WO2019001588A1 - Data processing method and apparatus, terminal, and storage medium - Google Patents

Data processing method and apparatus, terminal, and storage medium Download PDF

Info

Publication number
WO2019001588A1
WO2019001588A1 PCT/CN2018/098541 CN2018098541W WO2019001588A1 WO 2019001588 A1 WO2019001588 A1 WO 2019001588A1 CN 2018098541 W CN2018098541 W CN 2018098541W WO 2019001588 A1 WO2019001588 A1 WO 2019001588A1
Authority
WO
WIPO (PCT)
Prior art keywords
parameter
unlocking
key
processor side
terminal
Prior art date
Application number
PCT/CN2018/098541
Other languages
French (fr)
Chinese (zh)
Inventor
魏明业
Original Assignee
西安中兴新软件有限责任公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 西安中兴新软件有限责任公司 filed Critical 西安中兴新软件有限责任公司
Publication of WO2019001588A1 publication Critical patent/WO2019001588A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data
    • H04W8/245Transfer of terminal data from a network towards a terminal

Definitions

  • the present disclosure relates to the field of mobile communications technologies, and in particular, to a data processing method and apparatus, terminal, and storage medium.
  • mobile terminals support more and more functions.
  • Many of the functions on mobile terminals require locking because they involve user privacy or require authorization from the communications carrier.
  • privacy application lock For example, privacy application lock, user privacy data lock and lock network technology.
  • security data In the process of locking and unlocking, it is necessary to use security data such as key, lock parameters and unlock parameters.
  • the present disclosure provides a data processing method, including: receiving a first parameter of an unlocking object delivered by a server and a first key of an unlocking object, where the first parameter and the first key are used for determining Whether the terminal satisfies the condition for parsing the data; acquiring the second parameter of the unlocking object located at the terminal and the second key of the unlocking object; when the first parameter and the second parameter satisfy the preset first condition and When the first secret key and the second secret key satisfy the preset second condition, the unlocked object is unlocked.
  • the present disclosure provides a data processing method, including: acquiring an unlocking parameter generated based on a locking object from a terminal; generating a first key and a second key according to the unlocking parameter; and sending the first secret Key to the server; generating an application processor AP side unlocking parameter and a modem processor modem side unlocking parameter according to the second key; and generating an encrypted AP side unlocking parameter and an AP side key according to the AP side unlocking parameter; Generating an encrypted modem side unlocking parameter and a modem side key according to the modem side unlocking parameter; and writing the AP side key, the AP side unlocking parameter, and the encrypted modem side unlocking parameter to the storage on the AP side
  • the second area in the area, the storage area on the AP side further includes a first area, the second area has higher authority than the first area; and the modem side key, the modem side unlocking parameter, and the The encrypted AP-side unlocking parameter is written in a fourth area in the storage area on the modem side
  • the present disclosure provides a data processing apparatus, including: a receiving module, an obtaining module, and an unlocking module; the receiving module is configured to receive a first parameter of the unlocking object and a unlocking object of the unlocking object delivered by the server a first key, the first parameter and the first key are used to determine whether the terminal satisfies the condition for parsing data; the obtaining module is configured to acquire a second parameter of the unlocking object and a second key of the unlocking object; The unlocking module is configured to: when the first parameter and the second parameter satisfy a preset first condition, and the first key and the second key satisfy a preset second condition, Unlock the object to unlock it.
  • the present disclosure provides a data processing apparatus, including: an acquisition module, a first generation module, a transmission module, a second generation module, a third generation module, a fourth generation module, a first write module, and a second Writing a module;
  • the obtaining module is configured to acquire an unlocking parameter generated based on the locking object from the terminal;
  • the first generating module is configured to generate a first key and a second key according to the unlocking parameter;
  • the sending module is configured to send the first key to the server;
  • the second generating module is configured to generate an application processor AP side unlocking parameter and a modem processor modem side unlocking parameter according to the second key;
  • the third generation module is configured to generate an encrypted AP side unlocking parameter and an AP side key according to the AP side unlocking parameter, and the fourth generating module is configured to generate an encrypted modem side unlocking parameter and a modem according to the modem side unlocking parameter.
  • the first write module is configured to write the AP side key, the AP side unlocking parameter, and the encrypted modem side unlocking parameter into a storage area on the AP side.
  • the second area of the AP, the storage area of the AP side further includes a first area, the second area is higher than the first area; the second write module is configured to use the modem side key
  • the encrypted AP side unlocking parameter and the modem side unlocking parameter are written in a fourth area in the storage area on the modem side, and the modem side storage area further includes a third area, the fourth area
  • the authority is higher than the third area.
  • the present disclosure provides a terminal comprising at least a display screen, a processor, and a storage medium configured to store executable instructions, wherein the processor is configured to execute the stored executable instructions, the executable The instructions are configured to perform the data processing methods described herein.
  • the present disclosure provides a computer storage medium having stored therein computer executable instructions configured to perform the data processing methods described herein.
  • FIG. 1 is a flow chart of a data processing method in accordance with an embodiment of the present disclosure
  • FIG. 2 is a flowchart of a data processing method in accordance with an embodiment of the present disclosure
  • FIG. 3 is a flowchart of a data processing method in accordance with an embodiment of the present disclosure.
  • FIG. 4 is a flowchart of a data processing method in accordance with an embodiment of the present disclosure.
  • FIG. 5 is a schematic structural diagram of an AP processor according to an embodiment of the present disclosure.
  • FIG. 6 is a schematic structural diagram of a modem processor according to an embodiment of the present disclosure.
  • FIG. 7A is a flowchart of a data processing method in accordance with an embodiment of the present disclosure.
  • FIG. 7B is a flowchart of a data processing method in accordance with an embodiment of the present disclosure.
  • FIG. 7C is a flowchart of a data processing method in accordance with an embodiment of the present disclosure.
  • FIG. 8A is a flowchart of a data processing method according to an embodiment of the present disclosure.
  • FIG. 8B is a flowchart of a data processing method in accordance with an embodiment of the present disclosure.
  • 8C is a flowchart of a data processing method in accordance with an embodiment of the present disclosure.
  • FIG. 9A is a flowchart of a data processing method in accordance with an embodiment of the present disclosure.
  • 9B is a flowchart of a data processing method in accordance with an embodiment of the present disclosure.
  • 9C is a flowchart of a data processing method in accordance with an embodiment of the present disclosure.
  • FIG. 10 is a schematic structural diagram of a data processing apparatus of an application according to an embodiment of the present disclosure.
  • FIG. 11 is a schematic structural diagram of a data processing device of an application according to an embodiment of the present disclosure.
  • FIG. 12 is a schematic structural diagram of a terminal according to an embodiment of the present disclosure.
  • mobile terminals support more and more functions.
  • Many of the functions on mobile terminals require locking because they involve user privacy or require authorization from the communications carrier.
  • privacy application lock For example, privacy application lock, user privacy data lock and lock network technology.
  • security data In the process of locking and unlocking, it is necessary to use security data such as key, lock parameters and unlock parameters.
  • the mobile terminal After the operator locks the network, the mobile terminal generates a lock flag and unlocking information, and the unlocking information includes an unlocking parameter.
  • the unlocking parameter is stored locally in the mobile terminal or stored in the server.
  • the user inputs an unlocking parameter (such as an unlocking code) obtained from the store or through the network, and the mobile terminal compares the unlocking parameter input by the user with the unlocking parameter stored locally in the mobile terminal, if the unlocking parameter input by the user is stored in the If the local unlocking parameters of the mobile terminal are the same, the lock flag is deleted to unlock the network.
  • the user needs to go to the store or obtain the unlocking code through the network, which is very troublesome and the user experience is poor.
  • unlocking parameters it is not safe to store the unlocking parameters in the mobile terminal or the server. If the unlocking parameters are stored in the mobile terminal, there is a risk of being stolen. Even if the unlocking parameters are encrypted, the criminals may still steal the encrypted unlocking. The parameters are cracked. If the unlocking parameter is stored in the server, there is still the possibility that the unlocking parameter is tampered with during the process of sending the unlocking parameter to the mobile terminal by the server. Therefore, there is a need for a secure data processing method that can be automated.
  • the present disclosure particularly provides a data processing method and apparatus therefor, a terminal, and a storage medium that substantially obviate one or more of the problems due to the limitations and disadvantages of the related art.
  • embodiments of the present disclosure provide a data processing method.
  • the method can be applied to many scenarios, for example, unlocking of private data stored by a user on a mobile terminal, unlocking of a privacy application installed on a mobile terminal, and some services requiring an operator authorization (such as unlocking a network).
  • the mobile terminal includes an application processor (AP) chip and a modem chip.
  • AP application processor
  • the storage area on the AP side includes at least two areas.
  • the two areas are used as an example.
  • the storage area on the AP side includes a first area and a second area, where the second area is a security area in the storage area, and the second area is higher than the first area. region.
  • the first area may be a common storage area in the AP side storage area
  • the second area may be It is the Replay Protect Memory Block (RPMB) on the AP side.
  • the manufacturer sets the second area to be accessible only by the AP processor before leaving the factory.
  • the storage area on the modem side includes at least two areas. The two areas are taken as an example.
  • the storage area on the modem side includes a third area and a fourth area, wherein the fourth area is a security area in the storage area, and the fourth area is higher than the third area. region.
  • the third area may be a common storage area in the modem side storage area
  • the fourth area may be a security file storage area on the modem side ( SFS, Secure File System).
  • SFS Secure File System
  • the unlocking parameter generated based on the locking object is obtained from the terminal, and the first key and the second key are generated according to the unlocking parameter, and the first key is sent to the server.
  • the AP side unlocking parameter, the modem side unlocking parameter, the encrypted AP side unlocking parameter, the AP side key, the encrypted modem side unlocking parameter, and the modem side key are generated according to the second key, and the AP side key,
  • the AP side unlocking parameter and the encrypted modem side unlocking parameter are stored in the second area, and the modem side key, the modem side unlocking parameter, and the encrypted AP side unlocking parameter are stored in the fourth area, and the unlocking condition is set.
  • the mobile terminal meets the set unlocking condition
  • the first parameter and the first key sent by the server are received, and the second parameter and the second key are obtained from the terminal itself, only when the first parameter and the second parameter meet the preset.
  • the unlocking process is started when the first condition and the first key and the second key satisfy the preset second condition, by acquiring the encrypted modem side unlocking parameter stored in the second area and storing in the fourth area
  • the encrypted AP side unlocking parameter is double-sidedly unlocked.
  • FIG. 1 is a flow chart of a data processing method in accordance with an embodiment of the present disclosure. As shown in FIG. 1, in an embodiment, the method may include steps S101 to S106.
  • the terminal generates a lock flag and an unlock parameter based on the lock object according to the user's lock operation.
  • the locking object may be a communication network provided by an operator, may be a privacy application (such as a secure payment application), or may be a user's private data.
  • the locking operation may be a lock operation, and may be a privacy application locking operation or a privacy data locking operation.
  • the setting operation is included before the locking operation.
  • the setting operation sets a third condition for the user, the third condition being that the terminal satisfies the condition of unlocking.
  • the third condition is that the counter in the terminal reaches a threshold;
  • the locking object is a privacy application (such as a payment application) or privacy data of the user, the third condition
  • the terminal obtains the password input by the user, wherein the password may be a digital password, a fingerprint password, an eye password, a voice password, etc., and the user or the operator or the manufacturer may set the user according to the actual application needs. .
  • the third condition is that the counter in the terminal reaches a threshold
  • the user needs to set the size of the threshold.
  • the terminal sends the threshold to the server, and the server stores the threshold.
  • the terminal and the counter in the server start counting synchronously.
  • the terminal acquires the password input by the user
  • the user needs to input the password into the terminal.
  • the terminal sends the password information to the server, and the server stores the password information.
  • the terminal acquires an unlocking parameter generated based on the locking object from itself, and generates a first key and a second key according to the unlocking parameter.
  • the first key is the same as the second key
  • the terminal writes the second key to the unlocking process executed by the AP processor in a macro definition manner, where the unlocking single process is used.
  • the unlocking object is unlocked when the user unlocks, wherein the unlocking object is the locking object in step S101.
  • the terminal sends the first key to the server, and the server receives and stores the first key; and at step S104, the terminal generates an AP side unlocking parameter according to the second key, and the modem side is unlocked.
  • Parameters, encrypted AP side unlock parameters, AP side keys, encrypted modem side unlock parameters, and modem side keys are included in the terminal.
  • the terminal first generates an AP side unlocking parameter and a modem side unlocking parameter according to the second key, and the AP side unlocking parameter and the modem side unlocking parameter may be the same or different. Then, the terminal generates an encrypted AP side unlocking parameter and an AP side key according to the AP side unlocking parameter, and generates an encrypted modem side unlocking parameter and a modem side key according to the modem side unlocking parameter.
  • the encryption process of the AP side unlocking parameter and the encryption method of the AP side unlocking parameter and the AP side key may be any existing encryption algorithm, such as an asymmetric RSA algorithm, for the modem.
  • the side unlocking parameter is subjected to encryption processing, and the encryption method for generating the encrypted modem side unlocking parameter and the modem side key may also be any existing encryption method, and the encryption method may be used to encrypt the AP side unlocking parameter.
  • the encryption method is the same or different.
  • the AP side key, the AP side unlocking parameter, and the encrypted modem side unlocking parameter are written in the second area in the storage area on the AP side.
  • the storage area on the AP side further includes a first area, and the second area has higher authority than the first area.
  • the mobile terminal adopts a partitioning mode of an embedded multimedia chip (EMMC), the first area is a common storage area on the AP side, and the second area is an AP. Side RPMB area.
  • the manufacturer sets the second area to be unlocked only by the unlocking process executed by the AP processor.
  • the modem side key, the modem side unlocking parameter, and the encrypted AP side unlocking parameter are written in the fourth area in the storage area on the modem side.
  • the storage area on the modem side further includes a third area, and the fourth area has higher authority than the third area.
  • the mobile terminal adopts a partition mode of an embedded multimedia chip (EMMC)
  • the third area is a common storage area on the modem side
  • the fourth area is a modem.
  • Side SFS area The manufacturer sets the fourth area to be unlocked by the AP processor only after the factory is executed.
  • the terminal when unlocking, acquires the encrypted AP side unlocking parameter from the fourth area and acquires the encrypted modem side unlocking parameter from the second area to unlock, if only the AP side and the modem side are both
  • the terminal deletes the lock flag to complete the unlocking.
  • Embodiments of the present disclosure also provide a data processing method.
  • 2 is a flow chart of a data processing method in accordance with an embodiment of the present disclosure. As shown in FIG. 2, in an embodiment, the method may include steps S201 to S204.
  • step S201 when the terminal satisfies the preset third condition, the message that the terminal meets the preset third condition is sent to the server.
  • the preset third condition is a third condition set by the user in the setting operation in the step S101, and the message that the terminal satisfies the preset third condition includes the terminal identifier of the terminal.
  • step S201 can be applied to multiple different scenarios in the specific implementation process.
  • the following describes the scenarios based on several scenarios.
  • it can also be applied to other different scenarios.
  • the scene is not limited to the following.
  • Unlocking the network scenario At a certain moment, the counter in the user terminal reaches the preset threshold, that is, the preset third condition is met, and the terminal reports the message that the counter reaches the preset threshold to the server.
  • Unlocking the privacy application scenario At a certain moment, the user wants to open the locked privacy application (for example, a secure payment application), so the user inputs the password required to open the privacy application, that is, the preset third condition is met, and the terminal The message reporting server for entering the password of the privacy application input by the user is obtained by itself.
  • the locked privacy application for example, a secure payment application
  • Unlocking the privacy data scene At a certain moment, the user wants to read the private data that he has locked, so the user inputs the password required to read the private data, that is, the preset third condition is met, and the terminal acquires the user by itself.
  • the message input server for reading the password for reading the private data is sent to the server.
  • the password input by the user may be a digital password, a fingerprint password, an eye password, a voice password, etc., and the user or the operator or the manufacturer may according to the actual application needs. Set it yourself, I won't go into details here.
  • step S202 the first parameter of the unlocking object and the first key of the unlocking object delivered by the server are received.
  • the first parameter and the first key are sent by the server according to the terminal identifier, and the first parameter and the first key are used to determine whether the terminal satisfies the condition for parsing data.
  • the first parameter has different meanings according to different application scenarios in the specific implementation process.
  • the following describes the several parameters based on several scenarios. Of course, in the specific implementation process, it can also be applied. Other different scenarios are not limited to the following.
  • the first parameter is a value reached by the server-side counter; in the scenario of unlocking the privacy application scenario and unlocking the privacy data, the first parameter is password information pre-stored in the server, where The password information is the password information that the terminal transmits to the server and is stored by the server in step S101.
  • step S203 a second parameter of the unlocking object located at the terminal and a second key of the unlocking object are acquired.
  • the second parameter corresponds to the first parameter, and has different meanings according to different application scenarios in a specific implementation process.
  • the following describes the several scenarios based on the descriptions thereof. Of course, in the specific implementation process. It can also be applied to other different scenarios, not limited to the following.
  • the second parameter is a value reached by the terminal counter; in the unlocking the privacy application scenario and the unlocking privacy data scenario, the second parameter is password information input by the user into the terminal.
  • the second key is the same as the second key written in the unlocking process in the manner defined by the macro in step S102 of FIG.
  • step S204 when the first parameter and the second parameter satisfy a preset first condition and the first key and the second key satisfy a preset second condition, the unlocking object is unlocked. Unlock it.
  • the preset first condition is that the first parameter and the second parameter satisfy a certain relationship, and may be equal to each other, or may be a difference or a sum of the two, satisfying a certain range, user or operation.
  • the manufacturer or manufacturer can set it according to the needs of the actual application, and will not go into details here.
  • the preset second condition is that the first key and the second key satisfy a certain relationship, and may be equal to each other, or may be a difference or a sum of the two, satisfying a certain range. Or the operator or the manufacturer can set it according to the needs of the actual application, and will not be described here.
  • the unlocking object is the same as the locking object in step S101 of FIG. 1.
  • the unlocking the unlocking object refers to starting an unlocking single process executed by the AP processor, and the unlocking single process is used to execute the unlocking object.
  • one parameter and one secret key are stored on the server side, and one parameter and one secret key are also stored on the terminal side, by determining whether the parameters on the server side and the terminal side are different from the secret key.
  • the predetermined condition is met to decide whether to unlock the unlocked object.
  • a person skilled in the art may also store a plurality of parameters and a plurality of keys on the server side and the terminal side respectively to determine whether to unlock the unlocked object.
  • two parameters and two keys are stored on the server side, and two parameters and two keys are also stored on the terminal side.
  • Embodiments of the present disclosure also provide a data processing method.
  • 3 is a flow chart of a data processing method in accordance with an embodiment of the present disclosure. As shown in FIG. 3, in an embodiment, the method may include steps S301 to S307.
  • step S301 when the terminal satisfies the preset third condition, the message that the terminal satisfies the preset third condition is sent to the server.
  • step S302 the first parameter of the unlocking object and the first key of the unlocking object delivered by the server are received.
  • step S301 is similar to step S201 of FIG. 2, and step S302 is similar to step S202 of FIG. 2, and therefore, no further description is made here.
  • the first parameter is read from a storage area on the modem side.
  • the first parameter and the first key delivered by the server in step S302 are received by the modem processor in the terminal.
  • the terminal stores the first parameter and the first key in a third area on the modem side, where the third area is a normal storage area on the modem side.
  • the second parameter is read from a second reserved field in the first region.
  • the first area on the AP side that is, the normal storage area on the AP side
  • two fields, a first reserved field and a second reserved field are reserved, and the first reserved field is initialized to a null value
  • the second reserved field is used to store the second parameter.
  • step S305 if the first parameter and the second parameter satisfy a preset first condition, the first key is read from the storage area on the modem side, and the first secret is The value of the key is written to the first reserved field.
  • the preset first condition is that the first parameter and the second parameter satisfy a certain relationship, and may be equal to each other, or may be a difference or a sum of the two, satisfying a certain range, user or operation.
  • the manufacturer or manufacturer can set it according to the needs of the actual application, and will not go into details here.
  • the terminal deletes the first key in the storage area on the modem side, and ends the processing flow.
  • step S306 if the first reserved field is non-empty, the value in the first reserved field is compared with the value of the second key.
  • the unlocking single process performed by the AP processor in the terminal monitors the first reserved field in real time, and when the first reserved field is non-empty, the unlocking single process compares the first reserved field. And a value of the second key, wherein the second key is written in the unlocking process in a macro definition manner; if the first reserved field is a null value, the unlocking The single process continues to monitor the first reserved field in real time.
  • step S307 if the value in the first reserved field and the value of the second key satisfy the preset second condition, the unlocked object is unlocked.
  • the preset second condition is that the value in the first reserved field satisfies a certain relationship with the value of the second key, and may be equal to each other, or may be a difference or sum of the two. To meet a certain range, the user or the operator or the manufacturer can set it according to the needs of the actual application, and will not be described here.
  • the terminal deletes the value in the first reserved field, and ends the processing flow.
  • the unlocking object is the same as the locking object in step S101, and the unlocking the unlocking object refers to starting an unlocking single process executed by the AP processor, where the unlocking single process is used to perform an AP side and an unlocking object. Double-sided cross data unlock processing on the modem side.
  • one parameter and one secret key are stored on the server side, and one parameter and one secret key are also stored on the terminal side, by determining whether the parameters on the server side and the terminal side are different from the secret key.
  • the predetermined condition is met to decide whether to unlock the unlocked object.
  • a person skilled in the art may also store a plurality of parameters and a plurality of keys on the server side and the terminal side respectively to determine whether to unlock the unlocked object.
  • two parameters and two keys are stored on the server side, and two parameters and two keys are also stored on the terminal side.
  • Embodiments of the present disclosure also provide a data processing method.
  • 4 is a flow chart of a data processing method in accordance with an embodiment of the present disclosure. As shown in FIG. 4, in an embodiment, the method may include steps S401 to S410.
  • step S401 when the terminal satisfies the preset third condition, the message that the terminal meets the preset third condition is sent to the server.
  • step S402 the first parameter of the unlocking object and the first key of the unlocking object delivered by the server are received.
  • the first parameter is read from a storage area on the modem side.
  • the second parameter is read from a second reserved field in the first region.
  • step S405 if the first parameter and the second parameter satisfy a preset first condition, the first key is read from the storage area on the modem side, and the first secret is The value of the key is written to the first reserved field.
  • step S406 if the first reserved field is non-empty, the value in the first reserved field is compared with the value of the second key.
  • steps S401 to S406 are similar to steps S301 to S306 of FIG. 3, and therefore, no further description is made herein.
  • the encrypted AP side unlocking parameter and the encrypted modem side unlocking parameter are acquired from the terminal.
  • the encrypted modem side unlocking parameter is acquired from the second area in the storage area on the AP side, and the right of the second area is higher than the first area.
  • the mobile terminal adopts a partitioning mode of an embedded multimedia chip (EMMC), the first area is a common storage area on the AP side, and the second area is an AP. Side RPMB area.
  • EMMC embedded multimedia chip
  • Side RPMB area The manufacturer sets the second area to be unlocked only by the unlocking process executed by the AP processor.
  • the encrypted AP side unlocking parameter is acquired from the fourth area in the storage area on the modem side, and the storage area on the modem side further includes a third area having a lower authority than the fourth area.
  • the mobile terminal adopts a partition mode of an embedded multimedia chip (EMMC), the third area is a common storage area on the modem side, and the fourth area is a modem. Side SFS area. The manufacturer sets the fourth area to be unlocked by the AP processor only after the factory is executed.
  • EMMC embedded multimedia chip
  • a first flag bit is generated based on the encrypted AP side unlocking parameter, the first flag bit being used to indicate whether the parsing of the encrypted AP side unlocking parameter is successful.
  • the generating the first flag bit based on the encrypted AP side unlocking parameter includes: acquiring an AP side unlocking parameter and an AP side key from the second area; and decrypting the encrypted AP side unlocking parameter according to the AP side key The decrypted AP side unlocking parameter is obtained; the decrypted AP side unlocking parameter and the AP side unlocking parameter are compared to obtain a first comparison result; and the first flag bit is generated according to the first comparison result.
  • the first flag bit may be set to 0 or 1, where 0 indicates that the parsing fails, and 1 indicates that the parsing is successful.
  • the first flag bit may also be set to 00 to indicate parsing failure, 11 Indicates that the analysis was successful. The user or the operator or the manufacturer can set it according to the needs of the actual application, and will not be described here.
  • a second flag bit is generated based on the encrypted modem side unlocking parameter, the second flag bit being used to indicate whether the encrypted modem side unlocking parameter is resolved successfully.
  • the generating, according to the encrypted modem side unlocking parameter, a second flag bit comprising: acquiring a modem side unlocking parameter and a modem side key from the fourth area; and decrypting the encrypted modem side unlocking parameter according to the modem side key Obtaining the decrypted modem side unlocking parameter; comparing the decrypted modem side unlocking parameter and the modem side unlocking parameter to obtain a second comparison result; and generating a second flag bit according to the second comparison result.
  • the second flag bit may be set to 0 or 1, where 0 indicates that the parsing fails, 1 indicates that the parsing is successful, and of course, the second flag bit may also be set to 00 to indicate parsing failure, 11 Indicates that the analysis was successful.
  • the user or the operator or the manufacturer can set it according to the needs of the actual application, and will not be described here.
  • the method of setting the first mark bit may be the same as or different from the method of setting the second mark bit.
  • step S410 when the first marker bit and the second marker bit satisfy a preset fourth condition, the unlocked object is unlocked.
  • the preset fourth condition is that both the encrypted AP side unlocking parameter and the encrypted modem side unlocking parameter are successfully parsed. For example, when both the first flag bit and the second flag bit are set to 0, the parsing fails, and 1 indicates that the parsing is successful, if and only if the first flag bit and the second flag bit are both 1, the first flag bit is indicated. And the second marker bit satisfies the preset first condition.
  • the terminal ends the processing flow.
  • one parameter and one secret key are stored on the server side, and one parameter and one secret key are also stored on the terminal side, by determining whether the parameters on the server side and the terminal side are different from the secret key.
  • the predetermined condition is met to decide whether to unlock the unlocked object.
  • a person skilled in the art may also store a plurality of parameters and a plurality of keys on the server side and the terminal side respectively to determine whether to unlock the unlocked object.
  • two parameters and two keys are stored on the server side, and two parameters and two keys are also stored on the terminal side.
  • Embodiments of the present disclosure also provide a data processing method. Before introducing a data processing method provided by this embodiment, the composition of the AP processor and the modem processor in this embodiment will be described.
  • FIG. 5 is a schematic structural diagram of an AP processor according to an embodiment of the present disclosure.
  • the AP processor includes a processing area for executing a command and a storage area for storing data.
  • the processing area of the AP processor includes: an unlocking single process, an AP side data storage module, an AP side data processing module, and an AP side data parsing module.
  • the unlocking single process is used to perform double-side cross data unlocking processing on the AP side and the modem side on the unlocking object.
  • the storage area of the AP processor includes a common storage area and an RPMB area, and the RPMB area belongs to a security area in the storage area, and the area has higher authority than the normal storage area. The manufacturer sets the RPMB area before leaving the factory, and only the unlocking single process can be accessed.
  • FIG. 6 is a schematic structural diagram of a modem processor according to an embodiment of the present disclosure.
  • the modem processor includes a processing area for executing a command and a storage area for storing data.
  • the processing area of the modem processor includes: a modem side data storage module, a modem side data processing module, and a modem side data parsing module.
  • the storage area of the modem processor includes a common storage area and an SFS area, and the SFS area belongs to a security area in the storage area, and the area has higher authority than the normal storage area. The manufacturer sets the SFS area before leaving the factory, and only the unlocking single process can be accessed.
  • FIGS. 7A through 7C are flowcharts of a data processing method according to an embodiment of the present disclosure. As shown in FIGS. 7A through 7C, in an embodiment, the method includes steps S701 through S718.
  • the terminal is in an initial state, and four values are stored in the normal storage area in the storage area of the terminal AP processor, and are respectively stored in four different positions.
  • terminal parameter 1 and terminal parameter 2 are terminal parameters (terminal parameter 1 and terminal parameter 2), and the other two are null values.
  • the terminal parameter is the second parameter in the foregoing embodiment
  • the location for storing the terminal parameter is the second reserved field in the foregoing embodiment
  • the location for storing the null value is the first in the foregoing embodiment. Reserved field.
  • step S702 when the terminal satisfies the parsing condition one, it reports to the server, and receives the server parameter 1 and key1 values delivered by the server according to the terminal identifier; when the terminal satisfies the parsing condition 2, the server reports the value to the server, and the receiving server delivers the message according to the terminal identifier. Server parameter 2 and key2 values.
  • the two server parameters are sent by the instruction, and the command header file includes server parameter 1 and server parameter 2, and the redundancy bit includes the key1 value and the key2 value.
  • the analysis condition 1 and the analysis condition 2 may be identical, that is, there is only one analysis condition, such as the third condition in the above embodiment.
  • those skilled in the art may separately set different analysis conditions 1 and analysis conditions 2.
  • the server parameter 1 and the server parameter 2 may also be consistent.
  • the server parameter 1 and the server parameter 2 are the same as the first parameter in the foregoing embodiment, those skilled in the art may separately set different server parameters 1 and server.
  • Parameter 2; the key1 value may be the same as the key2 value.
  • the key1 value and the key2 value are the first key in the foregoing embodiment.
  • those skilled in the art may separately set different key1 values and key2 values. .
  • server parameter 1 and server parameter 2 in the instruction header file are read.
  • step S704 it is compared whether the two terminal parameters stored by the terminal are consistent with the two server parameters.
  • the two terminal parameters stored in the terminal are the terminal parameter 1 and the terminal parameter 2, respectively, and the terminal parameter 1 and the terminal parameter 2 may be identical.
  • the terminal parameter 1 and the terminal parameter 2 are the second parameter in the foregoing embodiment.
  • those skilled in the art can also set different terminal parameters 1 and terminal parameters 2 respectively.
  • the two terminal parameters are consistent with the two server parameters, specifically comparing whether the terminal parameter 1 and the server parameter 1 are consistent, and comparing whether the terminal parameter 2 and the server parameter 2 are consistent.
  • step S705 if the two terminal parameters are consistent with the two server parameters, the corresponding key1 value and/or key2 value in the instruction is read, and the key1 value and/or the key2 value are stored to the null area reserved by the terminal.
  • the corresponding key1 value in the command is read, and the key1 value is stored to the null value area reserved by the terminal; if only the terminal parameter 2 is consistent with the server parameter 2, Then, the corresponding key2 value in the instruction is read, and the key2 value is stored to the null value area reserved by the terminal; if the terminal parameter 1 is consistent with the server parameter 1 and the terminal parameter 2 is consistent with the server parameter 2, the corresponding command is read.
  • the key1 value and the key2 value and store the key1 value and the key2 value to the null area reserved by the terminal.
  • step S701 if the two terminal parameters are inconsistent with the two server parameters, the process flow returns to step S701, and the key1 value and/or the key2 value delivered by the server is deleted.
  • step S701 if the two terminal parameters are inconsistent with the two server parameters, the process flow returns to step S701, and the key1 value and/or the key2 value delivered by the server is specifically deleted: if only the terminal parameter 1 is inconsistent with the server parameter 1 Delete the key1 value sent by the server and return to step S701; if only the terminal parameter 2 is inconsistent with the server parameter 2, delete the key2 value sent by the server and return to step S701; if the terminal parameter 1 is inconsistent with the server parameter 1 and the terminal parameter 2 If the server parameter 2 is also inconsistent, the key1 value and the key2 value sent by the server are deleted, and the process returns to step S701.
  • the unlocking single process determines whether the storage area of the key1 value and the key2 value is empty; if both the key1 value and the key2 value are not empty, it is determined whether the key1 value and the key2 value are written in the unlocking process.
  • Parameter 1 is consistent with parameter 2.
  • the key1 value and the key2 value are consistent with the parameter 1 and the parameter 2 written in the unlocking process. Specifically, it is determined whether the key1 value is consistent with the parameter 1 written in the unlocking process, and whether the key2 value is related to the unlocking list.
  • the parameters 2 written in the process are the same.
  • parameter 1 and the parameter 2 which are written in the process of the unlocking process can be the same as the parameter 2, and the second key in the above embodiment can be used. Parameter 1 and parameter 2.
  • the unlocking single process is set to monitor the null value area in the normal storage area of the terminal AP processor in real time, and the parameters 1 and 2 written in the unlocking single process are set by macro definition.
  • step S707 if one of the storage areas of the key1 value and the key2 value is empty, or one of the key1 value and the key2 value does not match the parameter 1 and the parameter 2 written in the unlocking process, the process flow goes to step S707; if the key1 value And the storage area of the key2 value is not empty, and the key1 value and the key2 value are both consistent with the parameters 1 and 2 written in the second single process, the process flow goes to step S708.
  • one of the storage areas of the key1 value and the key2 value is empty, and the storage area of the key1 value is empty, or the storage area of the key2 value is empty, or the storage areas of the key1 value and the key2 value are empty.
  • the key1 value and the key2 value have one inconsistent with the parameter 1 and the parameter 2 written in the unlocking process.
  • the key1 value is inconsistent with the parameter 1 written in the unlocking process, or the key2 value is written in the unlocking process.
  • the parameter 2 is inconsistent, or the key1 value is inconsistent with the parameter 1 written in the unlocking process and the key2 value is also inconsistent with the parameter 2 written in the unlocking process.
  • both the key1 value and the key2 value are consistent with the parameters 1 and 2 written in the unlocking process.
  • the key1 value is consistent with the parameter 1 written in the unlocking process and the key2 value and the parameter written in the unlocking process. 2 is also consistent.
  • the unlocking single process continues to monitor the null area in the normal storage area in real time.
  • step S708 the unlocking single process performs steps S709 to S718.
  • step S709 the unlocking single process sends a request for acquiring an AP side parsing parameter to the SFS area.
  • the AP side resolution parameter is an AP side unlocking parameter encrypted in the foregoing embodiment.
  • the unlocking single process acquires an AP side parsing parameter.
  • the AP side data processing module in the AP processor decrypts the AP side parsing parameter.
  • the AP side data processing module in the AP processor decrypts the AP side parsing parameter, and the unlocking single process sends the AP side parsing parameter to the AP side data processing module, and the AP side data processing module collides.
  • the AP side parsing parameters are decrypted.
  • step S712 if the AP side data processing module decrypts the AP side parsing parameter is unsuccessful, the processing flow is terminated; if the AP side data processing module decrypts the AP side parsing parameter successfully, the AP side data processing module parses the decrypted AP side.
  • the parameter is sent to the AP side data parsing module in the AP processor for parsing, and the AP side parsing flag bit is generated according to the parsing result.
  • the decrypted AP side parsing parameter is the decrypted AP side unlocking parameter in the above embodiment
  • the AP side parsing flag bit is the first flag bit in the above embodiment.
  • the AP side data parsing module sends the AP side parsing flag bit to the unlocking single process.
  • the AP side parsing flag bit is used to indicate whether the AP side parsing parameter is successfully parsed; the AP side flag bit may be set to 0 or 1, where 0 indicates parsing failure and 1 indicates parsing success.
  • the unlocking single process sends a request to acquire a modem side resolution parameter to the RPMB area.
  • the modem side resolution parameter is the encrypted modem side unlocking parameter in the above embodiment.
  • the unlocking single process acquires a modem side resolution parameter.
  • the modem side data processing module in the modem processor decrypts the modem side parsing parameter.
  • step S717 if the modem side data processing module decrypts the modem side parsing parameter is unsuccessful, the processing flow is terminated; if the modem side data processing module decrypts the modem side parsing parameter successfully, the modem side data processing module parses the decrypted modem side.
  • the parameter is sent to the modem side data parsing module in the modem processor for parsing, and the modem side parsing flag bit is generated according to the parsing result.
  • the decrypted modem side parsing parameter is the decrypted modem side unlocking parameter in the above embodiment
  • the modem side parsing flag bit is the second flag bit in the above embodiment.
  • the modem side parsing flag bit is used to indicate whether the modem side parsing parameter is successfully parsed; the modem side parsing flag bit may be set to 0 or 1, where 0 indicates parsing failure and 1 indicates parsing succeeds.
  • the modem side data parsing module sends the modem side parsing flag bit to the unlocking single process.
  • the terminal is normally unlocked if and only if both parsing flag bits are 1.
  • the dual-side parsing and the dual-parsing parameters are set, and the dual-parsing parameters are respectively stored in the security area in the modem side and the AP side storage area, and the dual-side security area is only the AP processor.
  • the unlocked single process that is executed can be accessed.
  • the server sends the server parameter 1 and key1.
  • the server reports the server parameter 2 and the key2 value.
  • the terminal preferentially reads the server parameter.
  • the terminal When the server parameter is used, When the terminal parameters are consistent or the value of the server parameter meets the preset condition, the terminal reads the corresponding key value and writes the blank area in the normal storage area of the AP processor. If they are inconsistent, the terminal deletes the corresponding key value.
  • the unlocking single process will retrieve the AP side from the modem side security area when the blank area in the normal storage area of the AP processor is not empty, and the value in the blank area is consistent with the value of the parameter written by the macro definition.
  • the parameters are parsed, and the AP side analysis parameters are sent to the AP side data processing module for processing.
  • the processed data is sent to the AP side data analysis module for analysis.
  • the unlocking single process also extracts the modem side parsing parameter from the AP side security area and sends it to the modem side data processing module for processing, and the processed data is sent to the modem side data parsing module for parsing.
  • the terminal is normally unlocked.
  • the terminal cannot be unlocked normally.
  • the terminal parameter 1 in the above embodiment is the terminal count 1; the terminal parameter 2 is the terminal count 2; the analysis condition 1 is the unlock network condition 1; the analysis condition 2 is the unlock network condition 2; the server parameter 1 is the server count 1
  • the server parameter 2 is the server count 2; the unlock single process is the subscriber identification module unlock (simunlock) module; the AP side resolution parameter is the AP side unlock network parameter; the modem side resolution parameter is the modem side unlock network parameter; the AP side
  • the parsing flag bit is the AP side unlocking network tag bit; the modem side parsing flag bit is the modem side unlocking network tag bit; the modem side data storage module is the modem side unlocking network parameter storage module; and the modem side data processing module is the modem side unlocking network parameter decryption.
  • the module side data parsing module is the modem side unlocking network module; the AP side data storage module is the AP side unlocking network parameter storage module; the AP side data processing module is the AP side unlocking network parameter decryption module; the AP side data parsing module is the AP side. Unlock the network module.
  • FIGS. 8A through 8C are flowcharts of a data unlocking method according to an embodiment of the present disclosure.
  • the method may include steps S801 through S818.
  • the terminal is in an initial state, and four values are stored in a normal storage area in the storage area of the AP processor, and are respectively stored in four different positions, wherein two are terminal counts, and the other two The number is null.
  • terminal counts are terminal count 1 and terminal count 2, respectively.
  • step S802 when the terminal satisfies the unlocking network condition one, the server reports to the server, and receives the server count 1 and key1 values issued by the server according to the terminal identifier; when the terminal satisfies the parsing condition 2, reports the server to the server, and receives the server according to the terminal identifier.
  • the sent server counts 2 and key2 values.
  • the server count 1 is the value 1 reached by the lock counter 1 in the server
  • the server count 2 is the value 2 reached by the lock counter 2 in the server.
  • step S803 the server count 1 and the server count 2 are read.
  • step S804 it is compared with whether the two terminal counts stored by the terminal are consistent with the two server counts.
  • the terminal count 1 is the value 1 reached by the terminal unlocking network counter 1
  • the terminal count 2 is the value 2 reached by the terminal unlocking network counter 2.
  • the two terminal counts are consistent with the two server counts, specifically whether the comparison terminal count 1 is consistent with the server count 1, and the comparison between the terminal count 2 and the server count 2 is consistent.
  • step S805 if the two terminal counts coincide with the two server counts, the corresponding key1 value and/or key2 value are read, and the key1 value and/or the key2 value are stored to the null area reserved by the terminal.
  • the corresponding key1 value is read, and the key1 value is stored to the null area reserved by the terminal; if only the terminal count 2 is consistent with the server count 2, then read The corresponding key2 value is obtained, and the key2 value is stored in the null value area reserved by the terminal; if the terminal count 1 is consistent with the server count 1 and the terminal count 2 is consistent with the server count 2, the corresponding key1 value and the key2 value are read. And store the key1 value and the key2 value to the null area reserved by the terminal.
  • step S801 if the two terminal counts are inconsistent with the two server counts, the process flow returns to step S801 to delete the key1 value and/or the key2 value delivered by the server, and the minimum synchronization count.
  • step S801 deletes the key1 value and/or the key2 value delivered by the server, and the minimum synchronization count, specifically: if only the terminal counts 1 If the server 1 is inconsistent with the server, the key1 value sent by the server is deleted, and the process returns to step S801, and the minimum synchronization is counted. If only the terminal count 2 is different from the server count 2, the key2 value sent by the server is deleted and the process returns to step S801 and is minimum.
  • Synchronization count if the terminal count 1 is inconsistent with the server count 1 and the terminal count 2 and the server count 2 are also inconsistent, the key1 value and the key2 value delivered by the server are deleted and the process returns to step S801, and the minimum synchronization count is performed.
  • the minimum synchronization count specifically resets the terminal count 1 to the server count 1, and resets the terminal count 2 to the server count 2.
  • the simunlock module determines whether the storage area of the key1 value and the key2 value is empty; if both the key1 value and the key2 value are not empty, it is determined whether the key1 value and the key2 value are the parameters 1 written in the simunlock module. Consistent with parameter 2.
  • it is determined whether the key1 value and the key2 value are consistent with the parameter 1 and the parameter 2 written in the simunlock module specifically: determining whether the key1 value is consistent with the parameter 1 written in the simunlock module, and determining whether the key2 value is written in the simunlock module.
  • the specified parameter 2 is consistent.
  • the simunlock module is configured to monitor a null value area in a normal storage area of the terminal AP processor in real time, and parameters 1 and 2 written in the simunlock module are set by a macro definition.
  • step S807 if one of the storage areas of the key1 value and the key2 value is empty, or the key1 value and the key2 value have a parameter that is different from the parameter written in the simunlock module, the process flow goes to step S807; if the key1 value and the key2 value are stored If the area is not empty, and the key1 value and the key2 value are both consistent with the parameters 1 and 2 written in the simunlock module, the process goes to step S808.
  • one of the storage areas of the key1 value and the key2 value is empty, and the storage area of the key1 value is empty, or the storage area of the key2 value is empty, or the storage areas of the key1 value and the key2 value are empty.
  • the key1 value and the key2 value have one inconsistency with the parameter 1 and the parameter 2 written in the simunlock module.
  • the key1 value is inconsistent with the parameter 1 written in the simunlock module, or the key2 value and the parameter 2 written in the simunlock module. Inconsistent, or the key1 value is inconsistent with the parameter 1 written in the simunlock module and the key2 value is also inconsistent with the parameter 2 written in the simunlock module.
  • both the key1 value and the key2 value are consistent with the parameters 1 and 2 written in the simunlock module.
  • the key1 value is consistent with the parameter 1 written by the simunlock module and the key2 value is also consistent with the parameter 2 written in the simunlock module.
  • the simunlock module continues to monitor the null area in the normal storage area of the terminal AP processor in real time.
  • the simunlock module performs steps S809 through S818.
  • step S809 the simunlock module sends a request for acquiring an AP side unlocking network parameter to the SFS area.
  • the simunlock module acquires an AP side unlocking network parameter.
  • the AP side unlocking network parameter decryption module in the AP processor decrypts the AP side unlocking network parameter.
  • the AP side unlocking network parameter decryption module in the AP processor decrypts the AP side unlocking network parameter
  • the simunlock module sends the AP side unlocking network parameter to the AP side unlocking network parameter decryption module
  • the AP side The unlocking network parameter decryption module decrypts the AP side unlocking network parameters.
  • Step S812 If the AP side unlocking network parameter decryption module decrypts the AP side unlocking network parameter is unsuccessful, the processing flow is terminated; if the AP side unlocking network parameter decryption module decrypts the AP side unlocking network parameter successfully, the AP side unlocking network parameter The decryption module sends the decrypted AP side unlocking network parameter to the AP side unlocking network module in the AP processor to unlock, and generates an AP side unlocking network flag bit according to the unlocking result.
  • the AP side unlocking network flag bit is used to indicate whether the AP side unlocking is successful; the AP side unlocking network flag bit can be set to 0 or 1, where 0 indicates that the unlocking fails, and 1 indicates that the unlocking is successful.
  • the AP side unlocking network module sends the AP side unlocking network flag bit to the simunlock module.
  • the simunlock module sends a request for acquiring a modem side unlocking network parameter to the RPMB area.
  • the simunlock module acquires a modem side unlocking network parameter.
  • the modem side unlocking network parameter is decrypted by the modem side unlocking network parameter decryption module in the modem processor.
  • step S817 if the modem side unlocking network parameter decryption module decrypts the modem side unlocking network parameter is unsuccessful, the processing flow is terminated; if the modem side unlocking network parameter decryption module decrypts the modem side unlocking network parameter successfully, the modem side unlocking network parameter is decrypted.
  • the module sends the decrypted modem side unlocking network parameter to the modem side unlocking network module in the modem processor to unlock, and generates a modem side unlocking network marking bit according to the unlocking result.
  • the modem side unlocking network flag bit is used to indicate whether the modem side unlocking network parameter is unlocked successfully; the modem side unlocking network flag bit can be set to 0 or 1, wherein 0 means unlocking failure, 1 means unlocking success.
  • the modem side unlocking network module sends the modem side unlocking network flag bit to the simunlock module.
  • the terminal is normally unlocked if and only if both unlocking network flag bits are 1.
  • the parameters of the double-side unlocking and the double-side unlocking network are set in the embodiment of the present disclosure, and the parameters of the double-side unlocking network are respectively stored in the security area in the modem side and the AP side storage area.
  • the two-sided security zone is accessible only to the simunlock module in the AP processor.
  • the simunlock module may retrieve the AP side unlocking network parameter from the modem side security area when the blank area is not empty, and the value in the blank area is consistent with the parameter value written by the simunlock module itself through the macro definition, and The AP-side unlocking network parameters are sent to the AP-side unlocking network parameter decryption module for decryption. The data after successful decryption is sent to the AP-side unlocking network module for unlocking.
  • the simunlock module also retrieves the modem side parsing parameter from the ap side security area and sends the modem side unlocking network parameter decryption module to decrypt, and the decrypted data is sent to the modem side unlocking network module for unlocking.
  • the terminal is normally unlocked.
  • the terminal cannot be unlocked normally.
  • a data unlocking method provided by the present disclosure is applied to unlock a privacy application or unlock a privacy data scenario.
  • the unlocking of the privacy application is taken as an example.
  • the terminal parameters in the foregoing embodiment are conditional determination parameters, such as a two-handed fingerprint or a two-eye eye pattern (in this embodiment, a binocular eye pattern is taken as an example), and the terminal parameter 1 is a terminal.
  • terminal parameter 2 is the eye pattern data 2 entered by the terminal;
  • the analysis condition 1 is the terminal input eye pattern 1;
  • the analysis condition 2 is the terminal input eye pattern 2;
  • the server parameter 1 is the server eye pattern data 1;
  • the server Parameter 2 is the server eye pattern data 2;
  • the unlocking single process is the privacy protection (Private Protection) module;
  • the AP side analysis parameter is the AP side eye pattern parameter;
  • the modem side analysis parameter is the modem side eye pattern parameter;
  • the AP side analysis flag bit is the AP side.
  • Modem side resolution flag bit is modem side resolution flag bit
  • modem side data storage module is modem side eye pattern parameter storage module
  • modem side data processing module is modem side privacy application parameter decryption module
  • modem side data parsing module The modem side privacy application parsing module; the AP side data storage module is an AP side eye pattern parameter storage module; and the AP side data processing module is an AP side privacy application parameter decryption. Block; AP side of the data analysis module AP side privacy application parsing module.
  • FIGS. 9A through 9C are flowcharts of a data unlocking method according to an embodiment of the present disclosure.
  • the method may include steps S901 through S918.
  • the terminal is in an initial state, and four values are stored in a normal storage area of the storage area of the terminal AP processor, and are respectively stored in four different positions, wherein two are used for storing terminal input. Eye pattern data, the other two are null values.
  • step S902 when the terminal enters the eye 1 , it reports to the server, and receives the server eye data 1 and key 1 values issued by the server according to the terminal identifier; when the terminal enters the eye 2, reports to the server, and receives the server according to the terminal. Identifies the server eye pattern data 2 and key2 values that are delivered.
  • step S903 the server eye pattern data 1 and the server eye pattern data 2 are read.
  • step S904 it is compared whether the two eye pattern data entered by the terminal are consistent with the two server eye pattern data.
  • comparing whether the two terminal eye pattern data is consistent with the two server eye pattern data specifically comparing whether the eye pattern data 1 recorded by the terminal is consistent with the server eye pattern data 1, and comparing the eye pattern data 2 entered by the terminal with the server eye pattern Whether data 2 is consistent.
  • step S905 if the two eye pattern data entered by the terminal are consistent with the two server eye pattern data, the corresponding key1 value and/or the key2 value are read, and the key1 value and/or the key2 value are stored to the terminal reserved. Null value area.
  • the corresponding key1 value is read, and the key1 value is stored to the null value reserved by the terminal; If the data 2 is consistent with the server eye pattern data 2, the corresponding key2 value is read, and the corresponding key2 value is read, and the key2 value is stored to the null value area reserved by the terminal; if the eyeline data 1 and the server eye are entered by the terminal If the pattern data 1 is consistent and the eye pattern data 2 entered by the terminal is also consistent with the server eye pattern data 2, the corresponding key1 value and key2 value are read, and the key1 value and the key2 value are stored to the null area reserved by the terminal.
  • step S901 if the two eye pattern data entered by the terminal are inconsistent with the two server eye pattern data, the process flow returns to step S901 to delete the key1 value and/or the key2 value delivered by the server.
  • step S901 to delete the key1 value and/or the key2 value delivered by the server, specifically: if only the terminal is entered. If the eye pattern data 1 does not match the server eye pattern data 1, the key1 value sent by the server is deleted and the process returns to step S901. If only the eye pattern data 2 entered by the terminal does not match the server eye pattern data 2, the key2 sent by the server is deleted.
  • step S901 if the eyeprint data 1 entered by the terminal is inconsistent with the server eyeprint data 1 and the eyeprint data 2 entered by the terminal does not match the server eyeprint data 2, the key1 value and the key2 value sent by the server are deleted. Go back to step S901.
  • the privacy protection module determines whether the storage area of the key1 value and the key2 value is empty; if both the key1 value and the key2 value are not empty, it is determined whether the key1 value and the key2 value are written in the privacy protection module.
  • Parameter 1 and parameter 2 are the same.
  • it is determined whether the key1 value and the key2 value are consistent with the parameter 1 and the parameter 2 written in the privacy protection module specifically: determining whether the key1 value is consistent with the parameter 1 written in the privacy protection module, and determining whether the key2 value is related to privacy protection.
  • the parameters 2 written in the module are the same.
  • the privacy protection module is configured to monitor a null value area in a normal storage area of the terminal AP processor in real time, and parameters 1 and 2 written in the privacy protection module are set by a macro definition.
  • step S907 if one of the storage areas of the key1 value and the key2 value is empty, or one of the key1 value and the key2 value is inconsistent with the parameter written in the privacy protection module, the process flow goes to step S907; if the key1 value and the key2 value are The storage area is not empty, and the key1 value and the key2 value are consistent with the parameters 1 and 2 written in the privacy protection module, and then the process goes to step S908.
  • one of the storage areas of the key1 value and the key2 value is empty, and the storage area of the key1 value is empty, or the storage area of the key2 value is empty, or the storage areas of the key1 value and the key2 value are empty.
  • the key1 value and the key2 value have one inconsistency with the parameter 1 and the parameter 2 written in the privacy protection module.
  • the key1 value is inconsistent with the parameter 1 written in the privacy protection module, or the key2 value is written in the privacy protection module.
  • the parameter 2 is inconsistent, or the key1 value is inconsistent with the parameter 1 written in the privacy protection module and the key2 value is also inconsistent with the parameter 2 written in the privacy protection module.
  • both the key1 value and the key2 value are consistent with the parameters 1 and 2 written in the privacy protection module, specifically: the key1 value is consistent with the parameter 1 written by the privacy protection module and the key2 value and the parameter 2 written in the privacy protection module are Also consistent.
  • the privacy protection module continues to monitor the null area in the normal storage area of the terminal AP processor in real time.
  • the privacy protection module performs steps S909 to S918.
  • the privacy protection module sends a request for acquiring an AP side eye pattern parameter to the SFS area.
  • the privacy protection module acquires an AP side eye pattern parameter.
  • the AP side eye pattern parameter is decrypted by the AP side privacy application parameter decryption module in the AP processor.
  • the AP side privacy application parameter decryption module in the AP processor decrypts the AP side eye pattern parameter
  • the privacy protection module sends the AP side eye pattern parameter to the AP side privacy application parameter decryption module.
  • the AP side privacy application parameter decryption module decrypts the AP side eye pattern parameter.
  • step S912 if the AP side privacy application parameter decryption module decrypts the AP side eye pattern parameter is unsuccessful, the processing flow is terminated; if the AP side privacy application parameter decryption module decrypts the AP side eye pattern parameter successfully, the AP side privacy application parameter is decrypted.
  • the module sends the decrypted AP eye pattern parameter to the AP side privacy application parsing module in the AP processor for parsing, and generates an AP side parsing flag bit according to the parsing result.
  • the AP side parsing flag bit is used to indicate whether the AP side parsing is successful; the AP side parsing flag bit can be set to 0 or 1, where 0 indicates parsing failure and 1 indicates parsing succeeds.
  • the AP side privacy application parsing module sends the AP side parsing flag bit to the privacy protection module.
  • step S914 the privacy protection module sends a request for acquiring a modem side eye pattern parameter to the RPMB area.
  • the privacy protection module acquires a modem side eye pattern parameter.
  • the modem side eye pattern parameter is decrypted by the modem side privacy application parameter decryption module in the modem processor.
  • the modem side privacy application parameter decryption module in the modem processor decrypts the modem side eye pattern parameter
  • the privacy protection module sends the modem side eye pattern parameter to a modem side privacy application parameter decryption module.
  • the modem side privacy application parameter decryption module decrypts the modem side eye pattern parameter.
  • step S917 if the modem side privacy application parameter decryption module decrypts the modem side eye pattern parameter is unsuccessful, the processing flow is terminated; if the modem side privacy application parameter decryption module decrypts the modem side eye pattern parameter successfully, the modem side privacy application parameter is decrypted.
  • the module sends the decrypted modem side eye pattern parameter to the modem side privacy application parsing module in the modem processor for parsing, and generates a modem side parsing flag bit according to the parsing result.
  • the modem side parsing flag bit is used to indicate whether the modem side eye pattern parameter is successfully parsed; the modem side parsing flag bit may be set to 0 or 1, where 0 indicates parsing failure and 1 indicates parsing success.
  • the modem side privacy application parsing module sends the modem side parsing flag bit to the privacy protection module.
  • the terminal is normally unlocked if and only if both parsing flag bits are 1.
  • the double-sided analysis and the double-sided eye pattern parameters are set, and the double-sided eye pattern parameters are respectively stored in the security area in the modem side and the AP side storage area.
  • the two-sided security zone is accessible only to the privacy protection module in the AP processor.
  • the privacy protection module may retrieve the AP side eye pattern parameter from the modem side security area when the blank area is not empty, and the value in the blank area is consistent with the parameter value written by the privacy protection module itself through the macro definition. And the AP side eye pattern parameter is sent to the AP side privacy application parameter decryption module for decryption, and the decrypted data is sent to the AP side privacy application parsing module for parsing. In addition, the privacy protection module also extracts the modem side parsing parameter from the ap side security area and sends the modem side privacy application parameter decryption module to decrypt, and the decrypted data is sent to the modem side privacy application parsing module for parsing.
  • the terminal When the AP side privacy application parsing module and the modem side privacy application parsing module are successfully parsed, the terminal is normally unlocked. When one of the AP side privacy application parsing module and the modem side privacy application parsing module fails to parse, the terminal cannot be unlocked normally.
  • the present disclosure can implement security analysis of a privacy application.
  • a security area in which the parsing parameters are stored only a single process access can be performed by the AP processor, and the secure storage of the parsing parameters is strictly controlled. .
  • the privacy application it is necessary to determine whether the key value of the server is consistent with the key value of the terminal. Because the key value of the terminal is written by the macro definition in the single process executed by the AP processor, and the parameter written in the process is not stored data, and can hardly be acquired, so that data hijacking can be avoided, thereby enabling analysis. The process is safer.
  • the disclosure can also realize automatic unlocking of the network, and at the same time strictly control the security of automatically unlocking the network.
  • the lock network counter is required to reach a preset threshold. If the lock network counter is only stored in the mobile phone, there is a risk of being tampered with. If it is only stored on the server side, the lock network count value may be tampered with after the server sends the lock network count value to the terminal. In order to prevent this from happening, the present disclosure synchronizes the network lock with the terminal at the server end. When determining whether the unlocking network condition is reached, the network lock count of the server is required to be the same as the lock network count of the terminal, and reaches a preset threshold.
  • the key value of the server end is consistent with the key value of the terminal. Because the key value of the terminal is written by the macro definition in the single process executed by the AP processor, and the parameter written in the process is not stored data, and can hardly be acquired, so that data hijacking can be avoided, thereby enabling analysis. The process is safer. Finally, by setting the security zone in which the parameters of the unlocking network are stored, only the single process access performed by the AP processor can be accessed, and the secure storage of the parameters of the unlocking network is strictly controlled.
  • the present disclosure further provides a data processing apparatus, each module included in the data processing apparatus and each submodule included in each module can be implemented by an AP processor and a modem processor in the terminal;
  • the processor may be a central processing unit (CPU), a microprocessor (MPU), a digital signal processor (DSP), or a field programmable gate array (FPGA).
  • FIG. 10 is a block diagram showing the structure of a data processing apparatus according to an embodiment of the present disclosure.
  • the apparatus 1000 includes: a second obtaining module 1001, a first generating module 1002, a second sending module 1003, a second generating module 1004, a third generating module 1005, and a fourth.
  • a module 1006, a first write module 1007, and a second write module 1008 are generated.
  • the second obtaining module 1001 is configured to acquire an unlocking parameter generated based on the locking object from the terminal.
  • the first generating module 1002 is configured to generate a first key and a second key according to the unlocking parameter.
  • the second sending module 1003 is configured to send the first key to the server.
  • the second generation module 1004 is configured to generate an AP side unlocking parameter and a modem side unlocking parameter according to the second key.
  • the third generation module 1005 is configured to generate an encrypted AP side unlocking parameter and an AP side key according to the AP side unlocking parameter.
  • the fourth generation module 1006 is configured to generate an encrypted modem side unlocking parameter and a modem side key according to the modem side unlocking parameter.
  • the first writing module 1007 is configured to write the AP side key, the AP side unlocking parameter, and the encrypted modem side unlocking parameter into a second area in a storage area on the AP side, where the AP
  • the storage area on the side further includes a first area, and the second area is higher in authority than the first area;
  • the second writing module 1008 is configured to use the modem side key and the encrypted AP side unlocking parameter.
  • the modem side unlocking parameter is written in a fourth area in the storage area on the modem side, and the storage area on the modem side further includes a third area, and the fourth area is higher in authority than the third area.
  • the present disclosure further provides a data processing apparatus, each module in the data processing apparatus and each submodule included in each module can be implemented by an AP processor and a modem processor in the terminal, where
  • the processor may be a central processing unit (CPU), a microprocessor (MPU), a digital signal processor (DSP), or a field programmable gate array (FPGA).
  • the apparatus 1100 includes: a receiving module 1101 , a first obtaining module 1102 , and an unlocking module 1103 .
  • the receiving module 1101 is configured to receive a first parameter of the unlocking object and a first key of the unlocking object that are sent by the server, where the first parameter and the first key are used to determine whether the terminal satisfies the condition for analyzing the data.
  • the first obtaining module 1102 is configured to acquire a second parameter of the unlocking object located in the terminal and a second key of the unlocking object.
  • the unlocking module 1103 is configured to: when the first parameter and the second parameter satisfy a preset first condition, and the first key and the second key satisfy a preset second condition, The unlocked object is unlocked.
  • the apparatus further includes: a first sending module, configured to: before the receiving module receives the first parameter of the unlocking object delivered by the server and the first key of the unlocking object, When the terminal meets the preset third condition, the terminal sends a message that the terminal meets the preset third condition to the server.
  • a first sending module configured to: before the receiving module receives the first parameter of the unlocking object delivered by the server and the first key of the unlocking object, When the terminal meets the preset third condition, the terminal sends a message that the terminal meets the preset third condition to the server.
  • the apparatus further includes: a first reading module, a second reading module, and a first comparison module.
  • the first reading module is configured to read the first parameter from a storage area on the modem side.
  • the second reading module is configured to read the second parameter from a second reserved field in the first region.
  • the first comparison module is configured to compare a value in the first reserved field in the first area with the second secret if the first parameter and the second parameter satisfy a preset first condition The value of the key is triggered, if the value in the first reserved field and the value of the second key meet the preset second condition, the unlocking module is triggered to unlock the unlocked object.
  • the first comparison module further includes: a read sub-module and a write sub-module comparison sub-module.
  • the reading submodule is configured to read the first key from a storage area on the modem side if the first parameter and the second parameter satisfy a preset first condition.
  • the write submodule is configured to write the value of the first key to the first reserved field.
  • the comparison submodule is configured to compare the value in the first reserved field in the first region with the value of the second key if the first reserved field is non-empty.
  • the unlocking module further includes: an obtaining submodule, a first generating submodule, a second generating submodule, and an unlocking submodule.
  • the acquiring submodule is configured to acquire an encrypted AP side unlocking parameter and an encrypted modem side unlocking parameter from the terminal.
  • the first generation submodule is configured to generate a first flag bit based on the encrypted AP side unlocking parameter, where the first flag bit is used to indicate whether the encrypted AP side unlocking parameter is successfully parsed.
  • the second generation submodule is configured to generate a second flag bit based on the encrypted modem side unlocking parameter, the second flag bit being used to indicate whether the encrypted modem side unlocking parameter is successfully resolved.
  • the unlocking submodule is configured to unlock the unlocking object when the first marking bit and the second marking bit satisfy a preset fourth condition.
  • the acquiring sub-module is configured to acquire an encrypted modem side unlocking parameter from a second area in the storage area of the AP, where the right of the second area is higher than the first region.
  • the acquiring sub-module is further configured to acquire an encrypted AP-side unlocking parameter from a fourth area in the storage area of the modem side, where the storage area on the modem side further includes a third authority having a lower authority than the fourth area. region.
  • the first generation sub-module is configured to acquire an AP-side unlocking parameter and an AP-side key from the second area, and unlock the encrypted AP side according to the AP-side key.
  • the parameter is decrypted to obtain the decrypted AP side unlocking parameter, and the decrypted AP side unlocking parameter and the AP side unlocking parameter are compared to obtain a first comparison result, and the first flag bit is generated according to the first comparison result.
  • the second generation sub-module is configured to acquire a modem side unlocking parameter and a modem side key from the fourth area, and decrypt the encrypted modem side unlocking parameter according to the modem side key to obtain the decrypted
  • the modem side unlocking parameter compares the decrypted modem side unlocking parameter with the modem side unlocking parameter to obtain a second comparison result, and generates a second flag bit according to the second comparison result.
  • the first parameter is a value reached by a lock counter in the server
  • the second parameter is a value reached by the terminal lock network counter.
  • the preset third condition is that the value reached by the terminal lock network counter exceeds a preset threshold.
  • the device further includes a reset module configured to reset the value reached by the terminal lock network counter when the value reached by the terminal lock counter is inconsistent with the value reached by the lock counter in the server The value reached by the lock counter in the server.
  • the first parameter is pre-stored password information in the server
  • the second parameter is password information entered by the terminal.
  • the preset third condition is that the terminal enters password information.
  • the above data locking method or data unlocking method is implemented in the form of a software function module, and is sold or used as a separate product, it may also be stored in a computer readable storage medium.
  • the technical solution of the embodiments of the present disclosure may be embodied in the form of a software product in essence or in the form of a software product stored in a storage medium, including a plurality of instructions for making A computer device (which may be a personal computer, server, or network device, etc.) performs all or part of the methods described in various embodiments of the present disclosure.
  • the foregoing storage medium includes various media that can store program codes, such as a USB flash drive, a mobile hard disk, a read only memory (ROM), a magnetic disk, or an optical disk.
  • program codes such as a USB flash drive, a mobile hard disk, a read only memory (ROM), a magnetic disk, or an optical disk.
  • an embodiment of the present disclosure provides a computer storage medium having stored therein computer executable instructions configured to perform the data unlocking method or the data locking method described above.
  • FIG. 12 is a schematic structural diagram of a terminal according to an embodiment of the present disclosure.
  • the terminal 1200 includes a display screen 1201, a processor 1202, and a storage medium 1203 configured to store executable instructions, wherein the processor 1202 is configured to execute the stored executable instructions.
  • the executable instructions are for executing the data processing method described above.
  • embodiments of the present disclosure can be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of a hardware embodiment, a software embodiment, or a combination of software and hardware aspects. Moreover, the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage and optical storage, etc.) containing computer usable program code.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.

Abstract

Provided are a data processing method and apparatus, a terminal, and a storage medium. The method comprises: receiving a first parameter of an unlocking object and a first secret key of the unlocking object issued by a server, the first parameter and the first secret key being used for determining whether a terminal satisfies a data analysis condition; obtaining a second parameter of the unlocking object and a second secret key of the unlocking object located in the terminal; when the first parameter and the second parameter satisfy a preset first condition, and the first secret key and the second secret key satisfy a preset second condition, unlocking the unlocking object.

Description

数据处理方法及其装置、终端、存储介质Data processing method and device thereof, terminal, storage medium 技术领域Technical field
本公开涉及移动通信领域技术,尤其涉及数据处理方法及其装置、终端、存储介质。The present disclosure relates to the field of mobile communications technologies, and in particular, to a data processing method and apparatus, terminal, and storage medium.
背景技术Background technique
随着智能移动终端的发展和演进,移动终端支持的功能越来越多。而移动终端上的许多功能因为涉及用户隐私或者需要通信运营商授权所以需要进行加锁。例如隐私应用加锁、用户隐私数据加锁以及锁网技术等。而在加锁与解锁的过程中需要用到秘钥、加锁参数以及解锁参数等安全数据信息。With the development and evolution of intelligent mobile terminals, mobile terminals support more and more functions. Many of the functions on mobile terminals require locking because they involve user privacy or require authorization from the communications carrier. For example, privacy application lock, user privacy data lock and lock network technology. In the process of locking and unlocking, it is necessary to use security data such as key, lock parameters and unlock parameters.
发明内容Summary of the invention
一方面,本公开提供了一种数据处理方法,包括:接收服务器下发的解锁对象的第一参数和解锁对象的第一秘钥,所述第一参数和所述第一秘钥用于判断终端是否满足解析数据的条件;获取位于所述终端的解锁对象的第二参数和解锁对象的第二秘钥;当所述第一参数和所述第二参数满足预设的第一条件且所述第一秘钥和所述第二秘钥满足预设的第二条件时,对所述解锁对象进行解锁。In one aspect, the present disclosure provides a data processing method, including: receiving a first parameter of an unlocking object delivered by a server and a first key of an unlocking object, where the first parameter and the first key are used for determining Whether the terminal satisfies the condition for parsing the data; acquiring the second parameter of the unlocking object located at the terminal and the second key of the unlocking object; when the first parameter and the second parameter satisfy the preset first condition and When the first secret key and the second secret key satisfy the preset second condition, the unlocked object is unlocked.
另一方面,本公开提供了一种数据处理方法,包括:从终端获取基于加锁对象生成的解锁参数;根据所述解锁参数生成第一秘钥和第二秘钥;发送所述第一秘钥至服务器;根据所述第二秘钥生成应用处理器AP侧解锁参数和调制解调处理器modem侧解锁参数;根据所述AP侧解锁参数生成加密的AP侧解锁参数和AP侧秘钥;根据所述modem侧解锁参数生成加密的modem侧解锁参数和modem侧秘钥;将所述AP侧秘钥、所述AP侧解锁参数和所述加密的modem侧解锁参数写入位于AP侧的存储区域中的第二区域,所述AP侧的存储区域还包括第一区域,所述第二区域权限高于所述第一区域;将所述modem侧秘钥、所述modem侧解锁参数和所述加密的AP侧解锁参数写入位 于modem侧的存储区域中的第四区域,所述modem侧的存储区域还包括第三区域,所述第四区域权限高于所述第三区域。In another aspect, the present disclosure provides a data processing method, including: acquiring an unlocking parameter generated based on a locking object from a terminal; generating a first key and a second key according to the unlocking parameter; and sending the first secret Key to the server; generating an application processor AP side unlocking parameter and a modem processor modem side unlocking parameter according to the second key; and generating an encrypted AP side unlocking parameter and an AP side key according to the AP side unlocking parameter; Generating an encrypted modem side unlocking parameter and a modem side key according to the modem side unlocking parameter; and writing the AP side key, the AP side unlocking parameter, and the encrypted modem side unlocking parameter to the storage on the AP side The second area in the area, the storage area on the AP side further includes a first area, the second area has higher authority than the first area; and the modem side key, the modem side unlocking parameter, and the The encrypted AP-side unlocking parameter is written in a fourth area in the storage area on the modem side, and the storage area on the modem side further includes a third area, and the fourth area has higher authority than the third area.
另一方面,本公开提供了一种数据处理装置,包括:接收模块、获取模块、解锁模块;所述接收模块配置为接收服务器下发的位于终端的解锁对象的第一参数和解锁对象的第一秘钥,所述第一参数和第一秘钥用于判断所述终端是否满足解析数据的条件;所述获取模块配置为获取解锁对象的第二参数和解锁对象的第二秘钥;所述解锁模块配置为当所述第一参数和所述第二参数满足预设的第一条件且所述第一秘钥和所述第二秘钥满足预设的第二条件时,对所述解锁对象进行解锁。In another aspect, the present disclosure provides a data processing apparatus, including: a receiving module, an obtaining module, and an unlocking module; the receiving module is configured to receive a first parameter of the unlocking object and a unlocking object of the unlocking object delivered by the server a first key, the first parameter and the first key are used to determine whether the terminal satisfies the condition for parsing data; the obtaining module is configured to acquire a second parameter of the unlocking object and a second key of the unlocking object; The unlocking module is configured to: when the first parameter and the second parameter satisfy a preset first condition, and the first key and the second key satisfy a preset second condition, Unlock the object to unlock it.
另一方面,本公开提供了一种数据处理装置,包括:获取模块、第一生成模块、发送模块、第二生成模块、第三生成模块、第四生成模块、第一写入模块和第二写入模块;所述获取模块配置为从所述终端获取基于加锁对象生成的解锁参数;所述第一生成模块配置为根据所述解锁参数生成第一秘钥和第二秘钥;所述发送模块配置为发送所述第一秘钥至服务器;所述第二生成模块配置为根据所述第二秘钥生成应用处理器AP侧解锁参数和调制解调处理器modem侧解锁参数;所述第三生成模块配置为根据所述AP侧解锁参数生成加密的AP侧解锁参数和AP侧秘钥;所述第四生成模块配置为根据所述modem侧解锁参数生成加密的modem侧解锁参数和modem侧秘钥;所述第一写入模块配置为将所述AP侧秘钥、所述AP侧解锁参数和所述加密的modem侧解锁参数写入位于所述AP侧的存储区域中的第二区域,所述AP侧的存储区域还包括第一区域,所述第二区域权限高于所述第一区域;所述第二写入模块,配置为将所述modem侧秘钥、所述加密的AP侧解锁参数和所述modem侧解锁参数写入位于所述modem侧的存储区域中的第四区域,所述modem侧的存储区域还包括第三区域,所述第四区域权限高于所述第三区域。In another aspect, the present disclosure provides a data processing apparatus, including: an acquisition module, a first generation module, a transmission module, a second generation module, a third generation module, a fourth generation module, a first write module, and a second Writing a module; the obtaining module is configured to acquire an unlocking parameter generated based on the locking object from the terminal; the first generating module is configured to generate a first key and a second key according to the unlocking parameter; The sending module is configured to send the first key to the server; the second generating module is configured to generate an application processor AP side unlocking parameter and a modem processor modem side unlocking parameter according to the second key; The third generation module is configured to generate an encrypted AP side unlocking parameter and an AP side key according to the AP side unlocking parameter, and the fourth generating module is configured to generate an encrypted modem side unlocking parameter and a modem according to the modem side unlocking parameter. The first write module is configured to write the AP side key, the AP side unlocking parameter, and the encrypted modem side unlocking parameter into a storage area on the AP side. The second area of the AP, the storage area of the AP side further includes a first area, the second area is higher than the first area; the second write module is configured to use the modem side key The encrypted AP side unlocking parameter and the modem side unlocking parameter are written in a fourth area in the storage area on the modem side, and the modem side storage area further includes a third area, the fourth area The authority is higher than the third area.
另一方面,本公开提供了一种终端,所述终端至少包括显示屏、处理器和配置为存储可执行指令的存储介质,其中,处理器配置为执行存储的可执行指令,所述可执行指令配置为执行本文所述的数据处 理方法。In another aspect, the present disclosure provides a terminal comprising at least a display screen, a processor, and a storage medium configured to store executable instructions, wherein the processor is configured to execute the stored executable instructions, the executable The instructions are configured to perform the data processing methods described herein.
另一方面,本公开提供了一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,该计算机可执行指令配置为执行本文所述的数据处理方法。In another aspect, the present disclosure provides a computer storage medium having stored therein computer executable instructions configured to perform the data processing methods described herein.
附图说明DRAWINGS
在附图(其不一定是按比例绘制的)中,相似的附图标记可在不同的附图中描述相似的部件。具有不同字母后缀的相似附图标记可表示相似部件的不同示例。附图以示例而非限制的方式大体示出了本文中所讨论的各个实施例。In the drawings, which are not necessarily to scale, the Like reference numerals with different letter suffixes may indicate different examples of similar components. The drawings generally illustrate the various embodiments discussed herein by way of example and not limitation.
图1为根据本公开的实施例的数据处理方法的流程图;1 is a flow chart of a data processing method in accordance with an embodiment of the present disclosure;
图2为根据本公开的实施例的数据处理方法的流程图;2 is a flowchart of a data processing method in accordance with an embodiment of the present disclosure;
图3为根据本公开的实施例的数据处理方法的流程图;3 is a flowchart of a data processing method in accordance with an embodiment of the present disclosure;
图4为根据本公开的实施例的数据处理方法的流程图;4 is a flowchart of a data processing method in accordance with an embodiment of the present disclosure;
图5为根据本公开的实施例的AP处理器的结构示意图;FIG. 5 is a schematic structural diagram of an AP processor according to an embodiment of the present disclosure; FIG.
图6为根据本公开的实施例的modem处理器的结构示意图;6 is a schematic structural diagram of a modem processor according to an embodiment of the present disclosure;
图7A为根据本公开的实施例的数据处理方法的流程图;7A is a flowchart of a data processing method in accordance with an embodiment of the present disclosure;
图7B为根据本公开的实施例的数据处理方法的流程图;7B is a flowchart of a data processing method in accordance with an embodiment of the present disclosure;
图7C为根据本公开的实施例的数据处理方法的流程图;7C is a flowchart of a data processing method in accordance with an embodiment of the present disclosure;
图8A为根据本公开的实施例的数据处理方法的流程图;FIG. 8A is a flowchart of a data processing method according to an embodiment of the present disclosure; FIG.
图8B为根据本公开的实施例的数据处理方法的流程图;8B is a flowchart of a data processing method in accordance with an embodiment of the present disclosure;
图8C为根据本公开的实施例的数据处理方法的流程图;8C is a flowchart of a data processing method in accordance with an embodiment of the present disclosure;
图9A为根据本公开的实施例的数据处理方法的流程图;9A is a flowchart of a data processing method in accordance with an embodiment of the present disclosure;
图9B为根据本公开的实施例的数据处理方法的流程图;9B is a flowchart of a data processing method in accordance with an embodiment of the present disclosure;
图9C为根据本公开的实施例的数据处理方法的流程图;9C is a flowchart of a data processing method in accordance with an embodiment of the present disclosure;
图10为根据本公开的实施例的应用的数据处理装置的结构示意图;FIG. 10 is a schematic structural diagram of a data processing apparatus of an application according to an embodiment of the present disclosure; FIG.
图11为根据本公开的实施例的应用的数据处理装置的结构示意图;11 is a schematic structural diagram of a data processing device of an application according to an embodiment of the present disclosure;
图12为根据本公开的实施例的终端的结构示意图。FIG. 12 is a schematic structural diagram of a terminal according to an embodiment of the present disclosure.
具体实施方式Detailed ways
为使本公开实施例的目的、技术方案和优点更加清楚,下面结合本公开实施例中的附图,对本公开实施例中的技术方案进行清楚完整的描述,显然,所描述的实施例是本公开一部分实施例,而不是全部的实施例。基于本公开中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本公开的保护范围。The technical solutions in the embodiments of the present disclosure are clearly and completely described below in conjunction with the drawings in the embodiments of the present disclosure. Some embodiments are disclosed, rather than all of the embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present disclosure without creative efforts are within the scope of the present disclosure.
随着智能移动终端的发展和演进,移动终端支持的功能越来越多。而移动终端上的许多功能因为涉及用户隐私或者需要通信运营商授权所以需要进行加锁。例如隐私应用加锁、用户隐私数据加锁以及锁网技术等。而在加锁与解锁的过程中需要用到秘钥、加锁参数以及解锁参数等安全数据信息。With the development and evolution of intelligent mobile terminals, mobile terminals support more and more functions. Many of the functions on mobile terminals require locking because they involve user privacy or require authorization from the communications carrier. For example, privacy application lock, user privacy data lock and lock network technology. In the process of locking and unlocking, it is necessary to use security data such as key, lock parameters and unlock parameters.
以解锁网为例,运营商锁网后,移动终端会生成加锁标志和解锁信息,所述解锁信息包括解锁参数,在相关技术中所述解锁参数要么存储于移动终端本地,要么存储于服务器。在用户解锁网时,用户输入从门店或通过网络获取的解锁参数(例如解锁码),移动终端对比用户输入的解锁参数与存储在移动终端本地的解锁参数,如果用户输入的解锁参数与存储在移动终端本地的解锁参数一致,则删除加锁标志,实现解锁网。但是,在这种解锁网方式中,用户需要到门店或通过网络获取解锁码,十分麻烦,用户体验差。Taking the unlocking network as an example, after the operator locks the network, the mobile terminal generates a lock flag and unlocking information, and the unlocking information includes an unlocking parameter. In the related art, the unlocking parameter is stored locally in the mobile terminal or stored in the server. . When the user unlocks the network, the user inputs an unlocking parameter (such as an unlocking code) obtained from the store or through the network, and the mobile terminal compares the unlocking parameter input by the user with the unlocking parameter stored locally in the mobile terminal, if the unlocking parameter input by the user is stored in the If the local unlocking parameters of the mobile terminal are the same, the lock flag is deleted to unlock the network. However, in this unlocking network method, the user needs to go to the store or obtain the unlocking code through the network, which is very troublesome and the user experience is poor.
此外,将解锁参数存储在移动终端或服务器并不安全,若解锁参数存储在移动终端则有被盗走的风险,即使对解锁参数进行了加密处理,不法分子仍有可能盗走加密后的解锁参数进行破解。若解锁参数存储在服务器,则在服务器发送解锁参数到移动终端的过程中,仍有解锁参数被篡改的可能。因此,需要一种能够自动运行的安全的数据处理方法。In addition, it is not safe to store the unlocking parameters in the mobile terminal or the server. If the unlocking parameters are stored in the mobile terminal, there is a risk of being stolen. Even if the unlocking parameters are encrypted, the criminals may still steal the encrypted unlocking. The parameters are cracked. If the unlocking parameter is stored in the server, there is still the possibility that the unlocking parameter is tampered with during the process of sending the unlocking parameter to the mobile terminal by the server. Therefore, there is a need for a secure data processing method that can be automated.
因此,本公开特别提供了数据处理方法及其装置、终端、存储介质,其实质上避免了由于相关技术的局限和缺点而导致的问题中的一个或多个。Accordingly, the present disclosure particularly provides a data processing method and apparatus therefor, a terminal, and a storage medium that substantially obviate one or more of the problems due to the limitations and disadvantages of the related art.
一方面,本公开实施例提供一种数据处理方法。该方法可应用于很多场景,例如,用户存储在移动终端上的隐私数据的解锁、安装在移动终端上的隐私应用的解锁、一些需要运营商授权的服务(例如解锁网)。In one aspect, embodiments of the present disclosure provide a data processing method. The method can be applied to many scenarios, for example, unlocking of private data stored by a user on a mobile terminal, unlocking of a privacy application installed on a mobile terminal, and some services requiring an operator authorization (such as unlocking a network).
在本公开的各实施例中,所述移动终端包括应用处理器(AP,Application Processor)芯片和调制解调处理器(modem)芯片。In various embodiments of the present disclosure, the mobile terminal includes an application processor (AP) chip and a modem chip.
所述AP侧的存储区域包括至少两个区域。以两个区域为例进行说明,所述AP侧的存储区域包括第一区域和第二区域,其中,第二区域为存储区域中的安全区域,所述第二区域权限高于所述第一区域。在实施的过程中,如果移动终端采用嵌入式多媒体芯片(EMMC,Embedded Multi Media Card)的分区方式时,所述第一区域可以为AP侧存储区域中的普通存储区域,所述第二区域可以为AP侧的回环保护分区(RPMB,Replay Protect Memory Block)。厂家在出厂前设定所述第二区域仅AP处理器可以访问。The storage area on the AP side includes at least two areas. The two areas are used as an example. The storage area on the AP side includes a first area and a second area, where the second area is a security area in the storage area, and the second area is higher than the first area. region. In the implementation process, if the mobile terminal adopts an EMMC (Embedded Multi Media Card) partitioning mode, the first area may be a common storage area in the AP side storage area, and the second area may be It is the Replay Protect Memory Block (RPMB) on the AP side. The manufacturer sets the second area to be accessible only by the AP processor before leaving the factory.
所述modem侧的存储区域包括至少两个区域。以两个区域为例进行说明,所述modem侧的存储区域包括第三区域和第四区域,其中,第四区域为存储区域中的安全区域,所述第四区域权限高于所述第三区域。在实施的过程中,如果移动终端采用EMMC的分区方式时,其中,所述第三区域可以为modem侧存储区域中的普通存储区域,所述第四区域可以为modem侧的安全文件存储区(SFS,Secure File System)。厂家在出厂前设定所述第四区域仅AP处理器可以访问。The storage area on the modem side includes at least two areas. The two areas are taken as an example. The storage area on the modem side includes a third area and a fourth area, wherein the fourth area is a security area in the storage area, and the fourth area is higher than the third area. region. In the implementation process, if the mobile terminal adopts the partition mode of the EMMC, the third area may be a common storage area in the modem side storage area, and the fourth area may be a security file storage area on the modem side ( SFS, Secure File System). The manufacturer sets the fourth area to be accessible only by the AP processor before leaving the factory.
在本公开实施例提供的数据处理方法中,从所述终端获取基于加锁对象生成的解锁参数,并根据解锁参数生成第一秘钥和第二秘钥,将第一秘钥发送至服务器。此外,根据所述第二秘钥生成AP侧解锁参数、modem侧解锁参数、加密的AP侧解锁参数、AP侧秘钥、加密的modem侧解锁参数和modem侧秘钥,将AP侧秘钥、AP侧解锁参数和加密的modem侧解锁参数存储在第二区域,将modem侧秘钥、modem侧解锁参数和加密的AP侧解锁参数存储在第四区域,并设定解锁条件。当移动终端满足设定的解锁条件时,接收服务器下发的第一参数和第一秘钥,从终端自身获取第二参数和第二秘钥,只有当第一参数 和第二参数满足预设的第一条件并且第一秘钥和第二秘钥满足预设的第二条件时才会启动解锁处理流程,通过获取存储在第二区域的加密的modem侧解锁参数和存储在第四区域的加密的AP侧解锁参数进行双侧交叉解锁。In the data processing method provided by the embodiment of the present disclosure, the unlocking parameter generated based on the locking object is obtained from the terminal, and the first key and the second key are generated according to the unlocking parameter, and the first key is sent to the server. In addition, the AP side unlocking parameter, the modem side unlocking parameter, the encrypted AP side unlocking parameter, the AP side key, the encrypted modem side unlocking parameter, and the modem side key are generated according to the second key, and the AP side key, The AP side unlocking parameter and the encrypted modem side unlocking parameter are stored in the second area, and the modem side key, the modem side unlocking parameter, and the encrypted AP side unlocking parameter are stored in the fourth area, and the unlocking condition is set. When the mobile terminal meets the set unlocking condition, the first parameter and the first key sent by the server are received, and the second parameter and the second key are obtained from the terminal itself, only when the first parameter and the second parameter meet the preset. And the unlocking process is started when the first condition and the first key and the second key satisfy the preset second condition, by acquiring the encrypted modem side unlocking parameter stored in the second area and storing in the fourth area The encrypted AP side unlocking parameter is double-sidedly unlocked.
为便于对本公开实施例的理解,下面将结合附图以几个具体实施例为例做进一步的解释说明,且各个实施例并不构成对本公开实施例的限定。In order to facilitate the understanding of the embodiments of the present disclosure, the following detailed description of the embodiments,
本公开实施例提供的一种数据处理方法。图1为根据本公开实施例的数据处理方法的流程图。如图1所示,在一实施例中,该方法可以包括步骤S101至步骤S106。A data processing method provided by an embodiment of the present disclosure. FIG. 1 is a flow chart of a data processing method in accordance with an embodiment of the present disclosure. As shown in FIG. 1, in an embodiment, the method may include steps S101 to S106.
在步骤S101处,终端根据用户的加锁操作基于加锁对象生成加锁标志和解锁参数。At step S101, the terminal generates a lock flag and an unlock parameter based on the lock object according to the user's lock operation.
这里,用户在终端上对加锁对象进行加锁操作,终端根据用户的加锁操作生成加锁标志和解锁参数。所述加锁对象可以是运营商提供的通信网络,可以是隐私应用(例如安全支付应用),也可以是用户的隐私数据。对应地,所述加锁操作可以是锁网操作,可以是隐私应用加锁操作,也可以是隐私数据加锁操作。Here, the user performs a locking operation on the locking object on the terminal, and the terminal generates a locking flag and an unlocking parameter according to the locking operation of the user. The locking object may be a communication network provided by an operator, may be a privacy application (such as a secure payment application), or may be a user's private data. Correspondingly, the locking operation may be a lock operation, and may be a privacy application locking operation or a privacy data locking operation.
这里,所述加锁操作前包括设置操作。所述设置操作为用户设定第三条件,所述第三条件是所述终端满足解锁的条件。当加锁对象是运营商提供的网络时,所述第三条件是终端中的计数器达到一个阈值;当加锁对象是隐私应用(如支付应用)或用户的隐私数据时,所述第三条件是终端获取用户输入的密码,其中,所述密码可以是数字密码、指纹密码、眼纹密码、声音密码等,用户或运营商或生产厂家可以根据实际应用的需要自行设定,这里不做赘述。Here, the setting operation is included before the locking operation. The setting operation sets a third condition for the user, the third condition being that the terminal satisfies the condition of unlocking. When the locking object is a network provided by an operator, the third condition is that the counter in the terminal reaches a threshold; when the locking object is a privacy application (such as a payment application) or privacy data of the user, the third condition The terminal obtains the password input by the user, wherein the password may be a digital password, a fingerprint password, an eye password, a voice password, etc., and the user or the operator or the manufacturer may set the user according to the actual application needs. .
这里,当所述第三条件是终端中的计数器达到一个阈值时,用户需要设定该阈值的大小。在用户设定完所述阈值后,终端将所述阈值发送至服务器,服务器存储所述阈值。当加锁操作完成后,所述终端和所述服务器中的计数器会同步开始计数。当所述第三条件是终端获取用户输入的密码时,用户需要将该密码输入终端,终端在获取用户输入的密码后,将所述密码信息发送至服务器,服务器存储所述密 码信息。Here, when the third condition is that the counter in the terminal reaches a threshold, the user needs to set the size of the threshold. After the user sets the threshold, the terminal sends the threshold to the server, and the server stores the threshold. When the locking operation is completed, the terminal and the counter in the server start counting synchronously. When the third condition is that the terminal acquires the password input by the user, the user needs to input the password into the terminal. After acquiring the password input by the user, the terminal sends the password information to the server, and the server stores the password information.
在步骤S102处,终端从自身获取基于加锁对象生成的解锁参数,并根据所述解锁参数生成第一秘钥和第二秘钥。At step S102, the terminal acquires an unlocking parameter generated based on the locking object from itself, and generates a first key and a second key according to the unlocking parameter.
这里,所述第一秘钥和所述第二秘钥相同,终端将所述第二秘钥通过宏定义的方式写入AP处理器所执行的解锁单进程中,所述解锁单进程用于在用户解锁时对解锁对象进行解锁,其中,所述解锁对象为步骤S101中的加锁对象。Here, the first key is the same as the second key, and the terminal writes the second key to the unlocking process executed by the AP processor in a macro definition manner, where the unlocking single process is used. The unlocking object is unlocked when the user unlocks, wherein the unlocking object is the locking object in step S101.
在步骤S103处,终端发送所述第一秘钥至服务器,服务器接收并存储所述第一秘钥;并且在步骤S104处,终端根据所述第二秘钥生成AP侧解锁参数、modem侧解锁参数、加密的AP侧解锁参数、AP侧秘钥、加密的modem侧解锁参数和modem侧秘钥。At step S103, the terminal sends the first key to the server, and the server receives and stores the first key; and at step S104, the terminal generates an AP side unlocking parameter according to the second key, and the modem side is unlocked. Parameters, encrypted AP side unlock parameters, AP side keys, encrypted modem side unlock parameters, and modem side keys.
这里,终端首先根据所述第二秘钥生成AP侧解锁参数和modem侧解锁参数,所述AP侧解锁参数和所述modem侧解锁参数可以相同,也可以不同。然后,终端根据所述AP侧解锁参数生成加密的AP侧解锁参数和AP侧秘钥,并根据所述modem侧解锁参数生成加密的modem侧解锁参数和modem侧秘钥。Here, the terminal first generates an AP side unlocking parameter and a modem side unlocking parameter according to the second key, and the AP side unlocking parameter and the modem side unlocking parameter may be the same or different. Then, the terminal generates an encrypted AP side unlocking parameter and an AP side key according to the AP side unlocking parameter, and generates an encrypted modem side unlocking parameter and a modem side key according to the modem side unlocking parameter.
需要理解的是,对AP侧解锁参数进行加密处理,生成加密的AP侧解锁参数和AP侧秘钥中的加密方法可以是任一种现有的加密算法,例如非对称RSA算法等,对modem侧解锁参数进行加密处理,生成加密的modem侧解锁参数和modem侧秘钥中的加密方法也可以是任一种现有的加密方法,所述加密方法可以与对AP侧解锁参数进行加密处理的加密方法相同,也可以不同。It is to be understood that the encryption process of the AP side unlocking parameter and the encryption method of the AP side unlocking parameter and the AP side key may be any existing encryption algorithm, such as an asymmetric RSA algorithm, for the modem. The side unlocking parameter is subjected to encryption processing, and the encryption method for generating the encrypted modem side unlocking parameter and the modem side key may also be any existing encryption method, and the encryption method may be used to encrypt the AP side unlocking parameter. The encryption method is the same or different.
在步骤S105处,将AP侧秘钥、AP侧解锁参数和加密的modem侧解锁参数写入位于AP侧的存储区域中的第二区域。At step S105, the AP side key, the AP side unlocking parameter, and the encrypted modem side unlocking parameter are written in the second area in the storage area on the AP side.
这里,所述AP侧的存储区域还包括第一区域,所述第二区域权限高于所述第一区域。需要理解的是,本公开实施例中,移动终端采用嵌入式多媒体芯片(EMMC,Embedded Multi Media Card)的分区方式,所述第一区域为AP侧的普通存储区域,所述第二区域为AP侧的RPMB区域。厂家在出厂前设定所述第二区域仅AP处理器执行的解锁单进程可以访问。Here, the storage area on the AP side further includes a first area, and the second area has higher authority than the first area. It should be understood that, in the embodiment of the present disclosure, the mobile terminal adopts a partitioning mode of an embedded multimedia chip (EMMC), the first area is a common storage area on the AP side, and the second area is an AP. Side RPMB area. The manufacturer sets the second area to be unlocked only by the unlocking process executed by the AP processor.
在步骤S106处,将modem侧秘钥、modem侧解锁参数和加密的AP侧解锁参数写入位于modem侧的存储区域中的第四区域。At step S106, the modem side key, the modem side unlocking parameter, and the encrypted AP side unlocking parameter are written in the fourth area in the storage area on the modem side.
这里,所述modem侧的存储区域还包括第三区域,所述第四区域权限高于所述第三区域。需要理解的是,本公开实施例中,移动终端采用嵌入式多媒体芯片(EMMC,Embedded Multi Media Card)的分区方式,所述第三区域为modem侧的普通存储区域,所述第四区域为modem侧的SFS区域。厂家在出厂前设定所述第四区域仅AP处理器执行的解锁单进程可以访问。Here, the storage area on the modem side further includes a third area, and the fourth area has higher authority than the third area. It should be understood that, in the embodiment of the present disclosure, the mobile terminal adopts a partition mode of an embedded multimedia chip (EMMC), the third area is a common storage area on the modem side, and the fourth area is a modem. Side SFS area. The manufacturer sets the fourth area to be unlocked by the AP processor only after the factory is executed.
需要理解的是,解锁时,终端会从所述第四区域获取加密的AP侧解锁参数并从所述第二区域获取加密的modem侧解锁参数进行解锁,当且仅当AP侧和modem侧均解锁成功时,终端删除加锁标志完成解锁。It is to be understood that, when unlocking, the terminal acquires the encrypted AP side unlocking parameter from the fourth area and acquires the encrypted modem side unlocking parameter from the second area to unlock, if only the AP side and the modem side are both When the unlocking is successful, the terminal deletes the lock flag to complete the unlocking.
本公开实施例还提供一种数据处理方法。图2为根据本公开实施例的数据处理方法的流程图。如图2所示,在一实施例中,该方法可以包括步骤S201至步骤S204。Embodiments of the present disclosure also provide a data processing method. 2 is a flow chart of a data processing method in accordance with an embodiment of the present disclosure. As shown in FIG. 2, in an embodiment, the method may include steps S201 to S204.
在步骤S201处,当所述终端满足预设的第三条件时,发送所述终端满足预设的第三条件的消息至所述服务器。At step S201, when the terminal satisfies the preset third condition, the message that the terminal meets the preset third condition is sent to the server.
这里,所述预设的第三条件为步骤S101中的上述设置操作中用户设定的第三条件,所述终端满足预设的第三条件的消息包括所述终端的终端标识。Here, the preset third condition is a third condition set by the user in the setting operation in the step S101, and the message that the terminal satisfies the preset third condition includes the terminal identifier of the terminal.
需要理解的是,步骤S201在具体实施过程中可以应用于多种不同的场景,下面基于介绍其中的几种场景来对其进行详尽介绍,当然,在具体实施过程中,还可以应用于其他不同的场景,不限于以下几种。It should be understood that step S201 can be applied to multiple different scenarios in the specific implementation process. The following describes the scenarios based on several scenarios. Of course, in the specific implementation process, it can also be applied to other different scenarios. The scene is not limited to the following.
解锁网场景:在某一时刻,用户终端中的计数器达到了预设的阈值,即满足了预设的第三条件,终端将自身计数器达到预设的阈值的消息上报服务器。Unlocking the network scenario: At a certain moment, the counter in the user terminal reaches the preset threshold, that is, the preset third condition is met, and the terminal reports the message that the counter reaches the preset threshold to the server.
解锁隐私应用场景:在某一时刻,用户希望开启被加锁的隐私应用(例如安全支付应用),于是用户输入开启所述隐私应用所需的密码,即满足了预设的第三条件,终端将自身获取了用户输入的用于开启所述隐私应用的密码的消息上报服务器。Unlocking the privacy application scenario: At a certain moment, the user wants to open the locked privacy application (for example, a secure payment application), so the user inputs the password required to open the privacy application, that is, the preset third condition is met, and the terminal The message reporting server for entering the password of the privacy application input by the user is obtained by itself.
解锁隐私数据场景:在某一时刻,用户希望读取自己被加锁的隐私数据,于是用户输入读取隐私数据所需的密码,即满足了预设的第三条件,终端将自身获取了用户输入的用于读取隐私数据的密码的消息上报服务器。Unlocking the privacy data scene: At a certain moment, the user wants to read the private data that he has locked, so the user inputs the password required to read the private data, that is, the preset third condition is met, and the terminal acquires the user by itself. The message input server for reading the password for reading the private data is sent to the server.
需要理解的是,在解锁隐私应用场景和解锁隐私数据场景中,用户输入的密码可以是数字密码、指纹密码、眼纹密码、声音密码等,用户或运营商或生产厂家可以根据实际应用的需要自行设定,这里不做赘述。It should be understood that, in the scenario of unlocking the privacy application scenario and unlocking the privacy data, the password input by the user may be a digital password, a fingerprint password, an eye password, a voice password, etc., and the user or the operator or the manufacturer may according to the actual application needs. Set it yourself, I won't go into details here.
在步骤S202处,接收服务器下发的解锁对象的第一参数和解锁对象的第一秘钥。At step S202, the first parameter of the unlocking object and the first key of the unlocking object delivered by the server are received.
这里,所述第一参数和所述第一秘钥是服务器根据终端标识下发的,所述第一参数和所述第一秘钥用于判断所述终端是否满足解析数据的条件。Here, the first parameter and the first key are sent by the server according to the terminal identifier, and the first parameter and the first key are used to determine whether the terminal satisfies the condition for parsing data.
需要理解的是,第一参数在具体实施过程中根据应用场景的不同具有不同的含义,下面基于介绍其中的几种场景来对其进行详尽介绍,当然,在具体实施过程中,还可以应用于其他不同的场景,不限于以下几种。It should be understood that the first parameter has different meanings according to different application scenarios in the specific implementation process. The following describes the several parameters based on several scenarios. Of course, in the specific implementation process, it can also be applied. Other different scenarios are not limited to the following.
在解锁网场景中,所述第一参数为服务器端计数器所达到的数值;在解锁隐私应用场景和解锁隐私数据场景中,所述第一参数为服务器中预存储的密码信息,这里,所述密码信息为步骤S101中终端发送至服务器并由服务器存储的密码信息。In the unlocking network scenario, the first parameter is a value reached by the server-side counter; in the scenario of unlocking the privacy application scenario and unlocking the privacy data, the first parameter is password information pre-stored in the server, where The password information is the password information that the terminal transmits to the server and is stored by the server in step S101.
在步骤S203处,获取位于所述终端的解锁对象的第二参数和解锁对象的第二秘钥。At step S203, a second parameter of the unlocking object located at the terminal and a second key of the unlocking object are acquired.
这里,所述第二参数对应于第一参数,在具体实施过程中根据应用场景的不同具有不同的含义,下面基于介绍其中的几种场景来对其进行详尽介绍,当然,在具体实施过程中,还可以应用于其他不同的场景,不限于以下几种。Here, the second parameter corresponds to the first parameter, and has different meanings according to different application scenarios in a specific implementation process. The following describes the several scenarios based on the descriptions thereof. Of course, in the specific implementation process. It can also be applied to other different scenarios, not limited to the following.
在解锁网场景中,所述第二参数为终端计数器所达到的数值;在解锁隐私应用场景和解锁隐私数据场景中,所述第二参数为用户输入至终端中的密码信息。In the unlocking network scenario, the second parameter is a value reached by the terminal counter; in the unlocking the privacy application scenario and the unlocking privacy data scenario, the second parameter is password information input by the user into the terminal.
这里,所述第二秘钥与图1的步骤S102中以宏定义的方式写入解锁单进程中的第二秘钥相同。Here, the second key is the same as the second key written in the unlocking process in the manner defined by the macro in step S102 of FIG.
在步骤S204处,当所述第一参数和所述第二参数满足预设的第一条件且所述第一秘钥和所述第二秘钥满足预设的第二条件时,对解锁对象进行解锁。At step S204, when the first parameter and the second parameter satisfy a preset first condition and the first key and the second key satisfy a preset second condition, the unlocking object is unlocked. Unlock it.
这里,所述预设的第一条件为所述第一参数与所述第二参数满足一定的关系,可以是二者相等,也可以是二者的差或和满足一定的范围,用户或运营商或生产厂家可以根据实际应用的需要自行设定,这里不做赘述。Here, the preset first condition is that the first parameter and the second parameter satisfy a certain relationship, and may be equal to each other, or may be a difference or a sum of the two, satisfying a certain range, user or operation. The manufacturer or manufacturer can set it according to the needs of the actual application, and will not go into details here.
这里,所述预设的第二条件为所述第一秘钥与所述第二秘钥满足一定的关系,可以是二者相等,也可以是二者的差或和满足一定的范围,用户或运营商或生产厂家可以根据实际应用的需要自行设定,这里不做赘述。Here, the preset second condition is that the first key and the second key satisfy a certain relationship, and may be equal to each other, or may be a difference or a sum of the two, satisfying a certain range. Or the operator or the manufacturer can set it according to the needs of the actual application, and will not be described here.
这里,所述解锁对象与图1的步骤S101中的加锁对象相同,所述对解锁对象进行解锁是指启动由AP处理器执行的解锁单进程,所述解锁单进程用于对解锁对象执行AP侧和modem侧的双侧交叉数据解锁处理。Here, the unlocking object is the same as the locking object in step S101 of FIG. 1. The unlocking the unlocking object refers to starting an unlocking single process executed by the AP processor, and the unlocking single process is used to execute the unlocking object. Two-sided cross data unlocking processing on the AP side and the modem side.
需要理解的是,本公开实施例中,在服务器侧存储了一个参数和一个秘钥,在终端侧也存储了一个参数和一个秘钥,通过判断服务器侧和终端侧的参数与秘钥是否分别满足预定的条件来决定是否对解锁对象进行解锁。在具体实施的过程中,本领域技术人员当然也可以在服务器侧和终端侧分别存储多个参数与多个秘钥来判断是否对解锁对象进行解锁。例如,在服务器侧存储两个参数和两个秘钥,在终端侧也存储两个参数和两个秘钥,当服务器侧的两个参数与终端侧的两个参数均满足预定的条件且服务器侧的两个秘钥与终端侧的两个秘钥也均满足预定的条件时对所述解锁对象进行解锁。It should be understood that, in the embodiment of the present disclosure, one parameter and one secret key are stored on the server side, and one parameter and one secret key are also stored on the terminal side, by determining whether the parameters on the server side and the terminal side are different from the secret key. The predetermined condition is met to decide whether to unlock the unlocked object. In a specific implementation process, a person skilled in the art may also store a plurality of parameters and a plurality of keys on the server side and the terminal side respectively to determine whether to unlock the unlocked object. For example, two parameters and two keys are stored on the server side, and two parameters and two keys are also stored on the terminal side. When the two parameters on the server side and the two parameters on the terminal side satisfy the predetermined condition and the server The unlocked object is unlocked when the two secret keys on the side and the two secret keys on the terminal side also satisfy the predetermined condition.
本公开实施例还提供一种数据处理方法。图3为根据本公开实施例的数据处理方法的流程图。如图3所示,在一实施例中,该方法可以包括步骤S301至步骤S307。Embodiments of the present disclosure also provide a data processing method. 3 is a flow chart of a data processing method in accordance with an embodiment of the present disclosure. As shown in FIG. 3, in an embodiment, the method may include steps S301 to S307.
在步骤S301处,当所述终端满足预设的第三条件时,发送所述 终端满足预设的第三条件的消息至所述服务器。At step S301, when the terminal satisfies the preset third condition, the message that the terminal satisfies the preset third condition is sent to the server.
在步骤S302处,接收服务器下发的解锁对象的第一参数和解锁对象的第一秘钥。At step S302, the first parameter of the unlocking object and the first key of the unlocking object delivered by the server are received.
需要理解的是,步骤S301和图2的步骤S201类似,步骤S302和图2的步骤S202类似,因此,这里不做赘述。It should be understood that step S301 is similar to step S201 of FIG. 2, and step S302 is similar to step S202 of FIG. 2, and therefore, no further description is made here.
在步骤S303处,从modem侧的存储区域读取所述第一参数。At step S303, the first parameter is read from a storage area on the modem side.
需要理解的是,步骤S302中服务器下发的第一参数和第一秘钥是由终端中的modem处理器接收的。终端将所述第一参数和所述第一秘钥存储于modem侧的第三区域,所述第三区域为modem侧的普通存储区域。It should be understood that the first parameter and the first key delivered by the server in step S302 are received by the modem processor in the terminal. The terminal stores the first parameter and the first key in a third area on the modem side, where the third area is a normal storage area on the modem side.
在步骤S304处,从所述第一区域中的第二预留字段读取所述第二参数。At step S304, the second parameter is read from a second reserved field in the first region.
这里,在AP侧的第一区域,即AP侧的普通存储区域,预留了第一预留字段和第二预留字段两个字段,所述第一预留字段初始化为空值,所述第二预留字段用于存储第二参数。Here, in the first area on the AP side, that is, the normal storage area on the AP side, two fields, a first reserved field and a second reserved field, are reserved, and the first reserved field is initialized to a null value, The second reserved field is used to store the second parameter.
在步骤S305处,如果所述第一参数和所述第二参数满足预设的第一条件时,从所述modem侧的存储区域读取所述第一秘钥,并将所述第一秘钥的值写入所述第一预留字段。At step S305, if the first parameter and the second parameter satisfy a preset first condition, the first key is read from the storage area on the modem side, and the first secret is The value of the key is written to the first reserved field.
这里,所述预设的第一条件为所述第一参数与所述第二参数满足一定的关系,可以是二者相等,也可以是二者的差或和满足一定的范围,用户或运营商或生产厂家可以根据实际应用的需要自行设定,这里不做赘述。Here, the preset first condition is that the first parameter and the second parameter satisfy a certain relationship, and may be equal to each other, or may be a difference or a sum of the two, satisfying a certain range, user or operation. The manufacturer or manufacturer can set it according to the needs of the actual application, and will not go into details here.
这里,如果所述第一参数和所述第二参数不满足预设的第一条件时,则终端将modem侧的存储区域中的第一秘钥删除,并结束处理流程。Here, if the first parameter and the second parameter do not satisfy the preset first condition, the terminal deletes the first key in the storage area on the modem side, and ends the processing flow.
在步骤S306处,如果所述第一预留字段为非空时,比较所述第一预留字段中的值与所述第二秘钥的值。At step S306, if the first reserved field is non-empty, the value in the first reserved field is compared with the value of the second key.
这里,终端中由AP处理器执行的解锁单进程实时监测所述第一预留字段,当所述第一预留字段为非空时,所述解锁单进程比较所述第一预留字段中的值与所述第二秘钥的值,其中,所述第二秘钥以宏 定义的方式写在所述解锁单进程中;如果所述第一预留字段为空值时,所述解锁单进程继续实时监测所述第一预留字段。Here, the unlocking single process performed by the AP processor in the terminal monitors the first reserved field in real time, and when the first reserved field is non-empty, the unlocking single process compares the first reserved field. And a value of the second key, wherein the second key is written in the unlocking process in a macro definition manner; if the first reserved field is a null value, the unlocking The single process continues to monitor the first reserved field in real time.
在步骤S307处,如果所述第一预留字段中的值与所述第二秘钥的值满足预设的第二条件时,对所述解锁对象进行解锁。At step S307, if the value in the first reserved field and the value of the second key satisfy the preset second condition, the unlocked object is unlocked.
这里,所述预设的第二条件为所述第一预留字段中的值与所述第二秘钥的值满足一定的关系,可以是二者相等,也可以是二者的差或和满足一定的范围,用户或运营商或生产厂家可以根据实际应用的需要自行设定,这里不做赘述。Here, the preset second condition is that the value in the first reserved field satisfies a certain relationship with the value of the second key, and may be equal to each other, or may be a difference or sum of the two. To meet a certain range, the user or the operator or the manufacturer can set it according to the needs of the actual application, and will not be described here.
这里,如果所述第一预留字段中的值与所述第二秘钥的值不满足预设的第二条件时,则终端将第一预留字段中的值删除,并结束处理流程。Here, if the value in the first reserved field and the value of the second key do not satisfy the preset second condition, the terminal deletes the value in the first reserved field, and ends the processing flow.
这里,所述解锁对象与步骤S101中的加锁对象相同,所述对解锁对象进行解锁是指启动由AP处理器执行的解锁单进程,所述解锁单进程用于对解锁对象执行AP侧和modem侧的双侧交叉数据解锁处理。Here, the unlocking object is the same as the locking object in step S101, and the unlocking the unlocking object refers to starting an unlocking single process executed by the AP processor, where the unlocking single process is used to perform an AP side and an unlocking object. Double-sided cross data unlock processing on the modem side.
需要理解的是,本公开实施例中,在服务器侧存储了一个参数和一个秘钥,在终端侧也存储了一个参数和一个秘钥,通过判断服务器侧和终端侧的参数与秘钥是否分别满足预定的条件来决定是否对解锁对象进行解锁。在具体实施的过程中,本领域技术人员当然也可以在服务器侧和终端侧分别存储多个参数与多个秘钥来判断是否对解锁对象进行解锁。例如,在服务器侧存储两个参数和两个秘钥,在终端侧也存储两个参数和两个秘钥,当服务器侧的两个参数与终端侧的两个参数均满足预定的条件且服务器侧的两个秘钥与终端侧的两个秘钥也均满足预定的条件时对所述解锁对象进行解锁。It should be understood that, in the embodiment of the present disclosure, one parameter and one secret key are stored on the server side, and one parameter and one secret key are also stored on the terminal side, by determining whether the parameters on the server side and the terminal side are different from the secret key. The predetermined condition is met to decide whether to unlock the unlocked object. In a specific implementation process, a person skilled in the art may also store a plurality of parameters and a plurality of keys on the server side and the terminal side respectively to determine whether to unlock the unlocked object. For example, two parameters and two keys are stored on the server side, and two parameters and two keys are also stored on the terminal side. When the two parameters on the server side and the two parameters on the terminal side satisfy the predetermined condition and the server The unlocked object is unlocked when the two secret keys on the side and the two secret keys on the terminal side also satisfy the predetermined condition.
本公开实施例还提供一种数据处理方法。图4为根据本公开实施例的数据处理方法的流程图。如图4所示,在一实施例中,该方法可以包括步骤S401至步骤S410。Embodiments of the present disclosure also provide a data processing method. 4 is a flow chart of a data processing method in accordance with an embodiment of the present disclosure. As shown in FIG. 4, in an embodiment, the method may include steps S401 to S410.
在步骤S401处,当所述终端满足预设的第三条件时,发送所述终端满足预设的第三条件的消息至所述服务器。At step S401, when the terminal satisfies the preset third condition, the message that the terminal meets the preset third condition is sent to the server.
在步骤S402处,接收服务器下发的解锁对象的第一参数和解锁 对象的第一秘钥。At step S402, the first parameter of the unlocking object and the first key of the unlocking object delivered by the server are received.
在步骤S403处,从modem侧的存储区域读取所述第一参数。At step S403, the first parameter is read from a storage area on the modem side.
在步骤S404处,从所述第一区域中的第二预留字段读取所述第二参数。At step S404, the second parameter is read from a second reserved field in the first region.
在步骤S405处,如果所述第一参数和所述第二参数满足预设的第一条件时,从所述modem侧的存储区域读取所述第一秘钥,并将所述第一秘钥的值写入所述第一预留字段。At step S405, if the first parameter and the second parameter satisfy a preset first condition, the first key is read from the storage area on the modem side, and the first secret is The value of the key is written to the first reserved field.
在步骤S406处,如果所述第一预留字段为非空时,比较所述第一预留字段中的值与所述第二秘钥的值。At step S406, if the first reserved field is non-empty, the value in the first reserved field is compared with the value of the second key.
需要理解的是,步骤S401至步骤S406与图3的步骤S301至步骤S306类似,因此,这里不做赘述。It should be understood that steps S401 to S406 are similar to steps S301 to S306 of FIG. 3, and therefore, no further description is made herein.
在步骤S407处,从所述终端获取加密的AP侧解锁参数和加密的modem侧解锁参数。At step S407, the encrypted AP side unlocking parameter and the encrypted modem side unlocking parameter are acquired from the terminal.
这里,从所述AP侧的存储区域中的第二区域获取加密的modem侧解锁参数,所述第二区域的权限高于所述第一区域。需要理解的是,本公开实施例中,移动终端采用嵌入式多媒体芯片(EMMC,Embedded Multi Media Card)的分区方式,所述第一区域为AP侧的普通存储区域,所述第二区域为AP侧的RPMB区域。厂家在出厂前设定所述第二区域仅AP处理器执行的解锁单进程可以访问。Here, the encrypted modem side unlocking parameter is acquired from the second area in the storage area on the AP side, and the right of the second area is higher than the first area. It should be understood that, in the embodiment of the present disclosure, the mobile terminal adopts a partitioning mode of an embedded multimedia chip (EMMC), the first area is a common storage area on the AP side, and the second area is an AP. Side RPMB area. The manufacturer sets the second area to be unlocked only by the unlocking process executed by the AP processor.
这里,从所述modem侧的存储区域中的第四区域获取加密的AP侧解锁参数,所述modem侧的存储区域还包括权限低于所述第四区域的第三区域。需要理解的是,本公开实施例中,移动终端采用嵌入式多媒体芯片(EMMC,Embedded Multi Media Card)的分区方式,所述第三区域为modem侧的普通存储区域,所述第四区域为modem侧的SFS区域。厂家在出厂前设定所述第四区域仅AP处理器执行的解锁单进程可以访问。Here, the encrypted AP side unlocking parameter is acquired from the fourth area in the storage area on the modem side, and the storage area on the modem side further includes a third area having a lower authority than the fourth area. It should be understood that, in the embodiment of the present disclosure, the mobile terminal adopts a partition mode of an embedded multimedia chip (EMMC), the third area is a common storage area on the modem side, and the fourth area is a modem. Side SFS area. The manufacturer sets the fourth area to be unlocked by the AP processor only after the factory is executed.
在步骤S408处,基于所述加密的AP侧解锁参数生成第一标记位,所述第一标记位用于表明解析所述加密的AP侧解锁参数是否成功。At step S408, a first flag bit is generated based on the encrypted AP side unlocking parameter, the first flag bit being used to indicate whether the parsing of the encrypted AP side unlocking parameter is successful.
这里,所述基于所述加密的AP侧解锁参数生成第一标记位,包 括:从第二区域获取AP侧解锁参数和AP侧秘钥;根据AP侧秘钥对加密的AP侧解锁参数进行解密,得到解密后的AP侧解锁参数;比较解密后的AP侧解锁参数与AP侧解锁参数,得到第一比较结果;并根据第一比较结果生成第一标记位。Here, the generating the first flag bit based on the encrypted AP side unlocking parameter includes: acquiring an AP side unlocking parameter and an AP side key from the second area; and decrypting the encrypted AP side unlocking parameter according to the AP side key The decrypted AP side unlocking parameter is obtained; the decrypted AP side unlocking parameter and the AP side unlocking parameter are compared to obtain a first comparison result; and the first flag bit is generated according to the first comparison result.
需要理解的是,所述第一标记位可以设定为0或1,其中,0表示解析失败,1表示解析成功,当然,所述第一标记位也可以设定为00表示解析失败,11表示解析成功。用户或运营商或生产厂家可以根据实际应用的需要自行设定,这里不做赘述。It should be understood that the first flag bit may be set to 0 or 1, where 0 indicates that the parsing fails, and 1 indicates that the parsing is successful. Of course, the first flag bit may also be set to 00 to indicate parsing failure, 11 Indicates that the analysis was successful. The user or the operator or the manufacturer can set it according to the needs of the actual application, and will not be described here.
在步骤S409处,基于所述加密的modem侧解锁参数生成第二标记位,所述第二标记位用于表明解析所述加密的modem侧解锁参数是否成功。At step S409, a second flag bit is generated based on the encrypted modem side unlocking parameter, the second flag bit being used to indicate whether the encrypted modem side unlocking parameter is resolved successfully.
这里,所述基于所述加密的modem侧解锁参数生成第二标记位,包括:从第四区域获取modem侧解锁参数和modem侧秘钥;根据modem侧秘钥对加密的modem侧解锁参数进行解密,得到解密后的modem侧解锁参数;比较解密后的modem侧解锁参数与modem侧解锁参数,得到第二比较结果;并根据第二比较结果生成第二标记位。Here, the generating, according to the encrypted modem side unlocking parameter, a second flag bit, comprising: acquiring a modem side unlocking parameter and a modem side key from the fourth area; and decrypting the encrypted modem side unlocking parameter according to the modem side key Obtaining the decrypted modem side unlocking parameter; comparing the decrypted modem side unlocking parameter and the modem side unlocking parameter to obtain a second comparison result; and generating a second flag bit according to the second comparison result.
需要理解的是,所述第二标记位可以设定为0或1,其中,0表示解析失败,1表示解析成功,当然,所述第二标记位也可以设定为00表示解析失败,11表示解析成功。用户或运营商或生产厂家可以根据实际应用的需要自行设定,这里不做赘述。所述第一标记位的设定方法与所述第二标记位的设定方法可以相同,也可以不同。It should be understood that the second flag bit may be set to 0 or 1, where 0 indicates that the parsing fails, 1 indicates that the parsing is successful, and of course, the second flag bit may also be set to 00 to indicate parsing failure, 11 Indicates that the analysis was successful. The user or the operator or the manufacturer can set it according to the needs of the actual application, and will not be described here. The method of setting the first mark bit may be the same as or different from the method of setting the second mark bit.
在步骤S410处,当所述第一标记位和所述第二标记位满足预设的第四条件时,对所述解锁对象进行解锁。At step S410, when the first marker bit and the second marker bit satisfy a preset fourth condition, the unlocked object is unlocked.
这里,所述预设的第四条件为加密的AP侧解锁参数和加密的modem侧解锁参数均解析成功。例如,当第一标记位和第二标记位均设定为0表示解析失败,1表示解析成功时,当且仅当第一标记位和第二标记位均为1时,表示第一标记位和第二标记位满足预设的第一条件。Here, the preset fourth condition is that both the encrypted AP side unlocking parameter and the encrypted modem side unlocking parameter are successfully parsed. For example, when both the first flag bit and the second flag bit are set to 0, the parsing fails, and 1 indicates that the parsing is successful, if and only if the first flag bit and the second flag bit are both 1, the first flag bit is indicated. And the second marker bit satisfies the preset first condition.
这里,当所述第一标记位和所述第二标记位不满足预设的第四条件时,终端结束处理流程。Here, when the first flag bit and the second flag bit do not satisfy the preset fourth condition, the terminal ends the processing flow.
需要理解的是,本公开实施例中,在服务器侧存储了一个参数和一个秘钥,在终端侧也存储了一个参数和一个秘钥,通过判断服务器侧和终端侧的参数与秘钥是否分别满足预定的条件来决定是否对解锁对象进行解锁。在具体实施的过程中,本领域技术人员当然也可以在服务器侧和终端侧分别存储多个参数与多个秘钥来判断是否对解锁对象进行解锁。例如,在服务器侧存储两个参数和两个秘钥,在终端侧也存储两个参数和两个秘钥,当服务器侧的两个参数与终端侧的两个参数均满足预定的条件且服务器侧的两个秘钥与终端侧的两个秘钥也均满足预定的条件时对所述解锁对象进行解锁。It should be understood that, in the embodiment of the present disclosure, one parameter and one secret key are stored on the server side, and one parameter and one secret key are also stored on the terminal side, by determining whether the parameters on the server side and the terminal side are different from the secret key. The predetermined condition is met to decide whether to unlock the unlocked object. In a specific implementation process, a person skilled in the art may also store a plurality of parameters and a plurality of keys on the server side and the terminal side respectively to determine whether to unlock the unlocked object. For example, two parameters and two keys are stored on the server side, and two parameters and two keys are also stored on the terminal side. When the two parameters on the server side and the two parameters on the terminal side satisfy the predetermined condition and the server The unlocked object is unlocked when the two secret keys on the side and the two secret keys on the terminal side also satisfy the predetermined condition.
本公开实施例还提供一种数据处理方法。在介绍本实施例提供的一种数据处理方法之前,先介绍一下本实施例中AP处理器和modem处理器的组成结构。Embodiments of the present disclosure also provide a data processing method. Before introducing a data processing method provided by this embodiment, the composition of the AP processor and the modem processor in this embodiment will be described.
图5根据本公开的实施例的AP处理器的结构示意图。如图5所示,所述AP处理器包括用于执行命令的处理区域和用于存储数据的存储区域。所述AP处理器的处理区域包括:解锁单进程、AP侧数据存储模块、AP侧数据处理模块和AP侧数据解析模块。所述解锁单进程用于对解锁对象执行AP侧和modem侧的双侧交叉数据解锁处理。所述AP处理器的存储区域包括普通存储区域和RPMB区域,RPMB区域属于存储区域中的安全区域,该区域权限高于普通存储区域。厂家在出厂前设定所述RPMB区域仅所述解锁单进程可以访问。FIG. 5 is a schematic structural diagram of an AP processor according to an embodiment of the present disclosure. As shown in FIG. 5, the AP processor includes a processing area for executing a command and a storage area for storing data. The processing area of the AP processor includes: an unlocking single process, an AP side data storage module, an AP side data processing module, and an AP side data parsing module. The unlocking single process is used to perform double-side cross data unlocking processing on the AP side and the modem side on the unlocking object. The storage area of the AP processor includes a common storage area and an RPMB area, and the RPMB area belongs to a security area in the storage area, and the area has higher authority than the normal storage area. The manufacturer sets the RPMB area before leaving the factory, and only the unlocking single process can be accessed.
图6为根据本公开实施例的modem处理器的结构示意图。如图6所示,所述modem处理器包括用于执行命令的处理区域和用于存储数据的存储区域。所述modem处理器的处理区域包括:modem侧数据存储模块、modem侧数据处理模块和modem侧数据解析模块。所述modem处理器的存储区域包括普通存储区域和SFS区域,SFS区域属于存储区域中的安全区域,该区域权限高于普通存储区域。厂家在出厂前设定所述SFS区域仅所述解锁单进程可以访问。FIG. 6 is a schematic structural diagram of a modem processor according to an embodiment of the present disclosure. As shown in FIG. 6, the modem processor includes a processing area for executing a command and a storage area for storing data. The processing area of the modem processor includes: a modem side data storage module, a modem side data processing module, and a modem side data parsing module. The storage area of the modem processor includes a common storage area and an SFS area, and the SFS area belongs to a security area in the storage area, and the area has higher authority than the normal storage area. The manufacturer sets the SFS area before leaving the factory, and only the unlocking single process can be accessed.
图7A至图7C为根据本公开实施例的数据处理方法的流程图。如图7A至图7C所示,在一实施例中,该方法包括步骤S701至S718。7A through 7C are flowcharts of a data processing method according to an embodiment of the present disclosure. As shown in FIGS. 7A through 7C, in an embodiment, the method includes steps S701 through S718.
参照图7A,在步骤S701处,终端处于初始状态,在所述终端 AP处理器存储区域中的普通存储区域存储四个值,分别存储在四个不同的位置。Referring to FIG. 7A, at step S701, the terminal is in an initial state, and four values are stored in the normal storage area in the storage area of the terminal AP processor, and are respectively stored in four different positions.
在该四个值中,两个为终端参数(终端参数1与终端参数2),另外两个为空值。这里,所述终端参数为上述实施例中的第二参数,用于存储终端参数的位置为上述实施例中的第二预留字段,用于存储空值的位置为上述实施例中的第一预留字段。Of the four values, two are terminal parameters (terminal parameter 1 and terminal parameter 2), and the other two are null values. Here, the terminal parameter is the second parameter in the foregoing embodiment, and the location for storing the terminal parameter is the second reserved field in the foregoing embodiment, and the location for storing the null value is the first in the foregoing embodiment. Reserved field.
在步骤S702处,当终端满足解析条件一时,上报服务器,并接收服务器根据终端标识下发的服务器参数1和key1值;当终端满足解析条件二时,上报服务器,并接收服务器根据终端标识下发的服务器参数2和key2值。In step S702, when the terminal satisfies the parsing condition one, it reports to the server, and receives the server parameter 1 and key1 values delivered by the server according to the terminal identifier; when the terminal satisfies the parsing condition 2, the server reports the value to the server, and the receiving server delivers the message according to the terminal identifier. Server parameter 2 and key2 values.
所述两个服务器参数与所述两个key值通过指令下发,指令头文件中包含服务器参数1和服务器参数2,冗余位包含key1值和key2值。The two server parameters are sent by the instruction, and the command header file includes server parameter 1 and server parameter 2, and the redundancy bit includes the key1 value and the key2 value.
这里,所述解析条件一与解析条件二可以一致,即只有一个解析条件,如上述实施例中的第三条件,当然本领域的技术人员还可以分别设置不同的解析条件一与解析条件二。所述服务器参数1和服务器参数2也可以一致,一致时,服务器参数1和服务器参数2如上述实施例中的第一参数,当然本领域的技术人员还可以分别设置不同的服务器参数1和服务器参数2;所述key1值可key2值也可以一致,一致时,key1值和key2值如上述实施例中的第一秘钥,当然本领域的技术人员还可以分别设置不同的key1值和key2值。Here, the analysis condition 1 and the analysis condition 2 may be identical, that is, there is only one analysis condition, such as the third condition in the above embodiment. Of course, those skilled in the art may separately set different analysis conditions 1 and analysis conditions 2. The server parameter 1 and the server parameter 2 may also be consistent. When the server parameter 1 and the server parameter 2 are the same as the first parameter in the foregoing embodiment, those skilled in the art may separately set different server parameters 1 and server. Parameter 2; the key1 value may be the same as the key2 value. When the value is the same, the key1 value and the key2 value are the first key in the foregoing embodiment. Of course, those skilled in the art may separately set different key1 values and key2 values. .
在步骤S703处,读取指令头文件中的服务器参数1和服务器参数2。At step S703, server parameter 1 and server parameter 2 in the instruction header file are read.
在步骤S704处,对比终端存储的两个终端参数与两个服务器参数是否一致。At step S704, it is compared whether the two terminal parameters stored by the terminal are consistent with the two server parameters.
这里,终端存储的两个终端参数分别为终端参数1与终端参数2,所述终端参数1和终端参数2可以一致,一致时,终端参数1和终端参数2如上述实施例中的第二参数,当然本领域的技术人员还可以分别设置不同的终端参数1和终端参数2。Here, the two terminal parameters stored in the terminal are the terminal parameter 1 and the terminal parameter 2, respectively, and the terminal parameter 1 and the terminal parameter 2 may be identical. When the two are consistent, the terminal parameter 1 and the terminal parameter 2 are the second parameter in the foregoing embodiment. Of course, those skilled in the art can also set different terminal parameters 1 and terminal parameters 2 respectively.
这里,对比两个终端参数与两个服务器参数是否一致,具体为 对比终端参数1与服务器参数1是否一致,对比终端参数2与服务器参数2是否一致。Here, it is compared whether the two terminal parameters are consistent with the two server parameters, specifically comparing whether the terminal parameter 1 and the server parameter 1 are consistent, and comparing whether the terminal parameter 2 and the server parameter 2 are consistent.
在步骤S705处,若两个终端参数与两个服务器参数一致,则读取指令中对应的key1值和/或key2值,并存储key1值和/或key2值到终端预留的空值区域。At step S705, if the two terminal parameters are consistent with the two server parameters, the corresponding key1 value and/or key2 value in the instruction is read, and the key1 value and/or the key2 value are stored to the null area reserved by the terminal.
需要理解的是,若仅终端参数1与服务器参数1一致,则读取指令中对应的key1值,并存储key1值到终端预留的空值区域;若仅终端参数2与服务器参数2一致,则读取指令中对应的key2值,并存储key2值到终端预留的空值区域;若终端参数1与服务器参数1一致且终端参数2与服务器参数2也一致,则读取指令中对应的key1值和key2值,并存储key1值和key2值到终端预留的空值区域。It should be understood that if only the terminal parameter 1 is consistent with the server parameter 1, the corresponding key1 value in the command is read, and the key1 value is stored to the null value area reserved by the terminal; if only the terminal parameter 2 is consistent with the server parameter 2, Then, the corresponding key2 value in the instruction is read, and the key2 value is stored to the null value area reserved by the terminal; if the terminal parameter 1 is consistent with the server parameter 1 and the terminal parameter 2 is consistent with the server parameter 2, the corresponding command is read. The key1 value and the key2 value, and store the key1 value and the key2 value to the null area reserved by the terminal.
这里,若两个终端参数与两个服务器参数不一致,则处理流程返回步骤S701,并且删除服务器下发的key1值和/或key2值。Here, if the two terminal parameters are inconsistent with the two server parameters, the process flow returns to step S701, and the key1 value and/or the key2 value delivered by the server is deleted.
需要理解的是,若两个终端参数与两个服务器参数不一致,则处理流程返回步骤S701,并且删除服务器下发的key1值和/或key2值具体为:若仅终端参数1与服务器参数1不一致,则删除服务器下发的key1值并返回步骤S701;若仅终端参数2与服务器参数2不一致,则删除服务器下发的key2值并返回步骤S701;若终端参数1与服务器参数1不一致且终端参数2与服务器参数2也不一致,则删除服务器下发的key1值和key2值并返回步骤S701。It is to be understood that if the two terminal parameters are inconsistent with the two server parameters, the process flow returns to step S701, and the key1 value and/or the key2 value delivered by the server is specifically deleted: if only the terminal parameter 1 is inconsistent with the server parameter 1 Delete the key1 value sent by the server and return to step S701; if only the terminal parameter 2 is inconsistent with the server parameter 2, delete the key2 value sent by the server and return to step S701; if the terminal parameter 1 is inconsistent with the server parameter 1 and the terminal parameter 2 If the server parameter 2 is also inconsistent, the key1 value and the key2 value sent by the server are deleted, and the process returns to step S701.
在步骤S706处,所述解锁单进程判断key1值和key2值的存储区域是否为空;若key1值和key2值均不为空,则判断key1值和key2值是否与解锁单进程中写定的参数1与参数2一致。At step S706, the unlocking single process determines whether the storage area of the key1 value and the key2 value is empty; if both the key1 value and the key2 value are not empty, it is determined whether the key1 value and the key2 value are written in the unlocking process. Parameter 1 is consistent with parameter 2.
这里,判断key1值和key2值是否与解锁单进程中写定的参数1与参数2一致具体为:判断key1值是否与解锁单进程中写定的参数1一致,以及判断key2值是否与解锁单进程中写定的参数2一致。Here, it is determined whether the key1 value and the key2 value are consistent with the parameter 1 and the parameter 2 written in the unlocking process. Specifically, it is determined whether the key1 value is consistent with the parameter 1 written in the unlocking process, and whether the key2 value is related to the unlocking list. The parameters 2 written in the process are the same.
需要理解的是,解锁单进程中写定的参数1与参数2可以一致,一致时为上述实施例中的第二秘钥,当然本领域的技术人员还可以在解锁单进程中分别设置不同的参数1与参数2。It should be understood that the parameter 1 and the parameter 2 which are written in the process of the unlocking process can be the same as the parameter 2, and the second key in the above embodiment can be used. Parameter 1 and parameter 2.
这里,所述解锁单进程设定为实时监测所述终端AP处理器普通 存储区域中的空值区域,所述解锁单进程中写定的参数1与参数2通过宏定义设置。Here, the unlocking single process is set to monitor the null value area in the normal storage area of the terminal AP processor in real time, and the parameters 1 and 2 written in the unlocking single process are set by macro definition.
这里,若key1值和key2值的存储区域有一方为空,或key1值和key2值有一个与解锁单进程中写定的参数1和参数2不一致,则处理流程转至步骤S707;若key1值和key2值的存储区域均不为空,且key1值和key2值均与第二单进程中写定的参数1和参数2一致,则处理流程转至步骤S708。Here, if one of the storage areas of the key1 value and the key2 value is empty, or one of the key1 value and the key2 value does not match the parameter 1 and the parameter 2 written in the unlocking process, the process flow goes to step S707; if the key1 value And the storage area of the key2 value is not empty, and the key1 value and the key2 value are both consistent with the parameters 1 and 2 written in the second single process, the process flow goes to step S708.
这里,key1值和key2值的存储区域有一方为空,具体为key1值的存储区域为空,或key2值的存储区域为空,或key1值和key2值的存储区域均为空。Here, one of the storage areas of the key1 value and the key2 value is empty, and the storage area of the key1 value is empty, or the storage area of the key2 value is empty, or the storage areas of the key1 value and the key2 value are empty.
这里,key1值和key2值有一个与解锁单进程中写定的参数1和参数2不一致具体为:key1值与解锁单进程中写定的参数1不一致,或key2值与解锁单进程中写定的参数2不一致,或key1值与解锁单进程中写定的参数1不一致且key2值与解锁单进程中写定的参数2也不一致。Here, the key1 value and the key2 value have one inconsistent with the parameter 1 and the parameter 2 written in the unlocking process. Specifically, the key1 value is inconsistent with the parameter 1 written in the unlocking process, or the key2 value is written in the unlocking process. The parameter 2 is inconsistent, or the key1 value is inconsistent with the parameter 1 written in the unlocking process and the key2 value is also inconsistent with the parameter 2 written in the unlocking process.
这里,key1值和key2值均与解锁单进程中写定的参数1和参数2一致具体为:key1值与解锁单进程中写定的参数1一致且key2值与解锁单进程中写定的参数2也一致。Here, both the key1 value and the key2 value are consistent with the parameters 1 and 2 written in the unlocking process. Specifically, the key1 value is consistent with the parameter 1 written in the unlocking process and the key2 value and the parameter written in the unlocking process. 2 is also consistent.
在步骤S707处,解锁单进程继续实时监测所述普通存储区域中的空值区域。At step S707, the unlocking single process continues to monitor the null area in the normal storage area in real time.
在步骤S708处,解锁单进程执行步骤S709至步骤S718。At step S708, the unlocking single process performs steps S709 to S718.
参照图7B,在步骤S709处,所述解锁单进程向SFS区域发送获取AP侧解析参数的请求。Referring to FIG. 7B, in step S709, the unlocking single process sends a request for acquiring an AP side parsing parameter to the SFS area.
这里,所述AP侧解析参数为上述实施例中加密的AP侧解锁参数。Here, the AP side resolution parameter is an AP side unlocking parameter encrypted in the foregoing embodiment.
在步骤S710处,所述解锁单进程获取AP侧解析参数。At step S710, the unlocking single process acquires an AP side parsing parameter.
在步骤S711处,AP处理器中的AP侧数据处理模块对所述AP侧解析参数进行解密。At step S711, the AP side data processing module in the AP processor decrypts the AP side parsing parameter.
这里,所述AP处理器中的AP侧数据处理模块对所述AP侧解析参数进行解密包括:所述解锁单进程将AP侧解析参数发送至AP侧数 据处理模块,AP侧数据处理模块对所述AP侧解析参数进行解密。Here, the AP side data processing module in the AP processor decrypts the AP side parsing parameter, and the unlocking single process sends the AP side parsing parameter to the AP side data processing module, and the AP side data processing module collides. The AP side parsing parameters are decrypted.
在步骤S712处,若AP侧数据处理模块解密AP侧解析参数不成功,则处理流程终止;若AP侧数据处理模块解密AP侧解析参数成功,则AP侧数据处理模块将解密后的AP侧解析参数送入AP处理器中的AP侧数据解析模块进行解析,并根据解析结果生成AP侧解析标记位。In step S712, if the AP side data processing module decrypts the AP side parsing parameter is unsuccessful, the processing flow is terminated; if the AP side data processing module decrypts the AP side parsing parameter successfully, the AP side data processing module parses the decrypted AP side. The parameter is sent to the AP side data parsing module in the AP processor for parsing, and the AP side parsing flag bit is generated according to the parsing result.
这里,所述解密后的AP侧解析参数为上述实施例中的解密后的AP侧解锁参数;所述AP侧解析标记位为上述实施例中的第一标记位。Here, the decrypted AP side parsing parameter is the decrypted AP side unlocking parameter in the above embodiment; the AP side parsing flag bit is the first flag bit in the above embodiment.
在步骤S713处,AP侧数据解析模块发送AP侧解析标记位至解锁单进程。At step S713, the AP side data parsing module sends the AP side parsing flag bit to the unlocking single process.
这里,所述AP侧解析标记位用于表明解析所述AP侧解析参数是否成功;所述AP侧标记位可以设定为0或1,其中,0表示解析失败,1表示解析成功。Here, the AP side parsing flag bit is used to indicate whether the AP side parsing parameter is successfully parsed; the AP side flag bit may be set to 0 or 1, where 0 indicates parsing failure and 1 indicates parsing success.
参照图7C,在步骤S714处,所述解锁单进程向RPMB区域发送获取modem侧解析参数的请求。Referring to FIG. 7C, at step S714, the unlocking single process sends a request to acquire a modem side resolution parameter to the RPMB area.
这里,所述modem侧解析参数为上述实施例中的加密的modem侧解锁参数。Here, the modem side resolution parameter is the encrypted modem side unlocking parameter in the above embodiment.
在步骤S715处,所述解锁单进程获取modem侧解析参数。At step S715, the unlocking single process acquires a modem side resolution parameter.
在步骤S716处,modem处理器中的modem侧数据处理模块对所述modem侧解析参数进行解密。At step S716, the modem side data processing module in the modem processor decrypts the modem side parsing parameter.
在步骤S717处,若modem侧数据处理模块解密modem侧解析参数不成功,则处理流程终止;若modem侧数据处理模块解密modem侧解析参数成功,则modem侧数据处理模块将解密后的modem侧解析参数送入modem处理器中的modem侧数据解析模块进行解析,并根据解析结果生成modem侧解析标记位。In step S717, if the modem side data processing module decrypts the modem side parsing parameter is unsuccessful, the processing flow is terminated; if the modem side data processing module decrypts the modem side parsing parameter successfully, the modem side data processing module parses the decrypted modem side. The parameter is sent to the modem side data parsing module in the modem processor for parsing, and the modem side parsing flag bit is generated according to the parsing result.
这里,所述解密后的modem侧解析参数为上述实施例中的解密后的modem侧解锁参数;所述modem侧解析标记位为上述实施例中的第二标记位。Here, the decrypted modem side parsing parameter is the decrypted modem side unlocking parameter in the above embodiment; the modem side parsing flag bit is the second flag bit in the above embodiment.
这里,所述modem侧解析标记位用于表明解析所述modem侧解析参数是否成功;所述modem侧解析标记位可以设定为0或1,其中,0表示解析失败,1表示解析成功。Here, the modem side parsing flag bit is used to indicate whether the modem side parsing parameter is successfully parsed; the modem side parsing flag bit may be set to 0 or 1, where 0 indicates parsing failure and 1 indicates parsing succeeds.
在步骤S718处,modem侧数据解析模块发送modem侧解析标记位至解锁单进程。At step S718, the modem side data parsing module sends the modem side parsing flag bit to the unlocking single process.
需要理解的是,当且仅当两个解析标记位均为1时,终端正常解锁。It should be understood that the terminal is normally unlocked if and only if both parsing flag bits are 1.
由本公开实施例可以看出,在本公开实施例中设置双侧解析和双解析参数,将双解析参数分别存储在modem侧和AP侧存储区域中的安全区域,双侧安全区域仅AP处理器执行的解锁单进程可以访问。当终端满足解析条件一时上报服务器,服务器下发服务器参数1和key1值,当终端满足解析条件二时上报服务器,服务器下发服务器参数2和key2值,终端优先读取服务器参数,当服务器参数与终端参数一致或服务器参数的值满足预设条件时,终端读取对应的key值,并写入AP处理器普通存储区域中的空白区域。若不一致,则终端删除对应的key值。解锁单进程会在AP处理器普通存储区域中的空白区域不为空时,并且所述空白区域中的值与自身通过宏定义写入的参数值一致时,从modem侧安全区域调取AP侧解析参数,并将AP侧解析参数送入AP侧数据处理模块进行处理,处理成功后的数据会被送入AP侧数据解析模块进行解析。此外,解锁单进程还会从AP侧安全区域取出modem侧解析参数送输入modem侧数据处理模块进行处理,处理成功后的数据会被送入modem侧数据解析模块进行解析。当AP侧数据解析模块和modem侧数据解析模块均解析成功时,终端正常解锁,当AP侧数据解析模块和modem侧数据解析模块有一方解析失败时,则终端不能正常解锁。It can be seen that, in the embodiment of the present disclosure, the dual-side parsing and the dual-parsing parameters are set, and the dual-parsing parameters are respectively stored in the security area in the modem side and the AP side storage area, and the dual-side security area is only the AP processor. The unlocked single process that is executed can be accessed. When the terminal meets the parsing condition, the server sends the server parameter 1 and key1. When the terminal meets the parsing condition 2, the server reports the server parameter 2 and the key2 value. The terminal preferentially reads the server parameter. When the server parameter is used, When the terminal parameters are consistent or the value of the server parameter meets the preset condition, the terminal reads the corresponding key value and writes the blank area in the normal storage area of the AP processor. If they are inconsistent, the terminal deletes the corresponding key value. The unlocking single process will retrieve the AP side from the modem side security area when the blank area in the normal storage area of the AP processor is not empty, and the value in the blank area is consistent with the value of the parameter written by the macro definition. The parameters are parsed, and the AP side analysis parameters are sent to the AP side data processing module for processing. The processed data is sent to the AP side data analysis module for analysis. In addition, the unlocking single process also extracts the modem side parsing parameter from the AP side security area and sends it to the modem side data processing module for processing, and the processed data is sent to the modem side data parsing module for parsing. When both the AP-side data parsing module and the modem-side data parsing module are successfully parsed, the terminal is normally unlocked. When one of the AP-side data parsing module and the modem-side data parsing module fails to parse, the terminal cannot be unlocked normally.
基于上述实施例,本公开提供的一种数据解锁方法应用于解锁网场景。该场景下,上述实施例中的终端参数1为终端计数1;终端参数2为终端计数2;解析条件一为解锁网条件一;解析条件二为解锁网条件二;服务器参数1为服务器计数1;服务器参数2为服务器计数2;解锁单进程为客户识别解锁(subscriber identification module unlock,simunlock)模块;AP侧解析参数为AP侧解锁网参数;modem侧解析参数为modem侧解锁网参数;AP侧解析标记位为AP侧解锁网标记位;modem侧解析标记位为modem侧解锁网标记位; modem侧数据存储模块为modem侧解锁网参数存储模块;modem侧数据处理模块为modem侧解锁网参数解密模块;modem侧数据解析模块为modem侧解锁网模块;AP侧数据存储模块为AP侧解锁网参数存储模块;AP侧数据处理模块为AP侧解锁网参数解密模块;AP侧数据解析模块为AP侧解锁网模块。Based on the foregoing embodiment, a data unlocking method provided by the present disclosure is applied to unlocking a network scenario. In this scenario, the terminal parameter 1 in the above embodiment is the terminal count 1; the terminal parameter 2 is the terminal count 2; the analysis condition 1 is the unlock network condition 1; the analysis condition 2 is the unlock network condition 2; the server parameter 1 is the server count 1 The server parameter 2 is the server count 2; the unlock single process is the subscriber identification module unlock (simunlock) module; the AP side resolution parameter is the AP side unlock network parameter; the modem side resolution parameter is the modem side unlock network parameter; the AP side The parsing flag bit is the AP side unlocking network tag bit; the modem side parsing flag bit is the modem side unlocking network tag bit; the modem side data storage module is the modem side unlocking network parameter storage module; and the modem side data processing module is the modem side unlocking network parameter decryption. The module side data parsing module is the modem side unlocking network module; the AP side data storage module is the AP side unlocking network parameter storage module; the AP side data processing module is the AP side unlocking network parameter decryption module; the AP side data parsing module is the AP side. Unlock the network module.
图8A至图8C为根据本公开实施例的数据解锁方法的流程图。参照图8A至图8C,在一实施例中,该方法可以包括步骤S801至步骤S818。8A through 8C are flowcharts of a data unlocking method according to an embodiment of the present disclosure. Referring to FIGS. 8A through 8C, in an embodiment, the method may include steps S801 through S818.
参照图8A,在步骤S801处,终端处于初始状态,在AP处理器存储区域中的普通存储区域中存储四个值,分别存储在四个不同的位置,其中,两个为终端计数,另外两个为空值。Referring to FIG. 8A, at step S801, the terminal is in an initial state, and four values are stored in a normal storage area in the storage area of the AP processor, and are respectively stored in four different positions, wherein two are terminal counts, and the other two The number is null.
这里,所述终端计数分别为终端计数1和终端计数2。Here, the terminal counts are terminal count 1 and terminal count 2, respectively.
在步骤S802处,当终端满足解锁网条件一时,上报服务器,并接收服务器根据终端标识下发的服务器计数1和key1值;当终端满足解析条件二时,上报服务器,并接收服务器根据终端标识下发的服务器计数2和key2值。At step S802, when the terminal satisfies the unlocking network condition one, the server reports to the server, and receives the server count 1 and key1 values issued by the server according to the terminal identifier; when the terminal satisfies the parsing condition 2, reports the server to the server, and receives the server according to the terminal identifier. The sent server counts 2 and key2 values.
这里,服务器计数1为服务器中锁网计数器1达到的数值1,服务器计数2为服务器中锁网计数器2达到的数值2。Here, the server count 1 is the value 1 reached by the lock counter 1 in the server, and the server count 2 is the value 2 reached by the lock counter 2 in the server.
在步骤S803处,读取服务器计数1和服务器计数2。At step S803, the server count 1 and the server count 2 are read.
在步骤S804处,对比终端存储的两个终端计数与两个服务器计数是否一致。At step S804, it is compared with whether the two terminal counts stored by the terminal are consistent with the two server counts.
这里,终端计数1为终端解锁网计数器1达到的数值1,终端计数2为终端解锁网计数器2达到的数值2。Here, the terminal count 1 is the value 1 reached by the terminal unlocking network counter 1, and the terminal count 2 is the value 2 reached by the terminal unlocking network counter 2.
这里,对比两个终端计数与两个服务器计数是否一致,具体为对比终端计数1与服务器计数1是否一致,对比终端计数2与服务器计数2是否一致。Here, it is compared whether the two terminal counts are consistent with the two server counts, specifically whether the comparison terminal count 1 is consistent with the server count 1, and the comparison between the terminal count 2 and the server count 2 is consistent.
在步骤S805处,若两个终端计数与两个服务器计数一致,则读取对应的key1值和/或key2值,并存储key1值和/或key2值到终端预留的空值区域。At step S805, if the two terminal counts coincide with the two server counts, the corresponding key1 value and/or key2 value are read, and the key1 value and/or the key2 value are stored to the null area reserved by the terminal.
需要理解的是,若仅终端计数1与服务器计数1一致,则读取 对应的key1值,并存储key1值到终端预留的空值区域;若仅终端计数2与服务器计数2一致,则读取对应的key2值,并存储key2值到终端预留的空值区域;若终端计数1与服务器计数1一致且终端计数2与服务器计数2也一致,则读取对应的key1值和key2值,并存储key1值和key2值到终端预留的空值区域。It should be understood that if only the terminal count 1 is consistent with the server count 1, the corresponding key1 value is read, and the key1 value is stored to the null area reserved by the terminal; if only the terminal count 2 is consistent with the server count 2, then read The corresponding key2 value is obtained, and the key2 value is stored in the null value area reserved by the terminal; if the terminal count 1 is consistent with the server count 1 and the terminal count 2 is consistent with the server count 2, the corresponding key1 value and the key2 value are read. And store the key1 value and the key2 value to the null area reserved by the terminal.
这里,若两个终端计数与两个服务器计数不一致,则处理流程返回步骤S801,删除服务器下发的key1值和/或key2值,并最小同步计数。Here, if the two terminal counts are inconsistent with the two server counts, the process flow returns to step S801 to delete the key1 value and/or the key2 value delivered by the server, and the minimum synchronization count.
需要理解的是,若两个终端计数与两个服务器计数不一致,则处理流程返回步骤S801,删除服务器下发的key1值和/或key2值,并最小同步计数,具体为:若仅终端计数1与服务器计数1不一致,则删除服务器下发的key1值并返回步骤S801,并最小同步计数;若仅终端计数2与服务器计数2不一致,则删除服务器下发的key2值并返回步骤S801,并最小同步计数;若终端计数1与服务器计数1不一致且终端计数2与服务器计数2也不一致,则删除服务器下发的key1值和key2值并返回步骤S801,并最小同步计数。It is to be understood that, if the two terminal counts are inconsistent with the two server counts, the process flow returns to step S801 to delete the key1 value and/or the key2 value delivered by the server, and the minimum synchronization count, specifically: if only the terminal counts 1 If the server 1 is inconsistent with the server, the key1 value sent by the server is deleted, and the process returns to step S801, and the minimum synchronization is counted. If only the terminal count 2 is different from the server count 2, the key2 value sent by the server is deleted and the process returns to step S801 and is minimum. Synchronization count; if the terminal count 1 is inconsistent with the server count 1 and the terminal count 2 and the server count 2 are also inconsistent, the key1 value and the key2 value delivered by the server are deleted and the process returns to step S801, and the minimum synchronization count is performed.
这里,最小同步计数具体为将终端计数1重置为服务器计数1,并将终端计数2重置为服务器计数2。Here, the minimum synchronization count specifically resets the terminal count 1 to the server count 1, and resets the terminal count 2 to the server count 2.
在步骤S806处,所述simunlock模块判断key1值和key2值的存储区域是否为空;若key1值和key2值均不为空,则判断key1值和key2值是否与simunlock模块中写定的参数1与参数2一致。At step S806, the simunlock module determines whether the storage area of the key1 value and the key2 value is empty; if both the key1 value and the key2 value are not empty, it is determined whether the key1 value and the key2 value are the parameters 1 written in the simunlock module. Consistent with parameter 2.
这里,判断key1值和key2值是否与simunlock模块中写定的参数1与参数2一致具体为:判断key1值是否与simunlock模块中写定的参数1一致,以及判断key2值是否与simunlock模块中写定的参数2一致。Here, it is determined whether the key1 value and the key2 value are consistent with the parameter 1 and the parameter 2 written in the simunlock module, specifically: determining whether the key1 value is consistent with the parameter 1 written in the simunlock module, and determining whether the key2 value is written in the simunlock module. The specified parameter 2 is consistent.
这里,所述simunlock模块设定为实时监测所述终端AP处理器普通存储区域中的空值区域,所述simunlock模块中写定的参数1与参数2通过宏定义设置。Here, the simunlock module is configured to monitor a null value area in a normal storage area of the terminal AP processor in real time, and parameters 1 and 2 written in the simunlock module are set by a macro definition.
这里,若key1值和key2值的存储区域有一方为空,或key1值和key2值有一个与simunlock模块中写定的参数不一致,则处理流 程转至步骤S807;若key1值和key2值的存储区域均不为空,且key1值和key2值均与simunlock模块中写定的参数1和参数2一致,则转至步骤S808。Here, if one of the storage areas of the key1 value and the key2 value is empty, or the key1 value and the key2 value have a parameter that is different from the parameter written in the simunlock module, the process flow goes to step S807; if the key1 value and the key2 value are stored If the area is not empty, and the key1 value and the key2 value are both consistent with the parameters 1 and 2 written in the simunlock module, the process goes to step S808.
这里,key1值和key2值的存储区域有一方为空,具体为key1值的存储区域为空,或key2值的存储区域为空,或key1值和key2值的存储区域均为空。Here, one of the storage areas of the key1 value and the key2 value is empty, and the storage area of the key1 value is empty, or the storage area of the key2 value is empty, or the storage areas of the key1 value and the key2 value are empty.
这里,key1值和key2值有一个与simunlock模块中写定的参数1和参数2不一致具体为:key1值与simunlock模块中写定的参数1不一致,或key2值与simunlock模块中写定的参数2不一致,或key1值与simunlock模块中写定的参数1不一致且key2值与simunlock模块中写定的参数2也不一致。Here, the key1 value and the key2 value have one inconsistency with the parameter 1 and the parameter 2 written in the simunlock module. Specifically, the key1 value is inconsistent with the parameter 1 written in the simunlock module, or the key2 value and the parameter 2 written in the simunlock module. Inconsistent, or the key1 value is inconsistent with the parameter 1 written in the simunlock module and the key2 value is also inconsistent with the parameter 2 written in the simunlock module.
这里,key1值和key2值均与simunlock模块中写定的参数1和参数2一致具体为:key1值与simunlock模块写定的参数1一致且key2值与simunlock模块中写定的参数2也一致。Here, both the key1 value and the key2 value are consistent with the parameters 1 and 2 written in the simunlock module. Specifically, the key1 value is consistent with the parameter 1 written by the simunlock module and the key2 value is also consistent with the parameter 2 written in the simunlock module.
在步骤S807处,所述simunlock模块继续实时监测所述终端AP处理器普通存储区域中的空值区域。At step S807, the simunlock module continues to monitor the null area in the normal storage area of the terminal AP processor in real time.
在步骤S808处,simunlock模块执行步骤S809至步骤S818。At step S808, the simunlock module performs steps S809 through S818.
参照图8B,在步骤S809处,所述simunlock模块向SFS区域发送获取AP侧解锁网参数的请求。Referring to FIG. 8B, in step S809, the simunlock module sends a request for acquiring an AP side unlocking network parameter to the SFS area.
在步骤S810处,所述simunlock模块获取AP侧解锁网参数。At step S810, the simunlock module acquires an AP side unlocking network parameter.
在步骤S811处,AP处理器中的AP侧解锁网参数解密模块对所述AP侧解锁网参数进行解密。At step S811, the AP side unlocking network parameter decryption module in the AP processor decrypts the AP side unlocking network parameter.
这里,所述AP处理器中的AP侧解锁网参数解密模块对所述AP侧解锁网参数进行解密包括:所述simunlock模块将AP侧解锁网参数发送至AP侧解锁网参数解密模块,AP侧解锁网参数解密模块对所述AP侧解锁网参数进行解密。Here, the AP side unlocking network parameter decryption module in the AP processor decrypts the AP side unlocking network parameter, and the simunlock module sends the AP side unlocking network parameter to the AP side unlocking network parameter decryption module, and the AP side The unlocking network parameter decryption module decrypts the AP side unlocking network parameters.
步在骤S812处,若AP侧解锁网参数解密模块解密AP侧解锁网参数不成功,则处理流程终止;若AP侧解锁网参数解密模块解密AP侧解锁网参数成功,则AP侧解锁网参数解密模块将解密后的AP侧解锁网参数送入AP处理器中的AP侧解锁网模块进行解锁,并根据解锁 结果生成AP侧解锁网标记位。Step S812: If the AP side unlocking network parameter decryption module decrypts the AP side unlocking network parameter is unsuccessful, the processing flow is terminated; if the AP side unlocking network parameter decryption module decrypts the AP side unlocking network parameter successfully, the AP side unlocking network parameter The decryption module sends the decrypted AP side unlocking network parameter to the AP side unlocking network module in the AP processor to unlock, and generates an AP side unlocking network flag bit according to the unlocking result.
这里,所述AP侧解锁网标记位用于表明AP侧解锁是否成功;所述AP侧解锁网标记位可以设定为0或1,其中,0表示解锁失败,1表示解锁成功。Here, the AP side unlocking network flag bit is used to indicate whether the AP side unlocking is successful; the AP side unlocking network flag bit can be set to 0 or 1, where 0 indicates that the unlocking fails, and 1 indicates that the unlocking is successful.
在步骤S813处,AP侧解锁网模块发送AP侧解锁网标记位至simunlock模块。At step S813, the AP side unlocking network module sends the AP side unlocking network flag bit to the simunlock module.
参照图8C,在步骤S814处,所述simunlock模块向RPMB区域发送获取modem侧解锁网参数请求。Referring to FIG. 8C, at step S814, the simunlock module sends a request for acquiring a modem side unlocking network parameter to the RPMB area.
在步骤S815处,所述simunlock模块获取modem侧解锁网参数。At step S815, the simunlock module acquires a modem side unlocking network parameter.
在步骤S816处,由modem处理器中的modem侧解锁网参数解密模块对所述modem侧解锁网参数进行解密。At step S816, the modem side unlocking network parameter is decrypted by the modem side unlocking network parameter decryption module in the modem processor.
在步骤S817处,若modem侧解锁网参数解密模块解密modem侧解锁网参数不成功,则处理流程终止;若modem侧解锁网参数解密模块解密modem侧解锁网参数成功,则modem侧解锁网参数解密模块将解密后的modem侧解锁网参数送入modem处理器中的modem侧解锁网模块进行解锁,并根据解锁结果生成modem侧解锁网标记位。At step S817, if the modem side unlocking network parameter decryption module decrypts the modem side unlocking network parameter is unsuccessful, the processing flow is terminated; if the modem side unlocking network parameter decryption module decrypts the modem side unlocking network parameter successfully, the modem side unlocking network parameter is decrypted. The module sends the decrypted modem side unlocking network parameter to the modem side unlocking network module in the modem processor to unlock, and generates a modem side unlocking network marking bit according to the unlocking result.
这里,所述modem侧解锁网标记位用于表明解锁所述modem侧解锁网参数是否成功;所述modem侧解锁网标记位可以设定为0或1,其中,0表示解锁失败,1表示解锁成功。Here, the modem side unlocking network flag bit is used to indicate whether the modem side unlocking network parameter is unlocked successfully; the modem side unlocking network flag bit can be set to 0 or 1, wherein 0 means unlocking failure, 1 means unlocking success.
在步骤S818处,modem侧解锁网模块发送modem侧解锁网标记位至simunlock模块。At step S818, the modem side unlocking network module sends the modem side unlocking network flag bit to the simunlock module.
需要理解的是,当且仅当两个解锁网标记位均为1时,终端正常解锁。It should be understood that the terminal is normally unlocked if and only if both unlocking network flag bits are 1.
由本公开实施例可以看出,在本公开实施例中设置双侧解锁和双侧解锁网参数,将双侧解锁网参数分别存储在modem侧和AP侧存储区域中的安全区域。双侧安全区域仅AP处理器中的simunlock模块可以访问。当终端满足解锁网条件一时上报服务器,服务器下发服务器计数1和key1值,当终端满足解锁网条件二时上报服务器,服务器下发服务器计数2和key2值,终端优先读取服务器计数,当服务器计数与终端计数一致时,终端读取对应的key值,并写入AP处 理器普通存储区域中对应的空白区域。若不一致,则终端删除对应的key值,并同步最小计数。simunlock模块会在所述空白区域不为空时,并且所述空白区域中的值与simunlock模块自身通过宏定义写入的参数值一致时,从modem侧安全区域调取AP侧解锁网参数,并将AP侧解锁网参数送入AP侧解锁网参数解密模块进行解密,解密成功后的数据会被送入AP侧解锁网模块进行解锁。此外,simunlock模块还会从ap侧安全区域取出modem侧解析参数送输入modem侧解锁网参数解密模块进行解密,解密成功后的数据会被送入modem侧解锁网模块进行解锁。当AP侧解锁网模块和modem侧解锁网模块均解锁成功时,终端正常解锁,当AP侧解锁网模块和modem侧解锁网模块有一方解锁失败时,则终端不能正常解锁。It can be seen that the parameters of the double-side unlocking and the double-side unlocking network are set in the embodiment of the present disclosure, and the parameters of the double-side unlocking network are respectively stored in the security area in the modem side and the AP side storage area. The two-sided security zone is accessible only to the simunlock module in the AP processor. When the terminal meets the conditions of the unlocking network, the server reports the value of the server 1 and the value of the key1. When the terminal meets the condition of the unlocking network, the server reports the server 2 and the key 2, and the server preferentially reads the server count. When the count is consistent with the terminal count, the terminal reads the corresponding key value and writes the corresponding blank area in the normal storage area of the AP processor. If they are inconsistent, the terminal deletes the corresponding key value and synchronizes the minimum count. The simunlock module may retrieve the AP side unlocking network parameter from the modem side security area when the blank area is not empty, and the value in the blank area is consistent with the parameter value written by the simunlock module itself through the macro definition, and The AP-side unlocking network parameters are sent to the AP-side unlocking network parameter decryption module for decryption. The data after successful decryption is sent to the AP-side unlocking network module for unlocking. In addition, the simunlock module also retrieves the modem side parsing parameter from the ap side security area and sends the modem side unlocking network parameter decryption module to decrypt, and the decrypted data is sent to the modem side unlocking network module for unlocking. When both the AP side unlocking network module and the modem side unlocking network module are successfully unlocked, the terminal is normally unlocked. When one of the AP side unlocking network module and the modem side unlocking network module fails to be unlocked, the terminal cannot be unlocked normally.
基于上述实施例,本公开提供的一种数据解锁方法应用于解锁隐私应用或解锁隐私数据场景。本实施例以解锁隐私应用为例,该场景下,上述实施例中的终端参数为条件判断参数,如双手指纹或双眼眼纹(本实施例以双眼眼纹为例),终端参数1为终端录入的眼纹数据1,终端参数2为终端录入的眼纹数据2;解析条件一为终端录入眼纹1;解析条件二为终端录入眼纹2;服务器参数1为服务器眼纹数据1;服务器参数2为服务器眼纹数据2;解锁单进程为隐私保护(Private Protection)模块;AP侧解析参数为AP侧眼纹参数;modem侧解析参数为modem侧眼纹参数;AP侧解析标记位为AP侧解析标记位;modem侧解析标记位为modem侧解析标记位;modem侧数据存储模块为modem侧眼纹参数存储模块;modem侧数据处理模块为modem侧隐私应用参数解密模块;modem侧数据解析模块为modem侧隐私应用解析模块;AP侧数据存储模块为AP侧眼纹参数存储模块;AP侧数据处理模块为AP侧隐私应用参数解密模块;AP侧数据解析模块为AP侧隐私应用解析模块。Based on the foregoing embodiments, a data unlocking method provided by the present disclosure is applied to unlock a privacy application or unlock a privacy data scenario. In this embodiment, the unlocking of the privacy application is taken as an example. In this scenario, the terminal parameters in the foregoing embodiment are conditional determination parameters, such as a two-handed fingerprint or a two-eye eye pattern (in this embodiment, a binocular eye pattern is taken as an example), and the terminal parameter 1 is a terminal. Entered eye pattern data 1, terminal parameter 2 is the eye pattern data 2 entered by the terminal; the analysis condition 1 is the terminal input eye pattern 1; the analysis condition 2 is the terminal input eye pattern 2; the server parameter 1 is the server eye pattern data 1; the server Parameter 2 is the server eye pattern data 2; the unlocking single process is the privacy protection (Private Protection) module; the AP side analysis parameter is the AP side eye pattern parameter; the modem side analysis parameter is the modem side eye pattern parameter; and the AP side analysis flag bit is the AP side. Side resolution flag bit; modem side resolution flag bit is modem side resolution flag bit; modem side data storage module is modem side eye pattern parameter storage module; modem side data processing module is modem side privacy application parameter decryption module; modem side data parsing module The modem side privacy application parsing module; the AP side data storage module is an AP side eye pattern parameter storage module; and the AP side data processing module is an AP side privacy application parameter decryption. Block; AP side of the data analysis module AP side privacy application parsing module.
图9A至图9C为根据本公开实施例的数据解锁方法的流程图。参照图9A至图9C,在一实施例中,该方法可以包括步骤S901至步骤S918。9A through 9C are flowcharts of a data unlocking method according to an embodiment of the present disclosure. Referring to FIGS. 9A through 9C, in an embodiment, the method may include steps S901 through S918.
参照图9A,在步骤S901处,终端处于初始状态,在终端AP处 理器存储区域的普通存储区域中存储四个值,分别存储在四个不同的位置,其中,两个用于存储终端录入的眼纹数据,另外两个为空值。Referring to FIG. 9A, at step S901, the terminal is in an initial state, and four values are stored in a normal storage area of the storage area of the terminal AP processor, and are respectively stored in four different positions, wherein two are used for storing terminal input. Eye pattern data, the other two are null values.
在步骤S902处,当终端录入眼纹1时,上报服务器,并接收服务器根据终端标识下发的服务器眼纹数据1和key1值;当终端录入眼纹2时,上报服务器,并接收服务器根据终端标识下发的服务器眼纹数据2和key2值。In step S902, when the terminal enters the eye 1 , it reports to the server, and receives the server eye data 1 and key 1 values issued by the server according to the terminal identifier; when the terminal enters the eye 2, reports to the server, and receives the server according to the terminal. Identifies the server eye pattern data 2 and key2 values that are delivered.
在步骤S903处,读取服务器眼纹数据1和服务器眼纹数据2。At step S903, the server eye pattern data 1 and the server eye pattern data 2 are read.
在步骤S904处,对比终端录入的两个眼纹数据与两个服务器眼纹数据是否一致。At step S904, it is compared whether the two eye pattern data entered by the terminal are consistent with the two server eye pattern data.
这里,对比两个终端眼纹数据与两个服务器眼纹数据是否一致,具体为对比终端录入的眼纹数据1与服务器眼纹数据1是否一致,对比终端录入的眼纹数据2与服务器眼纹数据2是否一致。Here, comparing whether the two terminal eye pattern data is consistent with the two server eye pattern data, specifically comparing whether the eye pattern data 1 recorded by the terminal is consistent with the server eye pattern data 1, and comparing the eye pattern data 2 entered by the terminal with the server eye pattern Whether data 2 is consistent.
在步骤S905处,若终端录入的两个眼纹数据与两个服务器眼纹数据一致,则读取对应的key1值和/或key2值,并存储key1值和/或key2值到终端预留的空值区域。At step S905, if the two eye pattern data entered by the terminal are consistent with the two server eye pattern data, the corresponding key1 value and/or the key2 value are read, and the key1 value and/or the key2 value are stored to the terminal reserved. Null value area.
需要理解的是,若仅终端录入的眼纹数据1与服务器眼纹数据1一致,则读取对应的key1值,并存储key1值到终端预留的空值区域;若仅终端录入的眼纹数据2与服务器眼纹数据2一致,则读取对应的key2值,则读取对应的key2值,并存储key2值到终端预留的空值区域;若终端录入的眼纹数据1与服务器眼纹数据1一致且终端录入的眼纹数据2与服务器眼纹数据2也一致,则读取对应的key1值和key2值,并存储key1值和key2值到终端预留的空值区域。It should be understood that if only the eyeprint data 1 entered by the terminal is consistent with the server eyeprint data 1, the corresponding key1 value is read, and the key1 value is stored to the null value reserved by the terminal; If the data 2 is consistent with the server eye pattern data 2, the corresponding key2 value is read, and the corresponding key2 value is read, and the key2 value is stored to the null value area reserved by the terminal; if the eyeline data 1 and the server eye are entered by the terminal If the pattern data 1 is consistent and the eye pattern data 2 entered by the terminal is also consistent with the server eye pattern data 2, the corresponding key1 value and key2 value are read, and the key1 value and the key2 value are stored to the null area reserved by the terminal.
这里,若终端录入的两个眼纹数据与两个服务器眼纹数据不一致,则处理流程返回步骤S901,删除服务器下发的key1值和/或key2值。Here, if the two eye pattern data entered by the terminal are inconsistent with the two server eye pattern data, the process flow returns to step S901 to delete the key1 value and/or the key2 value delivered by the server.
需要理解的是,若终端录入的两个眼纹数据与两个服务器眼纹数据不一致,则处理流程返回步骤S901,删除服务器下发的key1值和/或key2值,具体为:若仅终端录入的眼纹数据1与服务器眼纹数据1不一致,则删除服务器下发的key1值并返回步骤S901;若仅终端录入的眼纹数据2与服务器眼纹数据2不一致,则删除服务器下发 的key2值并返回步骤S901;若终端录入的眼纹数据1与服务器眼纹数据1不一致且终端录入的眼纹数据2与服务器眼纹数据2也不一致,则删除服务器下发的key1值和key2值并返回步骤S901。It is to be understood that if the two eyeprint data entered by the terminal are inconsistent with the data of the two server eyeprints, the process returns to step S901 to delete the key1 value and/or the key2 value delivered by the server, specifically: if only the terminal is entered. If the eye pattern data 1 does not match the server eye pattern data 1, the key1 value sent by the server is deleted and the process returns to step S901. If only the eye pattern data 2 entered by the terminal does not match the server eye pattern data 2, the key2 sent by the server is deleted. And returning to step S901; if the eyeprint data 1 entered by the terminal is inconsistent with the server eyeprint data 1 and the eyeprint data 2 entered by the terminal does not match the server eyeprint data 2, the key1 value and the key2 value sent by the server are deleted. Go back to step S901.
在步骤S906处,所述隐私保护模块判断key1值和key2值的存储区域是否为空;若key1值和key2值均不为空,则判断key1值和key2值是否与隐私保护模块中写定的参数1和参数2一致。At step S906, the privacy protection module determines whether the storage area of the key1 value and the key2 value is empty; if both the key1 value and the key2 value are not empty, it is determined whether the key1 value and the key2 value are written in the privacy protection module. Parameter 1 and parameter 2 are the same.
这里,判断key1值和key2值是否与隐私保护模块中写定的参数1与参数2一致具体为:判断key1值是否与隐私保护模块中写定的参数1一致,以及判断key2值是否与隐私保护模块中写定的参数2一致。Here, it is determined whether the key1 value and the key2 value are consistent with the parameter 1 and the parameter 2 written in the privacy protection module, specifically: determining whether the key1 value is consistent with the parameter 1 written in the privacy protection module, and determining whether the key2 value is related to privacy protection. The parameters 2 written in the module are the same.
这里,所述隐私保护模块设定为实时监测所述终端AP处理器普通存储区域中的空值区域,所述隐私保护模块中写定的参数1与参数2通过宏定义设置。Here, the privacy protection module is configured to monitor a null value area in a normal storage area of the terminal AP processor in real time, and parameters 1 and 2 written in the privacy protection module are set by a macro definition.
这里,若key1值和key2值的存储区域有一方为空,或key1值和key2值有一个与隐私保护模块中写定的参数不一致,则处理流程转至步骤S907;若key1值和key2值的存储区域均不为空,且key1值和key2值均与隐私保护模块中写定的参数1和参数2一致,则转至步骤S908。Here, if one of the storage areas of the key1 value and the key2 value is empty, or one of the key1 value and the key2 value is inconsistent with the parameter written in the privacy protection module, the process flow goes to step S907; if the key1 value and the key2 value are The storage area is not empty, and the key1 value and the key2 value are consistent with the parameters 1 and 2 written in the privacy protection module, and then the process goes to step S908.
这里,key1值和key2值的存储区域有一方为空,具体为key1值的存储区域为空,或key2值的存储区域为空,或key1值和key2值的存储区域均为空。Here, one of the storage areas of the key1 value and the key2 value is empty, and the storage area of the key1 value is empty, or the storage area of the key2 value is empty, or the storage areas of the key1 value and the key2 value are empty.
这里,key1值和key2值有一个与隐私保护模块中写定的参数1和参数2不一致具体为:key1值与隐私保护模块中写定的参数1不一致,或key2值与隐私保护模块中写定的参数2不一致,或key1值与隐私保护模块中写定的参数1不一致且key2值与隐私保护模块中写定的参数2也不一致。Here, the key1 value and the key2 value have one inconsistency with the parameter 1 and the parameter 2 written in the privacy protection module. Specifically, the key1 value is inconsistent with the parameter 1 written in the privacy protection module, or the key2 value is written in the privacy protection module. The parameter 2 is inconsistent, or the key1 value is inconsistent with the parameter 1 written in the privacy protection module and the key2 value is also inconsistent with the parameter 2 written in the privacy protection module.
这里,key1值和key2值均与隐私保护模块中写定的参数1和参数2一致具体为:key1值与隐私保护模块写定的参数1一致且key2值与隐私保护模块中写定的参数2也一致。Here, both the key1 value and the key2 value are consistent with the parameters 1 and 2 written in the privacy protection module, specifically: the key1 value is consistent with the parameter 1 written by the privacy protection module and the key2 value and the parameter 2 written in the privacy protection module are Also consistent.
在步骤S907处,所述隐私保护模块继续实时监测所述终端AP 处理器普通存储区域中的空值区域。At step S907, the privacy protection module continues to monitor the null area in the normal storage area of the terminal AP processor in real time.
在步骤S908处,所述隐私保护模块执行步骤S909至步骤S918。At step S908, the privacy protection module performs steps S909 to S918.
参照图9B,在步骤S909处,所述隐私保护模块向SFS区域发送获取AP侧眼纹参数的请求。Referring to FIG. 9B, at step S909, the privacy protection module sends a request for acquiring an AP side eye pattern parameter to the SFS area.
在步骤S910处,所述隐私保护模块获取AP侧眼纹参数。At step S910, the privacy protection module acquires an AP side eye pattern parameter.
在步骤S911处,由AP处理器中的AP侧隐私应用参数解密模块对所述AP侧眼纹参数进行解密。At step S911, the AP side eye pattern parameter is decrypted by the AP side privacy application parameter decryption module in the AP processor.
这里,所述AP处理器中的AP侧隐私应用参数解密模块对所述AP侧眼纹参数进行解密包括:所述隐私保护模块将所述AP侧眼纹参数发送至AP侧隐私应用参数解密模块,AP侧隐私应用参数解密模块对所述AP侧眼纹参数进行解密。Here, the AP side privacy application parameter decryption module in the AP processor decrypts the AP side eye pattern parameter, and the privacy protection module sends the AP side eye pattern parameter to the AP side privacy application parameter decryption module. The AP side privacy application parameter decryption module decrypts the AP side eye pattern parameter.
在步骤S912处,若AP侧隐私应用参数解密模块解密AP侧眼纹参数不成功,则处理流程终止;若AP侧隐私应用参数解密模块解密AP侧眼纹参数成功,则AP侧隐私应用参数解密模块将解密后的AP眼纹参数送入AP处理器中的AP侧隐私应用解析模块进行解析,并根据解析结果生成AP侧解析标记位。In step S912, if the AP side privacy application parameter decryption module decrypts the AP side eye pattern parameter is unsuccessful, the processing flow is terminated; if the AP side privacy application parameter decryption module decrypts the AP side eye pattern parameter successfully, the AP side privacy application parameter is decrypted. The module sends the decrypted AP eye pattern parameter to the AP side privacy application parsing module in the AP processor for parsing, and generates an AP side parsing flag bit according to the parsing result.
这里,所述AP侧解析标记位用于表明AP侧解析是否成功;所述AP侧解析标记位可以设定为0或1,其中,0表示解析失败,1表示解析成功。Here, the AP side parsing flag bit is used to indicate whether the AP side parsing is successful; the AP side parsing flag bit can be set to 0 or 1, where 0 indicates parsing failure and 1 indicates parsing succeeds.
在步骤S913处,AP侧隐私应用解析模块发送AP侧解析标记位至隐私保护模块。At step S913, the AP side privacy application parsing module sends the AP side parsing flag bit to the privacy protection module.
参照图9C,步骤S914,所述隐私保护模块向RPMB区域发送获取modem侧眼纹参数请求。Referring to FIG. 9C, in step S914, the privacy protection module sends a request for acquiring a modem side eye pattern parameter to the RPMB area.
在步骤S915处,所述隐私保护模块获取modem侧眼纹参数。At step S915, the privacy protection module acquires a modem side eye pattern parameter.
在步骤S916处,由modem处理器中的modem侧隐私应用参数解密模块对所述modem侧眼纹参数进行解密。At step S916, the modem side eye pattern parameter is decrypted by the modem side privacy application parameter decryption module in the modem processor.
这里,所述modem处理器中的modem侧隐私应用参数解密模块对所述modem侧眼纹参数进行解密包括:所述隐私保护模块将所述modem侧眼纹参数发送至modem侧隐私应用参数解密模块,modem侧隐私应用参数解密模块对所述modem侧眼纹参数进行解密。Here, the modem side privacy application parameter decryption module in the modem processor decrypts the modem side eye pattern parameter, and the privacy protection module sends the modem side eye pattern parameter to a modem side privacy application parameter decryption module. The modem side privacy application parameter decryption module decrypts the modem side eye pattern parameter.
在步骤S917处,若modem侧隐私应用参数解密模块解密modem侧眼纹参数不成功,则处理流程终止;若modem侧隐私应用参数解密模块解密modem侧眼纹参数成功,则modem侧隐私应用参数解密模块将解密后的modem侧眼纹参数送入modem处理器中的modem侧隐私应用解析模块进行解析,并根据解析结果生成modem侧解析标记位。At step S917, if the modem side privacy application parameter decryption module decrypts the modem side eye pattern parameter is unsuccessful, the processing flow is terminated; if the modem side privacy application parameter decryption module decrypts the modem side eye pattern parameter successfully, the modem side privacy application parameter is decrypted. The module sends the decrypted modem side eye pattern parameter to the modem side privacy application parsing module in the modem processor for parsing, and generates a modem side parsing flag bit according to the parsing result.
这里,所述modem侧解析标记位用于表明解析所述modem侧眼纹参数是否成功;所述modem侧解析标记位可以设定为0或1,其中,0表示解析失败,1表示解析成功。Here, the modem side parsing flag bit is used to indicate whether the modem side eye pattern parameter is successfully parsed; the modem side parsing flag bit may be set to 0 or 1, where 0 indicates parsing failure and 1 indicates parsing success.
在步骤S918处,modem侧隐私应用解析模块发送modem侧解析标记位至隐私保护模块。At step S918, the modem side privacy application parsing module sends the modem side parsing flag bit to the privacy protection module.
需要理解的是,当且仅当两个解析标记位均为1时,终端正常解锁。It should be understood that the terminal is normally unlocked if and only if both parsing flag bits are 1.
由本公开实施例可以看出,在本公开实施例中设置双侧解析和双侧眼纹参数,将双侧眼纹参数分别存储在modem侧和AP侧存储区域中的安全区域。双侧安全区域仅AP处理器中的隐私保护模块可以访问。当终端录入眼纹1时上报服务器,服务器下发服务器眼纹数据1和key1值,当终端录入眼纹2时上报服务器,服务器下发服务器眼纹数据2和key2值,终端优先读取服务器眼纹数据,当服务器眼纹数据与终端录入眼纹一致时,终端读取对应的key值,并写入AP处理器普通存储区域中对应的空白区域。若不一致,则终端删除对应的key值。隐私保护模块会在所述空白区域不为空时,并且所述空白区域中的值与隐私保护模块自身通过宏定义写入的参数值一致时,从modem侧安全区域调取AP侧眼纹参数,并将AP侧眼纹参数送入AP侧隐私应用参数解密模块进行解密,解密成功后的数据会被送入AP侧隐私应用解析模块进行解析。此外,隐私保护模块还会从ap侧安全区域取出modem侧解析参数送输入modem侧隐私应用参数解密模块进行解密,解密成功后的数据会被送入modem侧隐私应用解析模块进行解析。当AP侧隐私应用解析模块和modem侧隐私应用解析模块均解析成功时,终端正常解锁,当AP侧隐私应用解析模块和modem侧隐私应用解析模块有一方解析失败时,则终端不能正常解锁。It can be seen that, in the embodiment of the present disclosure, the double-sided analysis and the double-sided eye pattern parameters are set, and the double-sided eye pattern parameters are respectively stored in the security area in the modem side and the AP side storage area. The two-sided security zone is accessible only to the privacy protection module in the AP processor. When the terminal enters the eye 1 to report to the server, the server sends the server eye data 1 and the key1 value. When the terminal enters the eye 2, it reports to the server, the server sends the server eye data 2 and the key2 value, and the terminal preferentially reads the server eye. When the server eye pattern data is consistent with the terminal input eye pattern, the terminal reads the corresponding key value and writes the corresponding blank area in the normal storage area of the AP processor. If they are inconsistent, the terminal deletes the corresponding key value. The privacy protection module may retrieve the AP side eye pattern parameter from the modem side security area when the blank area is not empty, and the value in the blank area is consistent with the parameter value written by the privacy protection module itself through the macro definition. And the AP side eye pattern parameter is sent to the AP side privacy application parameter decryption module for decryption, and the decrypted data is sent to the AP side privacy application parsing module for parsing. In addition, the privacy protection module also extracts the modem side parsing parameter from the ap side security area and sends the modem side privacy application parameter decryption module to decrypt, and the decrypted data is sent to the modem side privacy application parsing module for parsing. When the AP side privacy application parsing module and the modem side privacy application parsing module are successfully parsed, the terminal is normally unlocked. When one of the AP side privacy application parsing module and the modem side privacy application parsing module fails to parse, the terminal cannot be unlocked normally.
由本公开的上述实施例可见,本公开可实现对隐私应用的安全解析,通过设定存储有解析参数的安全区域仅可以被AP处理器执行的单进程访问,严格把控了解析参数的安全存储。而隐私应用在开启时需要判别服务器端的key值与终端的key值是否一致。因为终端的key值通过宏定义写死在所述AP处理器执行的单进程里,而进程中写死的参数不是存储的数据,几乎不可被获取,所以可以避免数据劫持的发生,从而使解析过程更为安全。As can be seen from the above embodiments of the present disclosure, the present disclosure can implement security analysis of a privacy application. By setting a security area in which the parsing parameters are stored, only a single process access can be performed by the AP processor, and the secure storage of the parsing parameters is strictly controlled. . When the privacy application is enabled, it is necessary to determine whether the key value of the server is consistent with the key value of the terminal. Because the key value of the terminal is written by the macro definition in the single process executed by the AP processor, and the parameter written in the process is not stored data, and can hardly be acquired, so that data hijacking can be avoided, thereby enabling analysis. The process is safer.
本公开还可以实现自动解锁网,同时又严格把控自动解锁网的安全。在相关技术中,在判定是否达到解锁网条件时,需要锁网计数器达到一个预设的阈值。而若锁网计数器只存储在手机中,则有被篡改的风险,若只存储在服务器端,则在服务器端下发锁网计数值到终端后仍有锁网计数值被篡改的可能。为了避免这种情况发生,本公开在服务器端与终端同步锁网计数,在判定是否达到解锁网条件时,需要服务器端的锁网计数与终端的锁网计数相同,并达到一个预设的阈值,此外,仍需判别服务器端的key值与终端的key值是否一致。因为终端的key值通过宏定义写死在所述AP处理器执行的单进程里,而进程中写死的参数不是存储的数据,几乎不可被获取,所以可以避免数据劫持的发生,从而使解析过程更为安全。最后,还通过设定存储有解锁网参数的安全区域仅可以被AP处理器执行的单进程访问,严格把控了解锁网参数的安全存储。The disclosure can also realize automatic unlocking of the network, and at the same time strictly control the security of automatically unlocking the network. In the related art, when it is determined whether the unlocking network condition is reached, the lock network counter is required to reach a preset threshold. If the lock network counter is only stored in the mobile phone, there is a risk of being tampered with. If it is only stored on the server side, the lock network count value may be tampered with after the server sends the lock network count value to the terminal. In order to prevent this from happening, the present disclosure synchronizes the network lock with the terminal at the server end. When determining whether the unlocking network condition is reached, the network lock count of the server is required to be the same as the lock network count of the terminal, and reaches a preset threshold. In addition, it is still necessary to determine whether the key value of the server end is consistent with the key value of the terminal. Because the key value of the terminal is written by the macro definition in the single process executed by the AP processor, and the parameter written in the process is not stored data, and can hardly be acquired, so that data hijacking can be avoided, thereby enabling analysis. The process is safer. Finally, by setting the security zone in which the parameters of the unlocking network are stored, only the single process access performed by the AP processor can be accessed, and the secure storage of the parameters of the unlocking network is strictly controlled.
另一方面,本公开还提供一种数据处理装置,该数据处理装置所包括的各模块以及各模块中所包括的各子模块,都可以通过终端中的AP处理器和modem处理器来实现;在实施的过程中,处理器可以为中央处理器(CPU)、微处理器(MPU)、数字信号处理器(DSP)或现场可编程门阵列(FPGA)等。In another aspect, the present disclosure further provides a data processing apparatus, each module included in the data processing apparatus and each submodule included in each module can be implemented by an AP processor and a modem processor in the terminal; In the process of implementation, the processor may be a central processing unit (CPU), a microprocessor (MPU), a digital signal processor (DSP), or a field programmable gate array (FPGA).
图10为根据本公开实施例的数据处理装置的结构示意图。如图10所示,在一些实施例中,所述装置1000包括:第二获取模块1001、第一生成模块1002、第二发送模块1003、第二生成模块1004、第三生成模块1005、第四生成模块1006、第一写入模块1007和第二写入 模块1008。FIG. 10 is a block diagram showing the structure of a data processing apparatus according to an embodiment of the present disclosure. As shown in FIG. 10, in some embodiments, the apparatus 1000 includes: a second obtaining module 1001, a first generating module 1002, a second sending module 1003, a second generating module 1004, a third generating module 1005, and a fourth. A module 1006, a first write module 1007, and a second write module 1008 are generated.
所述第二获取模块1001配置为从终端获取基于加锁对象生成的解锁参数。所述第一生成模块1002配置为根据所述解锁参数生成第一秘钥和第二秘钥。所述第二发送模块1003配置为发送所述第一秘钥至服务器。所述第二生成模块1004配置为根据所述第二秘钥生成AP侧解锁参数和modem侧解锁参数。所述第三生成模块1005配置为根据所述AP侧解锁参数生成加密的AP侧解锁参数和AP侧秘钥。所述第四生成模块1006配置为根据所述modem侧解锁参数生成加密的modem侧解锁参数和modem侧秘钥。所述第一写入模块1007配置为将所述AP侧秘钥、所述AP侧解锁参数和所述加密的modem侧解锁参数写入位于AP侧的存储区域中的第二区域,所述AP侧的存储区域还包括第一区域,所述第二区域权限高于所述第一区域;所述第二写入模块1008配置为将所述modem侧秘钥、所述加密的AP侧解锁参数和所述modem侧解锁参数写入位于所述modem侧的存储区域中的第四区域,所述modem侧的存储区域还包括第三区域,所述第四区域权限高于所述第三区域。The second obtaining module 1001 is configured to acquire an unlocking parameter generated based on the locking object from the terminal. The first generating module 1002 is configured to generate a first key and a second key according to the unlocking parameter. The second sending module 1003 is configured to send the first key to the server. The second generation module 1004 is configured to generate an AP side unlocking parameter and a modem side unlocking parameter according to the second key. The third generation module 1005 is configured to generate an encrypted AP side unlocking parameter and an AP side key according to the AP side unlocking parameter. The fourth generation module 1006 is configured to generate an encrypted modem side unlocking parameter and a modem side key according to the modem side unlocking parameter. The first writing module 1007 is configured to write the AP side key, the AP side unlocking parameter, and the encrypted modem side unlocking parameter into a second area in a storage area on the AP side, where the AP The storage area on the side further includes a first area, and the second area is higher in authority than the first area; the second writing module 1008 is configured to use the modem side key and the encrypted AP side unlocking parameter. And the modem side unlocking parameter is written in a fourth area in the storage area on the modem side, and the storage area on the modem side further includes a third area, and the fourth area is higher in authority than the third area.
这里需要指出的是:以上数据处理装置实施例的描述,与上述方法实施例的描述是类似的,具有同方法实施例相似的有益效果。对于本公开数据处理装置实施例中未披露的技术细节,请参照本公开方法实施例的描述而理解。It should be noted here that the description of the above embodiment of the data processing apparatus is similar to the description of the above method embodiment, and has similar advantageous effects as the method embodiment. For technical details not disclosed in the embodiments of the data processing apparatus of the present disclosure, please refer to the description of the method embodiments of the present disclosure.
另一方面,本公开还提供一种数据处理装置,该数据处理装置中的各模块以及各模块中所包括的各子模块,都可以通过终端中的AP处理器和modem处理器来实现,在实施的过程中,处理器可以为中央处理器(CPU)、微处理器(MPU)、数字信号处理器(DSP)或现场可编程门阵列(FPGA)等。In another aspect, the present disclosure further provides a data processing apparatus, each module in the data processing apparatus and each submodule included in each module can be implemented by an AP processor and a modem processor in the terminal, where In the process of implementation, the processor may be a central processing unit (CPU), a microprocessor (MPU), a digital signal processor (DSP), or a field programmable gate array (FPGA).
图11为根据本公开实施例的数据处理装置的结构示意图。如图11所示,在一些实施例中,所述装置1100包括:接收模块1101、第一获取模块1102和解锁模块1103。所述接收模块1101配置为接收服务器下发的位于终端的解锁对象的第一参数和解锁对象的第一秘 钥,所述第一参数和第一秘钥用于判断终端是否满足解析数据的条件。所述第一获取模块1102配置为获取位于所述终端的解锁对象的第二参数和解锁对象的第二秘钥。所述解锁模块1103配置为当所述第一参数和所述第二参数满足预设的第一条件且所述第一秘钥和所述第二秘钥满足预设的第二条件时,对所述解锁对象进行解锁。11 is a schematic structural diagram of a data processing device according to an embodiment of the present disclosure. As shown in FIG. 11 , in some embodiments, the apparatus 1100 includes: a receiving module 1101 , a first obtaining module 1102 , and an unlocking module 1103 . The receiving module 1101 is configured to receive a first parameter of the unlocking object and a first key of the unlocking object that are sent by the server, where the first parameter and the first key are used to determine whether the terminal satisfies the condition for analyzing the data. . The first obtaining module 1102 is configured to acquire a second parameter of the unlocking object located in the terminal and a second key of the unlocking object. The unlocking module 1103 is configured to: when the first parameter and the second parameter satisfy a preset first condition, and the first key and the second key satisfy a preset second condition, The unlocked object is unlocked.
在本公开其他实施例中,所述装置还包括:第一发送模块,其配置为在所述接收模块接收服务器下发的解锁对象的第一参数和解锁对象的第一秘钥之前,当所述终端满足预设的第三条件时,发送所述终端满足预设的第三条件的消息至所述服务器。In other embodiments of the present disclosure, the apparatus further includes: a first sending module, configured to: before the receiving module receives the first parameter of the unlocking object delivered by the server and the first key of the unlocking object, When the terminal meets the preset third condition, the terminal sends a message that the terminal meets the preset third condition to the server.
在本公开其他实施例中,所述装置还包括:第一读取模块、第二读取模块和第一比较模块。所述第一读取模块配置为从modem侧的存储区域读取所述第一参数。所述第二读取模块配置为从所述第一区域中的第二预留字段读取所述第二参数。所述第一比较模块配置为如果所述第一参数和所述第二参数满足预设的第一条件时,比较所述第一区域中第一预留字段中的值与所述第二秘钥的值,如果所述第一预留字段中的值与所述第二秘钥的值满足预设的第二条件时,触发所述解锁模块对所述解锁对象进行解锁。In other embodiments of the present disclosure, the apparatus further includes: a first reading module, a second reading module, and a first comparison module. The first reading module is configured to read the first parameter from a storage area on the modem side. The second reading module is configured to read the second parameter from a second reserved field in the first region. The first comparison module is configured to compare a value in the first reserved field in the first area with the second secret if the first parameter and the second parameter satisfy a preset first condition The value of the key is triggered, if the value in the first reserved field and the value of the second key meet the preset second condition, the unlocking module is triggered to unlock the unlocked object.
所述第一比较模块还包括:读取子模块、写入子模块比较子模块。所述读取子模块配置为如果所述第一参数和所述第二参数满足预设的第一条件时,从所述modem侧的存储区域读取所述第一秘钥。所述写入子模块配置为将所述第一秘钥的值写入所述第一预留字段。所述比较子模块配置为如果第一预留字段为非空时,比较所述第一区域中第一预留字段中的值与所述第二秘钥的值。The first comparison module further includes: a read sub-module and a write sub-module comparison sub-module. The reading submodule is configured to read the first key from a storage area on the modem side if the first parameter and the second parameter satisfy a preset first condition. The write submodule is configured to write the value of the first key to the first reserved field. The comparison submodule is configured to compare the value in the first reserved field in the first region with the value of the second key if the first reserved field is non-empty.
所述解锁模块还包括:获取子模块、第一生成子模块、第二生成子模块和解锁子模块。所述获取子模块配置为从所述终端获取加密的AP侧解锁参数和加密的modem侧解锁参数。所述第一生成子模块配置为基于所述加密的AP侧解锁参数生成第一标记位,所述第一标记位用于表明解析所述加密的AP侧解锁参数是否成功。所述第二生成子模块配置为基于所述加密的modem侧解锁参数生成第二标记位,所述第二标记位用于表明解析所述加密的modem侧解锁参数是否成 功。所述解锁子模块配置为当所述第一标记位和所述第二标记位满足预设的第四条件时,对解锁对象进行解锁。The unlocking module further includes: an obtaining submodule, a first generating submodule, a second generating submodule, and an unlocking submodule. The acquiring submodule is configured to acquire an encrypted AP side unlocking parameter and an encrypted modem side unlocking parameter from the terminal. The first generation submodule is configured to generate a first flag bit based on the encrypted AP side unlocking parameter, where the first flag bit is used to indicate whether the encrypted AP side unlocking parameter is successfully parsed. The second generation submodule is configured to generate a second flag bit based on the encrypted modem side unlocking parameter, the second flag bit being used to indicate whether the encrypted modem side unlocking parameter is successfully resolved. The unlocking submodule is configured to unlock the unlocking object when the first marking bit and the second marking bit satisfy a preset fourth condition.
在本公开其他实施例中,所述获取子模块具体配置为从所述AP侧的存储区域中的第二区域获取加密的modem侧解锁参数,所述第二区域的权限高于所述第一区域。所述获取子模块具体还配置为从所述modem侧的存储区域中的第四区域获取加密的AP侧解锁参数,所述modem侧的存储区域还包括权限低于所述第四区域的第三区域。In other embodiments of the present disclosure, the acquiring sub-module is configured to acquire an encrypted modem side unlocking parameter from a second area in the storage area of the AP, where the right of the second area is higher than the first region. The acquiring sub-module is further configured to acquire an encrypted AP-side unlocking parameter from a fourth area in the storage area of the modem side, where the storage area on the modem side further includes a third authority having a lower authority than the fourth area. region.
在本公开其他实施例中,所述第一生成子模块具体配置为从所述第二区域获取AP侧解锁参数和AP侧秘钥,根据所述AP侧秘钥对所述加密的AP侧解锁参数进行解密,得到解密后的AP侧解锁参数,比较所述解密后的AP侧解锁参数与所述AP侧解锁参数,得到第一比较结果,根据所述第一比较结果生成第一标记位。In other embodiments of the present disclosure, the first generation sub-module is configured to acquire an AP-side unlocking parameter and an AP-side key from the second area, and unlock the encrypted AP side according to the AP-side key. The parameter is decrypted to obtain the decrypted AP side unlocking parameter, and the decrypted AP side unlocking parameter and the AP side unlocking parameter are compared to obtain a first comparison result, and the first flag bit is generated according to the first comparison result.
所述第二生成子模块具体配置为从所述第四区域获取modem侧解锁参数和modem侧秘钥,根据所述modem侧秘钥对所述加密的modem侧解锁参数进行解密,得到解密后的modem侧解锁参数,比较所述解密后的modem侧解锁参数与所述modem侧解锁参数,得到第二比较结果,根据所述第二比较结果生成第二标记位。The second generation sub-module is configured to acquire a modem side unlocking parameter and a modem side key from the fourth area, and decrypt the encrypted modem side unlocking parameter according to the modem side key to obtain the decrypted The modem side unlocking parameter compares the decrypted modem side unlocking parameter with the modem side unlocking parameter to obtain a second comparison result, and generates a second flag bit according to the second comparison result.
在本公开其他实施例中,当所述装置应用于解锁网场景时,所述第一参数为服务器中锁网计数器所达到的数值,所述第二参数为终端锁网计数器所达到的数值,所述预设的第三条件为所述终端锁网计数器所达到的数值超过预设的阈值。In other embodiments of the present disclosure, when the device is applied to the unlocking network scenario, the first parameter is a value reached by a lock counter in the server, and the second parameter is a value reached by the terminal lock network counter. The preset third condition is that the value reached by the terminal lock network counter exceeds a preset threshold.
所述装置还包括重置模块,配置为当所述终端锁网计数器所达到的数值与所述服务器中锁网计数器所达到的数值不一致时,将所述终端锁网计数器所达到的数值重置为所述服务器中锁网计数器所达到的数值。The device further includes a reset module configured to reset the value reached by the terminal lock network counter when the value reached by the terminal lock counter is inconsistent with the value reached by the lock counter in the server The value reached by the lock counter in the server.
在本公开其他实施例中,当所述装置应用于解锁隐私应用场景或解锁隐私数据景时,所述第一参数为服务器中预存储的密码信息,所述第二参数为终端录入的密码信息,所述预设的第三条件为所述终端录入密码信息。In other embodiments of the present disclosure, when the device is used to unlock a privacy application scenario or unlock a private data view, the first parameter is pre-stored password information in the server, and the second parameter is password information entered by the terminal. The preset third condition is that the terminal enters password information.
这里需要指出的是:以上装置实施例的描述,与上述方法实施 例的描述是类似的,具有同方法实施例相似的有益效果。对于本公开数据加锁装置实施例中未披露的技术细节,请参照本公开方法实施例的描述而理解。It should be noted here that the description of the above device embodiment is similar to the description of the above method embodiment, and has similar advantageous effects as the method embodiment. For technical details not disclosed in the data locking device embodiment of the present disclosure, please refer to the description of the method embodiments of the present disclosure.
本公开实施例中,如果以软件功能模块的形式实现上述的数据加锁方法或数据解锁方法,并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中。基于这样的理解,本公开实施例的技术方案本质上或者说对相关技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机、服务器、或者网络设备等)执行本公开各个实施例所述方法的全部或部分。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read Only Memory)、磁碟或者光盘等各种可以存储程序代码的介质。这样,本公开实施例不限制于任何特定的硬件和软件结合。In the embodiment of the present disclosure, if the above data locking method or data unlocking method is implemented in the form of a software function module, and is sold or used as a separate product, it may also be stored in a computer readable storage medium. Based on such understanding, the technical solution of the embodiments of the present disclosure may be embodied in the form of a software product in essence or in the form of a software product stored in a storage medium, including a plurality of instructions for making A computer device (which may be a personal computer, server, or network device, etc.) performs all or part of the methods described in various embodiments of the present disclosure. The foregoing storage medium includes various media that can store program codes, such as a USB flash drive, a mobile hard disk, a read only memory (ROM), a magnetic disk, or an optical disk. Thus, embodiments of the present disclosure are not limited to any specific combination of hardware and software.
另一方面,本公开实施例提供一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,该计算机可执行指令配置为执行上述的数据解锁方法或上述的数据加锁方法。In another aspect, an embodiment of the present disclosure provides a computer storage medium having stored therein computer executable instructions configured to perform the data unlocking method or the data locking method described above.
另一方面,本公开提供一种终端,图12为根据本公开的实施例的终端的结构示意图。如图12所示,在一些实施例中,所述终端1200包括:显示屏1201、处理器1202和配置为存储可执行指令的存储介质1203,其中,处理器1202配置为执行存储的可执行指令,所述可执行指令用于执行上述的数据处理方法。In another aspect, the present disclosure provides a terminal, and FIG. 12 is a schematic structural diagram of a terminal according to an embodiment of the present disclosure. As shown in FIG. 12, in some embodiments, the terminal 1200 includes a display screen 1201, a processor 1202, and a storage medium 1203 configured to store executable instructions, wherein the processor 1202 is configured to execute the stored executable instructions. The executable instructions are for executing the data processing method described above.
本领域内的技术人员应明白,本公开的实施例可提供为方法、系统、或计算机程序产品。因此,本公开可采用硬件实施例、软件实施例、或结合软件和硬件方面的实施例的形式。而且,本公开可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器和光学存储器等)上实施的计算机程序 产品的形式。Those skilled in the art will appreciate that embodiments of the present disclosure can be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of a hardware embodiment, a software embodiment, or a combination of software and hardware aspects. Moreover, the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage and optical storage, etc.) containing computer usable program code.
本公开是参照根据本公开实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The present disclosure is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the present disclosure. It will be understood that each flow and/or block of the flowchart illustrations and/or FIG. These computer program instructions can be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing device to produce a machine for the execution of instructions for execution by a processor of a computer or other programmable data processing device. Means for implementing the functions specified in one or more of the flow or in a block or blocks of the flow chart.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。The computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device. The apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device. The instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
以上所述,仅为本公开的一些实施例而已,并非用于限定本公开的保护范围。The above description is only for some embodiments of the present disclosure, and is not intended to limit the scope of the disclosure.

Claims (16)

  1. 一种数据处理方法,应用于终端,包括:A data processing method is applied to a terminal, including:
    接收服务器下发的解锁对象的第一参数和解锁对象的第一秘钥,所述第一参数和所述第一秘钥用于判断所述终端是否满足解析数据的条件;And receiving, by the server, a first parameter of the unlocking object and a first key of the unlocking object, where the first parameter and the first key are used to determine whether the terminal satisfies a condition for parsing data;
    获取位于所述终端的解锁对象的第二参数和解锁对象的第二秘钥;Obtaining a second parameter of the unlocking object located at the terminal and a second key of the unlocking object;
    当所述第一参数和所述第二参数满足预设的第一条件且所述第一秘钥和所述第二秘钥满足预设的第二条件时,对所述解锁对象进行解锁。The unlocking object is unlocked when the first parameter and the second parameter satisfy a preset first condition and the first key and the second key satisfy a preset second condition.
  2. 如权利要求1所述的方法,所述接收服务器下发的解锁对象的第一参数和解锁对象的第一秘钥之前,所述方法还包括:The method of claim 1, before the receiving the first parameter of the unlocking object and the unlocking the first key of the object, the method further includes:
    当所述终端满足预设的第三条件时,发送所述终端满足预设的第三条件的消息至所述服务器。And sending, by the terminal, a message that the terminal meets the preset third condition to the server, when the terminal meets the preset third condition.
  3. 如权利要求2所述的方法,其中,所述终端包括应用处理器和调制解调处理器,所述应用处理器侧的存储区域包括第一区域,The method of claim 2, wherein the terminal comprises an application processor and a modem processor, the storage area on the application processor side comprising a first area,
    所述当所述第一参数和所述第二参数满足预设的第一条件且所述第一秘钥和所述第二秘钥满足预设的第二条件时,对所述解锁对象进行解锁,包括:When the first parameter and the second parameter satisfy a preset first condition and the first key and the second key satisfy a preset second condition, performing the unlocking object Unlock, including:
    从调制解调处理器侧的存储区域读取所述第一参数;Reading the first parameter from a storage area on a modem processor side;
    从所述第一区域中的第二预留字段读取所述第二参数;Reading the second parameter from a second reserved field in the first area;
    如果所述第一参数和所述第二参数满足预设的第一条件时,比较所述第一区域中第一预留字段中的值与所述第二秘钥的值;If the first parameter and the second parameter satisfy a preset first condition, compare a value in the first reserved field in the first area with a value of the second key;
    如果所述第一预留字段中的值与所述第二秘钥的值满足预设的第二条件时,对所述解锁对象进行解锁。If the value in the first reserved field and the value of the second key satisfy a preset second condition, the unlocked object is unlocked.
  4. 如权利要求3所述的方法,所述如果所述第一参数和所述第 二参数满足预设的第一条件时,比较所述第一区域中第一预留字段中的值与所述第二秘钥的值,包括:The method according to claim 3, wherein if the first parameter and the second parameter satisfy a preset first condition, comparing values in the first reserved field in the first region with the The value of the second key, including:
    如果所述第一参数和所述第二参数满足预设的第一条件时,从所述调制解调处理器侧的存储区域读取所述第一秘钥,并将所述第一秘钥的值写入所述第一预留字段;Reading the first key from a storage area on the modem processor side if the first parameter and the second parameter satisfy a preset first condition, and the first key The value is written to the first reserved field;
    如果所述第一预留字段为非空时,比较所述第一预留字段中的值与所述第二秘钥的值。If the first reserved field is non-empty, compare the value in the first reserved field with the value of the second secret key.
  5. 如权利要求1所述的方法,其中,所述终端包括应用处理器和调制解调处理器,所述对所述解锁对象进行解锁,包括:The method of claim 1, wherein the terminal comprises an application processor and a modem processor, and the unlocking the unlocked object comprises:
    从所述终端获取加密的应用处理器侧解锁参数和加密的调制解调处理器侧解锁参数;Acquiring the encrypted application processor side unlocking parameter and the encrypted modem processor side unlocking parameter from the terminal;
    基于所述加密的应用处理器侧解锁参数生成第一标记位,所述第一标记位用于表明解析所述加密的应用处理器侧解锁参数是否成功;Generating a first flag bit based on the encrypted application processor side unlocking parameter, the first flag bit being used to indicate whether parsing the encrypted application processor side unlocking parameter is successful;
    基于所述加密的调制解调处理器侧解锁参数生成第二标记位,所述第二标记位用于表明解析所述加密的调制解调处理器侧解锁参数是否成功;Generating a second flag bit based on the encrypted modem processor side unlocking parameter, the second flag bit being used to indicate whether parsing the encrypted modem processor side unlocking parameter is successful;
    当所述第一标记位和所述第二标记位满足预设的第四条件时,对所述解锁对象进行解锁。When the first marker bit and the second marker bit satisfy a preset fourth condition, the unlocked object is unlocked.
  6. 如权利要求5所述的方法,其中,所述从所述终端获取加密的应用处理器侧解锁参数和加密的调制解调处理器侧解锁参数,包括:The method of claim 5, wherein the obtaining the encrypted application processor side unlocking parameter and the encrypted modem processor side unlocking parameter from the terminal comprises:
    从所述应用处理器侧的存储区域中的第二区域获取加密的调制解调处理器侧解锁参数,所述第二区域的权限高于所述第一区域;Obtaining an encrypted modem processor side unlocking parameter from a second one of the storage areas on the application processor side, the second area having a higher authority than the first area;
    从所述调制解调处理器侧的存储区域中的第四区域获取加密的应用处理器侧解锁参数,所述调制解调处理器侧的存储区域还包括权限低于所述第四区域的第三区域。Acquiring an encrypted application processor side unlocking parameter from a fourth area in the storage area on the modem processor side, the storage area on the modem processor side further including a lower authority than the fourth area Three areas.
  7. 如权利要求6所述的方法,其中,所述基于所述加密的应用 处理器侧解锁参数生成第一标记位,包括:The method of claim 6, wherein the generating the first flag bit based on the encrypted application processor side unlocking parameter comprises:
    从所述第二区域获取应用处理器侧解锁参数和应用处理器侧秘钥;Obtaining an application processor side unlocking parameter and an application processor side key from the second area;
    根据所述应用处理器侧秘钥对所述加密的应用处理器侧解锁参数进行解密,得到解密后的应用处理器侧解锁参数;Decrypting the encrypted application processor side unlocking parameter according to the application processor side key to obtain the decrypted application processor side unlocking parameter;
    比较所述解密后的应用处理器侧解锁参数与所述应用处理器侧解锁参数,得到第一比较结果;以及Comparing the decrypted application processor side unlocking parameter with the application processor side unlocking parameter to obtain a first comparison result;
    根据所述第一比较结果生成第一标记位。Generating a first flag bit according to the first comparison result.
  8. 如权利要求7所述的方法,其中,所述基于所述加密的调制解调处理器侧解锁参数生成第二标记位,包括:The method of claim 7, wherein the generating the second flag bit based on the encrypted modem processor side unlocking parameter comprises:
    从所述第四区域获取调制解调处理器侧解锁参数和调制解调处理器侧秘钥;Acquiring a modem processor side unlocking parameter and a modem processor side key from the fourth area;
    根据所述调制解调处理器侧秘钥对所述加密的调制解调处理器侧解锁参数进行解密,得到解密后的调制解调处理器侧解锁参数;Decrypting the encrypted modem processor side unlocking parameter according to the modulation and demodulation processor side key to obtain a decrypted modem processor side unlocking parameter;
    比较所述解密后的调制解调处理器侧解锁参数与所述调制解调处理器侧解锁参数,得到第二比较结果;以及Comparing the decrypted modem processor side unlocking parameter with the modem processor side unlocking parameter to obtain a second comparison result;
    根据所述第二比较结果生成第二标记位。Generating a second flag bit according to the second comparison result.
  9. 一种数据处理方法,应用于终端,包括:A data processing method is applied to a terminal, including:
    从所述终端获取基于加锁对象生成的解锁参数;Acquiring an unlocking parameter generated based on the locking object from the terminal;
    根据所述解锁参数生成第一秘钥和第二秘钥;Generating a first key and a second key according to the unlocking parameter;
    发送所述第一秘钥至服务器;Sending the first key to the server;
    根据所述第二秘钥生成应用处理器侧解锁参数和调制解调处理器侧解锁参数;Generating an application processor side unlocking parameter and a modem processor side unlocking parameter according to the second key;
    根据所述应用处理器侧解锁参数生成加密的应用处理器侧解锁参数和应用处理器侧秘钥;Generating an encrypted application processor side unlocking parameter and an application processor side key according to the application processor side unlocking parameter;
    根据所述调制解调处理器侧解锁参数生成加密的调制解调处理器侧解锁参数和调制解调处理器侧秘钥;Generating an encrypted modem processor side unlocking parameter and a modem processor side key according to the modem side unlocking parameter;
    将所述应用处理器侧秘钥、所述应用处理器侧解锁参数和所述 加密的调制解调处理器侧解锁参数写入位于应用处理器侧的存储区域中的第二区域,所述应用处理器侧的存储区域还包括第一区域,所述第二区域权限高于所述第一区域;Writing the application processor side key, the application processor side unlocking parameter, and the encrypted modem processor side unlocking parameter to a second area in a storage area on the application processor side, the application The storage area on the processor side further includes a first area, and the second area has higher authority than the first area;
    将所述调制解调处理器侧秘钥、所述调制解调处理器侧解锁参数和所述加密的应用处理器侧解锁参数写入位于调制解调处理器侧的存储区域中的第四区域,所述调制解调处理器侧的存储区域还包括第三区域,所述第四区域权限高于所述第三区域。Writing the modem side key, the modem side unlocking parameter, and the encrypted application processor side unlocking parameter to a fourth area in a storage area on the modem processor side The storage area on the modem processor side further includes a third area, the fourth area having higher authority than the third area.
  10. 一种数据处理装置,包括:接收模块、获取模块、解锁模块;A data processing device includes: a receiving module, an acquiring module, and an unlocking module;
    所述接收模块配置为接收服务器下发的位于终端的解锁对象的第一参数和解锁对象的第一秘钥,所述第一参数和第一秘钥用于判断所述终端是否满足解析数据的条件;The receiving module is configured to receive a first parameter of the unlocking object that is sent by the server and a first key of the unlocking object, where the first parameter and the first key are used to determine whether the terminal meets the parsing data. condition;
    所述获取模块配置为获取解锁对象的第二参数和解锁对象的第二秘钥;The acquiring module is configured to acquire a second parameter of the unlocking object and a second key of the unlocking object;
    所述解锁模块配置为当所述第一参数和所述第二参数满足预设的第一条件且所述第一秘钥和所述第二秘钥满足预设的第二条件时,对所述解锁对象进行解锁。The unlocking module is configured to: when the first parameter and the second parameter satisfy a preset first condition, and the first key and the second key satisfy a preset second condition, Unlock the object to unlock it.
  11. 如权利要求10所述的数据处理装置,还包括:发送模块,其配置为在所述接收模块接收服务器下发的解锁对象的第一参数和解锁对象的第一秘钥之前,当所述终端满足预设的第三条件时,发送所述终端满足预设的第三条件的消息至所述服务器。The data processing apparatus according to claim 10, further comprising: a transmitting module configured to: when the receiving module receives the first parameter of the unlocking object delivered by the server and the first key of the unlocking object, when the terminal When the preset third condition is met, the message that the terminal meets the preset third condition is sent to the server.
  12. 一种数据处理装置,包括:获取模块、第一生成模块、发送模块、第二生成模块、第三生成模块、第四生成模块、第一写入模块和第二写入模块;A data processing apparatus includes: an obtaining module, a first generating module, a sending module, a second generating module, a third generating module, a fourth generating module, a first writing module, and a second writing module;
    所述获取模块配置为从终端获取基于加锁对象生成的解锁参数;The obtaining module is configured to acquire, from the terminal, an unlocking parameter generated based on the locking object;
    所述第一生成模块配置为根据所述解锁参数生成第一秘钥和第二秘钥;The first generating module is configured to generate a first key and a second key according to the unlocking parameter;
    所述发送模块配置为发送所述第一秘钥至服务器;The sending module is configured to send the first key to a server;
    所述第二生成模块配置为根据所述第二秘钥生成应用处理器侧解锁参数和调制解调处理器侧解锁参数;The second generating module is configured to generate an application processor side unlocking parameter and a modem processor side unlocking parameter according to the second key;
    所述第三生成模块配置为根据所述应用处理器侧解锁参数生成加密的应用处理器侧解锁参数和应用处理器侧秘钥;The third generating module is configured to generate an encrypted application processor side unlocking parameter and an application processor side key according to the application processor side unlocking parameter;
    所述第四生成模块配置为根据所述调制解调处理器侧解锁参数生成加密的调制解调处理器侧解锁参数和调制解调处理器侧秘钥;The fourth generation module is configured to generate an encrypted modem processor side unlocking parameter and a modem processor side key according to the modulation and demodulation processor side unlocking parameter;
    所述第一写入模块配置为将所述应用处理器侧秘钥、所述应用处理器侧解锁参数和所述加密的调制解调处理器侧解锁参数写入位于所述应用处理器侧的存储区域中的第二区域,所述应用处理器侧的存储区域还包括第一区域,所述第二区域权限高于所述第一区域;The first writing module is configured to write the application processor side key, the application processor side unlocking parameter, and the encrypted modem processor side unlocking parameter on the application processor side a second area in the storage area, the storage area on the application processor side further includes a first area, and the second area has a higher authority than the first area;
    所述第二写入模块配置为将所述调制解调处理器侧秘钥、所述加密的应用处理器侧解锁参数和所述调制解调处理器侧解锁参数写入位于所述调制解调处理器侧的存储区域中的第四区域,所述调制解调处理器侧的存储区域还包括第三区域,所述第四区域权限高于所述第三区域。The second writing module is configured to write the modulation and demodulation processor side key, the encrypted application processor side unlocking parameter, and the modulation and demodulation processor side unlocking parameter in the modulation and demodulation A fourth area in the storage area on the processor side, the storage area on the modem processor side further includes a third area, the fourth area having higher authority than the third area.
  13. 一种终端,至少包括显示屏、处理器和配置为存储可执行指令的存储介质,其中,所述处理器配置为执行存储的可执行指令,所述可执行指令用于执行如权利要求1至8中任一项所述的数据处理方法。A terminal comprising at least a display screen, a processor, and a storage medium configured to store executable instructions, wherein the processor is configured to execute stored executable instructions for performing as in claim 1 The data processing method according to any one of the preceding claims.
  14. 一种终端,至少包括显示屏、处理器和配置为存储可执行指令的存储介质,其中,所述处理器配置为执行存储的可执行指令,所述可执行指令用于执行如权利要求9所述的数据处理方法。A terminal comprising at least a display screen, a processor, and a storage medium configured to store executable instructions, wherein the processor is configured to execute stored executable instructions for performing the method of claim 9. The data processing method described.
  15. 一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,该计算机可执行指令配置为执行如权利要求1至8中任一项所述的数据处理方法。A computer storage medium having stored therein computer executable instructions configured to perform the data processing method of any one of claims 1-8.
  16. 一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,该计算机可执行指令配置为执行如权利要求9所述的数据处理方法。A computer storage medium having stored therein computer executable instructions configured to perform the data processing method of claim 9.
PCT/CN2018/098541 2017-06-28 2018-08-03 Data processing method and apparatus, terminal, and storage medium WO2019001588A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710510233.X 2017-06-28
CN201710510233.XA CN109150814B (en) 2017-06-28 2017-06-28 Data processing method and device, terminal and storage medium

Publications (1)

Publication Number Publication Date
WO2019001588A1 true WO2019001588A1 (en) 2019-01-03

Family

ID=64741144

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/098541 WO2019001588A1 (en) 2017-06-28 2018-08-03 Data processing method and apparatus, terminal, and storage medium

Country Status (2)

Country Link
CN (1) CN109150814B (en)
WO (1) WO2019001588A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113726508A (en) * 2021-08-30 2021-11-30 北京博瑞翔伦科技发展有限公司 TOTP algorithm and system for unmanned bin offline intelligent lock

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102227734A (en) * 2008-11-28 2011-10-26 国际商业机器公司 Client computer for protecting confidential file, server computer therefor, method therefor, and computer program
CN105101183A (en) * 2014-05-07 2015-11-25 中国电信股份有限公司 Method and system for protecting private contents at mobile terminal
CN106384042A (en) * 2016-09-13 2017-02-08 北京豆荚科技有限公司 Electronic device and security system
US20170085546A1 (en) * 2015-09-17 2017-03-23 T-Mobile Usa, Inc. Secure remote user device unlock
CN106548088A (en) * 2016-10-19 2017-03-29 惠州Tcl移动通信有限公司 A kind of kept secure area reading and control method thereof and mobile terminal based on mobile terminal

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7940932B2 (en) * 2004-04-08 2011-05-10 Texas Instruments Incorporated Methods, apparatus, and systems for securing SIM (subscriber identity module) personalization and other data on a first processor and secure communication of the SIM data to a second processor
CN100574189C (en) * 2007-03-16 2009-12-23 中兴通讯股份有限公司 Protection of mobile terminal security lock network pintle hook lock and unlock method based on asymmetric arithmetic
US9705674B2 (en) * 2013-02-12 2017-07-11 Amazon Technologies, Inc. Federated key management
CN104519479B (en) * 2013-09-27 2019-06-11 中兴通讯股份有限公司 A kind of method of terminal and its lock network and unlocking locked network
CN104952128A (en) * 2015-05-20 2015-09-30 范浪波 Intelligent handheld terminal based electronic unlocking system and unlocking method thereof
CN106817377A (en) * 2017-03-27 2017-06-09 努比亚技术有限公司 A kind of data encryption device, decryption device and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102227734A (en) * 2008-11-28 2011-10-26 国际商业机器公司 Client computer for protecting confidential file, server computer therefor, method therefor, and computer program
CN105101183A (en) * 2014-05-07 2015-11-25 中国电信股份有限公司 Method and system for protecting private contents at mobile terminal
US20170085546A1 (en) * 2015-09-17 2017-03-23 T-Mobile Usa, Inc. Secure remote user device unlock
CN106384042A (en) * 2016-09-13 2017-02-08 北京豆荚科技有限公司 Electronic device and security system
CN106548088A (en) * 2016-10-19 2017-03-29 惠州Tcl移动通信有限公司 A kind of kept secure area reading and control method thereof and mobile terminal based on mobile terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113726508A (en) * 2021-08-30 2021-11-30 北京博瑞翔伦科技发展有限公司 TOTP algorithm and system for unmanned bin offline intelligent lock
CN113726508B (en) * 2021-08-30 2024-04-02 北京博瑞翔伦科技发展有限公司 TOTP algorithm and system for unmanned bin offline intelligent lock

Also Published As

Publication number Publication date
CN109150814B (en) 2022-12-02
CN109150814A (en) 2019-01-04

Similar Documents

Publication Publication Date Title
CN106603484B (en) Virtual key method, device applying same, background system and user terminal
EP3255832B1 (en) Dynamic encryption method, terminal and server
EP1560120A1 (en) Access method
CN110535880B (en) Access control method and system of Internet of things
US10630474B2 (en) Method and system for encrypted data synchronization for secure data management
WO2014177076A1 (en) Terminal, network locking and network unlocking method for same, and storage medium
CN115208705B (en) Encryption and decryption method and device based on link data self-adaptive adjustment
CN113282944B (en) Intelligent lock unlocking method and device, electronic equipment and storage medium
CN104868998A (en) System, Device, And Method Of Provisioning Cryptographic Data To Electronic Devices
CN112769789B (en) Encryption communication method and system
EP2065830B1 (en) System and method of controlling access to a device
WO2019001588A1 (en) Data processing method and apparatus, terminal, and storage medium
CN110533128B (en) Encryption-based anti-counterfeiting traceability data processing method, device, system and medium
KR102415628B1 (en) Method and apparatus for authenticating drone using dim
CN109302442B (en) Data storage proving method and related equipment
US11463251B2 (en) Method for secure management of secrets in a hierarchical multi-tenant environment
CN116366289A (en) Safety supervision method and device for remote sensing data of unmanned aerial vehicle
JP2017108237A (en) System, terminal device, control method and program
CN115037451B (en) Data protection method and electronic equipment
CN110287725B (en) Equipment, authority control method thereof and computer readable storage medium
CN114239065A (en) Data processing method based on secret key, electronic equipment and storage medium
CN116827691B (en) Method and system for data transmission
JP7086163B1 (en) Data processing system
CN116052307A (en) Unlocking method, unlocking system, intelligent door lock and storage medium
CN115484593A (en) Key retrieving method, server and user identity identification card

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18823543

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18823543

Country of ref document: EP

Kind code of ref document: A1