WO2018176781A1 - 信息发送方法、信息接收方法、装置及系统 - Google Patents

信息发送方法、信息接收方法、装置及系统 Download PDF

Info

Publication number
WO2018176781A1
WO2018176781A1 PCT/CN2017/104580 CN2017104580W WO2018176781A1 WO 2018176781 A1 WO2018176781 A1 WO 2018176781A1 CN 2017104580 W CN2017104580 W CN 2017104580W WO 2018176781 A1 WO2018176781 A1 WO 2018176781A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
terminal device
ciphertext
asymmetric
symmetric key
Prior art date
Application number
PCT/CN2017/104580
Other languages
English (en)
French (fr)
Inventor
朱忠磊
Original Assignee
广东欧珀移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 广东欧珀移动通信有限公司 filed Critical 广东欧珀移动通信有限公司
Priority to EP17903570.4A priority Critical patent/EP3605989B1/en
Priority to ES17903570T priority patent/ES2836114T3/es
Publication of WO2018176781A1 publication Critical patent/WO2018176781A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Definitions

  • the embodiments of the present invention relate to the field of mobile terminals, and in particular, to an information sending method, an information receiving method, an apparatus, and a system.
  • the Find Phone feature is an accessibility feature available on your smartphone. When the user cannot find the mobile phone at home or the mobile phone is lost, at least one of the operations of locating, ringing, locking the mobile phone or erasing the mobile phone by finding the mobile phone function.
  • Finding phone features requires the user to turn them on or off manually.
  • the user enters a user account and password on the mobile phone, and the mobile phone encrypts the user account, password, and mobile phone identity using a symmetric key, and sends the encrypted user account, password, and mobile phone identity.
  • the server After the server decrypts the user account, password, and mobile phone ID using the symmetric key, it verifies whether the user account and the password match; when the user account and the password match, the server binds the user account and the mobile phone identifier to the mobile phone. Open the phone function.
  • the mobile phone identifier can be represented by an IMEI (International Mobile Equipment Identity).
  • the embodiment of the present application provides an information sending method, an information receiving method, an apparatus, and a system.
  • an embodiment of the present application provides a method for sending information, where the method includes:
  • an information receiving method comprising:
  • the first ciphertext information is decrypted by using the symmetric key to obtain plaintext information.
  • an embodiment of the present application provides an information sending apparatus, where the apparatus includes:
  • An obtaining module configured to obtain plaintext information to be sent
  • An encryption module configured to encrypt the plaintext information by using the symmetric key to obtain first ciphertext information
  • the obtaining module is further configured to acquire an asymmetric cryptographic public key
  • the cryptographic module is further configured to encrypt the symmetric key by using the asymmetric cryptographic public key to obtain second ciphertext information;
  • a sending module configured to send the first ciphertext information and the second ciphertext information to a service device, where the service device stores an asymmetric encrypted private key corresponding to the asymmetric cryptographic public key.
  • an information receiving apparatus comprising:
  • a receiving module configured to receive first ciphertext information and second ciphertext information
  • An obtaining module configured to obtain an asymmetric encryption private key
  • a decryption module configured to decrypt the second ciphertext information by using the asymmetric encryption private key to obtain a symmetric key
  • the decrypting module is configured to decrypt the first ciphertext information by using the symmetric key to obtain plaintext information.
  • a terminal device comprising: a processor and a memory, the memory storing one or more computer programs, the processor implementing the computer program to implement the following steps:
  • a service device comprising: a processor and a memory, the memory storing one or more computer programs, the processor implementing the computer program to implement the following steps:
  • a seventh aspect provides an information transceiving system, the system comprising: a terminal device and a service device;
  • the terminal device includes the information transmitting apparatus according to the third aspect, the service device comprising the information receiving apparatus according to the fourth aspect;
  • the terminal device is the terminal device according to the fifth aspect
  • the service device is the service device according to the sixth aspect
  • a computer readable medium on which a computer program is stored, and when executed by the processor, the following steps are performed: acquiring plaintext information to be sent;
  • a computer readable medium having stored thereon a computer program that, when executed by a processor, implements the following steps:
  • the first ciphertext information is decrypted by using the symmetric key to obtain plaintext information.
  • FIG. 1 is a schematic structural diagram of an information transceiving system provided by an exemplary embodiment of the present application
  • FIG. 2 is a flowchart of a method for sending an information provided by an exemplary embodiment of the present application
  • FIG. 3 is a flowchart of a method for sending an information provided by another exemplary embodiment of the present application.
  • FIG. 4A is a schematic diagram of an interface of an information sending method provided by an exemplary embodiment of the present application.
  • FIG. 4B is a schematic diagram of encryption and decryption of an information sending method provided by an exemplary embodiment of the present application.
  • 4C is a schematic diagram of an interface when an information sending method provided by an exemplary embodiment of the present application is implemented;
  • FIG. 5 is a structural block diagram of an information transmitting apparatus according to an exemplary embodiment of the present application.
  • FIG. 6 is a structural block diagram of an information receiving apparatus according to another exemplary embodiment of the present application.
  • FIG. 7 is a structural block diagram of a terminal device according to an exemplary embodiment of the present application.
  • FIG. 8 is a structural block diagram of a service device according to another exemplary embodiment of the present application.
  • Symmetric encryption means that the encryption party and the decryption party have the same encryption key X. After the encrypting party encrypts the plaintext information using the encryption key X, the decrypting party decrypts the plaintext information using the same encryption key X. Once the encryption key X is compromised, the malicious person can decrypt the plaintext information.
  • the asymmetric cryptographic public key refers to the public key, which does not need to be kept secret.
  • the decryption party can obtain it through various channels; the asymmetric cryptographic private key (referred to as the private key) refers to only the cryptographic party itself. Some keys need to be kept secret.
  • a public key corresponds to a private key; the public key and the private key together form an asymmetric encryption method.
  • the asymmetric encryption method means that the plaintext information encrypted by the public key can only be decrypted by using the corresponding private key, and the plaintext information encrypted by the private key can only be decrypted by using the corresponding public key. That is, the keys used for encryption and decryption are different.
  • the encrypting party wants to send the ciphertext information to the decrypting party
  • the encrypting party first needs to obtain the public key corresponding to the decrypting party, and then encrypts the plaintext information by using the public key corresponding to the decrypting party, and then sends the ciphertext information to
  • the decryption party After the decryption party receives the ciphertext information sent by the encryption party, the decryption party must use the private key corresponding to the decryption party to decrypt the ciphertext information and obtain the plaintext information. Since the private key corresponding to the decrypting party is owned by the decrypting party only, the ciphertext information sent by the encrypting party is safe.
  • the terminal device When the user cannot find the terminal device at home or the terminal device is lost, at least one of positioning, ringing, locking, or erasing the data is performed on the terminal device by searching for the device function.
  • the terminal device When the terminal device is a mobile phone, it can be called a lookup mobile phone service; when the terminal device is a tablet computer, it can be called a find tablet service.
  • the present application provides the following embodiments:
  • FIG. 1 is a schematic structural diagram of an information transceiving system provided by an exemplary embodiment of the present application.
  • the information transceiving system includes: at least one terminal device 120 and a service device 140.
  • the terminal device 120 can be a mobile phone, a tablet computer, an e-book reader, an MP3 (Moving Picture Experts Group Audio Layer III) player, and an MP4 (Moving Picture Experts Group Audio Layer IV). Compress standard audio layers 4) players, laptops and desktop computers, and more.
  • MP3 Motion Picture Experts Group Audio Layer III
  • MP4 Motion Picture Experts Group Audio Layer IV
  • the terminal device 120 is provided with a positioning module, which may be an iBeacon positioning module, a GPS (Global Positioning System) positioning module, and a WIFI (Wireless Fidelity) network positioning. At least one of a module and a base station positioning module.
  • the terminal device 120 has the ability to locate the geographic location in which it is located to implement the location function in the device function.
  • the terminal device 120 also has a speaker, and the terminal device 120 has the ability to ring according to a control command to implement a ringing function in the function of the checking device.
  • an application for implementing the function of finding a device is installed in the terminal device 120.
  • an asymmetric cryptographic public key corresponding to the service device 140 is stored in the terminal device 120.
  • the asymmetric cryptographic public key stored in each terminal device 120 may be Same or different.
  • the asymmetric cryptographic public key stored in each terminal device 120 is the same.
  • the wireless network includes: a data network in mobile communication (ie, packet data domain PS) or a short message network in mobile communication (ie, circuit domain CS).
  • the service device 140 is a server for providing background services to the terminal device 120, such as looking up a mobile phone service, a data service, or other services.
  • the service device 140 stores an asymmetric encrypted private key corresponding to the asymmetric encrypted public key.
  • the asymmetric encrypted private key is one or more.
  • the asymmetric encryption private key stored in the service device 140 is used as an example.
  • the terminal device 120 is considered to be a first device or an encryption device or an information transmitting device or an information transmitting device
  • the service device 140 is considered to be a second device or a decrypting device or an information receiving device or an information receiving device.
  • the terminal device and/or the service device may be implemented as other devices, for example, the terminal device is a tablet computer, the service device is a storage service device, and the terminal device is a mobile phone, and the service device is a router or a host. This embodiment of the present application does not limit this.
  • FIG. 2 shows a flowchart of a method for transmitting information provided by an exemplary embodiment of the present application.
  • This embodiment is exemplified by applying the method to the information transceiving system shown in FIG. 1.
  • the method includes:
  • Step 201 The terminal device acquires plaintext information to be sent.
  • the terminal device obtains the plaintext information to be sent, and the plaintext information may be any information.
  • Step 202 The terminal device generates a symmetric key.
  • the symmetric key is not stored in the initial state of the terminal device, and the symmetric key is generated in real time when the symmetric key needs to be used.
  • the step 202 may be performed before or at the same time.
  • the embodiment of the present application does not limit the execution relationship of the two steps, and does not exclude the implementation manner in which the terminal device stores the symmetric key in advance.
  • Step 203 The terminal device encrypts the plaintext information by using a symmetric key to obtain the first ciphertext information.
  • Step 204 The terminal device acquires an asymmetric cryptographic public key, and encrypts the symmetric key by using an asymmetric cryptographic public key to obtain second ciphertext information.
  • the asymmetric cryptographic public key has a corresponding asymmetric cryptographic private key
  • the service device stores an asymmetric cryptographic private key corresponding to the asymmetric cryptographic public key.
  • the ciphertext encrypted by the asymmetric cryptographic public key needs to be decrypted by the corresponding asymmetric cryptographic private key.
  • Step 205 The terminal device sends the first ciphertext information and the second ciphertext information.
  • Step 206 The service device receives the first ciphertext information and the second ciphertext information.
  • Step 207 The service device acquires an asymmetric encrypted private key.
  • the asymmetric encryption private key is pre-stored in the service device.
  • Step 208 The service device decrypts the second ciphertext information by using an asymmetric encryption private key to obtain a symmetric key.
  • Step 209 The service device decrypts the first ciphertext information by using a symmetric key to obtain plaintext information.
  • the first ciphertext information is obtained by encrypting the plaintext information by using a symmetric key; and symmetrically using an asymmetric cryptographic public key pair
  • the key is encrypted to obtain the second ciphertext information; so that even if the asymmetric cryptographic public key in the mobile phone is leaked, due to the characteristics of asymmetric cryptography, the malicious person cannot decrypt the symmetric key, and the plaintext information cannot be decrypted, thereby ensuring Security when interacting information between the terminal device and the service device.
  • FIG. 3 is a flowchart of a method for transmitting information provided by another exemplary embodiment of the present application. This embodiment is exemplified by applying the method to the information transmitting system shown in FIG. 1.
  • the method includes:
  • Step 301 The terminal device sends a login request to the service device by using an encrypted connection, where the login request carries a user account and a password;
  • the terminal device establishes an https encrypted connection with the service device when it needs to communicate with the service device. Then, the terminal device generates a login request using the pre-registered user account and password, and transmits a login request to the service device.
  • the user inputs the user account zhangsan@xxx.com and the password in the input box 41 in the login interface, and then clicks the "login" button 42, the terminal sends a login request to the service device. .
  • the service device receives the login request sent by the terminal through the encrypted connection.
  • Step 302 The service device verifies the user account and the password, and after the verification succeeds, feeds back the login token to the terminal device.
  • a token is a digital token that is assigned to a terminal by a service device when the login is successful.
  • the login token usually has an expiration date (for example, within 10 minutes).
  • the terminal device subsequently communicates with the service device, the login token needs to be carried in the information, so that the service device recognizes that the terminal is in a valid login state.
  • each login token also has a corresponding expiration date.
  • Table 1 schematically shows the correspondence.
  • the terminal device stores the login token.
  • the terminal device After receiving the login token, the terminal device successfully logs in. Referring to the right side diagram of FIG. 4A, the terminal device jumps from the login interface to the open search for the mobile phone interface. If the user wishes to open the search device function, click the “Open Phone Search” button 43 when the search for the mobile phone interface is opened.
  • Step 303 The terminal device acquires at least one registration information for opening a function of searching for a terminal device, where the at least one registration information includes at least one of a login password, a device identifier, a mobile phone number, and a login token.
  • the terminal device After the user clicks the "open the check phone” button, the terminal device obtains at least one registration information for opening the function of the search device according to the click operation, and the at least one registration information includes: a login password, a device identifier, a mobile phone number, and a login token. At least one of them.
  • the device identifier is used to identify the terminal device (that is, the first device is identified).
  • the device identifier may be an IMEI (International Mobile Equipment Identity);
  • the mobile phone number is The mobile phone number used by the terminal device, the mobile phone number is used to realize the communication in the form of short message between the terminal device and the service device during the use of the function of finding the device;
  • the login token is allocated when the login password is successfully registered.
  • this embodiment is exemplified by the registration information including the above four types of information.
  • Step 304 The terminal device generates, according to at least one piece of registration information, plaintext information to be sent.
  • the terminal device encapsulates the foregoing four types of information into one piece of plaintext information.
  • Step 305 The terminal device generates a symmetric key.
  • the terminal device generates a symmetric key corresponding to the current opening operation. That is, the symmetric key is dynamically generated each time the mobile phone is checked. Different opening operations correspond to different symmetric keys, or there are different symmetric keys corresponding to at least two opening operations.
  • the terminal device generates a symmetric key corresponding to the current time period. That is, a symmetric key is dynamically generated for each time period. Different time segments correspond to different symmetric keys, or there are different symmetric keys corresponding to at least two time segments.
  • the terminal device generates a symmetric key corresponding to the current communication flow. That is, each communication process dynamically generates a symmetric key. Different communication flows correspond to different symmetric keys, or there are different symmetric keys corresponding to two communication flows.
  • the terminal device does not store the symmetric key in advance, only stores the symmetric key generation algorithm, and generates the symmetric key in real time when the symmetric key needs to be used, so as to reduce the risk that the symmetric key is leaked.
  • step 303 may be performed prior to step 302, or performed prior to step 301, or concurrently with step 302, or concurrently with step 301.
  • Step 306 The terminal device encrypts the plaintext information by using a symmetric key to obtain the first ciphertext information.
  • the terminal device encrypts the plaintext information X by using the symmetric key K1 to obtain the first ciphertext information S1.
  • Step 307 The terminal device acquires an asymmetric cryptographic public key corresponding to the service device.
  • the asymmetric encryption public key K2 is pre-stored in the operating system (or lookup mobile application) of the terminal device.
  • the terminal device stores an asymmetric encryption public key K2 at the time of shipment.
  • the service device may send system update information to the terminal device, where the system update information carries an asymmetric encryption public key; the terminal device receives system update information sent by the service device, and obtains an asymmetric from the system update information. Encrypt the public key.
  • the system update information can be delivered by using OTA (Over the Air Technology).
  • Step 308 The terminal device encrypts the symmetric key by using an asymmetric encryption public key to obtain second ciphertext information.
  • the terminal device encrypts the symmetric key K1 by using the asymmetric encryption public key K2 to obtain the second ciphertext information S2.
  • the encryption process of the first ciphertext information and the encryption process of the second ciphertext information are mutually Independent of each other, two encryption processes can be performed side by side, or one encryption process can be performed before another encryption process.
  • Step 309 The terminal device sends the first ciphertext information and the second ciphertext information to the service device.
  • the terminal device sends the first ciphertext information S1 and the second ciphertext information S2 to the service device at the same time; in another embodiment, the terminal device sets the first ciphertext information S1 and the second ciphertext information. S2 is sent to the service device separately.
  • the terminal device transmits the first ciphertext information S1 and the second ciphertext information S2 to the service device through a pre-established encrypted connection.
  • the encrypted connection is an https encrypted connection.
  • Step 310 The service device receives the first ciphertext information and the second ciphertext information.
  • the service device simultaneously receives the first ciphertext information S1 and the second ciphertext information S2; in another embodiment, the service device receives the first ciphertext information S1 and the second ciphertext information S2, respectively.
  • the service device receives the first ciphertext information S1 and the second ciphertext information S2 over a pre-established encrypted connection.
  • Step 311 The service device acquires an asymmetric encrypted private key.
  • the service device obtains an internally stored asymmetric encrypted private key K3.
  • Step 312 The service device decrypts the second ciphertext information by using an asymmetric encryption private key to obtain a symmetric key.
  • the service device decrypts the second ciphertext information K2 using the asymmetric encryption private key K3 to obtain a symmetric key K1.
  • Step 313 The service device decrypts the first ciphertext information by using a symmetric key to obtain plaintext information, where the plaintext information includes at least one of a login password, a device identifier, a mobile phone number, and a login token.
  • the service device decrypts the first ciphertext information S1 by using the symmetric key K1 to obtain the plaintext information X.
  • the plaintext information X includes at least one piece of information for opening a function of finding a device.
  • Step 314 The service device verifies whether the login token matches the login password.
  • the service device stores a correspondence between a user account, a login password, and a login token. Schematically, the correspondence is shown in Table 1.
  • the service device verifies whether the received login token and the login password match according to the correspondence between the login password and the login token. If yes, go to step 315; if there is no match, feed back the failure indication to the terminal device. Correspondingly, the terminal device receives and displays the activation failure prompt.
  • Step 315 When the login token matches the login password, verify whether the login token is within the validity period;
  • the service device When the login token matches the login password, the service device also needs to verify that the login token is within the validity period at the current time. If it is within the expiration date, the process proceeds to step 316; if the expiration date is exceeded, the opening failure prompt is fed back to the terminal device, and correspondingly, the terminal device receives and displays the activation failure prompt.
  • step 314 and step 315 may be interchanged or performed simultaneously.
  • Step 316 Establish a binding relationship between the device identifier and the mobile phone number when the login token is in the valid period.
  • the service device opens the function of finding the device for the terminal device, and establishes a binding relationship between the user account, the device identifier, and the mobile phone number.
  • Table 2 schematically shows the binding relationship.
  • the terminal device jumps from the open search mobile phone interface to the search for the mobile phone function interface, and the search mobile phone function interface provides the location of the searched mobile phone in the map. Display, the name of the mobile phone being searched for "Zhang San's mobile phone” and the status "online", and the distance between the current console and the searched mobile phone is "100 meters”. If the user wants to lock the "Zhang San's mobile phone", then A lock command can be sent to the service device by clicking the "lock” button 44.
  • the terminal device sends a lock instruction to the service device, only the symmetric key is used for encryption; or the terminal device encrypts the lock instruction by using the same encryption method as the registration information.
  • the first ciphertext information is obtained by encrypting the plaintext information by using a symmetric key; and the asymmetric cryptographic public key pair is used.
  • the symmetric key is encrypted to obtain the second ciphertext information; so that even if the asymmetric cryptographic public key in the mobile phone is leaked, due to the characteristics of asymmetric cryptography, the malicious person cannot decrypt the symmetric key, and the plaintext information cannot be decrypted, thereby ensuring Security when interacting between devices.
  • the communication between the terminal device and the serving device is secure as long as the asymmetric encrypted private key in the serving device is not compromised.
  • each symmetric key is made The key is only valid for a period of time, which increases the communication security between the terminal device and the service device.
  • the terminal device and the service device can continue to use the same symmetric key during a period of “opening the search device function ⁇ turning off the search device function”.
  • the key encrypts the information, which reduces the calculation amount of the terminal device that needs to generate the symmetric key, and reduces the calculation amount of the terminal device.
  • the terminal device when the terminal device generates the symmetric key once for each time period, since the time at which the terminal device uses the lookup device function each time is random, the symmetric key generated each time the device function is used is used.
  • the key is undefined.
  • the symmetric key is not only random at the time of generation but also random in use time, thereby enhancing the security of the symmetric key.
  • the terminal device and the service device when the terminal device generates a symmetric key for each communication flow, the terminal device and the service device continuously encrypt the information using the same symmetric key in a single communication flow, thereby reducing the need for the terminal device to generate.
  • the calculation amount of the symmetric key; in the adjacent two communication flows, the information is encrypted by using different symmetric keys to ensure the communication security between the terminal device and the service device.
  • the communication security between the terminal device and the service device is further increased due to the use of an https encrypted connection between the terminal device and the service device.
  • the service device is configured to provide services for at least two terminal devices, and at least two terminal devices store the same asymmetric encrypted public key, and The service device stores an asymmetric encrypted private key corresponding to the asymmetric encrypted public key.
  • each terminal device uses double encryption to communicate with the service device.
  • the symmetric keys used by each terminal device can be different, thereby ensuring communication between each terminal device and the service device, which is very safe. Even if the symmetric key of one of the terminals is leaked for any possible reason, it will not affect the communication security of other terminals.
  • the asymmetric cryptographic public key and the asymmetric cryptographic private key may be interchanged, that is, in the encryption process, encrypted by an asymmetric cryptographic private key; in the decryption process, the asymmetric cryptographic public key is used. Decrypt.
  • FIG. 5 is a structural block diagram of an information transmitting apparatus provided by an exemplary embodiment of the present application.
  • the information transmitting apparatus can be implemented as all or part of the terminal device by software, hardware, or a combination of both.
  • the information sending apparatus includes: an obtaining module 510, a generating module 520, and adding The secret module 530 and the transmitting module 540.
  • the obtaining module 510 is configured to implement the functions of step 201, step 303, step 307 and other at least one obtaining step explicitly or implicitly in the foregoing method embodiment.
  • the generating module 520 is configured to implement the functions of step 202, step 304, step 305 and other at least one generating step explicitly or implicitly in the foregoing method embodiments.
  • the cryptographic module 530 is configured to implement the functions of step 203, step 204, step 306, and step 306 in the foregoing method embodiments, and other at least one encryption step explicitly or implicitly.
  • the sending module 540 is configured to implement the functions of step 205, step 301, and step 309 in the foregoing method embodiment, and at least one sending step explicitly or implicitly.
  • the information sending apparatus further includes a receiving module, configured to implement the function of step 302 and other explicit or implicit at least one receiving step in the foregoing method embodiment.
  • FIG. 6 is a structural block diagram of an information receiving apparatus provided by an exemplary embodiment of the present application.
  • the information receiving device can be implemented as all or part of the service device by software, hardware or a combination of both.
  • the information receiving apparatus includes: a receiving module 610, an obtaining module 620, and a decrypting module 630.
  • the receiving module 610 is configured to implement the functions of step 206, step 301, step 310 and other explicit or implicit at least one receiving step in the foregoing method embodiments.
  • the obtaining module 620 is configured to implement the functions of step 207, step 311, and other at least one obtaining step explicitly or implicitly in the foregoing method embodiments.
  • the decryption module 630 is configured to implement the functions of step 208, step 209, step 312, step 313 and other at least one decryption step explicitly or implicitly in the foregoing method embodiments.
  • the device further includes: a verification module 640, a binding module 650, and a receiving module 660.
  • the verification module 640 is configured to implement the functions of step 208, step 209, step 312, step 313 and other explicit or implicit at least one verification step in the foregoing method embodiments.
  • the binding module 650 is configured to implement the functions of step 316 and other explicit or implicit at least one binding step in the foregoing method embodiments.
  • the sending module 660 is configured to implement the functions of step 302 and other explicit or implicit at least one sending step in the foregoing method embodiments.
  • the information transmitting apparatus provided by the above embodiment is at the time of encryption and the information receiving apparatus.
  • decryption only the division of each of the above functional modules is illustrated.
  • the above function assignments may be completed by different functional modules as needed, that is, the internal structure of the device is divided into different functional modules to complete the above. All or part of the function described.
  • the first device and the second device provided by the foregoing embodiments are in the same concept as the corresponding method embodiments, and the specific implementation process is described in detail in the method embodiment, and details are not described herein again.
  • FIG. 7 is a schematic structural diagram of a terminal device provided by an exemplary embodiment of the present application.
  • the terminal device may be used to implement the information sending method or the information receiving method provided in the foregoing embodiment. Specifically:
  • the terminal device 700 may include an RF (Radio Frequency) circuit 710, a memory 720 including one or more computer readable storage media, an input unit 730, a display unit 740, a sensor 750, an audio circuit 760, and a WiFi (wireless fidelity, Wireless Fidelity module 760, a processor 780 including one or more processing cores, and a power supply 790 and the like.
  • RF Radio Frequency
  • the RF circuit 710 can be used for transmitting and receiving information or during a call, and receiving and transmitting the signal. Specifically, after receiving the downlink information of the base station, the downlink information is processed by one or more processors 780. In addition, the data related to the uplink is sent to the base station. .
  • the RF circuit 710 includes, but is not limited to, an antenna, at least one amplifier, a tuner, one or more oscillators, a Subscriber Identity Module (SIM) card, a transceiver, a coupler, an LNA (Low Noise Amplifier). , duplexer, etc.
  • RF circuitry 710 can also communicate with the network and other devices via wireless communication.
  • the wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System of Mobile communication), GPRS (General Packet Radio Service), CDMA (Code Division Multiple Access). , Code Division Multiple Access), WCDMA (Wideband Code Division Multiple Access), LTE (Long Term Evolution), e-mail, SMS (Short Messaging Service), and the like.
  • GSM Global System of Mobile communication
  • GPRS General Packet Radio Service
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • LTE Long Term Evolution
  • e-mail Short Messaging Service
  • the memory 720 can be used to store software programs and modules, and the processor 780 executes various functional applications and data processing by running software programs and modules stored in the memory 720.
  • the memory 720 can mainly include a storage program area and a storage data area, wherein the storage program area can store an operating system, At least one function required application (such as a sound playing function, an image playing function, etc.); the storage data area can store data (such as audio data, phone book, etc.) created according to the use of the terminal device 700.
  • memory 720 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, memory 720 can also include a memory controller to provide access to memory 720 by processor 780 and input unit 730.
  • the input unit 730 can be configured to receive input numeric or character information and to generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function controls.
  • input unit 730 can include touch-sensitive surface 731 as well as other input devices 732.
  • Touch-sensitive surface 731 also referred to as a touch display or trackpad, can collect touch operations on or near the user (eg, the user uses a finger, stylus, etc., any suitable object or accessory on touch-sensitive surface 731 or The operation near the touch-sensitive surface 731) and driving the corresponding connecting device according to a preset program.
  • the touch-sensitive surface 731 can include two portions of a touch detection device and a touch controller.
  • the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
  • the processor 780 is provided and can receive commands from the processor 780 and execute them.
  • the touch-sensitive surface 731 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves.
  • the input unit 730 can also include other input devices 732.
  • other input devices 732 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
  • Display unit 740 can be used to display information entered by the user or information provided to the user and various graphical user interfaces of terminal device 700, which can be composed of graphics, text, icons, video, and any combination thereof.
  • the display unit 740 can include a display panel 741.
  • the display panel 741 can be configured in the form of an LCD (Liquid Crystal Display), an OLED (Organic Light-Emitting Diode), or the like.
  • the touch-sensitive surface 731 can cover the display panel 741, and when the touch-sensitive surface 731 detects a touch operation thereon or nearby, it is transmitted to the processor 780 to determine the type of touch event, and then the processor 780 according to the touch event The type provides a corresponding visual output on display panel 741.
  • touch-sensitive surface 731 and display panel 741 are implemented as two separate components to implement input and input functions, in some embodiments, touch-sensitive surface 731 can be integrated with display panel 741 for input. And output function.
  • the terminal device 700 may further include at least one type of sensor 750, such as a light sensor, a motion sensor And other sensors.
  • the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 741 according to the brightness of the ambient light, and the proximity sensor may close the display panel 741 when the terminal device 700 moves to the ear. And / or backlight.
  • the gravity acceleration sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity.
  • the terminal device 700 can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, here No longer.
  • An audio circuit 760, a speaker 761, and a microphone 762 can provide an audio interface between the user and the terminal device 700.
  • the audio circuit 760 can transmit the converted electrical data of the received audio data to the speaker 761 for conversion to the sound signal output by the speaker 761; on the other hand, the microphone 762 converts the collected sound signal into an electrical signal by the audio circuit 760. After receiving, it is converted into audio data, and then processed by the audio data output processor 780, transmitted to the terminal device such as another terminal device via the RF circuit 710, or outputted to the memory 720 for further processing.
  • the audio circuit 760 may also include an earbud jack to provide communication of the peripheral earphones with the terminal device 700.
  • WiFi is a short-range wireless transmission technology
  • the terminal device 700 can help a user to send and receive emails, browse web pages, and access streaming media through the WiFi module 770, which provides wireless broadband Internet access for users.
  • FIG. 7 shows the WiFi module 770, it can be understood that it does not belong to the essential configuration of the terminal device 700, and may be omitted as needed within the scope of not changing the essence of the invention.
  • Processor 780 is the control center of terminal device 700, which connects various portions of the entire handset using various interfaces and lines, by running or executing software programs and/or modules stored in memory 720, and recalling data stored in memory 720.
  • the various functions and processing data of the terminal device 700 are executed to perform overall monitoring of the mobile phone.
  • the processor 780 may include one or more processing cores; preferably, the processor 780 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, and the like.
  • the modem processor primarily handles wireless communications. It will be appreciated that the above described modem processor may also not be integrated into the processor 780.
  • the terminal device 700 further includes a power source 790 (such as a battery) for supplying power to the various components.
  • a power source 790 (such as a battery) for supplying power to the various components.
  • the power source can be logically connected to the processor 780 through the power management system to manage functions such as charging, discharging, and power management through the power management system.
  • the power supply 790 can also include one or more DC or AC power sources, a recharging system, a power failure detection circuit, a power converter, or an inverter, Any component such as a power status indicator.
  • the terminal device 700 may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
  • the display unit of the terminal device 700 is a touch screen display, and the terminal device 700 further includes a memory, and one or more programs, wherein one or more programs are stored in the memory and configured to be Or more than one processor to execute.
  • the one or more programs include instructions for performing various operations in the above information transmitting method.
  • a computer readable storage medium comprising a computer program, such as a memory comprising a computer program executable by a processor in a terminal device to perform the above described FIG. 2 embodiment or diagram The steps of the terminal device side in the information transmitting method shown in the embodiment.
  • the computer readable storage medium can be a ROM, a random access memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, and an optical data storage device.
  • FIG. 8 is a schematic structural diagram of a service device provided by an exemplary embodiment of the present application.
  • the service device can be used to implement the information transmitting method or the information receiving method provided in the above embodiments.
  • the service device 800 includes a central processing unit (CPU) 801, a system memory 804 including a random access memory (RAM) 802 and a read only memory (ROM) 803, and a system bus 805 that connects the system memory 804 and the central processing unit 801. .
  • the service device 800 also includes a basic input/output system (I/O system) 806 that facilitates the transfer of information between various devices within the computer, and a large capacity for storing the operating system 813, applications 814, and other program modules 815.
  • the basic input/output system 806 includes a display 808 for displaying information and an input device 809 such as a mouse or keyboard for user input of information.
  • the display 808 and input device 807 are both connected to the central processing unit 801 via an input and output controller 810 that is coupled to the system bus 805.
  • the basic input/output system 806 can also include an input output controller 810 for receiving and processing input from a plurality of other devices, such as a keyboard, mouse, or electronic stylus.
  • input and output controller 810 also provides output to a display screen, printer, or other type of output device.
  • the mass storage device 807 is connected to the central processing unit 801 by a mass storage controller (not shown) connected to the system bus 805.
  • the mass storage device 807 and its associated computer readable medium provide non-volatile storage for the service device 800. That is, the mass storage device 807 can include a computer readable medium (not shown) such as a hard disk or a CD-ROM drive.
  • the computer readable medium can include computer storage media and communication media.
  • Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data.
  • Computer storage media include RAM, ROM, EPROM, EEPROM, flash memory or other solid state storage technologies, CD-ROM, DVD or other optical storage, tape cartridges, magnetic tape, magnetic disk storage or other magnetic storage devices.
  • RAM random access memory
  • ROM read only memory
  • EPROM Erasable programmable read-only memory
  • EEPROM electrically erasable programmable read-only memory
  • the service device 800 may also be operated by a remote computer connected to the network through a network such as the Internet. That is, the service device 800 can be connected to the network 812 through a network interface unit 811 connected to the system bus 805, or can be connected to other types of networks or remote computer systems using the network interface unit 811 (not shown) ).
  • the memory further includes one or more programs, the one or more programs being stored in a memory, the one or more programs being used to perform the information transmitting method provided by the above embodiments.
  • the storage medium may include a read only memory (ROM), a random access memory (RAM), a magnetic disk or an optical disk. That is, the computer readable storage medium stores one or more computer programs for performing the following steps on the service device side in the information transmission method of the embodiment of FIG. 2 or the embodiment of FIG. 3 when executed by the processor. All or part of the steps.
  • a person skilled in the art may understand that all or part of the steps of implementing the above embodiments may be completed by hardware, or may be instructed by a program to execute related hardware, and the program may be stored in a computer readable storage medium.
  • the storage medium mentioned may be a read only memory, a magnetic disk or an optical disk or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本申请公开了一种信息发送方法、信息接收方法、装置及系统,属于移动终端领域。所述方法包括:终端设备获取待发送的明文信息;终端设备生成对称密钥;终端设备采用对称密钥对明文信息加密,得到第一密文信息;终端设备获取非对称加密公钥;终端设备采用非对称加密公钥对对称密钥进行加密,得到第二密文信息;发送第一密文信息和第二密文信息发送至服务设备。本申请通过使得即便手机中的非对称加密公钥泄露,由于非对称加密的特性,恶意人员也无法解密得到对称密钥,也无法解密得到明文信息,从而保证了终端设备和服务设备之间通信时的安全性。

Description

信息发送方法、信息接收方法、装置及系统
本申请要求于2017年4月1日提交中国专利局、申请号为201710213891.2、发明名称为“信息发送方法、信息接收方法、装置及系统”的中国专利申请的优先权,其全部内容通过引用结合在本申请中
技术领域
本申请实施例涉及移动终端领域,特别涉及一种信息发送方法、信息接收方法、装置及系统。
背景技术
查找手机功能是在智能手机上提供的一种辅助功能。当用户在家中找不到手机或者手机丢失后,通过查找手机功能对手机进行定位、响铃、锁死手机或抹除数据中的至少一项操作。
查找手机功能需要用户手动开启或关闭。在一种典型的开启查找手机功能方法中,用户在手机上输入用户帐号和密码,手机使用对称密钥将用户帐号、密码和手机标识进行加密,将加密后的用户帐号、密码和手机标识发送至服务器;服务器使用对称密钥解密得到用户帐号、密码和手机标识后,验证用户帐号和密码是否匹配;当用户帐号和密码匹配时,服务器将该用户帐号和手机标识进行绑定并为该手机开通查找手机功能。其中,手机标识可以采用IMEI(International Mobile Equipment Identity,国际移动设备身份码)来表示。
发明内容
本申请实施例提供了一种信息发送方法、信息接收方法、装置及系统。
第一方面,本申请实施例提供了一种信息发送方法,所述方法包括:
获取待发送的明文信息;
生成对称密钥;
采用所述对称密钥对所述明文信息加密,得到第一密文信息;
获取非对称加密公钥;采用所述非对称加密公钥对所述对称密钥进行加密,得到第二密文信息;
发送所述第一密文信息和所述第二密文信息至服务设备,所述服务设备存 储有与所述非对称加密公钥对应的非对称加密私钥。
第二方面,提供了一种信息接收方法,所述方法包括:
接收第一密文信息和第二密文信息;
获取非对称加密私钥;
采用所述非对称加密私钥对所述第二密文信息进行解密,得到对称密钥;
采用所述对称密钥对所述第一密文信息进行解密,得到明文信息。
第三方面,本申请实施例提供了一种信息发送装置,所述装置包括:
获取模块,用于获取待发送的明文信息;
生成模块,用于生成对称密钥;
加密模块,用于采用所述对称密钥对所述明文信息加密,得到第一密文信息;
所述获取模块,还用于获取非对称加密公钥;
所述加密模块,还用于采用所述非对称加密公钥对所述对称密钥进行加密,得到第二密文信息;
发送模块,用于发送所述第一密文信息和所述第二密文信息至服务设备,所述服务设备存储有与所述非对称加密公钥对应的非对称加密私钥。
第四方面,提供了一种信息接收装置,所述装置包括:
接收模块,用于接收第一密文信息和第二密文信息;
获取模块,用于获取非对称加密私钥;
解密模块,用于采用所述非对称加密私钥对所述第二密文信息进行解密,得到对称密钥;
所述解密模块,用于采用所述对称密钥对所述第一密文信息进行解密,得到明文信息。
第五方面,提供了一种终端设备,所述设备包括:处理器和存储器,所述存储器存储有一个或多个计算机程序,所述处理器执行所述计算机程序时实现以下步骤:
获取待发送的明文信息;
生成对称密钥;
采用所述对称密钥对所述明文信息加密,得到第一密文信息;
获取非对称加密公钥;采用所述非对称加密公钥对所述对称密钥进行加密,得到第二密文信息;
发送所述第一密文信息和所述第二密文信息至服务设备,所述服务设备存储有与所述非对称加密公钥对应的非对称加密私钥。
第六方面,提供了一种服务设备,所述设备包括:处理器和存储器,所述存储器存储有一个或多个计算机程序,所述处理器执行所述计算机程序时实现以下步骤:
接收第一密文信息和第二密文信息;
获取非对称加密私钥;
采用所述非对称加密私钥对所述第二密文信息进行解密,得到对称密钥;
采用所述对称密钥对所述第一密文信息进行解密,得到明文信息
第七方面,提供了一种信息收发系统,该系统包括:终端设备和服务设备;
所述终端设备包括如第三方面所述的信息发送装置,所述服务设备包括如第四方面所述的信息接收装置;
或,
所述终端设备是如第五方面所述的终端设备,所述服务设备是如第六方面所述的服务设备
第八方面,提供了一种计算机可读介质,其上存储有计算机程序,该程序被处理器执行时实现以下步骤:获取待发送的明文信息;
生成对称密钥;
采用所述对称密钥对所述明文信息加密,得到第一密文信息;
获取非对称加密公钥;采用所述非对称加密公钥对所述对称密钥进行加密,得到第二密文信息;
发送所述第一密文信息和所述第二密文信息至服务设备,所述服务设备存储有与所述非对称加密公钥对应的非对称加密私钥。
第九方面,提供了一种计算机可读介质,其上存储有计算机程序,该程序被处理器执行时实现以下步骤:
接收第一密文信息和第二密文信息;
获取非对称加密私钥;
采用所述非对称加密私钥对所述第二密文信息进行解密,得到对称密钥;
采用所述对称密钥对所述第一密文信息进行解密,得到明文信息。
附图说明
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本申请一个示例性实施例提供的信息收发系统的结构示意图;
图2是本申请一个示例性实施例提供的信息发送方法的方法流程图;
图3是本申请另一个示例性实施例提供的信息发送方法的方法流程图;
图4A是本申请一个示例性实施例提供的信息发送方法在实施时的界面示意图;
图4B是本申请一个示例性实施例提供的信息发送方法的加解密原理图;
图4C是本申请一个示例性实施例提供的信息发送方法在实施时的界面示意图;
图5是本申请一个示例性实施例提供的信息发送装置的结构方框图;
图6是本申请另一个示例性实施例提供的信息接收装置的结构方框图;
图7是本申请一个示例性实施例提供的终端设备的结构方框图;
图8是本申请另一个示例性实施例提供的服务设备的结构方框图。
具体实施方式
为使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请实施方式作进一步地详细描述。
为了便于理解,首先介绍一些本申请实施例所涉及的技术概念。
对称加密
对称加密是指加密方和解密方具有相同的加密密钥X。加密方使用加密密钥X将明文信息加密后,解密方使用相同的加密密钥X对明文信息进行解密。一旦加密密钥X泄露,则恶意人员能够解密到明文信息。
非对称加密以及公钥和私钥
非对称加密公钥(简称公钥)是指公开的密钥,不需要进行保密,解密方可以通过各种渠道获取;而非对称加密私钥(简称私钥)是指仅由加密方自身持有的密钥,需要进行保密。一个公钥对应一个私钥;公钥和私钥共同组成了一种不对称加密方式。不对称加密方式是指使用公钥加密的明文信息只能用对应的私钥进行解密,使用私钥加密的明文信息也只能用对应的公钥进行解密。 也即,加密和解密使用的密钥是不相同的。
比如:假定加密方要向解密方发送密文信息,则加密方首先要获取与解密方对应的公钥,然后使用与解密方对应的公钥对明文信息进行加密后,将密文信息发送给解密方,解密方在接收到加密方发送的密文信息后,必须使用与解密方对应的私钥才可以对密文信息进行解密,获取明文信息。由于与解密方对应的私钥只有解密方自己拥有,因此加密方发送的密文信息是安全的。
查找设备服务
当用户在家中找不到终端设备或者终端设备丢失后,通过查找设备功能对终端设备进行定位、响铃、锁死或抹除数据中的至少一项操作。当终端设备是手机时,可称为查找手机服务;当终端设备是平板电脑时,可称为查找平板服务。
在背景技术提供的查找手机功能中,当手机被恶意人员获得后,手机中的对称密钥容易被泄露或破译。此时会造成用户帐号和密码的泄露,使得查找手机功能失效。为此,本申请提供有如下实施例:
请参考图1,其示出了本申请一个示意性实施例提供的信息收发系统的结构示意图。该信息收发系统包括:至少一个终端设备120和服务设备140。
终端设备120可以是手机、平板电脑、电子书阅读器、MP3(Moving Picture Experts Group Audio Layer III,动态影像专家压缩标准音频层面3)播放器、MP4(Moving Picture Experts Group Audio Layer IV,动态影像专家压缩标准音频层面4)播放器、膝上型便携计算机和台式计算机等等。
可选地,终端设备120内设置有定位模块,该定位模块可以是必肯(iBeacon)定位模块、GPS(Global Positioning System,全球定位系统)定位模块、WIFI(Wireless Fidelity,无线保真)网络定位模块和基站定位模块中的至少一种。终端设备120具有定位自身所处地理位置的能力,以实现查收设备功能中的定位功能。终端设备120还具有扬声器,终端设备120具有根据控制指令响铃的能力,以实现查收设备功能中的响铃功能。可选地,终端设备120中安装有用于实现查找设备功能的应用程序。
可选地,终端设备120内存储有与服务设备140对应的非对称加密公钥。当终端设备120为多个时,每个终端设备120内存储的非对称加密公钥可以是 相同或不同的。本申请实施例中,以每个终端设备120中存储的非对称加密公钥是相同的来举例说明。
终端设备120与服务设备140之间通过有线网络或无线网络通信。该无线网络包括:移动通信中的数据网络(即分组数据域PS)或移动通信中的短信网络(即电路域CS)。
服务设备140是用于为终端设备120提供后台服务的服务器,比如查找手机服务、数据服务或其他服务。
服务设备140中存储有与非对称加密公钥对应的非对称加密私钥。可选地,该非对称加密私钥为1个或多个。本申请实施例中,以服务设备140中存储的非对称加密私钥为1个来举例说明。
可选地,终端设备120被认为是第一设备或加密设备或信息发送设备或信息发送装置,服务设备140被认为是第二设备或解密设备或信息接收设备或信息接收装置。在不同实施例中,终端设备和/或服务设备可替代实现成为其他设备,比如终端设备为平板电脑,服务设备为存储服务设备,又比如,终端设备是手机,服务设备是路由器或一台主机,本申请实施例对此不加以限定。
请参考图2,其示出了本申请一个示意性实施例提供的信息发送方法的方法流程图。本实施例以该方法应用于图1所示的信息收发系统来举例说明。该方法包括:
步骤201,终端设备获取待发送的明文信息;
终端设备获取待发送的明文信息,该明文信息可以是任意信息。
步骤202,终端设备生成对称密钥;
在一个实施例中,终端设备的初始状态下未存储有对称密钥,在需要使用对称密钥时,实时生成对称密钥。
在一个实施例中,步骤202可以在步骤201之前或同时执行,本申请实施例不限定这两个步骤的执行先后关系,也不排除终端设备预先存储有对称密钥的实现方式。
步骤203,终端设备采用对称密钥对明文信息进行加密,得到第一密文信息;
步骤204,终端设备获取非对称加密公钥,采用非对称加密公钥对对称密钥进行加密,得到第二密文信息;
非对称加密公钥存在对应的非对称加密私钥,服务设备中存储有与该非对称加密公钥存在对应的非对称加密私钥。
其中,非对称加密公钥加密后的密文,需要对应的非对称加密私钥进行解密。
步骤205,终端设备发送第一密文信息和第二密文信息;
步骤206,服务设备接收第一密文信息和第二密文信息;
步骤207,服务设备获取非对称加密私钥;
在一个实施例中,非对称加密私钥是预先存储在服务设备中的。
步骤208,服务设备采用非对称加密私钥对第二密文信息进行解密,得到对称密钥;
步骤209,服务设备采用对称密钥对第一密文信息进行解密,得到明文信息。
在本实施例中,通过在终端设备中存储非对称加密公钥,并在加密时生成对称密钥,采用对称密钥对明文信息加密得到第一密文信息;采用非对称加密公钥对对称密钥进行加密得到第二密文信息;使得即便手机中的非对称加密公钥泄露,由于非对称加密的特性,恶意人员也无法解密得到对称密钥,也无法解密得到明文信息,从而保证了终端设备与服务设备之间交互信息时的安全性。
请参考图3,其示出了本申请另一个示意性实施例提供的信息发送方法的方法流程图。本实施例以该方法应用于图1所示的信息发送系统来举例说明。该方法包括:
步骤301,终端设备通过加密连接向服务设备发送登录请求,该登录请求中携带有用户帐号和密码;
终端设备在需要和服务设备通信时,与服务设备之间建立https加密连接。然后,终端设备使用预先注册的用户帐号和密码生成登录请求,向服务设备发送登录请求。
示意性的,参考图4A的左侧图示,用户在登录界面中的输入框41中输入用户帐号zhangsan@xxx.com和密码,然后点击“登录”按钮42后,终端向服务设备发送登录请求。
对应地,服务设备通过加密连接接收终端发送的登录请求。
步骤302,服务设备对用户帐号和密码进行验证;并在验证成功后,向终端设备反馈登录令牌。
登录令牌(token)是登录成功时由服务设备分配给终端的一种数字令牌。登录令牌通常具有有效期限(比如10分钟内),终端设备后续与服务设备通信时,需要在信息中携带该登录令牌,以便服务设备识别出该终端是处于有效登录状态的终端。
用户帐号、登录密码和登录令牌之间存在对应关系。可选地,每个登录令牌还存在对应的有效期限。表一示意性的示出了该对应关系。
表一
用户名 登录密码 登录令牌token 有效期限
张三 128568 1F4Gsdfa 11:02-11:12
李四 865986 5548asdf1 10:59-11:09
王五 1155336 2146451af 11:04-11:14
对应地,终端设备存储该登录令牌。
终端设备在接收到登录令牌后,成功登录。结合参考图4A的右侧图示,终端设备从登录界面跳转到开通查找手机界面,如果用户希望开通查找设备功能,则在开通查找手机界面点击“开通查找手机”按钮43。
步骤303,终端设备获取用于开通查找终端设备设备功能的至少一项注册信息,至少一项注册信息包括:登录密码、设备标识、手机号和登录令牌中的至少一种;
当用户点击“开通查收手机”按钮后,终端设备根据该点击操作获取用于开通查找设备功能的至少一项注册信息,至少一项注册信息包括:登录密码、设备标识、手机号和登录令牌中的至少一种。
在一个实施例中,设备标识用于标识终端设备(也即标识第一设备),在终端设备为手机时,设备标识可以是IMEI(International Mobile Equipment Identity,国际移动设备身份码);手机号是终端设备所使用的手机号,该手机号用于在查找设备功能的使用过程中,实现终端设备和服务设备之间以短信形式的通信;登录令牌是采用上述登录密码成功登录时所分配的令牌,该登录令牌用于被服务设备验证终端设备是否为处于有效登录状态。
可选地,本实施例以注册信息包括上述四种信息来举例说明。
步骤304,终端设备根据至少一项注册信息生成待发送的明文信息;
可选地,终端设备将上述四种信息封装为一条明文信息。
步骤305,终端设备生成对称密钥;
在一个实施例中,终端设备生成与本次开通操作对应的对称密钥。也即,每次开通查收手机时,动态生成对称密钥。不同开通操作对应不同的对称密钥,或者存在至少两次开通操作对应的对称密钥是不同的。
或者,终端设备生成与当前时间段对应的对称密钥。也即,每个时间段动态生成对称密钥。不同时间段对应不同的对称密钥,或者存在至少两个时间段对应的对称密钥是不同的。
或者,终端设备生成与本次通信流程对应的对称密钥。也即,每个通信流程动态生成对称密钥。不同通信流程对应不同的对称密钥,或者存在两次通信流程对应的对称密钥是不同的。
可选地,终端设备预先不存储对称密钥,仅存储对称密钥的生成算法,在需要使用对称密钥时再实时生成对称密钥,以减少对称密钥被泄露的风险。
在一个实施例中,步骤303可以在步骤302之前执行,或者,与步骤301之前执行,或者,与步骤302同时执行,或者,与步骤301同时执行。
步骤306,终端设备采用对称密钥对明文信息进行加密,得到第一密文信息;
结合图4B可知,终端设备采用对称密钥K1对明文信息X进行加密,得到第一密文信息S1。
步骤307,终端设备获取与服务设备对应的非对称加密公钥;
在一个实施例中,终端设备的操作系统(或者查找手机应用)中预先存储有非对称加密公钥K2。比如,终端设备在出厂时存储有非对称加密公钥K2。
在一个实施例中,服务设备可以向终端设备发送系统更新信息,该系统更新信息携带有非对称加密公钥;终端设备接收该服务设备发送的系统更新信息,从该系统更新信息中获取非对称加密公钥。其中,系统更新信息可以采用OTA(Over the Air Technology,空中下载技术)下发。
步骤308,终端设备采用非对称加密公钥对对称密钥进行加密,得到第二密文信息;
结合图4B可知,终端设备采用非对称加密公钥K2对对称密钥K1进行加密,得到第二密文信息S2。
在一个实施例中,第一密文信息的加密过程和第二密文信息的加密过程互 相独立,两个加密过程可以并列执行,或者一个加密过程在另一个加密过程之前执行。
步骤309,终端设备发送第一密文信息和第二密文信息给服务设备;
在一个实施例中,终端设备将第一密文信息S1和第二密文信息S2同时发送给服务设备;在另一个实施例中,终端设备将第一密文信息S1和第二密文信息S2分别发送给服务设备。
在一个实施例中,终端设备通过预先建立的加密连接,将第一密文信息S1和第二密文信息S2发送给服务设备。该加密连接是https加密连接。
步骤310,服务设备接收第一密文信息和第二密文信息;
在一个实施例中,服务设备同时接收第一密文信息S1和第二密文信息S2;在另一个实施例中,服务设备分别接收第一密文信息S1和第二密文信息S2。
在一个实施例中,服务设备通过预先建立的加密连接,接收第一密文信息S1和第二密文信息S2。
步骤311,服务设备获取非对称加密私钥;
服务设备获取内部存储的非对称加密私钥K3。
步骤312,服务设备采用非对称加密私钥对第二密文信息进行解密,得到对称密钥;
结合参考图4B,服务设备采用非对称加密私钥K3对第二密文信息K2进行解密,得到对称密钥K1。
步骤313,服务设备采用对称密钥对第一密文信息进行解密,得到明文信息,明文信息包括登录密码、设备标识、手机号和登录令牌中的至少一种;
服务设备采用对称密钥K1对第一密文信息S1进行解密,得到明文信息X。该明文信息X包括用于开通查找设备功能的至少一项信息。
步骤314,服务设备验证登录令牌是否与登录密码匹配;
服务设备中存储有用户帐号、登录密码和登录令牌之间的对应关系。示意性的,该对应关系如表一所示。
服务设备根据登录密码和登录令牌之间的对应关系,验证接收到的登录令牌和登录密码是否匹配。若匹配,则进入步骤315;若不匹配,则向终端设备反馈开通失败提示,对应地,终端设备接收并显示开通失败提示。
步骤315,当登录令牌与登录密码匹配时,验证登录令牌是否处于有效期限内;
当登录令牌与登录密码相匹配时,服务设备还需要验证登录令牌在当前时刻是否处于有效期限内。若处于有效期限内,则进入步骤316;若超出了有效期限,则向终端设备反馈开通失败提示,对应地,终端设备接收并显示开通失败提示。
在一个实施例中,步骤314和步骤315之间的顺序可以互换,或者,同时执行。
步骤316,当登录令牌处于有效期限时,建立设备标识和手机号之间的绑定关系;
在一个实施例中,服务设备为终端设备开通查找设备功能,并建立用户帐号、设备标识和手机号之间的绑定关系。表二示意性的示出了该绑定关系。
表二
用户帐号 设备标识(IMEI) 手机号
张三 xxxxxx0601472104 134xxxx8888
李四 Xxxxxx121272105 135xxxx6666
李四 xxxxxx0701472234 186xxxx7777
结合参考图4C,服务设备向终端设备反馈成功开通查找设备功能的指令后,终端设备从开通查找手机界面跳转到查找手机功能界面,该查找手机功能界面提供有被查找手机在地图中的位置显示,被查找手机的名称“张三的手机”以及状态“在线”,以及当前控制端与被查找手机之间的距离“100米”,用户如果想要锁死“张三的手机”,则可以点击“锁死”按钮44,向服务设备发送锁死指令。在一个实施例中,终端设备向服务设备发送锁死指令时,仅使用对称密钥进行加密;或者,终端设备采用与注册信息相同的加密方式对锁死指令进行加密。
在本实施例中,通过在第一设备中存储非对称加密公钥,并在加密时生成对称密钥,采用对称密钥对明文信息加密得到第一密文信息;采用非对称加密公钥对对称密钥进行加密得到第二密文信息;使得即便手机中的非对称加密公钥泄露,由于非对称加密的特性,恶意人员也无法解密得到对称密钥,也无法解密得到明文信息,从而保证了设备间交互信息时的安全性。
在一个实施例中,如果仅在服务设备中存储非对称加密私钥,则只要服务设备中的非对称加密私钥不被泄露,则终端设备和服务设备之间的通信安全。
在一个实施例中,由于终端设备可以不断更新对称密钥,使得每个对称密 钥仅在一段时间内有效,增加了终端设备和服务设备之间的通信安全性。
在一个实施例中,当终端设备针对每次开通操作生成一次对称密钥时,则在一次“开通查找设备功能→关闭查找设备功能”的期限,终端设备和服务设备可以持续使用同一个对称密钥对信息进行加密,减少终端设备需要生成对称密钥的计算量,减少终端设备的计算量。
在一个实施例中,当终端设备针对每个时间段生成一次对称密钥时,由于终端设备每次使用查找设备功能的时间是随机性的,所以每次使用查找设备功能时所生成的对称密钥是不确定的。使得对称密钥不仅在生成时具有随机性,在使用时间上也具有随机性,从而增强了对称密钥的安全性。
在一个实施例中,当终端设备针对每个通信流程生成一次对称密钥时,可以在单个通信流程内,终端设备和服务设备持续使用同一个对称密钥对信息进行加密,减少终端设备需要生成对称密钥的计算量;相邻的两个通信流程内,又使用不同的对称密钥对信息进行加密,保证终端设备和服务设备之间的通信安全性。
在一个实施例中,由于终端设备和服务设备之间采用https加密连接来,进一步增加了终端设备和服务设备之间的通信安全性。
在一个实施例中,若信息收发系统中的终端设备为至少两个,则服务设备用于为至少两个终端设备提供服务,至少两个终端设备均存储有相同的非对称加密公钥,且服务设备存储有与该非对称加密公钥对应的非对称加密私钥,此时,只要服务设备中的非对称加密私钥不被泄露,每个终端设备都会采用双重加密与服务设备进行通信,而且每个终端设备采用的对称密钥可以是不同的,从而保证了每个终端设备与服务设备之间的通信,都是非常安全的。即便其中一个终端的对称密钥因为任何可能的原因而泄露,也不会影响其他终端的通信安全性。
在上述各个实施例中,非对称加密公钥和非对称加密私钥可以互换,也即,在加密过程中,通过非对称加密私钥进行加密;在解密过程中,通过非对称加密公钥进行解密。
请参考图5,其示出了本申请一个示例性实施例提供的信息发送装置的结构方框图。该信息发送装置可以通过软件、硬件或者两者的组合实现成为终端设备的全部或部分。该信息发送装置包括:获取模块510、生成模块520、加 密模块530和发送模块540。
获取模块510,用于实现上述方法实施例中步骤201、步骤303、步骤307及其它明示或暗示的至少一个获取步骤的功能。
生成模块520,用于实现上述方法实施例中步骤202、步骤304、步骤305及其它明示或暗示的至少一个生成步骤的功能。
加密模块530,用于实现上述方法实施例中步骤203、步骤204、步骤306和步骤306及其它明示或暗示的至少一个加密步骤的功能。
发送模块540,用于实现上述方法实施例中步骤205、步骤301和步骤309及其它明示或暗示的至少一个发送步骤的功能。
可选地,该信息发送装置还包括接收模块,用于实现上述方法实施例中步骤302及其它明示或暗示的至少一个接收步骤的功能。
请参考图6,其示出了本申请一个示例性实施例提供的信息接收装置的结构方框图。该信息接收装置可以通过软件、硬件或者两者的组合实现成为服务设备的全部或部分。该信息接收装置包括:接收模块610、获取模块620和解密模块630。
接收模块610,用于实现上述方法实施例中步骤206、步骤301、步骤310及其它明示或暗示的至少一个接收步骤的功能。
获取模块620,用于实现上述方法实施例中步骤207、步骤311及其它明示或暗示的至少一个获取步骤的功能。
解密模块630,用于实现上述方法实施例中步骤208、步骤209、步骤312、步骤313及其它明示或暗示的至少一个解密步骤的功能。
可选地,该装置还包括:验证模块640、绑定模块650和接收模块660。
验证模块640,用于实现上述方法实施例中步骤208、步骤209、步骤312、步骤313及其它明示或暗示的至少一个验证步骤的功能。
绑定模块650,用于实现上述方法实施例中步骤316及其它明示或暗示的至少一个绑定步骤的功能。
发送模块660,用于实现上述方法实施例中步骤302及其它明示或暗示的至少一个发送步骤的功能。
需要说明的是:上述实施例提供的信息发送装置在加密时和信息接收装置 在解密时,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将设备的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。另外,上述实施例提供的第一装置和第二装置与相应的方法实施例属于同一构思,其具体实现过程详见方法实施例,这里不再赘述。
请参考图7,其示出了本申请一个示例性实施例提供的终端设备的结构示意图,该终端设备可以用于实施上述实施例中提供的信息发送方法或信息接收方法。具体来讲:
终端设备700可以包括RF(Radio Frequency,射频)电路710、包括有一个或一个以上计算机可读存储介质的存储器720、输入单元730、显示单元740、传感器750、音频电路760、WiFi(wireless fidelity,无线保真)模块760、包括有一个或者一个以上处理核心的处理器780、以及电源790等部件。本领域技术人员可以理解,图7中示出的终端设备结构并不构成对终端设备的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。其中:
RF电路710可用于收发信息或通话过程中,信号的接收和发送,特别地,将基站的下行信息接收后,交由一个或者一个以上处理器780处理;另外,将涉及上行的数据发送给基站。通常,RF电路710包括但不限于天线、至少一个放大器、调谐器、一个或多个振荡器、用户身份模块(SIM)卡、收发信机、耦合器、LNA(Low Noise Amplifier,低噪声放大器)、双工器等。此外,RF电路710还可以通过无线通信与网络和其他设备通信。所述无线通信可以使用任一通信标准或协议,包括但不限于GSM(Global System of Mobile communication,全球移动通讯系统)、GPRS(General Packet Radio Service,通用分组无线服务)、CDMA(Code Division Multiple Access,码分多址)、WCDMA(Wideband Code Division Multiple Access,宽带码分多址)、LTE(Long Term Evolution,长期演进)、电子邮件、SMS(Short Messaging Service,短消息服务)等。
存储器720可用于存储软件程序以及模块,处理器780通过运行存储在存储器720的软件程序以及模块,从而执行各种功能应用以及数据处理。存储器720可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、 至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据终端设备700的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器720可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。相应地,存储器720还可以包括存储器控制器,以提供处理器780和输入单元730对存储器720的访问。
输入单元730可用于接收输入的数字或字符信息,以及产生与用户设置以及功能控制有关的键盘、鼠标、操作杆、光学或者轨迹球信号输入。具体地,输入单元730可包括触敏表面731以及其他输入设备732。触敏表面731,也称为触摸显示屏或者触控板,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触敏表面731上或在触敏表面731附近的操作),并根据预先设定的程式驱动相应的连接装置。可选的,触敏表面731可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器780,并能接收处理器780发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触敏表面731。除了触敏表面731,输入单元730还可以包括其他输入设备732。具体地,其他输入设备732可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。
显示单元740可用于显示由用户输入的信息或提供给用户的信息以及终端设备700的各种图形用户接口,这些图形用户接口可以由图形、文本、图标、视频和其任意组合来构成。显示单元740可包括显示面板741,可选的,可以采用LCD(Liquid Crystal Display,液晶显示器)、OLED(Organic Light-Emitting Diode,有机发光二极管)等形式来配置显示面板741。进一步的,触敏表面731可覆盖显示面板741,当触敏表面731检测到在其上或附近的触摸操作后,传送给处理器780以确定触摸事件的类型,随后处理器780根据触摸事件的类型在显示面板741上提供相应的视觉输出。虽然在图7中,触敏表面731与显示面板741是作为两个独立的部件来实现输入和输入功能,但是在某些实施例中,可以将触敏表面731与显示面板741集成而实现输入和输出功能。
终端设备700还可包括至少一种传感器750,比如光传感器、运动传感器 以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板741的亮度,接近传感器可在终端设备700移动到耳边时,关闭显示面板741和/或背光。作为运动传感器的一种,重力加速度传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;至于终端设备700还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。
音频电路760、扬声器761,传声器762可提供用户与终端设备700之间的音频接口。音频电路760可将接收到的音频数据转换后的电信号,传输到扬声器761,由扬声器761转换为声音信号输出;另一方面,传声器762将收集的声音信号转换为电信号,由音频电路760接收后转换为音频数据,再将音频数据输出处理器780处理后,经RF电路710以发送给比如另一终端设备,或者将音频数据输出至存储器720以便进一步处理。音频电路760还可能包括耳塞插孔,以提供外设耳机与终端设备700的通信。
WiFi属于短距离无线传输技术,终端设备700通过WiFi模块770可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图7示出了WiFi模块770,但是可以理解的是,其并不属于终端设备700的必须构成,完全可以根据需要在不改变发明的本质的范围内而省略。
处理器780是终端设备700的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器720内的软件程序和/或模块,以及调用存储在存储器720内的数据,执行终端设备700的各种功能和处理数据,从而对手机进行整体监控。可选的,处理器780可包括一个或多个处理核心;优选的,处理器780可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器780中。
终端设备700还包括给各个部件供电的电源790(比如电池),优选的,电源可以通过电源管理系统与处理器780逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。电源790还可以包括一个或一个以上的直流或交流电源、再充电系统、电源故障检测电路、电源转换器或者逆变器、 电源状态指示器等任意组件。
尽管未示出,终端设备700还可以包括摄像头、蓝牙模块等,在此不再赘述。具体在本实施例中,终端设备700的显示单元是触摸屏显示器,终端设备700还包括有存储器,以及一个或者一个以上的程序,其中一个或者一个以上程序存储于存储器中,且经配置以由一个或者一个以上处理器执行。所述一个或者一个以上程序包含用于执行上述信息发送方法中各个操作的指令。
在示例性实施例中,还提供了一种包括计算机程序的计算机可读存储介质,例如包括计算机程序的存储器,上述计算机程序可由终端设备中的处理器执行以完成上述图图2实施例或图3实施例所示出的信息发送方法中终端设备侧的步骤。例如,所述计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。
请参考图8,其示出了本申请一个示例性实施例提供的服务设备的结构示意图。该服务设备可以用于实施上述实施例中提供的信息发送方法或信息接收方法。所述服务设备800包括中央处理单元(CPU)801、包括随机存取存储器(RAM)802和只读存储器(ROM)803的系统存储器804,以及连接系统存储器804和中央处理单元801的系统总线805。所述服务设备800还包括帮助计算机内的各个器件之间传输信息的基本输入/输出系统(I/O系统)806,和用于存储操作系统813、应用程序814和其他程序模块815的大容量存储设备807。
所述基本输入/输出系统806包括有用于显示信息的显示器808和用于用户输入信息的诸如鼠标、键盘之类的输入设备809。其中所述显示器808和输入设备807都通过连接到系统总线805的输入输出控制器810连接到中央处理单元801。所述基本输入/输出系统806还可以包括输入输出控制器810以用于接收和处理来自键盘、鼠标、或电子触控笔等多个其他设备的输入。类似地,输入输出控制器810还提供输出到显示屏、打印机或其他类型的输出设备。
所述大容量存储设备807通过连接到系统总线805的大容量存储控制器(未示出)连接到中央处理单元801。所述大容量存储设备807及其相关联的计算机可读介质为服务设备800提供非易失性存储。也就是说,所述大容量存储设备807可以包括诸如硬盘或者CD-ROM驱动器之类的计算机可读介质(未示出)。
不失一般性,所述计算机可读介质可以包括计算机存储介质和通信介质。计算机存储介质包括以用于存储诸如计算机可读指令、数据结构、程序模块或其他数据等信息的任何方法或技术实现的易失性和非易失性、可移动和不可移动介质。计算机存储介质包括RAM、ROM、EPROM、EEPROM、闪存或其他固态存储其技术,CD-ROM、DVD或其他光学存储、磁带盒、磁带、磁盘存储或其他磁性存储设备。当然,本领域技术人员可知所述计算机存储介质不局限于上述几种。上述的系统存储器804和大容量存储设备807可以统称为存储器。
根据本发明的各种实施例,所述服务设备800还可以通过诸如因特网等网络连接到网络上的远程计算机运行。也即服务设备800可以通过连接在所述系统总线805上的网络接口单元811连接到网络812,或者说,也可以使用网络接口单元811来连接到其他类型的网络或远程计算机系统(未示出)。
所述存储器还包括一个或者一个以上的程序,所述一个或者一个以上程序存储于存储器中,所述一个或者一个以上程序用于执行上述实施例提供的信息发送方法。
本领域普通技术人员可以理解上述图2实施例或图3实施例的信息发送方法中服务设备侧的全部或部分步骤是可以通过程序来指令相关的硬件来完成,该程序可以存储于一计算机可读存储介质中,存储介质可以包括:只读存储器(ROM,Read Only Memory)、随机存取记忆体(RAM,Random Access Memory)、磁盘或光盘等。也即,该计算机可读存储介质存储有一个或多个计算机程序,该计算机程序被处理器执行时,用于实现以下步骤图2实施例或图3实施例的信息发送方法中服务设备侧的全部或部分步骤。
上述本申请实施例序号仅仅为了描述,不代表实施例的优劣。
本领域普通技术人员可以理解实现上述实施例的全部或部分步骤可以通过硬件来完成,也可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可读存储介质中,上述提到的存储介质可以是只读存储器,磁盘或光盘等。
以上所述仅为本申请的较佳实施例,并不用以限制本申请,凡在本申请的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本申请的保护范围之内。

Claims (21)

  1. 一种信息发送方法,其特征在于,所述方法包括:
    获取待发送的明文信息;
    生成对称密钥;
    采用所述对称密钥对所述明文信息加密,得到第一密文信息;
    获取非对称加密公钥;采用所述非对称加密公钥对所述对称密钥进行加密,得到第二密文信息;
    发送所述第一密文信息和所述第二密文信息至服务设备,所述服务设备存储有与所述非对称加密公钥对应的非对称加密私钥。
  2. 根据权利要求1所述的方法,其特征在于,所述获取待发送的明文信息,还包括:
    获取用于开通查找终端设备功能的至少一项注册信息,所述至少一项信息包括:登录密码、设备标识、手机号和登录令牌中的至少一种;
    根据所述至少一项信息生成待发送的所述明文信息;
    其中,所述设备标识用于标识终端设备,所述手机号是所述终端设备所使用的手机号码,所述登录令牌是采用所述登录密码成功登陆时所分配的令牌。
  3. 根据权利要求1所述的方法,其特征在于,所述获取非对称加密公钥,包括:
    获取预存的所述非对称加密公钥;
    或,
    获取系统更新信息;从所述系统更新信息中获取所述非对称加密公钥。
  4. 根据权利要求1所述的方法,其特征在于,所述生成对称密钥,包括:
    生成与本次开通操作对应的所述对称密钥;
    或者,
    生成与当前时间段对应的所述对称密钥;
    或者,
    生成与本次通信流程对应的所述对称密钥。
  5. 根据权利要求1至4任一所述的方法,其特征在于,所述发送所述第一密文信息和所述第二密文信息发送至服务设备,包括:
    采用预先建立的加密连接发送所述第一密文信息和所述第二密文信息至所述服务设备。
  6. 一种信息接收方法,其特征在于,所述方法包括:
    接收第一密文信息和第二密文信息;
    获取非对称加密私钥;
    采用所述非对称加密私钥对所述第二密文信息进行解密,得到对称密钥;
    采用所述对称密钥对所述第一密文信息进行解密,得到明文信息。
  7. 根据权利要求6所述的方法,其特征在于,所述明文信息包括用于为终端设备开通查找手机功能的至少一项注册信息,所述至少一项注册信息包括:设备标识、手机号、登录密码、登录令牌中的至少一种;
    所述采用所述对称密钥对所述第一密文信息进行解密,得到明文信息之后,还包括:
    验证所述登录令牌是否与所述登录密码匹配;
    当所述登录令牌与所述登录密码匹配时,验证所述登录令牌是否处于有效期限内;
    当所述登录令牌处于所述有效期限时,建立所述设备标识和所述手机号之间的绑定关系;
    其中,所述设备标识用于标识所述终端设备,所述手机号是所述终端设备所使用的手机号。
  8. 根据权利要求6所述的方法,其特征在于,所述接收第一密文信息和第二密文信息之前,还包括:
    发送系统更新信息,所述系统更新信息携带有与所述非对称加密私钥对应的非对称加密公钥。
  9. 根据权利要求6至8任一所述的方法,其特征在于,所述接收第一密文 信息和第二密文信息,包括:
    采用预先建立的加密连接,接收所述第一密文信息和所述第二密文信息。
  10. 一种信息发送装置,其特征在于,所述装置包括:
    获取模块,用于获取待发送的明文信息;
    生成模块,用于生成对称密钥;
    加密模块,用于采用所述对称密钥对所述明文信息加密,得到第一密文信息;
    所述获取模块,还用于获取非对称加密公钥;
    所述加密模块,还用于采用所述非对称加密公钥对所述对称密钥进行加密,得到第二密文信息;
    发送模块,用于发送所述第一密文信息和所述第二密文信息至服务设备,所述服务设备存储有与所述非对称加密公钥对应的非对称加密私钥。
  11. 根据权利要求10所述的装置,其特征在于,
    所述获取模块,用于获取用于开通查找终端设备功能的至少一项注册信息,所述至少一项信息包括:登录密码、设备标识、手机号和登录令牌中的至少一种;根据所述至少一项信息生成待发送的所述明文信息;
    其中,所述设备标识用于标识所述终端设备,所述手机号是所述终端设备所使用的手机号码,所述登录令牌是采用所述登录密码成功登陆时所分配的令牌。
  12. 根据权利要求10所述的装置,其特征在于,
    所述获取模块,用于获取预存的所述非对称加密公钥;
    或,
    所述获取模块,用于获取系统更新信息;从所述系统更新信息中获取所述非对称加密公钥。
  13. 根据权利要求10所述的装置,其特征在于,
    所述生成模块,用于生成与本次开通操作对应的所述对称密钥;
    或者,
    所述生成模块,用于生成与当前时间段对应的所述对称密钥;
    或者,
    所述生成模块,用于生成与本次通信流程对应的所述对称密钥。
  14. 根据权利要求10至13任一所述的装置,其特征在于,
    所述发送模块,用于采用预先建立的加密连接发送所述第一密文信息和所述第二密文信息至所述服务设备。
  15. 一种信息接收装置,其特征在于,所述装置包括:
    接收模块,用于接收第一密文信息和第二密文信息;
    获取模块,用于获取非对称加密私钥;
    解密模块,用于采用所述非对称加密私钥对所述第二密文信息进行解密,得到对称密钥;
    所述解密模块,用于采用所述对称密钥对所述第一密文信息进行解密,得到明文信息。
  16. 根据权利要求15所述的装置,其特征在于,所述明文信息包括用于开通查找终端设备功能的至少一项注册信息,所述至少一项注册信息包括:设备标识、手机号、登录密码、登录令牌中的至少一种;
    所述装置,还包括:
    验证模块,用于验证所述登录令牌是否与所述登录密码匹配;
    所述验证模块,还用于当所述登录令牌与所述登录密码匹配时,验证所述登录令牌是否处于有效期限内;
    绑定模块,还用于当所述登录令牌处于所述有效期限时,建立所述设备标识和所述手机号之间的绑定关系;
    其中,所述装置标识用于标识所述终端设备,所述手机号是所述终端设备所使用的手机号码。
  17. 根据权利要求15所述的装置,其特征在于,所述装置还包括:
    发送模块,用于发送系统更新信息,所述系统更新信息携带有与所述非对称加密私钥对应的非对称加密公钥。
  18. 根据权利要求15至17任一所述的装置,其特征在于,所述接收模块,用于采用预先建立的加密连接,接收所述第一密文信息和所述第二密文信息。
  19. 一种终端设备,其特征在于,所述设备包括:处理器和存储器,所述存储器存储有一个或多个计算机程序,所述处理器执行所述计算机程序时实现以下步骤:
    获取待发送的明文信息;
    生成对称密钥;
    采用所述对称密钥对所述明文信息加密,得到第一密文信息;
    获取非对称加密公钥;采用所述非对称加密公钥对所述对称密钥进行加密,得到第二密文信息;
    发送所述第一密文信息和所述第二密文信息至服务设备,所述服务设备存储有与所述非对称加密公钥对应的非对称加密私钥。
  20. 一种服务设备,其特征在于,所述设备包括:处理器和存储器,所述存储器存储有一个或多个计算机程序,所述处理器执行所述计算机程序时实现以下步骤:
    接收第一密文信息和第二密文信息;
    获取非对称加密私钥;
    采用所述非对称加密私钥对所述第二密文信息进行解密,得到对称密钥;
    采用所述对称密钥对所述第一密文信息进行解密,得到明文信息。
  21. 一种信息收发系统,其特征在于,所述系统包括:终端设备和服务设备;
    所述终端设备包括如权利要求10至14任一所述的信息发送装置,所述服务设备包括如权利要求15至18任一所述的信息接收装置;
    或,
    所述终端设备是如权利要求19所述的终端设备,所述服务设备是如权利要求20所述的服务设备。
PCT/CN2017/104580 2017-04-01 2017-09-29 信息发送方法、信息接收方法、装置及系统 WO2018176781A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP17903570.4A EP3605989B1 (en) 2017-04-01 2017-09-29 Information sending method, information receiving method, apparatus, and system
ES17903570T ES2836114T3 (es) 2017-04-01 2017-09-29 Método de envío de información, método de recepción de información, aparato y sistema

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710213891.2A CN107070909A (zh) 2017-04-01 2017-04-01 信息发送方法、信息接收方法、装置及系统
CN201710213891.2 2017-04-01

Publications (1)

Publication Number Publication Date
WO2018176781A1 true WO2018176781A1 (zh) 2018-10-04

Family

ID=59603048

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/104580 WO2018176781A1 (zh) 2017-04-01 2017-09-29 信息发送方法、信息接收方法、装置及系统

Country Status (4)

Country Link
EP (1) EP3605989B1 (zh)
CN (1) CN107070909A (zh)
ES (1) ES2836114T3 (zh)
WO (1) WO2018176781A1 (zh)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110138739A (zh) * 2019-04-15 2019-08-16 平安科技(深圳)有限公司 数据信息加密方法、装置、计算机设备及存储介质
CN110798830A (zh) * 2019-09-27 2020-02-14 华为终端有限公司 一种失联设备查找方法及设备
CN112804061A (zh) * 2021-01-04 2021-05-14 武汉虹信科技发展有限责任公司 电调天线控制器的数据传输方法及系统
CN112910916A (zh) * 2021-02-23 2021-06-04 内江佳路云网络科技有限公司 一种基于云计算的智能家居网关系统信息加密处理方法
CN113872946A (zh) * 2021-09-15 2021-12-31 上海宝康电子控制工程有限公司 一种前后端分离的数据加密传输方法及系统
CN114024665A (zh) * 2021-09-14 2022-02-08 天聚地合(苏州)数据股份有限公司 一种随机密钥及卡号生成方法及装置
CN116684075A (zh) * 2023-07-31 2023-09-01 章和技术(广州)有限公司 一种移动介质加密方法、装置、设备及存储介质

Families Citing this family (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107070909A (zh) * 2017-04-01 2017-08-18 广东欧珀移动通信有限公司 信息发送方法、信息接收方法、装置及系统
US10985915B2 (en) * 2017-04-12 2021-04-20 Blackberry Limited Encrypting data in a pre-associated state
CN108566381A (zh) * 2018-03-19 2018-09-21 百度在线网络技术(北京)有限公司 一种安全升级方法、装置、服务器、设备和介质
CN108848091A (zh) * 2018-06-20 2018-11-20 上海织语网络科技有限公司 一种用于即时通讯的混合加密方法
CN109041021B (zh) * 2018-07-24 2021-08-10 百富计算机技术(深圳)有限公司 一种基于蓝牙的文件传输方法、终端设备及存储介质
CN109978545A (zh) * 2019-04-04 2019-07-05 中国联合网络通信集团有限公司 虚拟物品处理方法、服务器及终端
CN110177099B (zh) * 2019-05-28 2021-11-05 平安科技(深圳)有限公司 基于非对称加密技术的数据交换方法、发送终端和介质
US11277373B2 (en) * 2019-07-24 2022-03-15 Lookout, Inc. Security during domain name resolution and browsing
CN111181909B (zh) * 2019-08-07 2022-02-15 腾讯科技(深圳)有限公司 一种身份信息的获取方法及相关装置
CN110677382A (zh) * 2019-08-20 2020-01-10 中国平安财产保险股份有限公司 数据安全处理方法、装置、计算机系统及存储介质
CN110401677B (zh) * 2019-08-23 2022-05-17 RealMe重庆移动通信有限公司 数字版权密钥的获取方法、装置、存储介质及电子设备
CN112637109B (zh) * 2019-09-24 2023-09-05 北京京东尚科信息技术有限公司 数据传输方法、系统、电子设备及计算机可读介质
CN110719166A (zh) * 2019-10-15 2020-01-21 深圳市元征科技股份有限公司 芯片烧录方法、芯片烧录装置、芯片烧录系统及存储介质
CN111127000B (zh) * 2019-12-10 2023-04-25 中国联合网络通信集团有限公司 充值卡信息加密方法、装置、终端设备和充值平台
CN111131278B (zh) * 2019-12-27 2022-09-06 京东科技控股股份有限公司 数据处理方法及装置、计算机存储介质、电子设备
CN115039376A (zh) * 2020-02-25 2022-09-09 深圳市欢太科技有限公司 终端设备信息传输方法、设备指纹生成方法及相关产品
CN113256902B (zh) * 2020-02-27 2024-07-12 深圳怡化电脑股份有限公司 敏感信息的安全输入方法、设备、系统及存储介质
US11785448B2 (en) * 2020-03-24 2023-10-10 Boe Technology Group Co., Ltd. Method and device for implementing secure communication, and storage medium
CN113922973B (zh) * 2020-06-22 2023-05-30 中国联合网络通信集团有限公司 基于密文的登录方法和设备
CN111818023A (zh) * 2020-06-23 2020-10-23 中国商用飞机有限责任公司 适用于空地通信链路的数据传输方法及数据传输系统
CN112291060B (zh) * 2020-08-08 2024-07-23 北京天润海图科技有限公司 安全通信方法及发送端、接收端
CN111740831B (zh) * 2020-08-13 2020-11-06 国网浙江省电力有限公司 复工复产检测用电力数据加密传输方法、系统及可读介质
US11996191B2 (en) * 2020-09-28 2024-05-28 Shanghai United Imaging Healthcare Co., Ltd. Systems and methods for device control
CN112235290B (zh) * 2020-10-13 2023-03-24 中国联合网络通信集团有限公司 基于区块链的物联网设备管理方法及第一物联网设备
CN112822152B (zh) * 2020-11-09 2023-07-04 腾讯科技(上海)有限公司 定向信息展示处理方法及相关设备
CN112202557B (zh) * 2020-11-17 2023-05-30 平安科技(深圳)有限公司 基于密钥更新分发的加密方法、装置、设备及存储介质
CN112866216B (zh) * 2021-01-05 2024-02-13 航天信息股份有限公司 一种用于对文件加密的方法及系统
CN112804259A (zh) * 2021-03-16 2021-05-14 厦门视云联科技有限公司 一种基于非对称加密的音视频通信加密方法及系统
CN115484353A (zh) * 2021-06-16 2022-12-16 中移动信息技术有限公司 适用于水印图片的处理方法、电子设备及存储介质
CN114531236B (zh) * 2022-03-02 2023-10-31 杭州华澜微电子股份有限公司 一种密钥的处理方法、装置及电子设备
CN115129332A (zh) * 2022-08-30 2022-09-30 深圳市航顺芯片技术研发有限公司 固件烧录方法、计算机设备及可读存储介质
CN115833985A (zh) * 2022-11-16 2023-03-21 中国联合网络通信集团有限公司 时间同步方法、装置、通信终端和存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060104441A1 (en) * 2004-11-17 2006-05-18 Microsoft Corporation Password protection
CN101442409A (zh) * 2007-11-23 2009-05-27 东方钢铁电子商务有限公司 用于b2b数据交换的加密方法及系统
CN101771699A (zh) * 2010-01-06 2010-07-07 华南理工大学 一种提高SaaS应用安全性的方法及系统
CN101964793A (zh) * 2010-10-08 2011-02-02 上海银联电子支付服务有限公司 终端和服务器间的数据传输方法及系统、签到和支付方法
CN102377560A (zh) * 2010-08-19 2012-03-14 北京韩美智恒科技有限公司 一种移动通信终端数据加密方法及装置
CN107070909A (zh) * 2017-04-01 2017-08-18 广东欧珀移动通信有限公司 信息发送方法、信息接收方法、装置及系统

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100488304C (zh) * 2007-05-25 2009-05-13 中兴通讯股份有限公司 一种实现及解除终端设备和用户识别卡绑定的方法和设备
FI20075577A0 (fi) * 2007-08-17 2007-08-17 Exove Oy Turvallinen tiedonsiirto
US20090088125A1 (en) * 2007-10-01 2009-04-02 At&T Knowledge Ventures, Lp System and Method for Locating a Cellular Telephone in an Emergency
CN101198121B (zh) * 2007-12-28 2011-07-20 中国移动通信集团四川有限公司 一种用户限制他人非法使用手机的鉴权方法
CN101340443B (zh) * 2008-08-28 2014-12-03 中国电信股份有限公司 一种通信网络中会话密钥协商方法、系统和服务器
CN101448001B (zh) * 2008-11-19 2012-03-21 中国工商银行股份有限公司 一种实现wap手机银行交易安全控制的系统及方法
CN101860525B (zh) * 2009-09-25 2012-11-14 深圳市安捷信联科技有限公司 电子授权状实现方法、智能终端、授权系统及验证终端
CN102014336A (zh) * 2010-08-19 2011-04-13 上海闻泰电子科技有限公司 一种基于gps的手机定位方法
CN102843405A (zh) * 2011-06-24 2012-12-26 基信康信息技术(上海)有限公司 移动终端、网络服务器和移动终端防盗服务的方法
CN102255994B (zh) * 2011-06-30 2014-02-05 宇龙计算机通信科技(深圳)有限公司 用于移动终端的数据录制存储方法及系统
CN102387482A (zh) * 2011-10-24 2012-03-21 深圳市智慧宇宙管理咨询有限公司 手机服务信息获取方法、系统及手机
US20160359822A1 (en) * 2013-12-31 2016-12-08 Adam Manuel Rivera Sovereign share encryption protocol
US9819656B2 (en) * 2014-05-09 2017-11-14 Sony Interactive Entertainment Inc. Method for secure communication using asymmetric and symmetric encryption over insecure communications
US20160192194A1 (en) * 2014-12-29 2016-06-30 Gongming Yang Secure way to build internet credit system and protect private information
CN106375306A (zh) * 2016-08-31 2017-02-01 武汉钢铁工程技术集团通信有限责任公司 手机应用数据传输加密方法及系统
CN106534079A (zh) * 2016-10-19 2017-03-22 华迪计算机集团有限公司 一种用于数据文件安全处理的方法及系统

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060104441A1 (en) * 2004-11-17 2006-05-18 Microsoft Corporation Password protection
CN101442409A (zh) * 2007-11-23 2009-05-27 东方钢铁电子商务有限公司 用于b2b数据交换的加密方法及系统
CN101771699A (zh) * 2010-01-06 2010-07-07 华南理工大学 一种提高SaaS应用安全性的方法及系统
CN102377560A (zh) * 2010-08-19 2012-03-14 北京韩美智恒科技有限公司 一种移动通信终端数据加密方法及装置
CN101964793A (zh) * 2010-10-08 2011-02-02 上海银联电子支付服务有限公司 终端和服务器间的数据传输方法及系统、签到和支付方法
CN107070909A (zh) * 2017-04-01 2017-08-18 广东欧珀移动通信有限公司 信息发送方法、信息接收方法、装置及系统

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110138739A (zh) * 2019-04-15 2019-08-16 平安科技(深圳)有限公司 数据信息加密方法、装置、计算机设备及存储介质
CN110138739B (zh) * 2019-04-15 2023-04-18 平安科技(深圳)有限公司 数据信息加密方法、装置、计算机设备及存储介质
CN110798830A (zh) * 2019-09-27 2020-02-14 华为终端有限公司 一种失联设备查找方法及设备
CN110798830B (zh) * 2019-09-27 2023-09-12 华为终端有限公司 一种失联设备查找方法及设备
CN112804061A (zh) * 2021-01-04 2021-05-14 武汉虹信科技发展有限责任公司 电调天线控制器的数据传输方法及系统
CN112910916A (zh) * 2021-02-23 2021-06-04 内江佳路云网络科技有限公司 一种基于云计算的智能家居网关系统信息加密处理方法
CN114024665A (zh) * 2021-09-14 2022-02-08 天聚地合(苏州)数据股份有限公司 一种随机密钥及卡号生成方法及装置
CN113872946A (zh) * 2021-09-15 2021-12-31 上海宝康电子控制工程有限公司 一种前后端分离的数据加密传输方法及系统
CN116684075A (zh) * 2023-07-31 2023-09-01 章和技术(广州)有限公司 一种移动介质加密方法、装置、设备及存储介质
CN116684075B (zh) * 2023-07-31 2023-09-29 章和技术(广州)有限公司 一种移动介质加密方法、装置、设备及存储介质

Also Published As

Publication number Publication date
EP3605989B1 (en) 2020-10-28
EP3605989A4 (en) 2020-02-05
EP3605989A1 (en) 2020-02-05
CN107070909A (zh) 2017-08-18
ES2836114T3 (es) 2021-06-24

Similar Documents

Publication Publication Date Title
WO2018176781A1 (zh) 信息发送方法、信息接收方法、装置及系统
US12041165B2 (en) Key updating method, apparatus, and system
US10880746B2 (en) Network connection method, apparatus, storage medium and terminal
WO2021027554A1 (zh) 信息共享方法、终端设备、存储介质及计算机程序产品
CN111193695B (zh) 一种第三方账号登录的加密方法、装置及存储介质
CN109600223B (zh) 验证方法、激活方法、装置、设备及存储介质
WO2017041599A1 (zh) 业务处理方法及电子设备
WO2018014723A1 (zh) 密钥管理方法、装置、设备及系统
CN110417543B (zh) 一种数据加密方法、装置和存储介质
CN104836664B (zh) 一种执行业务处理的方法、装置和系统
WO2017185711A1 (zh) 控制智能设备的方法、装置、系统和存储介质
WO2017020630A1 (zh) 一种处理订单信息的方法、装置和系统
WO2015027712A1 (zh) 移动终端连接网络的方法、移动终端与终端设备
CN106845177A (zh) 密码管理方法及系统
CN110198301B (zh) 一种服务数据获取方法、装置及设备
WO2020164526A1 (zh) 一种分布式系统中的节点控制方法和相关装置
US10454905B2 (en) Method and apparatus for encrypting and decrypting picture, and device
CN107154935B (zh) 业务请求方法及装置
WO2018201991A1 (zh) 数据处理方法、系统、装置、存储介质及设备
US20160301530A1 (en) Sensitive operation verification method, apparatus, and system
US20120303964A1 (en) Portable terminal, and method for securing data transmitted between hardware modules
CN112533202A (zh) 身份鉴别方法及装置
CN110572268B (zh) 一种匿名认证方法和装置
CN114553612B (zh) 数据加密、解密方法、装置、存储介质及电子设备
CN117240475B (zh) 一种智能门锁的通信方法、系统、设备及介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17903570

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2017903570

Country of ref document: EP

Effective date: 20191029