related to user privacy or account security.
In the process of data interaction, the first terminal device can determine interaction data and an application program to which the interaction data belongs according to an interaction control instruction, and acquire the interaction data from the application program to which the interaction data belongs, wherein the interaction control instruction is generated based on the operation of a user on the first terminal device or the second terminal device. Taking a screen-throwing scene as an example, after the first terminal device and the second terminal device establish screen-throwing connection, the first terminal device sends a default picture to the second terminal device so that the second terminal device displays the default picture, wherein the default picture can be a current picture of the first terminal device, a desktop or a special initial picture of a screen-throwing program; then, the user may operate the first terminal device, and the first terminal device generates an interaction control instruction based on the operation, or operates the default screen displayed on the second terminal device, and the second terminal device generates an interaction control instruction based on the operation and sends the interaction control instruction to the first terminal device, where the first terminal device obtains data such as a screen, audio, etc. from a corresponding application program according to the interaction control instruction, for example, the interaction control instruction is to start a certain application program on a desktop, and the first terminal device starts the application program and obtains an initial interface after the application program is started as interaction data.
After the first terminal device obtains the interaction data, it may determine whether key data exists in the interaction data according to the following manner: firstly, determining whether data belonging to a preset key data list exists in the interactive data, wherein the preset key data list is preset in the first terminal equipment in an exemplary manner; next, under the condition that data belonging to a preset key data list exists in the interactive data, determining that key data exists in the interactive data, and determining that the data belonging to the preset key data list is key data in the interactive data; and under the condition that the data in the preset key data list does not exist in the interactive data, determining that the key data does not exist in the interactive data.
In case that the key data exists in the interactive data, the step may be performed, that is, the key data in the interactive data is obtained. Since the critical data cannot be directly transmitted to the second terminal device due to the influence of the bandwidth of the transmission channel, referring to fig. 3, the critical data may be encapsulated into M first data packets.
In addition, non-critical data in the interactive data can be obtained, the critical data are encapsulated into a plurality of second data packets, and the second data packets are sent to the second terminal equipment, so that the second terminal equipment analyzes and displays the non-critical data.
And under the condition that key data does not exist in the interactive data, the interactive data can be packaged into a plurality of third data packets, and the third data packets are sent to the second terminal equipment, so that the second terminal equipment analyzes and displays the interactive data.
In step S102, the N first data packets in the M first data packets are encrypted, and the M first data packets are sequentially sent to the second terminal device, where N is greater than or equal to 1 and less than M.
The first data packet subjected to encryption processing may be part of the M first data packets. For example, the encryption ratio K may be determined according to the computing power p of the first terminal device and the quality parameter q of the data transmission link, where the computing power p of the first terminal device may be used to characterize the encryption speed of the first terminal device, the quality parameter q of the data transmission link may be used to characterize the packet loss rate, and if the packet loss rate is too high, the encrypted first data packet may be lost, and thus encryption is meaningless, taking a screen-throwing scenario as an example, the packet loss rate is extremely low, and the value of q is between 0.98 and 1, for example, K may be calculated according to the following formula: k=p×q; then, based on the M and the encryption ratio K, the encryption number N is determined, and N may be calculated according to the following formula: n=m×k; and finally, encrypting the first N first data packets in the plurality of first data packets. Referring to fig. 4, after the critical data is encapsulated into 4 first data packets, the first 3 first data packets are encrypted. It will be appreciated that fig. 4 is only an example, and that the encryption ratio K is typically between 20% and 30%.
In one possible embodiment, the first data packet may be encrypted in the manner shown in fig. 5: and carrying out encryption processing on the encryption identifier F, the encryption information I and the first data packet to obtain an encrypted first data packet, wherein the encryption identifier F is used for determining the first data packet subjected to encryption processing from the plurality of first data packets by the second terminal equipment.
It can be understood that in the data interaction process, the first terminal device continuously acquires the interaction data according to the interaction control instruction, judges whether key data exists in the interaction data, encrypts part or all of a plurality of first data packets obtained by encapsulating the key data if the key data exists, and then sends the encrypted part or all of the plurality of first data packets to the second terminal device, and directly sends a plurality of second data packets obtained by encapsulating non-key data to the second terminal device, and if the key data does not exist, directly sends a plurality of third data packets obtained by encapsulating the interaction data to the second terminal device. The processing and transmission order of the above-described interactive data may be determined according to the order in which the interactive data is acquired.
In step S103, encryption information returned by the second terminal device is received, and whether to continue to send the interactive data is determined according to the encryption information, where the encryption information is obtained by decrypting the encrypted first data packet by the second terminal device.
The second terminal device continuously receives the interactive data sent by the first terminal device in the form of data packets in the data interaction process, and then sequentially processes the received interactive data, namely sequentially processes the received data packets. Before processing the data packet, it can check whether the data packet has an encryption identifier, if not, the data packet is a second data packet, a third data packet or a first data packet which is not encrypted, and if so, the data packet is an encrypted first data packet.
After receiving the plurality of second data packets sent by the first terminal device, the plurality of second data packets can be sequentially analyzed according to a receiving sequence to obtain the non-critical data, and the non-critical data is displayed according to a display mode of the non-critical data. For example, if the non-critical data is a picture, the image may be displayed; the non-critical data is video, and then the video can be played.
After receiving the plurality of third data packets sent by the first terminal device, the plurality of third data packets can be sequentially analyzed according to the receiving sequence to obtain the interactive data, and the interactive data is displayed according to the display mode of the interactive data. For example, if the interactive data is a picture, the image may be displayed; and if the interactive data is video, the video can be played.
After receiving a plurality of first data packets sent by a first terminal device, determining a first data packet with an encryption identifier in the plurality of first data packets as an encrypted first data packet, then decrypting the N first data packets after encryption to obtain encrypted information and decrypted first data packets, then sequentially analyzing the plurality of first data packets according to a receiving sequence to obtain the key data, displaying the key data according to a display mode of the key data, wherein the key data is an image, and the image can be displayed; the key data is video, and then the video can be played; and at the same time, the encrypted information can be sent to the first terminal device.
The first terminal equipment receives the encryption information returned by the second terminal equipment within a preset time period, and under the condition that the encryption information passes verification, the interactive data is continuously sent, namely, key data and non-key data in the interactive data with the key data and the interactive data without the key data are continuously sent in the form of data packets; otherwise (i.e. the first terminal device does not receive the encrypted information returned by the second terminal device within the preset time period, or the first terminal device receives the encrypted information returned by the second terminal device within the preset time period, but the encrypted information is not verified), the sending of the interactive data is stopped, i.e. the sending of the key data and the non-key data in the interactive data with the key data and the sending of the interactive data without the key data are stopped, for example, in a screen-throwing scene, the screen-throwing connection with the second terminal device can be stopped, and the screen-throwing connection with the second terminal device is disconnected.
It may be understood that the first terminal device does not receive the encrypted information returned by the second terminal device within the preset duration, or the first terminal device receives the encrypted information returned by the second terminal device within the preset duration, but may also generate a prompt message, for example, a text prompt message displayed on the display screen or an audio prompt message played by the speaker, if the encrypted information fails to be verified.
The method comprises the steps of obtaining key data in interactive data, packaging the key data into M first data packets, then encrypting N first data packets in the M first data packets, sequentially sending the M first data packets to second terminal equipment, finally receiving encryption information returned by the second terminal equipment, and determining whether to continue sending the interactive data according to the encryption information, wherein the encryption information is obtained by decrypting the encrypted first data packets by the second terminal equipment. Because the encryption processing is performed on N first data packets in M first data packets encapsulated by key data in the interactive data, after the M data packets are sent to the second terminal device, whether the second terminal device successfully decrypts the encrypted first data packets or not can be judged according to whether the second terminal device returns encryption information capable of being verified or not, whether the data sent to the second terminal device is safe or not can be judged, and the interactive data is stopped to be sent under unsafe conditions, so that data leakage is avoided, and data safety is ensured.
In the method, the encryption processing is carried out on the parts of the plurality of first data packets obtained through encapsulation, so that the operation load of the encryption processing of the first terminal equipment and the operation load of the decryption processing of the second terminal equipment can be reduced, and the problems of blocking and flow interruption are avoided. And the method further controls the subsequent data interaction of the first terminal device according to the decryption condition of the second terminal device on the encrypted first data packet, namely, the data interaction is continued under the condition that the second terminal device successfully decrypts the encrypted first data packet, and the data interaction is stopped under the condition that the second terminal device does not successfully decrypt the encrypted first data packet, so that the problem that the malicious application in the second terminal device can not decrypt the encrypted first data packet but can still continuously acquire the user information leakage caused by the fact that the first data packet which is not encrypted is avoided. Furthermore, the first N first data packets in the plurality of first data packets are encrypted, so that subsequent unencrypted data packets can be prevented from being intercepted under the condition that malicious application intercepting data exists, and the data security is guaranteed to the greatest extent.
In a second aspect, at least one embodiment of the present disclosure provides a data interaction method, please refer to fig. 6, which illustrates a flow of the method, including step S601 and step S503.
The method can be applied to the second terminal equipment. The second terminal device may be a television, a vehicle terminal, or the like. The second terminal device may be a data terminal in a data interaction scenario, that is, a side that receives data, for example, in a scenario in which the smart phone projects a screen to the television, where the smart phone is a data source and the television is a data terminal.
In step S601, M first data packets sent by a first terminal device are received, where the plurality of first data packets are obtained by encapsulating key data in interactive data by the first terminal device, N first data packets in the M first data packets are subjected to encryption processing by the first terminal device, M is a natural number greater than 1, N is greater than or equal to 1, and is less than M.
The operations of the first terminal device for obtaining, encapsulating, encrypting, sending, etc. the key data in this step have been described in detail in the embodiments of the first aspect, so that a detailed description is not repeated here.
In step S602, decryption processing is performed on the N first packets subjected to encryption processing, so as to obtain encrypted information.
First, a first packet having an encryption flag among the M first packets may be determined as an encrypted first packet, and then the encrypted first packet may be decrypted. After decryption, not only the decrypted first data packet but also the encrypted information added by the first terminal device in the decryption process are obtained.
After the N first data packets subjected to encryption processing are decrypted, the M first data packets may be sequentially analyzed according to a receiving order, so as to obtain the key data, and the key data may be displayed according to a display manner of the key data. For example, if the non-critical data is a picture, the image may be displayed; the non-critical data is video, and then the video can be played.
In step S603, the encrypted information is sent to the first terminal device, so that the first terminal device continues to send the interaction data.
In this step, operations such as receiving and verifying the encrypted information by the first terminal device and continuing or stopping sending the interactive data according to the verification result have been described in detail in the embodiment of the first aspect, so that a detailed description is not repeated here.
In addition, the second terminal device may also receive a plurality of second data packets sent by the first terminal device, where the plurality of second data packets are obtained by encapsulating non-critical data in the interaction data by the first terminal device; sequentially analyzing the plurality of second data packets according to the receiving sequence to obtain the non-key data; and displaying the non-critical data according to the display mode of the non-critical data. For example, if the non-critical data is a picture, the image may be displayed; the non-critical data is video, and then the video can be played.
In addition, the second terminal device may also receive a plurality of third data packets sent by the first terminal device, where the plurality of third data packets are obtained by encapsulating, by the first terminal device, interactive data that does not have critical data; sequentially analyzing the plurality of third data packets according to the receiving sequence to obtain the interaction data; and displaying the interactive data according to the display mode of the interactive data. For example, if the non-critical data is a picture, the image may be displayed; the non-critical data is video, and then the video can be played.
Reference may be made to fig. 7, which shows a process flow of the terminal B as the second terminal device after receiving the interaction data. After receiving the data, the terminal B firstly determines whether decryption is needed; if decryption is not needed, namely the data is non-critical data in the interactive data with the critical data or the interactive data without the critical data, analyzing the data and displaying the data; if decryption is needed, the data is encrypted, the decrypted data is analyzed and displayed, meanwhile, the encrypted information I is obtained in the decryption process, then the encrypted information I is sent to a terminal A serving as first terminal equipment, the terminal A determines whether the information I is correct or not, if the information I is correct (namely, the information I passes verification), the data is continuously sent, and if the information I is incorrect (namely, the information I does not pass verification), the data is stopped being sent.
Based on the display of the interactive data by the second terminal equipment, the user can operate the display result of the interactive data, for example, operate a screen-throwing interface displayed by the second terminal equipment; the second terminal device can generate an interaction control instruction based on the operation of the user on the display result of the interaction data, and send the interaction control instruction to the first terminal device, so that the terminal device continuously returns the interaction data.
The data interaction method described in the two aspects can be combined to obtain the following data interaction method. In the data interaction method, a first terminal device continuously acquires interaction data according to an interaction control instruction (the interaction control instruction is generated based on the operation of a user on the first terminal device or the second terminal device), packages the interaction data and then sends the packaged interaction data to the second terminal device, and the second terminal device receives the interaction data and then unpacks the interaction data and then displays, for example, a display picture, audio and video playing and the like. The key data exists in the interactive data, and the key data relates to user privacy or account information, so encryption is needed to protect, and therefore after the key data is packaged, part of the obtained first data packets is encrypted and then sent to the second terminal equipment, and the second terminal equipment needs to decrypt, unpack and display the encrypted first data packets after receiving the encrypted first data packets. Meanwhile, the encrypted first data packet in the key data is also used as a security verification means in the data interaction process, namely the first data packet is added with encryption information in the encryption process, the second terminal equipment obtains the encryption information after decryption and returns the encryption information to the first terminal equipment, so that the first terminal equipment receives correct encryption information to indicate that the current interaction process is safe, data interaction can be continued, and the first terminal equipment does not receive correct encryption information to indicate that the current interaction process is unsafe, and data interaction can be stopped.
According to a third aspect of the embodiments of the present disclosure, a data interaction device is provided, which is applied to a first terminal device, where the first terminal performs screen-projection interaction with a second terminal, referring to fig. 8, and the device includes:
a first obtaining module 801, configured to obtain key data in the interaction data, and package the key data into M first data packets, where M is a natural number greater than 1;
an encryption module 802, configured to encrypt N first data packets in the M first data packets, and sequentially send the M first data packets to a second terminal device, where N is greater than or equal to 1 and less than M;
and the verification module 803 is configured to receive encryption information returned by the second terminal device, and determine whether to continue sending the interaction data according to the encryption information, where the encryption information is obtained by decrypting the encrypted first data packet by the second terminal device.
In some embodiments of the present disclosure, the method further comprises a determining module for:
determining interaction data according to an interaction control instruction, acquiring the interaction data, and determining whether key data exists in the interaction data, wherein the interaction control instruction is generated based on the operation of a user on the first terminal equipment or the second terminal equipment;
The first obtaining module is specifically configured to:
and acquiring the key data in the interactive data in response to the key data in the interactive data.
In some embodiments of the present disclosure, the determining module is configured to determine interaction data according to an interaction control instruction, and when obtaining the interaction data, specifically is configured to:
determining interaction data and an application program to which the interaction data belong according to an interaction control instruction;
and acquiring the interaction data from an application program to which the interaction data belongs.
In some embodiments of the present disclosure, the determining module is configured to, when determining whether critical data exists in the interaction data, specifically:
determining whether data belonging to a preset key data list exists in the interactive data;
determining that the key data exists in the interactive data in response to the fact that the data belonging to a preset key data list exists in the interactive data, and determining that the data belonging to the preset key data list in the interactive data is key data;
and determining that the key data does not exist in the interactive data in response to the fact that the data in the preset key data list does not exist in the interactive data.
In some embodiments of the present disclosure, the encryption module is configured to, when performing encryption processing on N first data packets in the M first data packets, specifically:
Determining the encryption quantity N according to the M and the encryption proportion;
and encrypting the first N first data packets in the plurality of first data packets.
In some embodiments of the present disclosure, a ratio module is further included for:
and determining the encryption proportion according to the calculation power of the first terminal equipment and the quality parameters of a data transmission link.
In some embodiments of the present disclosure, the encryption module is configured to, when performing encryption processing on N first data packets in the M first data packets, specifically:
and carrying out encryption processing on the encryption identifier, the encryption information and the first data packet to obtain an encrypted first data packet, wherein the encryption identifier is used for determining the first data packet subjected to encryption processing from the plurality of first data packets by the second terminal equipment.
In some embodiments of the present disclosure, a second acquisition module is further included for:
and acquiring non-critical data in the interactive data, packaging the critical data into a plurality of second data packets, and sending the second data packets to the second terminal equipment so that the second terminal equipment analyzes and displays the non-critical data.
In some embodiments of the present disclosure, the interaction data includes video and/or audio.
According to a fourth aspect of the embodiments of the present disclosure, a data interaction device is provided, applied to a second terminal device, referring to fig. 9, and the device includes:
a receiving module 901, configured to receive M first data packets sent by a first terminal device, where the M first data packets are obtained by encapsulating key data in interactive data by the first terminal device, N first data packets in the M first data packets are subjected to encryption processing by the first terminal device, M is a natural number greater than 1, N is greater than or equal to 1, and is less than M;
a decryption module 902, configured to decrypt the N encrypted first data packets to obtain encrypted information;
and the sending module 903 is configured to send the encrypted information to the first terminal device, so that the first terminal device continues to send the interaction data.
In some embodiments of the present disclosure, the system further comprises an identification module for:
and before the N first data packets subjected to encryption processing are subjected to decryption processing to obtain encryption information, determining the first data packet with the encryption identifier in the M first data packets as the first data packet subjected to encryption processing.
In some embodiments of the present disclosure, the display device further comprises a first display module for:
after the N first data packets subjected to encryption processing are subjected to decryption processing, sequentially analyzing the M first data packets according to a receiving sequence to obtain the key data;
and displaying the key data according to the display mode of the key data.
In some embodiments of the present disclosure, the display device further comprises a first display module for:
receiving a plurality of second data packets sent by a first terminal device, wherein the plurality of second data packets are obtained by packaging non-key data in interactive data by the first terminal device;
sequentially analyzing the plurality of second data packets according to the receiving sequence to obtain the non-key data;
and displaying the non-critical data according to the display mode of the non-critical data.
In some embodiments of the present disclosure, the control module is further configured to:
generating an interaction control instruction based on the operation of the user on the display result of the interaction data;
and sending the interaction control instruction to the first terminal equipment so as to enable the terminal equipment to continuously return the interaction data.
The specific manner in which the various modules perform the operations in relation to the apparatus of the above embodiments has been described in detail in relation to the embodiments of the method of the first aspect and will not be described in detail here.
In accordance with a fifth aspect of embodiments of the present disclosure, reference is made to fig. 10, which schematically illustrates a block diagram of an electronic device. For example, apparatus 1000 may be a mobile phone, computer, digital broadcast terminal, messaging device, game console, tablet device, medical device, exercise device, personal digital assistant, or the like.
Referring to fig. 10, the apparatus 1000 may include one or more of the following components: a processing component 1002, a memory 1004, a power component 1006, a multimedia component 1008, an audio component 1010, an input/output (I/O) interface 1012, a sensor component 1014, and a communication component 1016.
The processing component 1002 generally controls overall operation of the apparatus 1000, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing element 1002 may include one or more processors 1020 to execute instructions to perform all or part of the steps of the methods described above. Further, the processing component 1002 can include one or more modules that facilitate interaction between the processing component 1002 and other components. For example, the processing component 1002 may include a multimedia module to facilitate interaction between the multimedia component 1008 and the processing component 1002.
The memory 1004 is configured to store various types of data to support operations at the device 1000. Examples of such data include instructions for any application or method operating on the device 1000, contact data, phonebook data, messages, pictures, videos, and the like. The memory 1004 may be implemented by any type or combination of volatile or nonvolatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
The power component 1006 provides power to the various components of the device 1000. Power component 1006 can include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for device 1000.
The multimedia component 1008 includes a screen between the device 1000 and the user that provides an output interface. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user. The touch panel includes one or more touch sensors to sense touch, swipe, and gestures on the touch panel. The touch sensor may sense not only the boundary of a touch or sliding action, but also the duration and pressure associated with the touch or sliding operation. In some embodiments, the multimedia assembly 1008 includes a front-facing camera and/or a rear-facing camera. The front camera and/or the rear camera may receive external multimedia data when the apparatus 1000 is in an operation mode, such as a photographing mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have focal length and optical zoom capabilities.
The audio component 1010 is configured to output and/or input audio signals. For example, the audio component 1010 includes a Microphone (MIC) configured to receive external audio signals when the device 1000 is in an operational mode, such as a call mode, a recording mode, and a speech recognition mode. The received audio signals may be further stored in memory 1004 or transmitted via communication component 1016. In some embodiments, the audio component 1010 further comprises a speaker for outputting audio signals.
The I/O interface 1012 provides an interface between the processing assembly 1002 and peripheral interface modules, which may be a keyboard, click wheel, buttons, and the like. These buttons may include, but are not limited to: homepage button, volume button, start button, and lock button.
The sensor assembly 1014 includes one or more sensors for providing status assessment of various aspects of the device 1000. For example, the sensor assembly 1014 may detect an on/off state of the device 1000, a relative positioning of the components, such as a display and keypad of the device 1000, the sensor assembly 1014 may also detect a change in position of the device 1000 or a component of the device 1000, the presence or absence of user contact with the device 1000, an orientation or acceleration/deceleration of the device 1000, and a change in temperature of the device 1000. The sensor assembly 1014 may also include a proximity sensor configured to detect the presence of nearby objects in the absence of any physical contact. The sensor assembly 1014 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 1014 can also include an acceleration sensor, a gyroscopic sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 1016 is configured to facilitate communication between the apparatus 1000 and other devices, either wired or wireless. The device 1000 may access a wireless network based on a communication standard, such as WiFi,2G or 3G,4G or 5G, or a combination thereof. In one exemplary embodiment, the communication part 1016 receives a broadcast signal or broadcast-related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 1016 further includes a Near Field Communication (NFC) module to facilitate short range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, ultra Wideband (UWB) technology, bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 1000 may be implemented by one or more Application Specific Integrated Circuits (ASICs), digital Signal Processors (DSPs), digital Signal Processing Devices (DSPDs), programmable Logic Devices (PLDs), field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors, or other electronic elements for performing the power supply methods of electronic devices described above.
In a sixth aspect, the present disclosure also provides, in an exemplary embodiment, a non-transitory computer-readable storage medium, such as memory 1004, comprising instructions executable by processor 1020 of apparatus 1000 to perform the method of powering an electronic device described above. For example, the non-transitory computer readable storage medium may be ROM, random Access Memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any adaptations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It is to be understood that the present disclosure is not limited to the precise arrangements and instrumentalities shown in the drawings, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.
Claims (30)
1. The data interaction method is characterized by being applied to first terminal equipment, wherein the first terminal and the second terminal perform screen projection interaction, and the method comprises the following steps:
acquiring key data in interactive data, and packaging the key data into M first data packets, wherein M is a natural number greater than 1;
encrypting N first data packets in the M first data packets, and sequentially sending the M first data packets to the second terminal equipment, wherein N is greater than or equal to 1 and less than M;
And receiving encryption information returned by the second terminal equipment, and determining whether to continue to send the interactive data according to the encryption information, wherein the encryption information is obtained by decrypting the encrypted first data packet by the second terminal equipment.
2. The data interaction method of claim 1, further comprising:
determining interaction data according to an interaction control instruction, acquiring the interaction data, and determining whether key data exists in the interaction data, wherein the interaction control instruction is generated based on the operation of a user on the first terminal equipment or the second terminal equipment;
the obtaining the key data in the interaction data comprises the following steps:
and acquiring the key data in the interactive data in response to the key data in the interactive data.
3. The data interaction method according to claim 2, wherein the determining interaction data according to the interaction control instruction and acquiring the interaction data includes:
determining interaction data and an application program to which the interaction data belong according to an interaction control instruction;
and acquiring the interaction data from an application program to which the interaction data belongs.
4. The data interaction method according to claim 2, wherein the determining whether key data exists in the interaction data comprises:
determining whether data belonging to a preset key data list exists in the interactive data;
determining that the key data exists in the interactive data in response to the fact that the data belonging to a preset key data list exists in the interactive data, and determining that the data belonging to the preset key data list in the interactive data is key data;
and determining that the key data does not exist in the interactive data in response to the fact that the data in the preset key data list does not exist in the interactive data.
5. The data interaction method according to claim 1, wherein the encrypting N first data packets in the M first data packets includes:
determining N according to the M and the encryption proportion;
and encrypting the first N first data packets in the M first data packets.
6. The data interaction method of claim 5, further comprising:
and determining the encryption proportion according to the calculation power of the first terminal equipment and the quality parameters of a data transmission link.
7. The data interaction method according to claim 1, wherein the encrypting N first data packets in the M first data packets includes:
and carrying out encryption processing on the encryption identifier, the encryption information and the first data packet to obtain an encrypted first data packet, wherein the encryption identifier is used for determining the first data packet subjected to encryption processing from the plurality of first data packets by the second terminal equipment.
8. The data interaction method of claim 1, further comprising:
and acquiring non-critical data in the interactive data, packaging the critical data into a plurality of second data packets, and sending the second data packets to the second terminal equipment so that the second terminal equipment analyzes and displays the non-critical data.
9. A data interaction method as claimed in any one of claims 1 to 8, wherein the interaction data comprises video and/or audio.
10. The data interaction method is characterized by being applied to the second terminal equipment and comprising the following steps of:
receiving M first data packets sent by a first terminal device, wherein the M first data packets are obtained by packaging key data in interactive data by the first terminal device, and N first data packets in the M first data packets are subjected to encryption processing by the first terminal device, wherein M is a natural number greater than 1, N is greater than or equal to 1 and less than M;
Decrypting the N first data packets subjected to encryption processing to obtain encryption information;
and sending the encryption information to the first terminal equipment so that the first terminal equipment can continue to send the interaction data.
11. The data interaction method according to claim 10, further comprising, before said decrypting the N first data packets subjected to the encryption processing to obtain the encrypted information:
and determining the first data packet with the encryption identifier in the M first data packets as the encrypted first data packet.
12. The data interaction method according to claim 10, wherein after decrypting the N first data packets subjected to the encryption processing, further comprising:
sequentially analyzing the M first data packets according to the receiving sequence to obtain the key data;
and displaying the key data according to the display mode of the key data.
13. The data interaction method of claim 10, further comprising:
receiving a plurality of second data packets sent by a first terminal device, wherein the plurality of second data packets are obtained by packaging non-key data in interactive data by the first terminal device;
Sequentially analyzing the plurality of second data packets according to the receiving sequence to obtain the non-key data;
and displaying the non-critical data according to the display mode of the non-critical data.
14. The data interaction method of claim 10, further comprising:
generating an interaction control instruction based on the operation of the user on the display result of the interaction data;
and sending the interaction control instruction to the first terminal equipment so as to enable the terminal equipment to continuously return the interaction data.
15. A data interaction device, which is applied to a first terminal device, wherein the first terminal performs screen-projection interaction with a second terminal, and the device comprises:
the first acquisition module is used for acquiring key data in the interactive data and packaging the key data into M first data packets, wherein M is a natural number larger than 1;
the encryption module is used for carrying out encryption processing on N first data packets in the M first data packets and sequentially sending the M first data packets to the second terminal equipment, wherein N is greater than or equal to 1 and less than M;
and the verification module is used for receiving the encryption information returned by the second terminal equipment, and determining whether to continue to send the interactive data according to the encryption information, wherein the encryption information is obtained by decrypting the encrypted first data packet by the second terminal equipment.
16. The data interaction device of claim 15, further comprising a determination module configured to:
determining interaction data according to an interaction control instruction, acquiring the interaction data, and determining whether key data exists in the interaction data, wherein the interaction control instruction is generated based on the operation of a user on the first terminal equipment or the second terminal equipment;
the first obtaining module is specifically configured to:
and acquiring the key data in the interactive data in response to the key data in the interactive data.
17. The data interaction device according to claim 16, wherein the determining module is configured to determine interaction data according to an interaction control instruction, and when obtaining the interaction data, specifically configured to:
determining interaction data and an application program to which the interaction data belong according to an interaction control instruction;
and acquiring the interaction data from an application program to which the interaction data belongs.
18. The data interaction device of claim 16, wherein the determining module is configured to determine whether critical data exists in the interaction data, specifically configured to:
determining whether data belonging to a preset key data list exists in the interactive data;
Determining that the key data exists in the interactive data in response to the fact that the data belonging to a preset key data list exists in the interactive data, and determining that the data belonging to the preset key data list in the interactive data is key data;
and determining that the key data does not exist in the interactive data in response to the fact that the data in the preset key data list does not exist in the interactive data.
19. The data interaction device of claim 15, wherein the encryption module is configured to, when performing encryption processing on N first data packets in the M first data packets:
determining N according to the M and the encryption proportion;
and encrypting the first N first data packets in the M first data packets.
20. The data interaction device of claim 19, further comprising a scaling module for:
and determining the encryption proportion according to the calculation power of the first terminal equipment and the quality parameters of a data transmission link.
21. The data interaction device of claim 15, wherein the encryption module is configured to, when performing encryption processing on N first data packets in the M first data packets:
And carrying out encryption processing on the encryption identifier, the encryption information and the first data packet to obtain an encrypted first data packet, wherein the encryption identifier is used for determining the first data packet subjected to encryption processing from the plurality of first data packets by the second terminal equipment.
22. The data interaction device of claim 15, further comprising a second acquisition module configured to:
and acquiring non-critical data in the interactive data, packaging the critical data into a plurality of second data packets, and sending the second data packets to the second terminal equipment so that the second terminal equipment analyzes and displays the non-critical data.
23. A data interaction device as claimed in any one of claims 15 to 22 wherein the interaction data comprises video and/or audio.
24. A data interaction device, characterized in that it is applied to a second terminal device, comprising:
the receiving module is used for receiving M first data packets sent by the first terminal equipment, wherein the M first data packets are obtained by packaging key data in the interactive data by the first terminal equipment, N first data packets in the M first data packets are subjected to encryption processing of the first terminal equipment, M is a natural number greater than 1, N is greater than or equal to 1 and less than M;
The decryption module is used for decrypting the N first data packets subjected to encryption processing to obtain encryption information;
and the sending module is used for sending the encryption information to the first terminal equipment so as to enable the first terminal equipment to continuously send the interactive data.
25. The data interaction device of claim 24, further comprising an identification module for:
and before the N first data packets subjected to encryption processing are subjected to decryption processing to obtain encryption information, determining the first data packet with the encryption identifier in the M first data packets as the first data packet subjected to encryption processing.
26. The data interaction device of claim 24, further comprising a first presentation module for:
after the N first data packets subjected to encryption processing are subjected to decryption processing, sequentially analyzing the M first data packets according to a receiving sequence to obtain the key data;
and displaying the key data according to the display mode of the key data.
27. The data interaction device of claim 24, further comprising a first presentation module for:
Receiving a plurality of second data packets sent by a first terminal device, wherein the plurality of second data packets are obtained by packaging non-key data in interactive data by the first terminal device;
sequentially analyzing the plurality of second data packets according to the receiving sequence to obtain the non-key data;
and displaying the non-critical data according to the display mode of the non-critical data.
28. The data interaction device of claim 24, further comprising a control module for:
generating an interaction control instruction based on the operation of the user on the display result of the interaction data;
and sending the interaction control instruction to the first terminal equipment so as to enable the terminal equipment to continuously return the interaction data.
29. An electronic device comprising a memory, a processor for storing computer instructions executable on the processor, the processor for performing the computer instructions based on the data interaction method of any of claims 1 to 14.
30. A computer readable storage medium, on which a computer program is stored, characterized in that the program, when being executed by a processor, implements the method of any one of claims 1 to 14.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2022/091265 WO2023212943A1 (en) | 2022-05-06 | 2022-05-06 | Data interaction method and apparatus, electronic device, and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116097621A true CN116097621A (en) | 2023-05-09 |
Family
ID=86214309
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202280004232.7A Pending CN116097621A (en) | 2022-05-06 | 2022-05-06 | Data interaction method, device, electronic equipment and storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN116097621A (en) |
WO (1) | WO2023212943A1 (en) |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20170083905A (en) * | 2016-01-11 | 2017-07-19 | 엘지전자 주식회사 | Mobile terminal and method for controlling the same |
CN109996097B (en) * | 2019-03-12 | 2022-01-04 | 广州虎牙信息科技有限公司 | Screen projection method, system and storage device |
CN113179555A (en) * | 2021-05-19 | 2021-07-27 | 北京小米移动软件有限公司 | Screen projection method, screen projection device, screen projection system, electronic device, and storage medium |
CN113965789B (en) * | 2021-12-15 | 2022-05-17 | 荣耀终端有限公司 | Screen projection method, terminal and communication system |
-
2022
- 2022-05-06 CN CN202280004232.7A patent/CN116097621A/en active Pending
- 2022-05-06 WO PCT/CN2022/091265 patent/WO2023212943A1/en unknown
Also Published As
Publication number | Publication date |
---|---|
WO2023212943A1 (en) | 2023-11-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106453052B (en) | Message interaction method and device | |
US20220382884A1 (en) | Method and device for parsing shared password | |
CN113343212B (en) | Device registration method and apparatus, electronic device, and storage medium | |
CN107766701B (en) | Electronic equipment, dynamic library file protection method and device | |
US20170171794A1 (en) | Method and apparatus for acquiring routing information | |
US9723486B2 (en) | Method and apparatus for accessing network | |
CN108900553B (en) | Communication method, device and computer readable storage medium | |
KR20190042612A (en) | Method and apparatus for displaying an application interface | |
CN109246110B (en) | Data sharing method and device and computer readable storage medium | |
CN113179555A (en) | Screen projection method, screen projection device, screen projection system, electronic device, and storage medium | |
CN108053241B (en) | Data analysis method, device and computer readable storage medium | |
US10402562B2 (en) | Method and device for encrypting application | |
US10681533B2 (en) | Information writing method and device | |
CN114553552B (en) | Data encryption method and device, data decryption method and device and storage medium | |
CN114221788B (en) | Login method, login device, electronic equipment and storage medium | |
CN216437496U (en) | Screen projection equipment, receiving equipment and screen projection system | |
CN113206832B (en) | Data processing method and device and data processing device | |
US11444927B2 (en) | Method and apparatus for encrypting data | |
CN116097621A (en) | Data interaction method, device, electronic equipment and storage medium | |
CN106407818B (en) | Network packet encryption method and device | |
CN113225691B (en) | Audio processing method, device and storage medium | |
CN110072227B (en) | Card writing method and device | |
CN107566998B (en) | Communication identifier processing method and device and terminal | |
CN107318148B (en) | Wireless local area network access information storage method and device | |
CN115473736A (en) | Data request message verification method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |