WO2015158046A1 - Information processing method, electronic devices, and computer storage medium - Google Patents

Information processing method, electronic devices, and computer storage medium Download PDF

Info

Publication number
WO2015158046A1
WO2015158046A1 PCT/CN2014/081902 CN2014081902W WO2015158046A1 WO 2015158046 A1 WO2015158046 A1 WO 2015158046A1 CN 2014081902 W CN2014081902 W CN 2014081902W WO 2015158046 A1 WO2015158046 A1 WO 2015158046A1
Authority
WO
WIPO (PCT)
Prior art keywords
electronic device
binding
information
connection
established
Prior art date
Application number
PCT/CN2014/081902
Other languages
French (fr)
Chinese (zh)
Inventor
魏明业
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2015158046A1 publication Critical patent/WO2015158046A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Definitions

  • the present invention relates to information processing techniques in the field of communications, and more particularly to a secure information processing method, an electronic device, and a computer storage medium. Background technique
  • embodiments of the present invention are directed to an information processing method and an electronic device, which improve the security of information interaction.
  • a first aspect of the embodiments of the present invention provides an information processing method, where the method includes: detecting whether the first electronic device has established a connection with the second electronic device;
  • connection If the connection is established, extracting the connection address of the second electronic device, and determining whether the connection address is consistent with the pre-stored binding address;
  • the method further includes:
  • the detecting whether the first electronic device has established a connection with the second electronic device is: detecting the first electronic device when the first electronic device and the second electronic device have established a secure binding Whether a connection has been established with the second electronic device.
  • the method further includes:
  • connection address is inconsistent with the pre-stored binding address, or the first electronic device and the second electronic device are not established to be secure.
  • binding the first information is masked.
  • the method further includes:
  • the security binding is established according to the pre-stored binding information and the information exchange between the first electronic device and the second electronic device.
  • the establishing the security binding according to the pre-stored binding information and the information exchange between the first electronic device and the second electronic device includes:
  • the binding security information is a basis for determining that a secure connection has been established between the first electronic device and the second electronic device.
  • the method further includes the step of releasing the binding of the first electronic device and the second electronic device: the binding releasing step comprises: Receiving a binding release indication;
  • the binding information and the binding security information are deleted.
  • the binding release step further includes:
  • the security binding is established according to the pre-stored binding information and the information exchanged between the first electronic device and the second electronic device;
  • the binding release step is re-executed.
  • the method further includes:
  • the first electronic device is a second electronic device that is a mobile electronic device; the first electronic device and the second electronic device establish a connection by a short-distance transmission mode.
  • a second aspect of the embodiments of the present invention provides an electronic device, where the electronic device is a first electronic device, including:
  • a detecting unit configured to detect whether the first electronic device has established a connection with the second electronic device
  • a processing unit configured to: when the first electronic device and the second electronic device have established a connection, extract a connection address of the second electronic device, and determine whether the connection address is consistent with a pre-stored binding address ;
  • the receiving unit is configured to receive the first information when the connection address of the second electronic device is consistent with the pre-stored binding address.
  • the electronic device further includes a determining unit
  • the determining unit is configured to determine that the first electronic device and the second electronic device have established a security binding according to the binding address;
  • the detecting unit is configured to: when determining that the first electronic device and the second electronic device have established a security binding according to the binding address, detecting whether the first electronic device and the second electronic device are A connection has been established.
  • the receiving unit is further configured to: when the first electronic device and the second electronic device are not connected, when the connection address does not match the pre-stored binding address, or determine the first The first information is blocked when an electronic device does not establish a secure binding with the second electronic device.
  • the first electronic device further includes:
  • a binding unit configured to establish, according to the pre-stored binding information and the information exchange between the first electronic device and the second electronic device, when the first electronic device and the second electronic device are not securely bound, Secure binding.
  • the first electronic device further includes a sending unit
  • the sending unit is configured to send a connection request to the second electronic device according to the binding information; and send a binding to the second electronic device after the first electronic device is connected to the second electronic device verify message;
  • the receiving unit is configured to receive binding authentication information returned based on the binding verification information
  • the binding unit is configured to form and record binding security information according to the binding authentication information
  • the binding security information is a basis for determining that a secure connection has been established between the first electronic device and the second electronic device.
  • the first electronic device further includes an input unit;
  • the input unit is further configured to receive a binding release indication
  • the detecting unit is further configured to: when detecting the binding release indication, detecting whether the first electronic device has established a security binding with the second electronic device;
  • the binding unit is further configured to delete the binding information and the binding security information when the first electronic device and the second electronic device have established a secure binding.
  • the binding unit is further configured to receive a binding release indication at the input unit, and the detecting unit detects that a security binding is not established between the first electronic device and the second electronic device, according to pre-storage Binding information and interaction based on information between the first electronic device and the second electronic device to establish a security binding;
  • the binding unit is further configured to release the binding between the first electronic device and the second electronic device after the first electronic device establishes a security binding with the second electronic device in the binding release.
  • the first electronic device further includes a connection unit
  • the connecting unit is further configured to establish, between the first electronic device and the second electronic device, according to the binding address, when the first electronic device and the second electronic device are not connected. connection.
  • the first electronic device is a second electronic device that is a mobile electronic device; the first electronic device and the second electronic device establish a connection by a short-distance transmission mode.
  • the third aspect of the embodiments of the present invention further provides a computer storage medium, where the computer storage medium stores computer executable instructions, where the computer executable instructions are used to execute any one of the technical solutions of the first aspect of the embodiments of the present invention. method.
  • the first electronic device when receiving the first information, the first electronic device first verifies whether the first electronic device is in a secure environment by establishing a connection with the second electronic device. Receiving the first information normally if the environment in which the first electronic device is located; otherwise shielding the first information; thereby improving the security of the first information receiving. It is obvious that the information interaction method according to the embodiment of the present invention directly receives the first information with respect to the existing first electronic device, and completes the verification of the first information directly on the first electronic device. Processing, such as payment processing, is clearly more secure; it avoids the security risks caused by illegal users holding the first electronic device. DRAWINGS
  • FIG. 1 is a schematic flowchart of an information processing method according to Embodiment 1 of the present invention
  • FIG. 2 is a second schematic flowchart of an information processing method according to Embodiment 1 of the present invention
  • FIG. 4 is a schematic diagram of security binding of a first electronic device and a second electronic device according to Embodiment 1 of the present invention
  • FIG. 5 is a schematic diagram of binding a first electronic device to a second electronic device according to the first embodiment of the present invention
  • FIG. 6 is a schematic structural diagram of a first electronic device according to Embodiment 2 of the present invention
  • FIG. 7 is a second schematic structural diagram of a first electronic device according to Embodiment 2 of the present invention
  • FIG. Security binding diagram is a schematic structural diagram of a first electronic device according to Embodiment 2 of the present invention.
  • FIG. 9 is a schematic diagram of binding cancellation according to an example of the present invention.
  • FIG. 10 is a flowchart of an information processing method according to an example of the present invention. detailed description
  • Embodiment 1 is a diagrammatic representation of Embodiment 1:
  • the information processing method provided by this embodiment includes:
  • Step S120 detecting whether the first electronic device establishes a connection with the second electronic device;
  • Step S130 If a connection has been established, extracting a connection address of the second electronic device, and determining the connection address and pre-stored Whether the binding addresses are consistent;
  • the first electronic device may be a mobile device such as a mobile phone, a tablet computer, or a personal digital assistant, and may be a mobile terminal, and may perform information interaction by using a network element such as a server such as a wired or wireless network.
  • the second electronic device can also be a mobile electronic device such as a mobile phone, a tablet computer, and a personal digital processing; and the second electronic device can also be a wearable device, such as smart glasses, a smart bracelet, a smart watch, and the like.
  • Mobile electronic devices may be a mobile device such as a mobile phone, a tablet computer, or a personal digital assistant, and may be a mobile terminal, and may perform information interaction by using a network element such as a server such as a wired or wireless network.
  • the second electronic device can also be a mobile electronic device such as a mobile phone, a tablet computer, and a personal digital processing; and the second electronic device can also be a wearable device, such as smart glasses, a smart bracelet, a smart watch
  • the user may carry some mobile terminals for office or communication at any time, and may also carry some wearable devices.
  • these devices are owned by the same user, usually the distance between the devices is very close, and each device can be established.
  • the connection of the mode is especially suitable for the convenient connection of the short-distance transmission mode.
  • the connection established between the first electronic device and the second electronic device may be a connection established according to wireless communication such as second generation communication, third generation communication or fourth generation communication, or may be established according to short distance communication mode. Connection; a connection established based on a Bluetooth connection, a WIFI connection, or an infrared connection.
  • the pre-stored binding address is a connection address used by the second electronic device to establish a connection with the first electronic device.
  • the connection address is different according to the manner in which the connection is established; for example, when a Bluetooth connection is scheduled to be established between the first electronic device and the second electronic device, the binding address is a Bluetooth address of the second electronic device.
  • the first information in step S140 may be a verification code, a verification sequence number, a verification picture, an authentication number, an authentication information, or other information related to the user's personal and property security.
  • the first information may be a payment verification code; obviously, the payment verification code is lost together with the mobile phone within the effective time, and the user is likely to lose a large amount of property, and the property is obviously caused by the information security accident. Security incident.
  • the electronic information processing method described in this embodiment is specifically applicable to receiving some important information, first through the first electronic device and the second Whether a connection is established between the child devices to verify whether the first electronic device is in a secure receiving environment; the first information is received when the first electronic device is secure; this improves the security of the first information and the first information The security of other information associated.
  • the embodiment further provides an information processing method, where the method includes: Step S110: determining that the first electronic device and the second electronic device have established a security binding according to the binding address. ;
  • Step S120 When the first electronic device and the second electronic device have established a security binding, detecting whether the first electronic device establishes a connection with the second electronic device;
  • Step S130 If the connection is established, extract the connection address of the second electronic device, and determine whether the connection address is consistent with the pre-stored binding address;
  • Step S140 If they are consistent, the first information is received.
  • the security binding in the step S110 may be determined by whether the binding security information is formed in the first electronic device; the binding security information may be a security binding identifier bit, a security binding field, or a picture. Any information formed after security binding is implemented arbitrarily.
  • the first electronic device is triggered to execute the foregoing steps S110 to S140, but the user inputs an instruction; or may be an application-based operation; specifically, the user purchases a piece by using the first electronic device.
  • the product needs to be paid; the user enters the payment application to perform the payment operation; at this time, the first electronic device detects the payment operation, and triggers the detection of the step S110 by itself.
  • the first electronic device after determining that the first electronic device and the second electronic device are securely bound, requests to establish a connection between the first electronic device and the second electronic device;
  • the connection address of the second electronic device; the connection address is different according to the type of connection establishment; specifically, if the first electronic device and the second electronic device are established by using Bluetooth; the connection address is a Bluetooth address;
  • the first electronic device and the second electronic device are established by using a WIFI, and the connection address is a WIFI address; if the first electronic device establishes a connection with the second device through the mobile network, the connection The address is the second The IP address or MAC address of the child device.
  • the first electronic device matches the connection address with the pre-stored address, and the matching succeeds to indicate that the application environment of the first electronic device is safe at this time; The environment is not safe.
  • the first electronic device is a mobile phone
  • the second electronic device is a viewable wearable device carried by the user, such as a smart wristband
  • the first electronic device and the second electronic device are together, If the mobile phone is lost, the distance between the mobile phone and the smart bracelet will be far away.
  • the probability of successful establishment of the Bluetooth connection is very low, and the application environment of the mobile phone at this time can be recognized that the application environment is not safe enough.
  • the method further includes the step S150 of masking the first information; the specific triggering may be performed by any one of the following conditions:
  • the first type when the first electronic device and the second electronic device are not connected; the second type: when the connection address is inconsistent with the pre-stored binding address; When the first electronic device and the second electronic device do not establish a secure binding.
  • the above three situations cannot indicate that the first electronic device is in a safe use environment.
  • the first information is shielded; the leakage of the first information and other information associated with the first information leakage are prevented. Safety.
  • the method for receiving the first information shielding is implemented in a plurality of ways; specifically, the first electronic device does not receive the information from the first information sender, or receives the first information that is not normally demodulated or decoded; or displays or does not display normally. Or invalidating the first information, so that the first electronic device holder can not know or know the first information in a valid time, which is the shielding of the first information described in this embodiment.
  • the user may also have a binding or binding of the first electronic device and the second electronic device in the future, but the binding status is a non-secure binding condition, in the step S110. Detecting that the first electronic device and the second electronic device are non-securely bound, according to the pre-stored binding information and the information based on the first electronic device and the second electronic device Mutual, establish a security binding.
  • the information of the second electronic device is pre-stored in the binding information of the first electronic device; the binding information may include information such as a binding address or a connection manner of the second electronic device.
  • the establishing security binding according to the pre-stored binding information and the information exchange between the first electronic device and the second electronic device includes:
  • Step S210 Send a connection request to the second electronic device according to the binding information.
  • Step S220 After the first electronic device is connected to the second electronic device, send a binding to the second electronic device. Verify the information;
  • Step S230 Receive binding authentication information that is returned based on the binding verification information.
  • Step S240 Form and record binding security information according to the binding authentication information, where the binding security information is the first The electronic device and the second electronic device have established a basis for a secure connection.
  • the first electronic device may send a corresponding connection request according to the pre-stored binding information; for example, the corresponding connection may be sent according to the connection manner in the pre-stored binding information.
  • the connection mode stored in the binding information is a Bluetooth connection
  • the first electronic device may automatically search for a nearby Bluetooth device automatically or based on the user's indication when the step S210 is performed, and find the second electronic device in the binding information. Bind address, send a connection request.
  • the second electronic device may respond to the connection request automatically or based on a user request; after the first electronic device receives the response of the second electronic device; the first electronic device acts as The active party establishes a connection with the second electronic device; or the second electronic device establishes a connection between the first electronic device and the second electronic device as an active party after receiving the connection request.
  • the first electronic device After the first electronic device establishes a connection with the second electronic device, the first electronic device sends the binding verification information to the second electronic device; the first electronic device further receives the binding from the second electronic device The second electronic device verifies the formed binding authentication information according to the binding verification information; and forms the binding security information according to the binding authentication information in the step S240.
  • the binding verification information may specifically include some or all of the information in the binding information, such as information such as a binding identification code, such as a Bluetooth connection authentication code.
  • the binding authentication information may also be other information generated based on the binding verification information, such as a Bluetooth connection success feedback message.
  • the first electronic device and the second electronic device may be bound and connected according to the predetermined binding information, indicating that the first electronic device and the second electronic device may be carried by the user.
  • An electronic device is in a secure application environment. Therefore, in the step S240, the binding security information may be established according to the binding authentication information itself or the result of returning the binding authentication information.
  • the binding security information may be a value of a security environment check bit stored in the first electronic device; specifically, the value 1 of the security environment check bit may represent a security binding, and the value of the security environment check bit is 0 is a non-secure binding; in the specific implementation process, it can also be 0 for security binding and 1 for non-secure binding; there are many specific ways, which are not elaborated here. ⁇
  • the user may also cancel the old binding relationship and add a new binding relationship; therefore, for further convenient use, as shown in FIG. 5,
  • the embodiment further provides the step of releasing the binding of the first electronic device and the second electronic device:
  • the binding release step includes:
  • Step S310 Receive a binding release indication.
  • Step S320 Detect whether the first electronic device is securely bound to the second electronic device.
  • Step S330 If the security binding is performed, delete the binding information and the binding security information.
  • the step S310 may be a binding release indication of the receiving user.
  • the second electronic device receives the binding request as the binding active direction.
  • the second electronic device may also serve as an active party for binding cancellation, and the first electronic device receives the second binding device.
  • After the unbinding message of the electronic device it is determined to unbind and modify the binding information. However, when unbinding, it is necessary to verify whether the current first electronic device is securely bound to the second electronic device; if not securely bound, it indicates that the current application environment of the first electronic device is not secure, in an unsafe environment.
  • the binding is also released, and it is possible for the illegal user to take advantage of it; therefore, in the embodiment, the information security is improved again by the setting of step S320.
  • Step S330 deleting the binding information and the binding security information.
  • a connection between the first electronic device and the second electronic device if a connection is not established between the first electronic device and the second electronic device, but the user needs to use the first electronic device to obtain the first information, Setting a connection between the first electronic device and the second electronic device; in a specific execution process, establishing a connection may be based on a binding manner and a binding address in the pre-stored binding information.
  • a connection between the electronic device and the second electronic device; the process of establishing a connection between the first electronic device or the second electronic device may be a setup operation triggered based on a user indication or based on a built-in in the first electronic device The triggering establishment operation of the instruction.
  • the interaction between the first electronic device and the second electronic device may be performed according to the pre-stored binding information. After the security binding is established, the binding release step is re-executed.
  • the first electronic device and the second electronic device may implement the verification of the security binding by using at least one information interaction; after completing a security binding verification, after a certain interval, the security binding Automatic failure to improve safety again.
  • the binding failure period can be used to achieve; the failure period can be 10 minutes, 20 minutes, or 30 minutes; after the security binding continues for one failure period, the automatic failure occurs, and the security binding is changed.
  • the security binding may also be one-time; when the user completes one operation or multiple consecutive operations, the security binding automatically fails, and the specific implementation manners are various, and are not included here - enumerated .
  • the embodiment provides an information processing method.
  • the security of the first electronic device is verified by the association between the first electronic device and the second electronic device, thereby improving the probability of reducing the transmission of the information security incident.
  • the scene including mobile payment, secret information reading, etc.
  • Embodiment 2 is a diagrammatic representation of Embodiment 1:
  • an embodiment of the present invention provides an electronic device, where the electronic device is a first electronic device, and includes:
  • the detecting unit 120 is configured to detect whether the first electronic device has established a connection with the second electronic device;
  • the processing unit 130 is configured to: when the first electronic device and the second electronic device have established a connection, extract a connection address of the second electronic device, and determine whether the connection address and the pre-stored binding address are Consistent
  • the receiving unit 140 is configured to receive the first information when the connection address of the second electronic device matches the pre-stored binding address.
  • the specific physical structure of the detecting unit 120 and the processing unit 130 may include a processor; the processor may have processing capabilities such as a central processing unit, a microprocessor, a single chip microcomputer, a digital signal processor, and a programmable logic array. Electronic components. The processor can perform the above operations by running an executable instruction.
  • the detecting unit 120 and the processing unit 130 may be integrated to correspond to one processor, or may respectively correspond to different processors, and the specific implementation manners may be various, and are not expanded here.
  • the receiving unit 140 can be a communication interface, such as a receiving antenna or the like.
  • the first electronic device described in this embodiment may be a mobile phone, a tablet computer, a personal digital processing, or the like.
  • the second electronic device may also be the same mobile terminal as the first electronic device, and the second electronic device may also be a wearable device, such as smart glasses, a smart bracelet, and a smart watch.
  • the first electronic device in the embodiment provides hardware support for the information processing method in the first embodiment, and can be used to implement any one of the technical solutions in the embodiment, and the first electronic device application process is also improved. The security of information.
  • the electronic device further includes a determining unit 110;
  • the determining unit 110 is configured to determine that the first electronic device and the second electronic device have established a security binding according to the binding address;
  • the detecting unit 120 is configured to detect the first electronic device and the second electronic device when determining that the first electronic device and the second electronic device have established a security binding according to the binding address Whether a connection has been established.
  • the specific structure of the determining unit 110 may also include a processor; the processor may be a processing unit having a processing capability such as a central processing unit, a microprocessor, a single chip microcomputer, a digital signal processor, and a programmable logic array, and may be executable. The operation of the instruction performs the above operation.
  • the determining unit 110 and the detecting unit 120 and the processing unit 130 may be integrated to correspond to one processor, or may respectively correspond to different processors, and the specific implementation manners are various, and are not expanded here.
  • the receiving unit 140 is further configured to: when the first electronic device is not connected to the second electronic device, when the connection address is inconsistent with the pre-stored binding address, or determine the first electronic device The first information is masked when no secure binding is established with the second electronic device.
  • the first electronic device further includes:
  • the specific structure of the binding unit may also include a processor and a storage medium; the storage medium stores information such as binding information and binding security information; and the binding unit may establish a mapping relationship or a relationship table, etc.
  • binding of the first electronic device to the second electronic device is implemented. Specifically, a binding table is established; the device located in the binding table is a second electronic device that is bound to the first electronic device. The binding of the second electronic device can be deleted from the binding table by deleting the binding; the binding mode and the binding release mode are simple and fast.
  • the storage medium may be various storage media such as ROM, RAM or Flash, and is preferably a non-transitory storage medium in this embodiment.
  • the first electronic device is a second electronic device that is a mobile electronic device
  • the first electronic device and the second electronic device establish a connection by short-distance transmission.
  • short-distance transmission mode refer to the first embodiment and the corresponding parts of the embodiment, which will not be described in detail herein.
  • the first electronic device further includes a sending unit
  • the sending unit is configured to send a connection request to the second electronic device according to the binding address; and after the first electronic device is connected to the second electronic device, send a binding to the second electronic device verify message;
  • the receiving unit is configured to receive binding authentication information returned based on the binding verification information
  • the binding unit is configured to form and record binding security information according to the binding authentication information
  • the binding security information may be used as at least one of the basis for determining whether the first electronic device and the second electronic device establish a security binding.
  • the security binding information may include information such as time information, binding address, binding expiration time, and binding mode of the first electronic device and the second electronic device, and may also be in a specific execution process. Including other information, here and again - detailed description.
  • the specific physical structure of the sending unit may be a sending interface; specifically, a transmitting antenna or a transmitting antenna array.
  • the first electronic device sends information to the second electronic device through the sending unit, by using the sending unit, for binding information and binding security information.
  • the first electronic device is further used for binding release, and specifically the first electronic device further includes an input unit;
  • the input unit is further configured to receive a binding release indication
  • the detecting unit is further configured to: when detecting the binding release indication, detecting whether the first electronic device has established a secure binding with the second electronic device;
  • the binding unit is further configured to delete the binding information and the binding security information according to the security binding.
  • the specific physical structure of the input unit may be a physical or virtual keyboard, a touch or non-touch interactive screen or a voice input device on the first electronic device, and the user receives a binding release indication for the user.
  • the binding of the first electronic device and the second electronic device can be cancelled based on the user indication, so that the user can release and add the binding at any time, thereby improving the user's feeling of use.
  • the first electronic device described in this embodiment has the advantage of high intelligence.
  • the binding unit 140 is further configured to receive a binding release indication at the input unit, where the detecting unit detects that a security binding is not established between the first electronic device and the second electronic device. Establishing a security binding according to the pre-stored binding information and the information exchange between the first electronic device and the second electronic device;
  • the binding unit 140 is further configured to release the binding between the first electronic device and the second electronic device after the first electronic device establishes a secure binding with the second electronic device in the binding release.
  • the first electronic device in the embodiment has a simple structure, high compatibility with the prior art, and greatly improves information security.
  • the first electronic device further includes a connection unit,
  • the connecting unit is configured to establish a connection between the first electronic device and the second electronic device according to the binding address when the first electronic device and the second electronic device are not connected. .
  • connection unit may include a connection interface; the connection interface may be a wired connection interface or a wireless connection interface; specifically, a connection interface such as a Bluetooth connection interface or a WIFI connection interface; and the WIFI connection interface is preferably a WIFI direct connection.
  • the port is configured to establish a WIFI direct connection between the first electrical device and the second electronic device.
  • the first electronic device and the second electronic device can establish a connection in various manners.
  • the first electronic device and the second electronic device preferably establish a connection by using a short-distance transmission manner; Infrared, WIFI and other technologies.
  • the embodiment of the present invention further describes a computer storage medium, where the computer storage medium stores computer executable instructions, and the computer executable instructions are used to execute the method described in any one of the first embodiment, specifically The method described in 1.
  • the computer storage medium is preferably a non-transitory storage medium such as a ROM, a magnetic tape, a DVD, an optical disk, or a mobile hard disk.
  • the first electronic device is a mobile phone; the second electronic device is a wearable device; the connection established between the first electronic device and the second electronic device is a Bluetooth connection; and the application is performed by the first electronic device.
  • the mobile payment scenario Under the mobile payment scenario. The following are specific implementations:
  • Figure 8 shows the steps for establishing a secure binding between a mobile phone and a wearable device:
  • Step S100 When performing mobile payment, read the security environment check bit of the security information storage module, check the binding state of the mobile phone and the wearable device security environment; and proceed to step S200;
  • Step S200 When the security environment check bit is 1, the security environment verification process is started; the security environment verification is 1 to indicate that a security binding has been established between the mobile phone and the wearable device; after the step S200 is performed, the process proceeds to the step S900;
  • Step S300 When the security environment check bit is 0, the mobile phone requests to perform blue with the wearable device. Connecting the teeth; proceeding to step S400;
  • Step S400 determining whether the Bluetooth connection is successful
  • step S500 If yes, go to step S500;
  • Step S500 The mobile phone sends a Bluetooth verification code to the wearable device.
  • Step S600 The wearable device confirms the Bluetooth authentication code and returns the authentication information, and generates an unlock code according to the related information of the mobile phone, and stores the unlock code in the wearable device;
  • Step S700 The mobile phone records the wearable device Bluetooth address in the mobile phone according to the authentication information returned by the wearable device.
  • Step S800 setting the security environment check bit to 1;
  • Step S900 The binding is completed.
  • the security environment When the security environment is verified to be set to 1, it indicates that a secure binding is established between the mobile phone and the wearable device.
  • the steps for releasing the binding between the mobile phone and the wearable device are as follows:
  • Step S101 The user performs an unbinding operation on the mobile phone
  • Step S102 The mobile phone sends a Bluetooth authentication code to the wearable device;
  • the authentication code includes information such as a mobile phone Bluetooth address;
  • Step S103 After receiving the Bluetooth verification code, the wearable device determines, according to the Bluetooth authentication code, whether the mobile phone and the wearable device are securely bound.
  • step S104 If no, go to step S104;
  • Step S104 The session end unbinding fails
  • Step S105 The wearable device displays the Bluetooth verification code to the user, and the user needs to manually input the received Bluetooth verification code in the unbinding control interface.
  • Step S106 The wearable device calculates an unlock code according to the Bluetooth verification code, and the The unlock code is compared with the unlock code generated when binding, and the judgment is consistent.
  • step S104 If not, go to step S104;
  • Step S107 The wearable device box mobile phone returns verification information, where the verification information includes the information of the unbind flag bit and the Bluetooth address information, and sends a verification code to the mobile phone, where the verification code is calculated by using a Bluetooth address;
  • Step S108 After receiving the verification code, the user manually inputs a verification code on the mobile phone to determine whether the verification code is correct.
  • step S104 If no, go to step S104;
  • step S109 If yes, go to step S109;
  • Step S109 Unbinding successfully sets the security environment binding flag bit to 0.
  • Step S001 detecting a security environment binding flag bit
  • Step S002 If the security environment binding flag is 0, the binding between the mobile phone and the wearable device is performed, and the Bluetooth address of the wearable device is recorded, and after the binding is completed, the process returns to step S001;
  • Step S003 If the security environment binding flag is 1, it is determined whether a Bluetooth connection is established between the current mobile phone and the wearable device.
  • Step S004 The session end SMS verification code cannot be received normally
  • Step S005 determining whether the recorded Bluetooth address of the wearable device is consistent with the bound Bluetooth address of the bound wearable device.
  • step S004 If no, go to step S004;
  • Step S006 The mobile phone normally receives the short message verification code, and uses the verification code to complete the transfer payment.
  • the verification code is the first information according to the first embodiment and the second embodiment of the present invention.
  • the following provides a method for shielding the first message by the first electronic device, as follows: First: shielding the first message from the user by displaying the method that the first electronic device is automatically deleted before the user is displayed;
  • the mobile phone listens to the number segment sent by the short message center through the SMSHandler function; if the number segment is the mobile banking number segment, it is included in the short message blacklist; by mContext.getContent esolver().delete(Uri.parse( Uri), null, null)
  • the function automatically, J removes the short message sent by the communication number segment in the short message blacklist; thus, the shielding of the first message is realized.
  • the second type disables the first message by receiving the delay, thereby shielding the first message from the user; the mobile phone is in a non-secure environment, and the mobile phone listens to the number segment sent by the short message center through the SMSHandler function, if the number segment is the mobile banking number The segment delays receiving the short message by the DelayReceiver( ) function, and the delay time is set to the effective time of the verification code in the short message.
  • the third type the encryption process of the first message prevents the user from recognizing the first phenomenon, thereby shielding the first message content;
  • the mobile phone listens to the number segment sent by the short message center through the SMSHandler function, and encrypts the received short message content to display the ciphertext. Users can't get short messages as well.
  • the first message is masked to the user by replacing the displayed method.
  • the mobile phone is in a non-secure environment, and the mobile phone listens to the number segment sent by the short message center through the SMSHandler function, and modifies the verification code in the short message to a security verification code preset in the mobile phone security control module according to a preset format. After the security verification code is received, the mobile phone sends an alarm message after receiving the input of the security verification code; and the abnormal display of the short message is also achieved, and the shielding of the first message is reached.
  • the short message in the above four methods is the first information, and the function for shielding the first information in the above method may also be other functions, and is not limited to the above function.
  • the disclosed apparatus and method may be implemented in other manners.
  • the device embodiments described above are only schematic.
  • the division of the unit is only a logical function division.
  • the coupling, or direct coupling, or communication connection of the components shown or discussed may be indirect coupling or communication connection through some interfaces, devices or units, and may be electrical, mechanical or other forms. of.
  • the units described above as separate components may or may not be physically separated, and the components displayed as the units may or may not be physical units, that is, may be located in one place or distributed to multiple network units; Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing module, or each unit may be separately used as one unit, or two or more units may be integrated into one unit; the above integration
  • the unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
  • the foregoing storage medium includes: a mobile storage device, a read-only memory (ROM), a random access memory (RAM), a magnetic disk or an optical disk, and the like.
  • ROM read-only memory
  • RAM random access memory
  • magnetic disk or an optical disk and the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The present invention provides an information processing method and electronic devices, which are designed for improving information security. The method comprises: detecting whether a first electronic device establishes a connection with a second electronic device; if the connection is established, extracting a connection address of the second electronic device, and determining whether the connection address is consistent with a pre-stored binding address; and if yes, receiving first information. In addition, also disclosed is a computer storage medium.

Description

信息处理方法、 电子设备和计算机存储介质 技术领域  Information processing method, electronic device and computer storage medium
本发明涉及通信领域的信息处理技术, 尤其涉及一种安全信息处理方 法、 电子设备和计算机存储介质。 背景技术  The present invention relates to information processing techniques in the field of communications, and more particularly to a secure information processing method, an electronic device, and a computer storage medium. Background technique
随着通信技术及电子信息技术的发展, 用户的个人身份信息等涉及人 身财产安全的信息通常都会通过有线或无线网络进行传输; 在现有方法中 为了提高信息的安全性, 需要进行信息处理时, 通常需要进行鉴权处理。  With the development of communication technology and electronic information technology, information related to personal and personal security of users, such as personal and property security, is usually transmitted through wired or wireless networks. In the existing methods, in order to improve information security, information processing is required. , usually requires authentication.
例如现在移动电子设备上都安装了很多应用; 这些应用在进行一些处 理时, 可能涉及的鉴权处理等; 但是在具体的实现过程中, 信息安全事故 还是常出不断, 用户体验非常糟糕; 特别是移动电子设备丟失时, 导致用 户人身和财产信息被泄露, 造成重大损失的事故也很常见。  For example, many applications are installed on mobile electronic devices. These applications may involve authentication processing when performing some processing. However, in the specific implementation process, information security incidents are often frequent, and the user experience is very bad; When the mobile electronic device is lost, the accident that causes the user's personal and property information to be leaked, causing a major loss is also common.
综合上述, 提高信息安全是现有技术必须解决的一个问题。 发明内容  In summary, improving information security is a problem that must be solved by existing technologies. Summary of the invention
有鉴于此, 本发明实施例旨在提供一种信息处理方法及电子设备, 提 高信息交互的安全性。  In view of this, embodiments of the present invention are directed to an information processing method and an electronic device, which improve the security of information interaction.
为达到上述目的, 本发明实施例的技术方案是这样实现的:  To achieve the above objective, the technical solution of the embodiment of the present invention is implemented as follows:
本发明实施例第一方面提供一种信息处理方法,, 所述方法包括: 检测所述第一电子设备是否与所述第二电子设备已建立连接;  A first aspect of the embodiments of the present invention provides an information processing method, where the method includes: detecting whether the first electronic device has established a connection with the second electronic device;
若已建立连接, 提取所述第二电子设备的连接地址, 并判断所述连 接地址与预先存储的绑定地址是否一致;  If the connection is established, extracting the connection address of the second electronic device, and determining whether the connection address is consistent with the pre-stored binding address;
若一致, 则接收第一信息。 优选地, 所述方法还包括: If they are consistent, the first information is received. Preferably, the method further includes:
确定所述第一电子设备与所述第二电子设备依据所述绑定地址已建立 安全绑定;  Determining that the first electronic device and the second electronic device have established a security binding according to the binding address;
所述检测所述第一电子设备是否与所述第二电子设备已建立连接为: 当所述第一电子设备与所述第二电子设备已建立安全绑定时, 检测所 述第一电子设备是否与所述第二电子设备已建立连接。  The detecting whether the first electronic device has established a connection with the second electronic device is: detecting the first electronic device when the first electronic device and the second electronic device have established a secure binding Whether a connection has been established with the second electronic device.
优选地, 所述方法还包括:  Preferably, the method further includes:
在所述第一电子设备与所述第二电子设备未建立连接时、 所述连接地 址与所述预先存储的绑定地址不一致时或确定所述第一电子设备与第二电 子设备未建立安全绑定时, 屏蔽所述第一信息。  When the connection between the first electronic device and the second electronic device is not established, the connection address is inconsistent with the pre-stored binding address, or the first electronic device and the second electronic device are not established to be secure. When binding, the first information is masked.
优选地, 所述方法还包括:  Preferably, the method further includes:
在确定所述第一电子设备与第二电子设备未建立安全绑定时, 依据预 先存储的绑定信息及基于第一电子设备与第二电子设备的信息交互, 建立 安全绑定。  When it is determined that the first electronic device and the second electronic device are not securely bound, the security binding is established according to the pre-stored binding information and the information exchange between the first electronic device and the second electronic device.
优选地, 所述依据预先存储的绑定信息及基于第一电子设备与第二电 子设备的信息交互, 建立安全绑定包括:  Preferably, the establishing the security binding according to the pre-stored binding information and the information exchange between the first electronic device and the second electronic device includes:
依据所述绑定信息向第二电子设备发送连接请求;  Sending a connection request to the second electronic device according to the binding information;
当所述第一电子设备与所述第二电子设备连接建立后, 向所述第二电 子设备发送绑定验证信息;  After the connection between the first electronic device and the second electronic device is established, sending binding verification information to the second electronic device;
接收基于所述绑定验证信息返回的绑定认证信息;  Receiving binding authentication information returned based on the binding verification information;
依据所述绑定认证信息形成并记录绑定安全信息;  Forming and recording binding security information according to the binding authentication information;
其中, 所述绑定安全信息为所述确定第一电子设备与第二电子设备已 建立安全连接的依据。  The binding security information is a basis for determining that a secure connection has been established between the first electronic device and the second electronic device.
优选地, 所述方法还包括第一电子设备与第二电子设备绑定解除步骤: 所述绑定解除步骤包括: 接收绑定解除指示; Preferably, the method further includes the step of releasing the binding of the first electronic device and the second electronic device: the binding releasing step comprises: Receiving a binding release indication;
检测所述第一电子设备是否与所述第二电子设备安全绑定;  Detecting whether the first electronic device is securely bound to the second electronic device;
若已安全绑定, 则删除所述绑定信息及所述绑定安全信息。  If the binding is secure, the binding information and the binding security information are deleted.
优选地, 所述绑定解除步骤还包括:  Preferably, the binding release step further includes:
若非安全绑定, 则依据预先存储的绑定信息及基于第一电子设备与第 二电子设备的信息交互, 建立安全绑定;  If it is not securely bound, the security binding is established according to the pre-stored binding information and the information exchanged between the first electronic device and the second electronic device;
建立安全绑定后, 重新执行所述绑定解除步骤。  After the security binding is established, the binding release step is re-executed.
优选地, 所述方法还包括:  Preferably, the method further includes:
在所述第一电子设备与所述第二电子设备未建立连接时, 依照所述绑 定地址建立所述第一电子设备与所述第二电子设备之间的连接。  When the first electronic device and the second electronic device are not connected, establishing a connection between the first electronic device and the second electronic device according to the binding address.
优选地, 所述第一电子设备为第二电子设备均为移动电子设备; 所述第一电子设备与所述第二电子设备通过短距离传输方式建立连 接。  Preferably, the first electronic device is a second electronic device that is a mobile electronic device; the first electronic device and the second electronic device establish a connection by a short-distance transmission mode.
本发明实施例第二方面提供一种电子设备, 所述电子设备为第一电子 设备, 包括:  A second aspect of the embodiments of the present invention provides an electronic device, where the electronic device is a first electronic device, including:
检测单元, 配置为检测所述第一电子设备是否与所述第二电子设备已 建立连接;  a detecting unit, configured to detect whether the first electronic device has established a connection with the second electronic device;
处理单元, 配置为当所述第一电子设备与所述第二电子设备已建立连 接时, 提取所述第二电子设备的连接地址, 并判断所述连接地址与预先存 储的绑定地址是否一致;  a processing unit, configured to: when the first electronic device and the second electronic device have established a connection, extract a connection address of the second electronic device, and determine whether the connection address is consistent with a pre-stored binding address ;
接收单元, 配置为当所述第二电子设备的连接地址与预先存储的绑定 地址一致时, 接收第一信息。  The receiving unit is configured to receive the first information when the connection address of the second electronic device is consistent with the pre-stored binding address.
优选地, 所述电子设备还包括确定单元;  Preferably, the electronic device further includes a determining unit;
所述确定单元, 配置为确定所述第一电子设备与所述第二电子设备依 据所述绑定地址已建立安全绑定; 所述检测单元, 配置为在确定所述第一电子设备与所述第二电子设备 已依据所述绑定地址建立安全绑定时, 检测所述第一电子设备与所述第二 电子设备是否已建立连接。 The determining unit is configured to determine that the first electronic device and the second electronic device have established a security binding according to the binding address; The detecting unit is configured to: when determining that the first electronic device and the second electronic device have established a security binding according to the binding address, detecting whether the first electronic device and the second electronic device are A connection has been established.
优选地, 所述接收单元, 还配置为在所述第一电子设备与所述第二电 子设备未建立连接时、 所述连接地址与所述预先存储的绑定地址不一致时 或确定所述第一电子设备与第二电子设备未建立安全绑定时, 屏蔽所述第 一信息。  Preferably, the receiving unit is further configured to: when the first electronic device and the second electronic device are not connected, when the connection address does not match the pre-stored binding address, or determine the first The first information is blocked when an electronic device does not establish a secure binding with the second electronic device.
优选地, 所述第一电子设备还包括:  Preferably, the first electronic device further includes:
绑定单元, 配置为当所述第一电子设备与所述第二电子设备为未安全 绑定时, 依据预先存储的绑定信息及基于第一电子设备与第二电子设备的 信息交互, 建立安全绑定。  a binding unit, configured to establish, according to the pre-stored binding information and the information exchange between the first electronic device and the second electronic device, when the first electronic device and the second electronic device are not securely bound, Secure binding.
优选地, 所述第一电子设备还包括发送单元;  Preferably, the first electronic device further includes a sending unit;
所述发送单元, 配置为依据所述绑定信息向第二电子设备发送连接请 求; 当所述第一电子设备与所述第二电子设备连接建立后, 向所述第二电 子设备发送绑定验证信息;  The sending unit is configured to send a connection request to the second electronic device according to the binding information; and send a binding to the second electronic device after the first electronic device is connected to the second electronic device verify message;
所述接收单元, 配置为接收基于所述绑定验证信息返回的绑定认证信 息;  The receiving unit is configured to receive binding authentication information returned based on the binding verification information;
所述绑定单元, 配置为依据所述绑定认证信息形成并记录绑定安全信 息;  The binding unit is configured to form and record binding security information according to the binding authentication information;
其中, 所述绑定安全信息为所述确定第一电子设备与第二电子设备已 建立安全连接的依据。  The binding security information is a basis for determining that a secure connection has been established between the first electronic device and the second electronic device.
优选地, 所述第一电子设备还包括输入单元;  Preferably, the first electronic device further includes an input unit;
所述输入单元, 还配置为接收绑定解除指示;  The input unit is further configured to receive a binding release indication;
所述检测单元, 还配置为在接收到所述绑定解除指示时, 检测所述第 一电子设备是否与所述第二电子设备已建立安全绑定; 所述绑定单元, 还配置为在所述第一电子设备与所述第二电子设备已 建立安全绑定时, 删除所述绑定信息及所述绑定安全信息。 The detecting unit is further configured to: when detecting the binding release indication, detecting whether the first electronic device has established a security binding with the second electronic device; The binding unit is further configured to delete the binding information and the binding security information when the first electronic device and the second electronic device have established a secure binding.
优选地,  Preferably,
所述绑定单元, 还配置为在所述输入单元接收到绑定解除指示, 所述 检测单元检测到第一电子设备与所述第二电子设备之间未建立安全绑定 时, 依据预先存储的绑定信息及基于第一电子设备与第二电子设备的信息 交互, 建立安全绑定;  The binding unit is further configured to receive a binding release indication at the input unit, and the detecting unit detects that a security binding is not established between the first electronic device and the second electronic device, according to pre-storage Binding information and interaction based on information between the first electronic device and the second electronic device to establish a security binding;
所述绑定单元, 还配置为在绑定解除中第一电子设备与第二电子设备 建立安全绑定后, 解除所述第一电子设备与第二电子设备之间的绑定。  The binding unit is further configured to release the binding between the first electronic device and the second electronic device after the first electronic device establishes a security binding with the second electronic device in the binding release.
优选地, 所述第一电子设备还包括连接单元;  Preferably, the first electronic device further includes a connection unit;
所述连接单元, 还配置为在所述第一电子设备与所述第二电子设备未 建立连接时, 依照所述绑定地址建立所述第一电子设备与所述第二电子设 备之间的连接。  The connecting unit is further configured to establish, between the first electronic device and the second electronic device, according to the binding address, when the first electronic device and the second electronic device are not connected. connection.
优选地, 所述第一电子设备为第二电子设备均为移动电子设备; 所述第一电子设备与所述第二电子设备通过短距离传输方式建立连 接。  Preferably, the first electronic device is a second electronic device that is a mobile electronic device; the first electronic device and the second electronic device establish a connection by a short-distance transmission mode.
本发明实施例第三方面还提供一种计算机存储介质, 所述计算机存储 介质存储有计算机可执行指令, 所述计算机可执行指令用于执行本发明实 施例第一方面任一技术方案所述的方法。  The third aspect of the embodiments of the present invention further provides a computer storage medium, where the computer storage medium stores computer executable instructions, where the computer executable instructions are used to execute any one of the technical solutions of the first aspect of the embodiments of the present invention. method.
本发明实施例所述的信息交互方法、 电子设备和计算机存储介质, 第 一电子设备在接收第一信息时, 首先通过与第二电子设备是否建立连接来 验证第一电子设备是否处于安全环境中, 若第一电子设备所处的环境安全 才正常接收所述第一信息; 否则屏蔽所述第一信息; 从而提高了第一信息 接收的安全性。 显然本发明实施例所述的信息交互方法, 相对于现有的第 一电子设备直接接收第一信息, 将第一信息直接在第一电子设备完成验证 处理, 如支付处理, 显然安全性更高; 避免了非法用户持有第一电子设备 导致的安全风险。 附图说明 In the information interaction method, the electronic device, and the computer storage medium according to the embodiment of the present invention, when receiving the first information, the first electronic device first verifies whether the first electronic device is in a secure environment by establishing a connection with the second electronic device. Receiving the first information normally if the environment in which the first electronic device is located; otherwise shielding the first information; thereby improving the security of the first information receiving. It is obvious that the information interaction method according to the embodiment of the present invention directly receives the first information with respect to the existing first electronic device, and completes the verification of the first information directly on the first electronic device. Processing, such as payment processing, is clearly more secure; it avoids the security risks caused by illegal users holding the first electronic device. DRAWINGS
图 1为本发明实施例一所述的信息处理方法的流程示意图之一; 图 2为本发明实施例一所述的信息处理方法的流程示意图之二; 图 3为本发明实施例一所述的信息处理方法的流程示意图之三; 图 4 为本发明实施例一所述第一电子设备与第二电子设备安全绑定示 意图;  1 is a schematic flowchart of an information processing method according to Embodiment 1 of the present invention; FIG. 2 is a second schematic flowchart of an information processing method according to Embodiment 1 of the present invention; FIG. 4 is a schematic diagram of security binding of a first electronic device and a second electronic device according to Embodiment 1 of the present invention;
图 5 为本发明实施例一所述第一电子设备与第二电子设备绑定解除示 意图;  5 is a schematic diagram of binding a first electronic device to a second electronic device according to the first embodiment of the present invention;
图 6为本发明实施例二所述的第一电子设备的结构示意图之一; 图 7为本发明实施例二所述的第一电子设备的结构示意图之二; 图 8为本发明示例所述的安全绑定示意图;  FIG. 6 is a schematic structural diagram of a first electronic device according to Embodiment 2 of the present invention; FIG. 7 is a second schematic structural diagram of a first electronic device according to Embodiment 2 of the present invention; FIG. Security binding diagram;
图 9为本发明示例所述的绑定解除示意图;  FIG. 9 is a schematic diagram of binding cancellation according to an example of the present invention; FIG.
图 10为本发明示例所述的信息处理方法流程图。 具体实施方式  FIG. 10 is a flowchart of an information processing method according to an example of the present invention. detailed description
以下结合附图对本发明的优选实施例进行详细说明, 应当理解, 以下 所说明的优选实施例仅用于说明和解释本发明, 并不用于限定本发明。  The preferred embodiments of the present invention are described in detail below with reference to the accompanying drawings.
实施例一:  Embodiment 1:
如图 1所示, 本实施例提供一种信息处理方法包括:  As shown in FIG. 1, the information processing method provided by this embodiment includes:
步骤 S120:检测所述第一电子设备是否与所述第二电子设备建立连接; 步骤 S130: 若已建立连接, 提取所述第二电子设备的连接地址, 并判 断所述连接地址与预先存储的绑定地址是否一致;  Step S120: detecting whether the first electronic device establishes a connection with the second electronic device; Step S130: If a connection has been established, extracting a connection address of the second electronic device, and determining the connection address and pre-stored Whether the binding addresses are consistent;
步骤 S140: 若一致, 则接收第一信息。 在本实施例中所述第一电子设备可为手机、 平板电脑及个人数字助理 等移动设备, 具体可为移动终端, 可通过有线或无线与网络的服务器等网 元进行信息交互。 所述第二电子设备同样的可为手机、 平板电脑及个人数 字处理等移动电子设备; 此外所述第二电子设备还可为可穿戴设备, 具体 的如智能眼镜、 智能手环及智能手表等移动电子设备。 Step S140: If they are consistent, the first information is received. In this embodiment, the first electronic device may be a mobile device such as a mobile phone, a tablet computer, or a personal digital assistant, and may be a mobile terminal, and may perform information interaction by using a network element such as a server such as a wired or wireless network. The second electronic device can also be a mobile electronic device such as a mobile phone, a tablet computer, and a personal digital processing; and the second electronic device can also be a wearable device, such as smart glasses, a smart bracelet, a smart watch, and the like. Mobile electronic devices.
在本实施例中, 利用用户可能随时携带一些办公或通讯用的移动终端, 同时还可能携带一些可穿戴设备; 而这些设备被同一用户拥有时, 通常设 备之间的距离很近, 可以建立各种方式的连接, 尤其适用于短距离传输方 式这种方便快捷的连接。  In this embodiment, the user may carry some mobile terminals for office or communication at any time, and may also carry some wearable devices. When these devices are owned by the same user, usually the distance between the devices is very close, and each device can be established. The connection of the mode is especially suitable for the convenient connection of the short-distance transmission mode.
所述第一电子设备与所述第二电子设备建立的连接, 可为依据第二代 通信、 第三代通信或第四代通信等无线通信建立的连接, 还可以是依据短 距离通信方式建立的连接; 如基于蓝牙连接、 WIFI连接或红外连接等方式 建立的连接。  The connection established between the first electronic device and the second electronic device may be a connection established according to wireless communication such as second generation communication, third generation communication or fourth generation communication, or may be established according to short distance communication mode. Connection; a connection established based on a Bluetooth connection, a WIFI connection, or an infrared connection.
所述步骤 S130中, 所述预先存储的绑定地址为所述第二电子设备用来 与所述第一电子设备建立连接的连接地址。 所述连接地址根据所述建立连 接的方式的不同而不同; 如第一电子设备与第二电子设备之间预定建立的 是蓝牙连接时, 所述绑定地址则第二电子设备的蓝牙地址。  In the step S130, the pre-stored binding address is a connection address used by the second electronic device to establish a connection with the first electronic device. The connection address is different according to the manner in which the connection is established; for example, when a Bluetooth connection is scheduled to be established between the first electronic device and the second electronic device, the binding address is a Bluetooth address of the second electronic device.
在具体的实现过程中; 步骤 S140中的所述第一信息可为验证码、 验证 序列号、 验证图片、 鉴权号、 鉴权信息或其他关系用户人身、 财产安全性 的信息。 如, 用户利用手机进行支付时, 所述第一信息可为支付验证码; 显然支付验证码在有效时间内与手机一起丟失, 用户很有可能损失大笔财 产, 显然将因信息安全事故导致财产安全事故。  In a specific implementation process, the first information in step S140 may be a verification code, a verification sequence number, a verification picture, an authentication number, an authentication information, or other information related to the user's personal and property security. For example, when the user makes a payment by using the mobile phone, the first information may be a payment verification code; obviously, the payment verification code is lost together with the mobile phone within the effective time, and the user is likely to lose a large amount of property, and the property is obviously caused by the information security accident. Security incident.
在所述步骤 S140中, 当通过步骤 S130验证第一电子设备的应用环境 安全后, 则接收所述第一信息。 综合上述, 本实施例所述的电子信息处理 方法, 具体适用于接收一些重要信息时, 首先通过第一电子设备与第二电 子设备之间的是否建立连接来验证第一电子设备是否处于安全接收环境 下; 当第一电子设备安全时才接收所述第一信息; 这样提高了第一信息的 安全性及与第一信息关联的其他信息的安全性。 In the step S140, after the application environment of the first electronic device is verified to be secure by the step S130, the first information is received. In summary, the electronic information processing method described in this embodiment is specifically applicable to receiving some important information, first through the first electronic device and the second Whether a connection is established between the child devices to verify whether the first electronic device is in a secure receiving environment; the first information is received when the first electronic device is secure; this improves the security of the first information and the first information The security of other information associated.
如图 2所示, 本实施例还提供一种信息处理方法, 所述方法包括: 步骤 S110: 确定所述第一电子设备与所述第二电子设备依据所述绑定 地址已建立安全绑定;  As shown in FIG. 2, the embodiment further provides an information processing method, where the method includes: Step S110: determining that the first electronic device and the second electronic device have established a security binding according to the binding address. ;
步骤 S120: 当所述第一电子设备与所述第二电子设备已建立安全绑定 时, 检测所述第一电子设备是否与所述第二电子设备建立连接;  Step S120: When the first electronic device and the second electronic device have established a security binding, detecting whether the first electronic device establishes a connection with the second electronic device;
步骤 S130: 若已建立连接, 提取所述第二电子设备的连接地址, 并判 断所述连接地址与预先存储的绑定地址是否一致;  Step S130: If the connection is established, extract the connection address of the second electronic device, and determine whether the connection address is consistent with the pre-stored binding address;
步骤 S140: 若一致, 则接收第一信息。  Step S140: If they are consistent, the first information is received.
在步骤 S110中所述安全绑定, 可以通过所述第一电子设备中是否形成 了绑定安全信息来确定; 所述绑定安全信息可以是安全绑定标识位、 安全 绑定字段或图片等任意实现了安全绑定后形成的信息。 在具体的实现过程 中, 触发所述第一电子设备执行上述步骤 S110至步骤 S140的, 可是用户 输入的指令; 也可以是基于应用的运行; 具体的如用户利用第一电子设备 购买了一件商品, 需要支付; 用户进入支付应用执行支付操作; 此时第一 电子设备检测到了支付操作, 自行触发所述步骤 S110的检测。  The security binding in the step S110 may be determined by whether the binding security information is formed in the first electronic device; the binding security information may be a security binding identifier bit, a security binding field, or a picture. Any information formed after security binding is implemented arbitrarily. In a specific implementation process, the first electronic device is triggered to execute the foregoing steps S110 to S140, but the user inputs an instruction; or may be an application-based operation; specifically, the user purchases a piece by using the first electronic device. The product needs to be paid; the user enters the payment application to perform the payment operation; at this time, the first electronic device detects the payment operation, and triggers the detection of the step S110 by itself.
所述步骤 S120中, 当确定第一电子设备和第二电子设备安全绑定后, 第一电子设备作为发起方, 请求建立第一电子设备与第二电子设备的连接; 并通过连接的建立获取所述第二电子设备的连接地址; 所述连接地址根据 连接建立的类型不同而不同; 具体的若第一电子设备与第二电子设备是通 过蓝牙建立的; 则所述连接地址为蓝牙地址; 所述第一电子设备与第二电 子设是通过 WIFI建立的, 则所述连接地址是 WIFI地址; 若所述第一电子 设备与所述第二设备时通过移动网络建立连接, 则所述连接地址为第二电 子设备的 IP地址或 MAC地址等。 In the step S120, after determining that the first electronic device and the second electronic device are securely bound, the first electronic device, as an initiator, requests to establish a connection between the first electronic device and the second electronic device; The connection address of the second electronic device; the connection address is different according to the type of connection establishment; specifically, if the first electronic device and the second electronic device are established by using Bluetooth; the connection address is a Bluetooth address; The first electronic device and the second electronic device are established by using a WIFI, and the connection address is a WIFI address; if the first electronic device establishes a connection with the second device through the mobile network, the connection The address is the second The IP address or MAC address of the child device.
在获取了所述连接地址以后, 所述第一电子设备将所述连接地址与预 先存储的地址进行匹配, 匹配成功说明此时第一电子设备的应用环境安全; 若不成功则说明此时应用环境不安全。 具体的若所述第一电子设备为手机; 所述第二电子设备为用户随身携带的意见可穿戴设备, 如智能手环; 若此 时第一电子设备与第二电子设备在一起, 则能成功建立蓝牙连接; 若此时 手机丟失, 则手机与所述智能手环的距离将很远, 显然蓝牙连接建立成功 的几率很低, 则可识别出手机此时的应用环境不够安全。  After the connection address is obtained, the first electronic device matches the connection address with the pre-stored address, and the matching succeeds to indicate that the application environment of the first electronic device is safe at this time; The environment is not safe. Specifically, if the first electronic device is a mobile phone; the second electronic device is a viewable wearable device carried by the user, such as a smart wristband; if the first electronic device and the second electronic device are together, If the mobile phone is lost, the distance between the mobile phone and the smart bracelet will be far away. Obviously, the probability of successful establishment of the Bluetooth connection is very low, and the application environment of the mobile phone at this time can be recognized that the application environment is not safe enough.
优选地, 如图 3所示, 所述方法还包括屏蔽第一信息的步骤 S150; 具 体的触发执行所述步骤 S150的条件可为以下任意一种:  Preferably, as shown in FIG. 3, the method further includes the step S150 of masking the first information; the specific triggering may be performed by any one of the following conditions:
第一种: 当所述第一电子设备与所述第二电子设备未建立连接时; 第二种: 当所述连接地址与所述预先存储的绑定地址不一致时; 第三种: 当所述第一电子设备与第二电子设备未建立安全绑定时。 以上三种情形都不能说明第一电子设备处于安全的使用环境中, 为了 保证第一电子设备的使用安全性, 屏蔽第一信息; 防止第一信息的泄露以 及与第一信息泄露关联的其他信息安全。  The first type: when the first electronic device and the second electronic device are not connected; the second type: when the connection address is inconsistent with the pre-stored binding address; When the first electronic device and the second electronic device do not establish a secure binding. The above three situations cannot indicate that the first electronic device is in a safe use environment. In order to ensure the security of use of the first electronic device, the first information is shielded; the leakage of the first information and other information associated with the first information leakage are prevented. Safety.
具体的实现第一信息屏蔽接收方法很多; 具体的如第一电子设备不接 收来自第一信息发送方的信息, 或接收所述第一信息不正常解调或解码; 或不正常显示或不显示, 或者使所述第一信息失效, 使第一电子设备持有 者无法获知或在有效时间内获知所述第一信息, 均为本实施例所述的第一 信息的屏蔽。 在具体的实现过程中, 可能出现用户还未来得及进行第一电子设备与 第二电子设备的绑定或已经绑定但是绑定状况为非安全绑定状况的情况, 若在所述步骤 S110中检测到第一电子设备与第二电子设备为非安全绑定, 则依据预先存储的绑定信息及基于第一电子设备与第二电子设备的信息交 互, 建立安全绑定。 Specifically, the method for receiving the first information shielding is implemented in a plurality of ways; specifically, the first electronic device does not receive the information from the first information sender, or receives the first information that is not normally demodulated or decoded; or displays or does not display normally. Or invalidating the first information, so that the first electronic device holder can not know or know the first information in a valid time, which is the shielding of the first information described in this embodiment. In a specific implementation process, the user may also have a binding or binding of the first electronic device and the second electronic device in the future, but the binding status is a non-secure binding condition, in the step S110. Detecting that the first electronic device and the second electronic device are non-securely bound, according to the pre-stored binding information and the information based on the first electronic device and the second electronic device Mutual, establish a security binding.
通常所述第二电子设备的信息预先存储在所述第一电子设备中绑定信 息; 所述绑定信息可包括第二电子设备的绑定地址或连接方式等信息。  Generally, the information of the second electronic device is pre-stored in the binding information of the first electronic device; the binding information may include information such as a binding address or a connection manner of the second electronic device.
如图 4所示, 所述依据预先存储的绑定信息及基于第一电子设备与第 二电子设备的信息交互, 建立安全绑定包括:  As shown in FIG. 4, the establishing security binding according to the pre-stored binding information and the information exchange between the first electronic device and the second electronic device includes:
步骤 S210: 所述依据所述绑定信息向第二电子设备发送连接请求; 步骤 S220: 当所述第一电子设备与所述第二电子设备连接建立后, 向 所述第二电子设备发送绑定验证信息;  Step S210: Send a connection request to the second electronic device according to the binding information. Step S220: After the first electronic device is connected to the second electronic device, send a binding to the second electronic device. Verify the information;
步骤 S230: 接收基于所述绑定验证信息返回的绑定认证信息; 步骤 S240: 依据所述绑定认证信息形成并记录绑定安全信息; 其中, 所述绑定安全信息为所述确定第一电子设备与第二电子设备已 建立安全连接的依据。  Step S230: Receive binding authentication information that is returned based on the binding verification information. Step S240: Form and record binding security information according to the binding authentication information, where the binding security information is the first The electronic device and the second electronic device have established a basis for a secure connection.
在执行具体的操作之前, 所述步骤 S210所述第一电子设备可以根据预 先存储好的绑定信息, 发送相应的连接请求; 如可以根据预先存储的绑定 信息中的连接方式发送相应的连接请求; 如绑定信息中存储的连接方式为 蓝牙连接, 则第一电子设备在执行步骤 S210时, 就可自动或基于用户指示 的自动搜索附近蓝牙设备, 找到绑定信息中存储第二电子设备的绑定地址, 发送连接请求。  Before performing the specific operation, the first electronic device may send a corresponding connection request according to the pre-stored binding information; for example, the corresponding connection may be sent according to the connection manner in the pre-stored binding information. If the connection mode stored in the binding information is a Bluetooth connection, the first electronic device may automatically search for a nearby Bluetooth device automatically or based on the user's indication when the step S210 is performed, and find the second electronic device in the binding information. Bind address, send a connection request.
第二电子设备接收到第一电子设备的请求后, 可能会自动的或基于用 户请求响应所述连接请求; 当所述第一电子设备接收到第二电子设备的响 应之后; 第一电子设备作为主动方与第二电子设备建立连接; 或者第二电 子设备接收到连接请求后作为主动方建立第一电子设备与第二电子设备的 连接。  After receiving the request of the first electronic device, the second electronic device may respond to the connection request automatically or based on a user request; after the first electronic device receives the response of the second electronic device; the first electronic device acts as The active party establishes a connection with the second electronic device; or the second electronic device establishes a connection between the first electronic device and the second electronic device as an active party after receiving the connection request.
当第一电子设备与第二电子设备建立连接后, 第一电子设备向第二电 子设备发送绑定验证信息; 所述第一电子设备还从所述第二电子设备接收 所述第二电子设备依据绑定验证信息验证形成的绑定认证信息; 并在所述 步骤 S240中依据所述绑定认证信息形成所述绑定安全信息。 After the first electronic device establishes a connection with the second electronic device, the first electronic device sends the binding verification information to the second electronic device; the first electronic device further receives the binding from the second electronic device The second electronic device verifies the formed binding authentication information according to the binding verification information; and forms the binding security information according to the binding authentication information in the step S240.
所述绑定验证信息具体的可包括所述绑定信息中的部分或全部信息, 具体如绑定识别码等信息, 具体如蓝牙连接认证码等。 所述绑定认证信息, 也可是基于所述绑定验证信息生成的其他信息, 如蓝牙连接成功反馈消息 等。  The binding verification information may specifically include some or all of the information in the binding information, such as information such as a binding identification code, such as a Bluetooth connection authentication code. The binding authentication information may also be other information generated based on the binding verification information, such as a Bluetooth connection success feedback message.
连接建立成功后, 说明此时第一电子设备与第二电子设备之间可以按 照预定绑定信息建立绑定及连接, 说明此时第一电子设备与第二电子设备 可能都被用户携带, 第一电子设备处于安全的应用环境当中, 故在所述步 骤 S240中, 可依据绑定认证信息本身或返回绑定认证信息的结果, 建立绑 定安全信息。 所述绑定安全信息可为存储在第一电子设备中的安全环境校 验位的值; 具体如所述安全环境校验位的值 1 可表示安全绑定, 安全环境 校验位的值为 0为非安全绑定; 在具体的实现过程中, 也可以是 0表示安 全绑定, 1为非安全绑定; 具体的方式有多种, 就不在此进行详细阐述。 釆 用安全环境校验位这种 1个或多个比特位的形式来指示是否建立安全绑定, 具有实现简便的优点。  After the connection is successfully established, the first electronic device and the second electronic device may be bound and connected according to the predetermined binding information, indicating that the first electronic device and the second electronic device may be carried by the user. An electronic device is in a secure application environment. Therefore, in the step S240, the binding security information may be established according to the binding authentication information itself or the result of returning the binding authentication information. The binding security information may be a value of a security environment check bit stored in the first electronic device; specifically, the value 1 of the security environment check bit may represent a security binding, and the value of the security environment check bit is 0 is a non-secure binding; in the specific implementation process, it can also be 0 for security binding and 1 for non-secure binding; there are many specific ways, which are not elaborated here.釆 Use the security environment check digit in the form of one or more bits to indicate whether to establish a secure binding, which has the advantage of being simple to implement.
在具体的使用时, 用户根据第一电子设备与第二电子设备的使用状况, 还可能解除旧的绑定关系, 增加新的绑定关系; 故为了进一步方便使用, 如图 5 所示, 本实施例还进一步提供了第一电子设备与第二电子设备绑定 解除的步骤:  In a specific use, according to the usage status of the first electronic device and the second electronic device, the user may also cancel the old binding relationship and add a new binding relationship; therefore, for further convenient use, as shown in FIG. 5, The embodiment further provides the step of releasing the binding of the first electronic device and the second electronic device:
所述绑定解除步骤包括:  The binding release step includes:
步骤 S310: 接收绑定解除指示;  Step S310: Receive a binding release indication.
步骤 S320:检测所述第一电子设备是否与所述第二电子设备安全绑定; 步骤 S330: 若已安全绑定, 则删除所述绑定信息及所述绑定安全信息。 所述步骤 S310中可为接收用户的绑定解除指示。 所述步骤 S320作为绑定主动方向第二电子设备接收绑定请求; 在具体 的实现过程中, 所述第二电子设备也可以作为绑定解除的主动方, 第一电 子设备在接收到第二电子设备的解除绑定消息后, 确定解除绑定并修改绑 定信息。 但是在解除绑定时, 必须验证当前第一电子设备是否与第二电子 设备已安全绑定; 若未安全绑定, 表明第一电子设备当前的应用环境并不 安全, 在不安全的环境下还解除绑定, 有可能让非法用户有机可乘; 故本 实施例中通过步骤 S320的设置, 再次提高了信息安全。 Step S320: Detect whether the first electronic device is securely bound to the second electronic device. Step S330: If the security binding is performed, delete the binding information and the binding security information. The step S310 may be a binding release indication of the receiving user. In the step S320, the second electronic device receives the binding request as the binding active direction. In a specific implementation process, the second electronic device may also serve as an active party for binding cancellation, and the first electronic device receives the second binding device. After the unbinding message of the electronic device, it is determined to unbind and modify the binding information. However, when unbinding, it is necessary to verify whether the current first electronic device is securely bound to the second electronic device; if not securely bound, it indicates that the current application environment of the first electronic device is not secure, in an unsafe environment. The binding is also released, and it is possible for the illegal user to take advantage of it; therefore, in the embodiment, the information security is improved again by the setting of step S320.
步骤 S330, 删除所述绑定信息及所述绑定安全信息。  Step S330, deleting the binding information and the binding security information.
在具体的执行过程中, 若所述第一电子设备与所述第二电子设备之间 未建立连接, 但是在用户要利用所述第一电子设备获取第一信息时, 可临 时依据所述绑定地址建立所述第一电子设备与所述第二电子之间的连接; 在具体的执行过程中, 建立连接时可以依据预先存储的绑定信息中的绑定 方式以及绑定地址建立第一电子设备与所述第二电子设备之间的连接; 建 立所述第一电子设备或第二电子设备之间连接的过程可以是基于用户指示 触发的建立操作或基于所述第一电子设备中内置指令的触发的建立操作。  In a specific implementation process, if a connection is not established between the first electronic device and the second electronic device, but the user needs to use the first electronic device to obtain the first information, Setting a connection between the first electronic device and the second electronic device; in a specific execution process, establishing a connection may be based on a binding manner and a binding address in the pre-stored binding information. a connection between the electronic device and the second electronic device; the process of establishing a connection between the first electronic device or the second electronic device may be a setup operation triggered based on a user indication or based on a built-in in the first electronic device The triggering establishment operation of the instruction.
作为绑定解除的进一步补充, 在所述第一电子设备与第二电子设备未 建立安全绑定时, 可通依据预先存储的绑定信息及基于第一电子设备与第 二电子设备的信息交互, 建立安全绑定; 建立安全绑定后, 再重新执行所 述绑定解除步骤。  As a further supplement of the binding release, when the first electronic device and the second electronic device do not establish a security binding, the interaction between the first electronic device and the second electronic device may be performed according to the pre-stored binding information. After the security binding is established, the binding release step is re-executed.
这样方便用户的绑定操作。  This is convenient for the user's binding operation.
在具体的实现过程中, 第一电子设备与第二电子设备可以通过至少一 次信息交互实现信息实现安全绑定的验证; 当完成一次安全绑定验证后, 间隔一定时间后, 所述安全绑定自动失效, 以再次提高安全性能。 具体的 实现过程中, 可以釆用绑定失效周期来实现; 失效周期可为 10分钟、 20分 钟或 30分钟; 安全绑定持续了一个失效周期后, 自动失效, 由安全绑定转 为非安全绑定。 此外, 所述安全绑定还可以是一次性; 当用户完成一次操 作或连续的多个操作后, 所述安全绑定即自动失效, 具体的实现方式有多 种, 就不在此——列举了。 In a specific implementation process, the first electronic device and the second electronic device may implement the verification of the security binding by using at least one information interaction; after completing a security binding verification, after a certain interval, the security binding Automatic failure to improve safety again. In the specific implementation process, the binding failure period can be used to achieve; the failure period can be 10 minutes, 20 minutes, or 30 minutes; after the security binding continues for one failure period, the automatic failure occurs, and the security binding is changed. For non-secure binding. In addition, the security binding may also be one-time; when the user completes one operation or multiple consecutive operations, the security binding automatically fails, and the specific implementation manners are various, and are not included here - enumerated .
综合上述, 本实施例提供一种信息处理方法, 首先通过第一电子设备 与第二电子设备之间关联性来验证第一电子设备的使用安全性, 从而提高 降低信息安全事故发送的几率, 适用于包括移动支付、 秘密信息读取等场 景中。  In summary, the embodiment provides an information processing method. First, the security of the first electronic device is verified by the association between the first electronic device and the second electronic device, thereby improving the probability of reducing the transmission of the information security incident. In the scene including mobile payment, secret information reading, etc.
实施例二:  Embodiment 2:
如图 6所示, 本发明实施例提供一种电子设备, 所述电子设备为第一 电子设备, 包括:  As shown in FIG. 6, an embodiment of the present invention provides an electronic device, where the electronic device is a first electronic device, and includes:
检测单元 120,配置为检测第一电子设备是否与第二电子设备已建立连 接;  The detecting unit 120 is configured to detect whether the first electronic device has established a connection with the second electronic device;
处理单元 130,配置为当所述第一电子设备与所述第二电子设备已建立 连接时, 提取所述第二电子设备的连接地址, 并判断所述连接地址与预先 存储的绑定地址是否一致;  The processing unit 130 is configured to: when the first electronic device and the second electronic device have established a connection, extract a connection address of the second electronic device, and determine whether the connection address and the pre-stored binding address are Consistent
接收单元 140,配置为当所述第二电子设备的连接地址与预先存储的绑 定地址一致时, 接收第一信息。  The receiving unit 140 is configured to receive the first information when the connection address of the second electronic device matches the pre-stored binding address.
所述检测单元 120和所述处理单元 130的具体物理结构均可包括处理 器; 所述处理器可为中央处理器、 微处理器, 单片机、 数字信号处理器及 可编程逻辑阵列等具有处理能力的电子元器件。 所述处理器可通过对可执 行指令的运行执行上述操作。 所述检测单元 120和所述处理单元 130可集 成对应于一个处理器, 也可分别对应不同的处理器, 具体的实现方式有多 种, 就不在此进行展开了。  The specific physical structure of the detecting unit 120 and the processing unit 130 may include a processor; the processor may have processing capabilities such as a central processing unit, a microprocessor, a single chip microcomputer, a digital signal processor, and a programmable logic array. Electronic components. The processor can perform the above operations by running an executable instruction. The detecting unit 120 and the processing unit 130 may be integrated to correspond to one processor, or may respectively correspond to different processors, and the specific implementation manners may be various, and are not expanded here.
所述接收单元 140可为通信接口, 具体的如接收天线等结构。  The receiving unit 140 can be a communication interface, such as a receiving antenna or the like.
本实施例所述的第一电子设备可为手机、 平板电脑、 个人数字处理等 移动终端; 所述第二电子设备也可为与第一电子设备相同的移动终端, 所 述第二电子设备还可为可穿戴设备, 如智能眼镜、 智能手环及智能手表等 设备。 The first electronic device described in this embodiment may be a mobile phone, a tablet computer, a personal digital processing, or the like. The second electronic device may also be the same mobile terminal as the first electronic device, and the second electronic device may also be a wearable device, such as smart glasses, a smart bracelet, and a smart watch.
本实施例所述的第一电子设备为实施例一所述的信息处理方法提供了 硬件支持, 可用于实现实施例一种任一所述的技术方案, 同样的提升了第 一电子设备应用过程中信息的安全性。  The first electronic device in the embodiment provides hardware support for the information processing method in the first embodiment, and can be used to implement any one of the technical solutions in the embodiment, and the first electronic device application process is also improved. The security of information.
如图 7所示, 所述电子设备还包括确定单元 110;  As shown in Figure 7, the electronic device further includes a determining unit 110;
所述确定单元 110,配置为确定所述第一电子设备与所述第二电子设备 已依据所述绑定地址建立了安全绑定;  The determining unit 110 is configured to determine that the first electronic device and the second electronic device have established a security binding according to the binding address;
所述检测单元 120,配置为在确定所述第一电子设备与所述第二电子设 备已依据所述绑定地址建立安全绑定时, 检测所述第一电子设备与所述第 二电子设备是否已建立连接。  The detecting unit 120 is configured to detect the first electronic device and the second electronic device when determining that the first electronic device and the second electronic device have established a security binding according to the binding address Whether a connection has been established.
所述确定单元 110 的具体结构同样可包括处理器; 所述处理器可为中 央处理器、 微处理器, 单片机、 数字信号处理器及可编程逻辑阵列等具有 处理能力的结构, 可通过可执行指令的运行执行上述操作。 所述确定单元 110与所述检测单元 120和所述处理单元 130可集成对应于一个处理器,也 可分别对应不同的处理器, 具体的实现方式有多种, 就不在此进行展开了。  The specific structure of the determining unit 110 may also include a processor; the processor may be a processing unit having a processing capability such as a central processing unit, a microprocessor, a single chip microcomputer, a digital signal processor, and a programmable logic array, and may be executable. The operation of the instruction performs the above operation. The determining unit 110 and the detecting unit 120 and the processing unit 130 may be integrated to correspond to one processor, or may respectively correspond to different processors, and the specific implementation manners are various, and are not expanded here.
优选地,  Preferably,
所述接收单元 140,还配置为所述第一电子设备与所述第二电子设备未 建立连接时、 所述连接地址与所述预先存储的绑定地址不一致时或确定所 述第一电子设备与第二电子设备未建立安全绑定时, 屏蔽所述第一信息。  The receiving unit 140 is further configured to: when the first electronic device is not connected to the second electronic device, when the connection address is inconsistent with the pre-stored binding address, or determine the first electronic device The first information is masked when no secure binding is established with the second electronic device.
所述第一电子设备还包括:  The first electronic device further includes:
绑定单元, 配置为当所述第一电子设备与所述第二电子设备为未安全 绑定时, 依据预先存储的绑定信息及基于第一电子设备与第二电子设备的 信息交互, 建立安全绑定。 所述绑定单元的具体结构, 同样可包括处理器及存储介质; 所述存储 介质上存储有绑定信息及绑定安全信息等信息; 所述绑定单元可以通过建 立映射关系或关系表等方式, 实现第一电子设备与第二电子设备的绑定。 具体的如建立一个绑定表; 位于所述绑定表的设备为与第一电子设备建立 了绑定的第二电子设备。 删除绑定即可将所述第二电子设备从所述绑定表 中删除即可; 这种绑定方式及绑定解除方式, 实现简便快捷。 所述存储介 质可为 ROM、 RAM或 Flash等各种存储介质, 在本实施例中优选为非瞬间 存储介质。 a binding unit, configured to establish, according to the pre-stored binding information and the information exchange between the first electronic device and the second electronic device, when the first electronic device and the second electronic device are not securely bound, Secure binding. The specific structure of the binding unit may also include a processor and a storage medium; the storage medium stores information such as binding information and binding security information; and the binding unit may establish a mapping relationship or a relationship table, etc. In a manner, binding of the first electronic device to the second electronic device is implemented. Specifically, a binding table is established; the device located in the binding table is a second electronic device that is bound to the first electronic device. The binding of the second electronic device can be deleted from the binding table by deleting the binding; the binding mode and the binding release mode are simple and fast. The storage medium may be various storage media such as ROM, RAM or Flash, and is preferably a non-transitory storage medium in this embodiment.
所述第一电子设备为第二电子设备均为移动电子设备;  The first electronic device is a second electronic device that is a mobile electronic device;
所述第一电子设备与所述第二电子设备通过短距离传输方式建立连 接。 所述短距离传输方式可参见实施例一和本实施例上述相应部分, 在此 不再进行详细阐述。  The first electronic device and the second electronic device establish a connection by short-distance transmission. For the short-distance transmission mode, refer to the first embodiment and the corresponding parts of the embodiment, which will not be described in detail herein.
所述第一电子设备还包括发送单元;  The first electronic device further includes a sending unit;
所述发送单元, 配置为依据所述绑定地址向第二电子设备发送连接请 求; 当所述第一电子设备与所述第二电子设备连接建立后, 向所述第二电 子设备发送绑定验证信息;  The sending unit is configured to send a connection request to the second electronic device according to the binding address; and after the first electronic device is connected to the second electronic device, send a binding to the second electronic device verify message;
所述接收单元, 配置为接收基于所述绑定验证信息返回的绑定认证信 息;  The receiving unit is configured to receive binding authentication information returned based on the binding verification information;
所述绑定单元, 配置为依据所述绑定认证信息形成并记录绑定安全信 息;  The binding unit is configured to form and record binding security information according to the binding authentication information;
其中, 所述绑定安全信息可作为确定所述第一电子设备与所述第二电 子设备是否建立安全绑定的至少依据之一。 所述安全绑定信息可包括第一 电子设备与所述第二电子设备建立安全绑定的时间信息、 绑定地址、 绑定 失效时间以及绑定方式等信息, 在具体的执行过程中还可包括其他信息, 在此就一再——详细描述了。 所述发送单元的具体物理结构, 可为发送接口; 具体的如发送天线或 发送天线阵列等。 The binding security information may be used as at least one of the basis for determining whether the first electronic device and the second electronic device establish a security binding. The security binding information may include information such as time information, binding address, binding expiration time, and binding mode of the first electronic device and the second electronic device, and may also be in a specific execution process. Including other information, here and again - detailed description. The specific physical structure of the sending unit may be a sending interface; specifically, a transmitting antenna or a transmitting antenna array.
通过发送单元的增设, 所述第一电子设备通过所述发送单元向第二电 子设备发送信息, 用于绑定信息及绑定安全信息的形成。  The first electronic device sends information to the second electronic device through the sending unit, by using the sending unit, for binding information and binding security information.
优选地, 所述第一电子设备还可用于绑定解除, 具体地所述第一电子 设备还包括输入单元;  Preferably, the first electronic device is further used for binding release, and specifically the first electronic device further includes an input unit;
所述输入单元, 还配置为接收绑定解除指示;  The input unit is further configured to receive a binding release indication;
所述检测单元, 还配置为在接收到所述绑定解除指示时, 检测所述第 一电子设备是否与所述第二电子设备已建立安全绑定;  The detecting unit is further configured to: when detecting the binding release indication, detecting whether the first electronic device has established a secure binding with the second electronic device;
所述绑定单元, 还配置为依据所述若已安全绑定, 删除所述绑定信息 及所述绑定安全信息。  The binding unit is further configured to delete the binding information and the binding security information according to the security binding.
所述输入单元的具体物理结构, 可为所述第一电子设备上的实体或虚 拟键盘、 触摸或非触摸交互屏或语音输入装置等结构, 用户接收用于的绑 定解除指示。  The specific physical structure of the input unit may be a physical or virtual keyboard, a touch or non-touch interactive screen or a voice input device on the first electronic device, and the user receives a binding release indication for the user.
本实施例通过所述输入单元的增设, 可基于用户指示, 解除第一电子 设备与第二电子设备的绑定, 以方便用户随时解除和新增绑定, 提高用户 使用感受良好度。 本实施例所述第一电子设备具有智能性高的优点。  In this embodiment, the binding of the first electronic device and the second electronic device can be cancelled based on the user indication, so that the user can release and add the binding at any time, thereby improving the user's feeling of use. The first electronic device described in this embodiment has the advantage of high intelligence.
优选地, 所述绑定单元 140,还配置为在所述输入单元接收到绑定解除 指示, 所述检测单元检测到第一电子设备与所述第二电子设备之间未建立 安全绑定时, 依据预先存储的绑定信息及基于第一电子设备与第二电子设 备的信息交互, 建立安全绑定;  Preferably, the binding unit 140 is further configured to receive a binding release indication at the input unit, where the detecting unit detects that a security binding is not established between the first electronic device and the second electronic device. Establishing a security binding according to the pre-stored binding information and the information exchange between the first electronic device and the second electronic device;
所述绑定单元 140,还配置为在绑定解除中第一电子设备与第二电子设 备建立安全绑定后, 解除所述第一电子设备与第二电子设备之间的绑定。  The binding unit 140 is further configured to release the binding between the first electronic device and the second electronic device after the first electronic device establishes a secure binding with the second electronic device in the binding release.
本实施例所述第一电子设备具有结构简单, 与现有技术兼容性高, 大 大的提高了信息的安全性。 此外, 所述第一电子设备还包括连接单元, The first electronic device in the embodiment has a simple structure, high compatibility with the prior art, and greatly improves information security. In addition, the first electronic device further includes a connection unit,
所述连接单元, 配置为在所述第一电子设备与所述第二电子设备未建 立连接时, 依照所述绑定地址建立所述第一电子设备与所述第二电子设备 之间的连接。  The connecting unit is configured to establish a connection between the first electronic device and the second electronic device according to the binding address when the first electronic device and the second electronic device are not connected. .
所述连接单元的具体物理结构可包括连接接口; 所述连接接口可是有 线连接接口或无线连接接口; 具体的如蓝牙连接接口、 WIFI连接接口等连 接接口; 所述 WIFI连接接口优选为 WIFI直连接口, 用于建立第一电设备 与第二电子设备之间的 WIFI直连等。通常所述第一电子设备与第二电子设 备可以通过各种方式建立连接, 在本实施例中所述第一电子设备与第二电 子优选釆用短距离传输方式建立连接; 具体的如蓝牙、 红外、 WIFI等技术。  The specific physical structure of the connection unit may include a connection interface; the connection interface may be a wired connection interface or a wireless connection interface; specifically, a connection interface such as a Bluetooth connection interface or a WIFI connection interface; and the WIFI connection interface is preferably a WIFI direct connection. The port is configured to establish a WIFI direct connection between the first electrical device and the second electronic device. Generally, the first electronic device and the second electronic device can establish a connection in various manners. In this embodiment, the first electronic device and the second electronic device preferably establish a connection by using a short-distance transmission manner; Infrared, WIFI and other technologies.
本发明实施例还记载了一种计算机存储介质, 所述计算机存储介质存 储有计算机可执行指令, 所述计算机可执行指令用于执行实施例一中任一 技术方案所述的方法, 具体如图 1 所述的方法。 所述计算机存储介质优选 为非瞬间存储介质, 如 ROM、 磁带、 DVD、 光盘或移动硬盘等结构。  The embodiment of the present invention further describes a computer storage medium, where the computer storage medium stores computer executable instructions, and the computer executable instructions are used to execute the method described in any one of the first embodiment, specifically The method described in 1. The computer storage medium is preferably a non-transitory storage medium such as a ROM, a magnetic tape, a DVD, an optical disk, or a mobile hard disk.
以下结合实施例一及实施例二任一所述的技术方案, 提供具体示例。 在具体示例中, 所述第一电子设备为手机; 所述第二电子设备为可穿戴设 备; 第一电子设备与第二电子设备之间建立的连接为蓝牙连接; 应用在第 一电子设备进行移动支付的场景下。 以下是具体的实现方式:  Specific examples are provided below in conjunction with the technical solutions described in any of Embodiment 1 and Embodiment 2. In a specific example, the first electronic device is a mobile phone; the second electronic device is a wearable device; the connection established between the first electronic device and the second electronic device is a Bluetooth connection; and the application is performed by the first electronic device. Under the mobile payment scenario. The following are specific implementations:
图 8为手机与可穿戴设备之间建立的安全绑定的步骤:  Figure 8 shows the steps for establishing a secure binding between a mobile phone and a wearable device:
步骤 S100: 进行移动支付时, 读取安全信息存储模块的安全环境校验 位, 查看手机与可穿戴设备安全环境绑定状态; 并进入步骤 S200;  Step S100: When performing mobile payment, read the security environment check bit of the security information storage module, check the binding state of the mobile phone and the wearable device security environment; and proceed to step S200;
步骤 S200: 当安全环境校验位为 1时, 启动安全环境校验流程; 安全 环境验证为 1 表示手机与可穿戴设备之间已建立安全绑定; 执行完所述步 骤 S200后, 转入步骤 S900;  Step S200: When the security environment check bit is 1, the security environment verification process is started; the security environment verification is 1 to indicate that a security binding has been established between the mobile phone and the wearable device; after the step S200 is performed, the process proceeds to the step S900;
步骤 S300: 当安全环境校验位为 0时, 手机请求与可穿戴设备进行蓝 牙连接; 进入步骤 S400; Step S300: When the security environment check bit is 0, the mobile phone requests to perform blue with the wearable device. Connecting the teeth; proceeding to step S400;
步骤 S400: 判断蓝牙是否连接成功,  Step S400: determining whether the Bluetooth connection is successful,
若否, 则返回步骤 S300,  If not, return to step S300,
若是, 则转到步骤 S500;  If yes, go to step S500;
步骤 S500: 手机向可穿戴设备发送蓝牙验证码;  Step S500: The mobile phone sends a Bluetooth verification code to the wearable device.
步骤 S600: 可穿戴设备确认蓝牙认证码并返回认证信息, 同时根据手 机的相关信息生成解锁码, 存储在可穿戴设备中;  Step S600: The wearable device confirms the Bluetooth authentication code and returns the authentication information, and generates an unlock code according to the related information of the mobile phone, and stores the unlock code in the wearable device;
步骤 S700: 手机根据可穿戴设备返回的认证信息, 将可穿戴设备蓝牙 地址记录在手机中;  Step S700: The mobile phone records the wearable device Bluetooth address in the mobile phone according to the authentication information returned by the wearable device.
步骤 S800: 将安全环境校验位设置为 1 ;  Step S800: setting the security environment check bit to 1;
步骤 S900: 完成绑定。  Step S900: The binding is completed.
当所述安全环境验证为设置为 1 时, 表示手机与可穿戴设备之间建立 安全绑定。  When the security environment is verified to be set to 1, it indicates that a secure binding is established between the mobile phone and the wearable device.
如图 9所示, 为手机与可穿戴设备之间绑定解除的步骤:  As shown in Figure 9, the steps for releasing the binding between the mobile phone and the wearable device are as follows:
步骤 S101 : 用户在手机上进行解除绑定的操作;  Step S101: The user performs an unbinding operation on the mobile phone;
步骤 S102: 手机向可穿戴设备发送蓝牙认证码; 认证码中包含手机蓝 牙地址等信息;  Step S102: The mobile phone sends a Bluetooth authentication code to the wearable device; the authentication code includes information such as a mobile phone Bluetooth address;
步骤 S103 : 可穿戴设备接收到蓝牙验证码后, 依据所述蓝牙认证码判 断手机和可穿戴设备之间是否已安全绑定,  Step S103: After receiving the Bluetooth verification code, the wearable device determines, according to the Bluetooth authentication code, whether the mobile phone and the wearable device are securely bound.
若否, 则进入步骤 S104;  If no, go to step S104;
若是, 则进入步骤 S105;  If yes, proceed to step S105;
步骤 S104: 会话结束解除绑定失败;  Step S104: The session end unbinding fails;
步骤 S105: 所述可穿戴设备将蓝牙验证码显示给用户, 需用户在解除 绑定控制界面手动输入接收到的蓝牙验证码;  Step S105: The wearable device displays the Bluetooth verification code to the user, and the user needs to manually input the received Bluetooth verification code in the unbinding control interface.
步骤 S106: 可穿戴设备依据所述蓝牙验证码计算得到解锁码, 将所述 解锁码与绑定时生成的解锁码进行对比, 判断是否一致, Step S106: The wearable device calculates an unlock code according to the Bluetooth verification code, and the The unlock code is compared with the unlock code generated when binding, and the judgment is consistent.
若不一致, 进入步骤 S104;  If not, go to step S104;
若一致, 进入步骤 S107;  If yes, proceed to step S107;
步骤 S107: 可穿戴设备箱手机返回验证信息, 其中, 验证信息包含解 除绑定标志位信息与蓝牙地址信息, 并向手机发送验证码, 该验证码通过 蓝牙地址计算;  Step S107: The wearable device box mobile phone returns verification information, where the verification information includes the information of the unbind flag bit and the Bluetooth address information, and sends a verification code to the mobile phone, where the verification code is calculated by using a Bluetooth address;
步骤 S108: 手机接收到验证码后用户在手机上手动输入验证码, 判断 验证码是否正确;  Step S108: After receiving the verification code, the user manually inputs a verification code on the mobile phone to determine whether the verification code is correct.
若否, 进入步骤 S104;  If no, go to step S104;
若是, 进入步骤 S109;  If yes, go to step S109;
步骤 S109: 解除绑定成功将安全环境绑定标志位设置为 0。  Step S109: Unbinding successfully sets the security environment binding flag bit to 0.
如图 10所示, 具体的信息接收示例:  As shown in Figure 10, the specific information receiving example:
步骤 S001 : 检测安全环境绑定标志位;  Step S001: detecting a security environment binding flag bit;
步骤 S002: 若安全环境绑定标志位为 0, 进行手机与可穿戴设备的绑 定, 并记录可穿戴设备的蓝牙地址, 绑定完后返回步骤 S001;  Step S002: If the security environment binding flag is 0, the binding between the mobile phone and the wearable device is performed, and the Bluetooth address of the wearable device is recorded, and after the binding is completed, the process returns to step S001;
步骤 S003 : 若安全环境绑定标志位为 1, 判断当前手机和可穿戴设备 之间是否已建立蓝牙连接,  Step S003: If the security environment binding flag is 1, it is determined whether a Bluetooth connection is established between the current mobile phone and the wearable device.
若是, 则进入步骤 S004;  If yes, proceed to step S004;
若否, 则进入步骤 S005;  If no, proceed to step S005;
步骤 S004: 会话结束短信验证码无法正常接收;  Step S004: The session end SMS verification code cannot be received normally;
步骤 S005: 判断记录的可穿戴设备的蓝牙地址与绑定的可穿戴设备蓝 牙地址是否一致,  Step S005: determining whether the recorded Bluetooth address of the wearable device is consistent with the bound Bluetooth address of the bound wearable device.
若否, 则进入步骤 S004;  If no, go to step S004;
若是, 则进入步骤 S006  If yes, proceed to step S006
步骤 S006: 手机正常接收短信验证码, 利用所述验证码完成转账支付 流程。 所述验证码为本发明实施例一及实施例二所述的第一信息。 Step S006: The mobile phone normally receives the short message verification code, and uses the verification code to complete the transfer payment. Process. The verification code is the first information according to the first embodiment and the second embodiment of the present invention.
以下提供几种第一电子设备对第一消息屏蔽的方法, 具体如下: 第一种: 通过未向用户显示之前第一电子设备自动删除的方法, 向用 户屏蔽第一消息;  The following provides a method for shielding the first message by the first electronic device, as follows: First: shielding the first message from the user by displaying the method that the first electronic device is automatically deleted before the user is displayed;
手机处于非安全环境下, 手机通过 SMSHandler函数监听短消息中心发 送的号码段; 若号码段为手机银行号码段, 列入短消息黑名单; 通过 mContext.getContent esolver().delete(Uri.parse(uri), null, null)函数自动, J 除短消息黑名单内通信号码段发送的短消息; 从而实现第一消息的屏蔽。  When the mobile phone is in a non-secure environment, the mobile phone listens to the number segment sent by the short message center through the SMSHandler function; if the number segment is the mobile banking number segment, it is included in the short message blacklist; by mContext.getContent esolver().delete(Uri.parse( Uri), null, null) The function automatically, J removes the short message sent by the communication number segment in the short message blacklist; thus, the shielding of the first message is realized.
第二种: 通过接收延时, 使第一消息失效, 从而向用户屏蔽第一消息; 手机处于非安全环境下, 手机通过 SMSHandler函数监听短消息中心发 送的号码段, 若号码段为手机银行号码段, 则通过 DelayReceiver ( ) 函数 延迟接收短信, 延迟时间设定为所述短消息中验证码的有效时间。  The second type: disables the first message by receiving the delay, thereby shielding the first message from the user; the mobile phone is in a non-secure environment, and the mobile phone listens to the number segment sent by the short message center through the SMSHandler function, if the number segment is the mobile banking number The segment delays receiving the short message by the DelayReceiver( ) function, and the delay time is set to the effective time of the verification code in the short message.
第三种: 通过第一消息的加密处理, 使用户无法识别第一现象, 从而 实现第一消息内容的屏蔽;  The third type: the encryption process of the first message prevents the user from recognizing the first phenomenon, thereby shielding the first message content;
手机处于非安全环境下, 手机通过 SMSHandler函数监听短消息中心发 送的号码段, 将收到短消息内容进行加密处理, 密文显示。 用户同样的无 法获取短消息。  When the mobile phone is in a non-secure environment, the mobile phone listens to the number segment sent by the short message center through the SMSHandler function, and encrypts the received short message content to display the ciphertext. Users can't get short messages as well.
第四种: 通过替代显示的方法, 向用户屏蔽第一消息。  Fourth: The first message is masked to the user by replacing the displayed method.
手机处于非安全环境下, 手机通过 SMSHandler函数监听短消息中心发 送的号码段, 按照预设的格式将所述短消息中的验证码修改为预设在手机 安全控制模块的安全验证码, 显示所述安全验证码, 手机接收所述安全验 证码的输入后, 发出告警信息; 同样达到了所述短消息的非正常显示, 达 到了第一消息的屏蔽。  The mobile phone is in a non-secure environment, and the mobile phone listens to the number segment sent by the short message center through the SMSHandler function, and modifies the verification code in the short message to a security verification code preset in the mobile phone security control module according to a preset format. After the security verification code is received, the mobile phone sends an alarm message after receiving the input of the security verification code; and the abnormal display of the short message is also achieved, and the shielding of the first message is reached.
上述四种方法中的所述短消息均为第一信息, 且在上述方法中用于屏 蔽第一信息的函数, 还可为其他函数, 不局限于上述函数。 在本申请所提供的几个实施例中, 应该理解到, 所揭露的设备和方 法, 可以通过其它的方式实现。 以上所描述的设备实施例仅仅是示意性 的, 例如, 所述单元的划分, 仅仅为一种逻辑功能划分, 实际实现时可 以有另外的划分方式, 如: 多个单元或组件可以结合, 或可以集成到另 一个系统, 或一些特征可以忽略, 或不执行。 另外, 所显示或讨论的各 组成部分相互之间的耦合、 或直接耦合、 或通信连接可以是通过一些接 口, 设备或单元的间接耦合或通信连接, 可以是电性的、 机械的或其它 形式的。 The short message in the above four methods is the first information, and the function for shielding the first information in the above method may also be other functions, and is not limited to the above function. In the several embodiments provided by the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. The device embodiments described above are only schematic. For example, the division of the unit is only a logical function division. In actual implementation, there may be another division manner, such as: multiple units or components may be combined, or Can be integrated into another system, or some features can be ignored, or not executed. In addition, the coupling, or direct coupling, or communication connection of the components shown or discussed may be indirect coupling or communication connection through some interfaces, devices or units, and may be electrical, mechanical or other forms. of.
上述作为分离部件说明的单元可以是、或也可以不是物理上分开的, 作为单元显示的部件可以是、 或也可以不是物理单元, 即可以位于一个 地方, 也可以分布到多个网络单元上; 可以根据实际的需要选择其中的 部分或全部单元来实现本实施例方案的目的。  The units described above as separate components may or may not be physically separated, and the components displayed as the units may or may not be physical units, that is, may be located in one place or distributed to multiple network units; Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
另外, 在本发明各实施例中的各功能单元可以全部集成在一个处理 模块中, 也可以是各单元分别单独作为一个单元, 也可以两个或两个以 上单元集成在一个单元中;上述集成的单元既可以釆用硬件的形式实现, 也可以釆用硬件加软件功能单元的形式实现。  In addition, each functional unit in each embodiment of the present invention may be integrated into one processing module, or each unit may be separately used as one unit, or two or more units may be integrated into one unit; the above integration The unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
本领域普通技术人员可以理解: 实现上述方法实施例的全部或部分 步骤可以通过程序指令相关的硬件来完成, 前述的程序可以存储于一计 算机可读取存储介质中, 该程序在执行时, 执行包括上述方法实施例的 步骤; 而前述的存储介质包括: 移动存储设备、 只读存储器 (ROM, Read-Only Memory )、随机存取存者器( RAM, Random Access Memory )、 磁碟或者光盘等各种可以存储程序代码的介质。  A person skilled in the art can understand that all or part of the steps of implementing the above method embodiments may be completed by using hardware related to program instructions, and the foregoing program may be stored in a computer readable storage medium, and the program is executed when executed. The foregoing storage medium includes: a mobile storage device, a read-only memory (ROM), a random access memory (RAM), a magnetic disk or an optical disk, and the like. A variety of media that can store program code.
以上所述, 仅为本发明的具体实施方式, 但本发明的保护范围并不 局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内, 可轻易想到变化或替换, 都应涵盖在本发明的保护范围之内。 因此, 本 发明的保护范围应以所述权利要求的保护范围为准。 The above is only a specific embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily think of changes or substitutions within the technical scope of the present invention. It should be covered by the scope of the present invention. Therefore, this The scope of the invention should be determined by the scope of the appended claims.
以上所述, 仅为本发明的较佳实施例而已, 并非用于限定本发明的保 护范围。 凡按照本发明原理所作的修改, 都应当理解为落入本发明的保护 范围。  The above is only the preferred embodiment of the present invention and is not intended to limit the scope of the present invention. Modifications made in accordance with the principles of the invention are understood to fall within the scope of the invention.

Claims

权利要求书 claims
1、 一种信息处理方法, 所述方法包括: 1. An information processing method, the method includes:
检测所述第一电子设备是否与所述第二电子设备已建立连接; Detect whether the first electronic device has established a connection with the second electronic device;
若已建立连接, 提取所述第二电子设备的连接地址, 并判断所述连 接地址与预先存储的绑定地址是否一致; If the connection has been established, extract the connection address of the second electronic device, and determine whether the connection address is consistent with the pre-stored binding address;
若一致, 则接收第一信息。 If they are consistent, the first information is received.
2、 根据权利要求 1所述的方法, 其中, 所述方法还包括: 2. The method according to claim 1, wherein the method further includes:
确定所述第一电子设备与所述第二电子设备依据所述绑定地址已建立 安全绑定; Determining that the first electronic device and the second electronic device have established a secure binding based on the binding address;
所述检测所述第一电子设备是否与所述第二电子设备已建立连接为: 当所述第一电子设备与所述第二电子设备已建立安全绑定时, 检测所 述第一电子设备是否与所述第二电子设备已建立连接。 The step of detecting whether the first electronic device has established a connection with the second electronic device is: when the first electronic device and the second electronic device have established a secure binding, detecting that the first electronic device Whether a connection has been established with the second electronic device.
3、 根据权利要求 2所述的方法, 其特征在于, 所述方法还包括: 在所述第一电子设备与所述第二电子设备未建立连接时、 所述连接地 址与所述预先存储的绑定地址不一致时或确定所述第一电子设备与第二电 子设备未建立安全绑定时, 屏蔽所述第一信息。 3. The method according to claim 2, characterized in that, the method further includes: when the first electronic device and the second electronic device do not establish a connection, the connection address and the pre-stored When the binding addresses are inconsistent or when it is determined that the first electronic device and the second electronic device have not established a secure binding, the first information is blocked.
4、 根据权利要求 2或 3所述的方法, 其中, 所述方法还包括: 在确定所述第一电子设备与第二电子设备未建立安全绑定时, 依据预 先存储的绑定信息及基于第一电子设备与第二电子设备的信息交互, 建立 安全绑定。 4. The method according to claim 2 or 3, wherein the method further includes: when it is determined that the first electronic device and the second electronic device have not established a secure binding, based on the pre-stored binding information and the Information interaction between the first electronic device and the second electronic device establishes a secure binding.
5、 根据权利要求 4所述的方法, 其中, 所述依据预先存储的绑定信息 及基于第一电子设备与第二电子设备的信息交互, 建立安全绑定包括: 依据所述绑定信息向第二电子设备发送连接请求; 5. The method according to claim 4, wherein establishing secure binding based on pre-stored binding information and information interaction between the first electronic device and the second electronic device includes: The second electronic device sends a connection request;
当所述第一电子设备与所述第二电子设备连接建立后, 向所述第二电 子设备发送绑定验证信息; When the connection between the first electronic device and the second electronic device is established, The sub-device sends binding verification information;
接收基于所述绑定验证信息返回的绑定认证信息; Receive binding authentication information returned based on the binding authentication information;
依据所述绑定认证信息形成并记录绑定安全信息; Form and record binding security information based on the binding authentication information;
其中, 所述绑定安全信息为所述确定第一电子设备与第二电子设备已 建立安全连接的依据。 Wherein, the binding security information is the basis for determining that the first electronic device and the second electronic device have established a secure connection.
6、 根据权利要求 5 所述的方法, 其中, 所述方法还包括第一电子设 备与第二电子设备绑定解除步骤: 6. The method according to claim 5, wherein the method further includes the step of unbinding the first electronic device and the second electronic device:
所述绑定解除步骤包括: The binding removal steps include:
接收绑定解除指示; Receive binding release instructions;
检测所述第一电子设备是否与所述第二电子设备安全绑定; Detect whether the first electronic device is securely bound to the second electronic device;
若已安全绑定, 则删除所述绑定信息及所述绑定安全信息。 If it has been securely bound, the binding information and the binding security information are deleted.
7、 根据权利要求 6所述的方法, 其中, 所述绑定解除步骤还包括: 若非安全绑定, 则依据预先存储的绑定信息及基于第一电子设备与第 二电子设备的信息交互, 建立安全绑定; 7. The method according to claim 6, wherein the step of unbinding further includes: if it is not securely bound, based on pre-stored binding information and based on information interaction between the first electronic device and the second electronic device, Establish secure binding;
建立安全绑定后, 重新执行所述绑定解除步骤。 After establishing a secure binding, perform the binding removal steps again.
8、 根据权利要求 1、 2或 3所述的方法, 其中, 所述方法还包括: 在所述第一电子设备与所述第二电子设备未建立连接时, 依照所述绑 定地址建立所述第一电子设备与所述第二电子设备之间的连接。 8. The method according to claim 1, 2 or 3, wherein the method further comprises: when the first electronic device and the second electronic device do not establish a connection, establishing the connection according to the binding address. The connection between the first electronic device and the second electronic device.
9、 根据权利要求 1、 2或 3所述的方法, 其中, 所述第一电子设备为 第二电子设备均为移动电子设备; 9. The method according to claim 1, 2 or 3, wherein the first electronic device and the second electronic device are both mobile electronic devices;
所述第一电子设备与所述第二电子设备通过短距离传输方式建立连 接。 The first electronic device and the second electronic device establish a connection through short-distance transmission.
10、 一种电子设备, 所述电子设备为第一电子设备, 包括: 10. An electronic device, the electronic device being a first electronic device, including:
检测单元, 配置为检测所述第一电子设备是否与所述第二电子设备已 建立连接; 处理单元, 配置为当所述第一电子设备与所述第二电子设备已建立连 接时, 提取所述第二电子设备的连接地址, 并判断所述连接地址与预先存 储的绑定地址是否一致; a detection unit configured to detect whether the first electronic device has established a connection with the second electronic device; The processing unit is configured to extract the connection address of the second electronic device when the first electronic device and the second electronic device have established a connection, and determine whether the connection address is consistent with the pre-stored binding address. ;
接收单元, 配置为当所述第二电子设备的连接地址与预先存储的绑定 地址一致时, 接收第一信息。 The receiving unit is configured to receive the first information when the connection address of the second electronic device is consistent with the pre-stored binding address.
11、 根据权利要求 10所述的电子设备, 其中, 所述电子设备还包括确 定单元; 11. The electronic device according to claim 10, wherein the electronic device further includes a determining unit;
所述确定单元, 配置为确定所述第一电子设备与所述第二电子设备依 据所述绑定地址已建立安全绑定; The determining unit is configured to determine that the first electronic device and the second electronic device have established a secure binding based on the binding address;
所述检测单元, 配置为在确定所述第一电子设备与所述第二电子设备 已依据所述绑定地址建立安全绑定时, 检测所述第一电子设备与所述第二 电子设备是否已建立连接。 The detection unit is configured to detect whether the first electronic device and the second electronic device have established a secure binding based on the binding address when it is determined that the first electronic device and the second electronic device have established a secure binding. Connection established.
12、 根据权利要求 10所述的电子设备, 其中, 12. The electronic device according to claim 10, wherein,
所述接收单元, 还配置为在所述第一电子设备与所述第二电子设备未 建立连接时、 所述连接地址与所述预先存储的绑定地址不一致时或确定所 述第一电子设备与第二电子设备未建立安全绑定时, 屏蔽所述第一信息。 The receiving unit is further configured to determine whether the first electronic device is connected to the first electronic device when the connection is not established, when the connection address is inconsistent with the pre-stored binding address, or when the first electronic device is not connected to the second electronic device. When no security binding is established with the second electronic device, the first information is blocked.
13、 根据权利要求 10、 11或 12所述的电子设备, 其中, 所述第一电 子设备还包括: 13. The electronic device according to claim 10, 11 or 12, wherein the first electronic device further includes:
绑定单元, 配置为当所述第一电子设备与所述第二电子设备为未安全 绑定时, 依据预先存储的绑定信息及基于第一电子设备与第二电子设备的 信息交互, 建立安全绑定。 The binding unit is configured to, when the first electronic device and the second electronic device are not securely bound, establish based on the pre-stored binding information and based on the information interaction between the first electronic device and the second electronic device. Secure binding.
14、 根据权利要求 13所述的电子设备, 其中, 所述第一电子设备还包 括发送单元; 14. The electronic device according to claim 13, wherein the first electronic device further includes a sending unit;
所述发送单元, 配置为依据所述绑定信息向第二电子设备发送连接请 求; 当所述第一电子设备与所述第二电子设备连接建立后, 向所述第二电 子设备发送绑定验证信息; The sending unit is configured to send a connection request to the second electronic device according to the binding information; when the connection between the first electronic device and the second electronic device is established, The sub-device sends binding verification information;
所述接收单元, 配置为接收基于所述绑定验证信息返回的绑定认证信 息; The receiving unit is configured to receive binding authentication information returned based on the binding authentication information;
所述绑定单元, 配置为依据所述绑定认证信息形成并记录绑定安全信 息; The binding unit is configured to form and record binding security information based on the binding authentication information;
其中, 所述绑定安全信息为所述确定第一电子设备与第二电子设备已 建立安全连接的依据。 Wherein, the binding security information is the basis for determining that the first electronic device and the second electronic device have established a secure connection.
15、 根据权利要求 14所述的电子设备, 其中, 所述第一电子设备还包 括输入单元; 15. The electronic device according to claim 14, wherein the first electronic device further includes an input unit;
所述输入单元, 还配置为接收绑定解除指示; The input unit is also configured to receive a binding release instruction;
所述检测单元, 还配置为在接收到所述绑定解除指示时, 检测所述第 一电子设备是否与所述第二电子设备已建立安全绑定; The detection unit is further configured to detect whether the first electronic device and the second electronic device have established a secure binding when receiving the binding release instruction;
所述绑定单元, 还配置为在所述第一电子设备与所述第二电子设备已 建立安全绑定时, 删除所述绑定信息及所述绑定安全信息。 The binding unit is also configured to delete the binding information and the binding security information when the first electronic device and the second electronic device have established a secure binding.
16、 根据权利要求 15所述的电子设备, 其中, 16. The electronic device according to claim 15, wherein,
所述绑定单元, 还配置为在所述输入单元接收到绑定解除指示, 所述 检测单元检测到第一电子设备与所述第二电子设备之间未建立安全绑定 时, 依据预先存储的绑定信息及基于第一电子设备与第二电子设备的信息 交互, 建立安全绑定; The binding unit is further configured to: when the input unit receives a binding release instruction and the detection unit detects that no secure binding has been established between the first electronic device and the second electronic device, The binding information and the information interaction between the first electronic device and the second electronic device are used to establish a secure binding;
所述绑定单元, 还配置为在绑定解除中第一电子设备与第二电子设备 建立安全绑定后, 解除所述第一电子设备与第二电子设备之间的绑定。 The binding unit is further configured to release the binding between the first electronic device and the second electronic device after the first electronic device and the second electronic device establish a secure binding in the binding release.
17、 根据权利要求 10、 11或 12所述的电子设备, 其中, 所述第一电 子设备还包括连接单元; 17. The electronic device according to claim 10, 11 or 12, wherein the first electronic device further includes a connection unit;
所述连接单元, 还配置为在所述第一电子设备与所述第二电子设备未 建立连接时, 依照所述绑定地址建立所述第一电子设备与所述第二电子设 备之间的连接。 The connection unit is further configured to establish a connection between the first electronic device and the second electronic device according to the binding address when the first electronic device and the second electronic device have not established a connection. connections between devices.
18、 根据权利要 10、 11或 12所述的电子设备, 其中, 所述第一电子 设备为第二电子设备均为移动电子设备; 18. The electronic device according to claim 10, 11 or 12, wherein the first electronic device and the second electronic device are both mobile electronic devices;
所述第一电子设备与所述第二电子设备通过短距离传输方式建立连 接。 The first electronic device and the second electronic device establish a connection through short-distance transmission.
19、 一种计算机存储介质, 所述计算机存储介质存储有计算机可执行 指令, 所述计算机可执行指令用于执行权利要求 1至 9任一项所述的方法。 19. A computer storage medium that stores computer-executable instructions, and the computer-executable instructions are used to execute the method described in any one of claims 1 to 9.
PCT/CN2014/081902 2014-04-17 2014-07-09 Information processing method, electronic devices, and computer storage medium WO2015158046A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410155942.7 2014-04-17
CN201410155942.7A CN105022951A (en) 2014-04-17 2014-04-17 Information processing method and electronic equipment

Publications (1)

Publication Number Publication Date
WO2015158046A1 true WO2015158046A1 (en) 2015-10-22

Family

ID=54323435

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/081902 WO2015158046A1 (en) 2014-04-17 2014-07-09 Information processing method, electronic devices, and computer storage medium

Country Status (2)

Country Link
CN (1) CN105022951A (en)
WO (1) WO2015158046A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105516889A (en) * 2015-11-23 2016-04-20 深圳还是威健康科技有限公司 Bluetooth connection method and terminal
CN105550568B (en) * 2015-12-25 2019-03-15 小米科技有限责任公司 The method and device of mobile terminal data protection
CN107801174A (en) * 2017-11-09 2018-03-13 广东小天才科技有限公司 A kind of apparatus bound method and apparatus
CN110620847B (en) * 2019-10-21 2022-08-30 深圳传音控股股份有限公司 Anti-theft method of intelligent terminal and intelligent terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060128305A1 (en) * 2003-02-03 2006-06-15 Hamid Delalat Wireless security system
CN101252376A (en) * 2008-03-27 2008-08-27 宇龙计算机通信科技(深圳)有限公司 System and method for connecting blue tooth equipment and mobile communication terminal thereof
CN102034053A (en) * 2010-12-31 2011-04-27 中山大学 Computer user terminal authentication method
CN102693503A (en) * 2012-05-08 2012-09-26 北京工业大学 Transmission method and processing system for transaction information and transceiver apparatus

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102184352A (en) * 2011-03-16 2011-09-14 东南大学 Automatic protecting method for computer system based on Bluetooth device authentication
CN102932037A (en) * 2012-10-15 2013-02-13 天地融科技股份有限公司 Method and system for establishing connection between Bluetooth key and terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060128305A1 (en) * 2003-02-03 2006-06-15 Hamid Delalat Wireless security system
CN101252376A (en) * 2008-03-27 2008-08-27 宇龙计算机通信科技(深圳)有限公司 System and method for connecting blue tooth equipment and mobile communication terminal thereof
CN102034053A (en) * 2010-12-31 2011-04-27 中山大学 Computer user terminal authentication method
CN102693503A (en) * 2012-05-08 2012-09-26 北京工业大学 Transmission method and processing system for transaction information and transceiver apparatus

Also Published As

Publication number Publication date
CN105022951A (en) 2015-11-04

Similar Documents

Publication Publication Date Title
JP6135963B2 (en) Method, terminal, server, and system for sharing a virtual SIM card among a plurality of terminals
JP6914275B2 (en) Payment authentication methods, devices, and systems for in-vehicle terminals
US11488234B2 (en) Method, apparatus, and system for processing order information
KR101693130B1 (en) Information interaction method and device
EP3358805B1 (en) Systems and methods for provisioning a camera with a dynamic qr code and a ble connection
ES2884172T3 (en) Audio broadcasting procedure, device and system and intelligent broadcasting apparatus
EP2989601B1 (en) Secure voice transactions
KR101402960B1 (en) System and method for preventing abuse urgent call using smart phone
TW201516907A (en) Authentication for application
CN109146470A (en) Generate the method and device of payment code
WO2010057405A1 (en) Identity authentication method using short messages
CN101155212A (en) Method for limiting use of mobile terminal
CN101163290A (en) Method of limiting use of mobile terminal through machine-card mutual authentication
CN111512618B (en) Electronic device for transmitting and receiving message including emoticon and control method thereof
WO2015158046A1 (en) Information processing method, electronic devices, and computer storage medium
JP2018533864A (en) Remote control method, device and portable terminal
JP6752013B2 (en) Hearing devices with service modes and related methods
CN110167192B (en) Bluetooth connection management method and device, electronic equipment and non-transient storage medium
EP3226128B1 (en) Method and device for online payment
JP6397046B2 (en) Address book protection method, apparatus and communication system
KR20200028827A (en) Method for uwb transaction and electronic device therefor
EP3154287B1 (en) Method, apparatus and system for authorizing, by a remote server, short-range wireless communication between a peripheral device and a terminal
CN110278083A (en) ID authentication request treating method and apparatus, equipment replacement method and apparatus
CN107172618B (en) Device pairing method
KR20200050813A (en) Payment method using biometric authentication and electronic device thereof

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14889567

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14889567

Country of ref document: EP

Kind code of ref document: A1