WO2020010831A1 - Data acquisition method, data acquisition system, terminal, and diagnostic tool - Google Patents

Data acquisition method, data acquisition system, terminal, and diagnostic tool Download PDF

Info

Publication number
WO2020010831A1
WO2020010831A1 PCT/CN2019/070846 CN2019070846W WO2020010831A1 WO 2020010831 A1 WO2020010831 A1 WO 2020010831A1 CN 2019070846 W CN2019070846 W CN 2019070846W WO 2020010831 A1 WO2020010831 A1 WO 2020010831A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
encrypted
terminal
diagnostic tool
server
Prior art date
Application number
PCT/CN2019/070846
Other languages
French (fr)
Chinese (zh)
Inventor
欧锦荣
周海涛
郭子青
谭筱
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Publication of WO2020010831A1 publication Critical patent/WO2020010831A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N17/00Diagnosis, testing or measuring for television systems or their details

Definitions

  • the present application relates to the field of data interaction technology, and more particularly, to a data acquisition method, a data acquisition system, a terminal, a diagnostic tool, a non-volatile computer-readable storage medium, and a computer device.
  • the embodiments of the present application provide a data acquisition method, a data acquisition system, a terminal, a diagnostic tool, a non-volatile computer-readable storage medium, and a computer device of a data acquisition system.
  • the data acquisition method is used in a data acquisition system.
  • the data acquisition system includes a terminal, a diagnostic tool, and a server, and the terminal includes a laser projector.
  • the data acquisition method includes: using the terminal to send first data to the diagnostic tool, the first data includes an encrypted identification code of the laser projector; and using the diagnostic tool to send the first data Sending data to the server; using the server to send second data to the diagnostic tool, the second data includes first encrypted data, and the first encrypted data includes the first encrypted data and the second encrypted data.
  • Calibration data that matches an identification code; uses the diagnostic tool to determine whether the second data has been tampered with, and sends the second data to the terminal when it is determined that the second data has not been tampered with; and The terminal decrypts the first encrypted data in a first decryption manner to obtain the calibration data, and the first decryption manner matches the first encryption manner.
  • the data acquisition method is applied to a terminal.
  • the terminal communicates with the server through a diagnostic tool.
  • the terminal includes a laser projector.
  • the data acquisition method includes: sending first data to the diagnostic tool, so that the diagnostic tool sends the first data to the server, and the first data includes the encrypted data of the laser projector.
  • An identification code when the diagnostic tool determines that the second data has not been tampered with, the second data sent by the diagnostic tool is received, the second data is sent by the server to the diagnostic tool, and the first
  • the two data include first encrypted data, and the first encrypted data includes calibration data that is encrypted in a first encryption manner and matches the identification code; and the first encrypted data is decrypted in a first decryption manner.
  • the first decryption mode matches the first encryption mode.
  • the data acquisition method is used for a diagnostic tool that communicates with a terminal and a server.
  • the terminal includes a laser projector.
  • the data acquisition method includes: receiving first data sent by the terminal and forwarding the first data to the server, the first data including an encrypted identification code of the laser projector; receiving a second data sent by the server Data, the second data includes first encrypted data, the first encrypted data includes calibration data that is encrypted in a first encryption manner and matches the identity identification code; and determines whether the second data has been tampered with And when determining that the second data has not been tampered with, send the second data to the terminal to decrypt the first encrypted data by using the terminal in a first decryption manner to obtain the calibration data, The first decryption method matches the first encryption method.
  • the data acquisition system includes a terminal, a diagnostic tool, and a server.
  • the terminal includes a laser projector.
  • the terminal is configured to send first data to the diagnostic tool.
  • the first data includes an encrypted data.
  • the diagnostic tool is configured to send the first data to the server;
  • the server is configured to send second data to the diagnostic tool, and the second data includes a first Encrypted data, the first encrypted data includes calibration data that is encrypted in a first encryption manner and matches the identification code;
  • the diagnostic tool is further configured to determine whether the second data has been tampered with, and Sending the second data to the terminal when it is determined that the second data has not been tampered with;
  • the terminal is further configured to decrypt the first encrypted data in a first decryption manner to obtain the calibration data, the The first decryption mode matches the first encryption mode.
  • the terminal communicates with the server through a diagnostic tool.
  • the terminal includes a laser projector.
  • the terminal is configured to send first data to the diagnostic tool, so that the diagnostic tool sends the first data to the server, where the first data includes an identity of the laser projector being encrypted.
  • Identification code when the diagnostic tool determines that the second data has not been tampered with, receives second data sent by the diagnostic tool, the second data sent by the server to the diagnostic tool, the second data
  • the data includes first encrypted data, the first encrypted data includes calibration data that is encrypted in a first encryption manner and matches the identity identification code; and the first encrypted data is decrypted in a first decryption manner to The calibration data is obtained, and the first decryption mode matches the first encryption mode.
  • the electronic device includes a diagnostic tool, and the diagnostic tool communicates with the terminal and the server.
  • the terminal includes a laser projector.
  • the diagnostic tool is configured to receive first data sent by the terminal and forward the data to the server, where the first data includes an encrypted identification code of the laser projector; and receive a second data sent by the server.
  • the second data includes first encrypted data
  • the first encrypted data includes calibration data that is encrypted in a first encryption manner and matches the identity identification code; and determines whether the second data has been tampered with And when determining that the second data has not been tampered with, send the second data to the terminal to decrypt the first encrypted data by using the terminal in a first decryption manner to obtain the calibration data,
  • the first decryption method matches the first encryption method.
  • the non-transitory computer-readable storage medium of the computer-executable instructions when the computer-executable instructions are executed by one or more processors, cause the processors to execute any one of the foregoing embodiments.
  • Data acquisition method when the computer-executable instructions are executed by one or more processors, cause the processors to execute any one of the foregoing embodiments.
  • the computer device includes a memory and a processor.
  • the memory stores computer-readable instructions.
  • the processor causes the processor to execute data according to any one of the foregoing embodiments. Get method.
  • FIG. 1 is a schematic flowchart of a data acquisition method for a data acquisition system according to some embodiments of the present application.
  • FIG. 2 is a schematic structural diagram of a data acquisition system according to some embodiments of the present application.
  • FIG. 3 is a schematic structural diagram of a terminal according to some embodiments of the present application.
  • FIG. 4 is a schematic block diagram of an electronic device according to some embodiments of the present application.
  • FIG. 5 is a schematic block diagram of a server according to some embodiments of the present application.
  • 6 to 10 are schematic flowcharts of a data acquisition method for a data acquisition system according to some embodiments of the present application.
  • 11 to 14 are schematic flowcharts of a data acquisition method for a terminal according to some embodiments of the present application.
  • 15 to 17 are schematic flowcharts of a data acquisition method for a diagnostic tool according to some embodiments of the present application.
  • FIG. 18 is a schematic block diagram of a computer-readable storage medium and a processor according to some embodiments of the present application.
  • FIG. 19 is a schematic block diagram of a computer device according to some embodiments of the present application.
  • the first feature "on” or “down” of the second feature may be the first and second features in direct contact, or the first and second features indirectly through an intermediate medium. contact.
  • the first feature is "above”, “above”, and “above” the second feature.
  • the first feature is directly above or obliquely above the second feature, or it only indicates that the first feature is higher in level than the second feature.
  • the first feature is “below”, “below”, and “below” of the second feature.
  • the first feature may be directly below or obliquely below the second feature, or it may simply indicate that the first feature is less horizontal than the second feature.
  • the data acquisition method is used in a data acquisition system 100.
  • the data acquisition system 100 includes a terminal 10, a diagnostic tool 20, and a server 30.
  • the terminal 10 includes a laser projector 11.
  • the data acquisition method includes: using the terminal 10 to send first data to the diagnostic tool 20, where the first data includes an encrypted identification code of the laser projector 11; using the diagnostic tool 20 to The first data is sent to the server 30; the server 30 is used to send second data to the diagnostic tool 20, the second data includes first encrypted data, and the first encrypted data includes Calibration data encrypted with an encryption method that matches the identification code; using the diagnostic tool 20 to determine whether the second data has been tampered with, and sending the second data when it is determined that the second data has not been tampered with To the terminal 10; and using the terminal 10 to decrypt the first encrypted data in a first decryption manner to obtain the calibration data, the first decryption manner matches the first encryption manner.
  • the second data further includes second encrypted data
  • the data acquisition method further includes: using the server 30 to encrypt the first encrypted data in a second encryption manner to form the second encrypted data.
  • the second encrypted data; and determining whether the second data has been tampered with by using the diagnostic tool 20 includes: determining whether the second encrypted data can be decrypted in a second decryption manner, and the second decryption manner and The second encryption methods match; and if so, it is determined that the second data has not been tampered with.
  • the using the server 30 to encrypt the first encrypted data in a second encryption manner to form the second encrypted data includes: generating a first encrypted data for the first encrypted data; A data digest; and encrypting the first data digest with a first private key to form a digital signature.
  • the determining whether the second encrypted data can be decrypted in a second decryption manner includes: determining whether the first public key can decrypt the digital signature, and the first public key and the The first private key is paired; if it is, a second data digest for the first encrypted data is generated; whether the second data digest is consistent with the first data digest; and if it is, the first The two decryption modes can decrypt the second encrypted data.
  • the second data further includes the identification code
  • the data acquisition method further includes: determining whether the identity identification code is consistent with the original identity identification code stored in the terminal 10; and if not, using the terminal 10 to encrypt the first encryption in a first decryption manner The data is decrypted to obtain the calibration data.
  • the terminal 10 is formed with a trusted execution environment 1321, and before the using the terminal 10 to send the first data to the diagnostic tool 20, the data acquisition method further includes: using the The terminal 10 encrypts the identification code in a third encryption manner in the trusted execution environment 1321 to obtain the first data; before using the server 30 to send the second data to the diagnostic tool 20, The data acquisition method further includes: decrypting the first data in a third decryption manner to obtain the identity identification code, and the third decryption manner matches the third encryption manner.
  • the data acquisition method before the using the terminal 10 to decrypt the first encrypted data in a first decryption manner to obtain the calibration data, the data acquisition method further includes: using the terminal 10 Determining whether the second data has been tampered with; and if not, using the terminal 10 to decrypt the first encrypted data in a first decryption manner to obtain the calibration data.
  • the data acquisition method is applied to the terminal 10.
  • the terminal 10 communicates with the server 30 through the diagnostic tool 20.
  • the terminal 10 includes a laser projector 11.
  • the data acquisition method includes: sending first data to the diagnostic tool 20, so that the diagnostic tool 20 sends the first data to the server 30, and the first data includes the laser that is encrypted The identification code of the projector 11; when the diagnostic tool 20 determines that the second data has not been tampered with, the second data sent by the diagnostic tool 20 is received, and the second data is sent by the server 30 to all
  • the diagnostic tool 20 includes first encrypted data
  • the first encrypted data includes calibration data that is encrypted in a first encryption manner and matches the identity identification code; and
  • the first encrypted data is decrypted to obtain the calibration data, and the first decryption mode matches the first encryption mode.
  • the second data further includes the identification code
  • the data acquisition method is performed before decrypting the first encrypted data in a first decryption manner to obtain the calibration data.
  • the method further includes: determining whether the identity identification code is consistent with the original identity identification code stored in the terminal 10; and if not, decrypting the first encrypted data in a first decryption manner to obtain the calibration data.
  • the terminal 10 is formed with a trusted execution environment 1321, and before the sending of the first data to the diagnostic tool 20, the data acquisition method further includes: in the trusted execution environment 1321 The third encryption method is used to encrypt the identity identification code to obtain the first data.
  • the data acquisition method before the decrypting the first encrypted data in a first decryption manner to obtain the calibration data, the data acquisition method further includes: determining whether the second data has been tampered with; And if not, the first encrypted data is decrypted in a first decryption manner to obtain the calibration data.
  • the data acquisition method is used for a diagnostic tool 20 that communicates with the terminal 10 and the server 30.
  • the terminal 10 includes a laser projector 11.
  • the data acquisition method includes: receiving first data sent by the terminal 10 and forwarding the first data to the server 30, where the first data includes an encrypted identification code of the laser projector 11; receiving the server 30 The second data sent, the second data including first encrypted data, the first encrypted data including calibration data that is encrypted in a first encryption manner and matches the identity identification code; and determining the second data Whether the data has been tampered with, and when determining that the second data has not been tampered with, the second data is sent to the terminal 10 to use the terminal 10 to decrypt the first encrypted data in a first decryption manner to The calibration data is obtained, and the first decryption mode matches the first encryption mode.
  • the second data further includes second encrypted data
  • the server 30 is configured to encrypt the first encrypted data in a second encryption manner to form the second encrypted data
  • the The data acquisition method further includes: judging whether the second encrypted data can be decrypted by a second decryption method, the second decryption method matches the second encryption method; and if so, judging the second data Not tampered with.
  • the server 30 is further configured to generate a first data digest for the first encrypted data; and encrypt the first data digest with a first private key to form a digital signature; the Determining whether the second encrypted data can be decrypted in a second decryption manner includes determining whether the first public key can decrypt the digital signature, and the first public key is paired with the first private key; If yes, generate a second data digest for the first encrypted data; determine whether the second data digest is consistent with the first data digest; and if so, determine whether the second decryption can be performed on the second Encrypted data is decrypted.
  • the data acquisition system 100 includes a terminal 10, a diagnostic tool 20, and a server 30.
  • the terminal 10 includes a laser projector 11.
  • the terminal 10 is configured to send first data to the diagnostic tool 20.
  • the first data includes an encrypted identification code of the laser projector 11;
  • the diagnostic tool 20 is configured to send the first data to the server 30; and
  • the server 30 is configured to send second data to
  • the diagnostic tool 20 includes first encrypted data, and the first encrypted data includes calibration data that is encrypted in a first encryption manner and matches the identification code;
  • the diagnostic tool 20 further Configured to determine whether the second data has been tampered with, and send the second data to the terminal 10 when it is determined that the second data has not been tampered with;
  • the terminal 10 is further configured to perform
  • the first encrypted data is decrypted to obtain the calibration data, and the first decryption method matches the first encryption method.
  • the second data further includes second encrypted data
  • the server 30 is further configured to encrypt the first encrypted data in a second encryption manner to form the second encrypted data
  • the diagnostic tool 20 is further configured to determine whether the second encrypted data can be decrypted in a second decryption mode, and the second decryption mode matches the second encryption mode; and if so, determine the second encrypted data.
  • the data has not been tampered with.
  • the server 30 is further configured to: generate a first data digest for the first encrypted data; and encrypt the first data digest with a first private key to form a digital signature.
  • the diagnostic tool 20 is further configured to: determine whether a first public key can decrypt the digital signature, and the first public key is paired with the first private key; if yes, generate the A second data digest for the first encrypted data; determining whether the second data digest is consistent with the first data digest; and if so, determining whether the second encrypted data can be decrypted in a second decryption manner .
  • the second data further includes the identity identification code
  • the terminal 10 is further configured to determine whether the identity identification code is consistent with an original identity identification code stored in the terminal 10; and If not, the terminal 10 is used to decrypt the first encrypted data in a first decryption manner to obtain the calibration data.
  • the terminal 10 is formed with a trusted execution environment 1321, and the terminal 10 is further configured to encrypt the identity identification code in a third encryption manner in the trusted execution environment 1321 to obtain the The first data; the server 30 is further configured to decrypt the first data in a third decryption manner to obtain the identification code, and the third decryption manner matches the third encryption manner.
  • the terminal 10 is further configured to: determine whether the second data has been tampered with; and if not, decrypt the first encrypted data in a first decryption manner to obtain the calibration data. .
  • the terminal 10 communicates with the server 30 through the diagnostic tool 20.
  • the terminal 10 includes a laser projector 11.
  • the terminal 10 is configured to send first data to the diagnostic tool 20, so that the diagnostic tool 20 sends the first data to the server 30, where the first data includes the encrypted laser light.
  • the identification code of the projector 11 when the diagnostic tool 20 determines that the second data has not been tampered with, the second data sent by the diagnostic tool 20 is received, and the second data is sent by the server 30 to all
  • the second data includes first encrypted data
  • the first encrypted data includes calibration data that is encrypted in a first encryption manner and matches the identity identification code; and
  • the first encrypted data is decrypted to obtain the calibration data, and the first decryption method matches the first encryption method.
  • the electronic device includes a diagnostic tool 20 that communicates with the terminal 10 and the server 30.
  • the terminal 10 includes a laser projector 11.
  • the diagnostic tool 20 is configured to: receive first data sent by the terminal 10 and forward the first data to the server 30, where the first data includes an encrypted identification code of the laser projector 11; and receive the server 30 second data sent, the second data includes first encrypted data, the first encrypted data includes calibration data that is encrypted in a first encryption manner and matches the identification code; and determines the first Whether the two data have been tampered with, and when determining that the second data has not been tampered with, send the second data to the terminal 10 to use the terminal 10 to decrypt the first encrypted data in a first decryption manner To obtain the calibration data, the first decryption mode matches the first encryption mode.
  • the data acquisition method according to any one of the embodiments.
  • the computer device 1000 includes a memory 600 and a processor 500.
  • the memory 600 stores computer-readable instructions 601.
  • the processor 500 executes the foregoing.
  • the data acquisition method according to any one of the embodiments.
  • the present application provides a data acquisition method for a data acquisition system 100.
  • the data acquisition system 100 includes a terminal 10, a diagnostic tool 20, and a server 30.
  • the terminal 10 includes a laser projector 11.
  • the diagnostic tool 20 is mounted on the electronic device 200.
  • Data acquisition methods include:
  • 011 Use the terminal 10 to send the first data to the diagnostic tool 20, where the first data includes the encrypted identification code of the laser projector 11;
  • the server 30 uses the server 30 to send the second data to the diagnostic tool 20, the second data includes the first encrypted data, and the first encrypted data includes the calibration data that is encrypted in the first encryption mode and matches the identification code;
  • the present application provides a data acquisition system 100.
  • the data acquisition system 100 includes a terminal 10, a diagnostic tool 20, and a server 30.
  • the terminal 10 includes a laser projector 11. among them:
  • the terminal 10 is configured to send first data to the diagnostic tool 20, where the first data includes an identification code of the encrypted laser projector 11;
  • the diagnostic tool 20 is configured to send the first data to the server 30;
  • the server 30 is configured to send second data to the diagnostic tool 20, where the second data includes first encrypted data, and the first encrypted data includes calibration data that is encrypted in a first encryption manner and matches an identification code;
  • the diagnostic tool 20 is further configured to determine whether the second data has been tampered with, and send the second data to the terminal 10 when it is determined that the second data has not been tampered with;
  • the terminal 10 is further configured to decrypt the first encrypted data in a first decryption manner to obtain calibration data, and the first decryption manner matches the first encryption manner.
  • the terminal 10 is used to implement steps 011 and 015
  • the diagnostic tool 20 is used to implement steps 012 and 014
  • the server 30 is used to implement steps 013.
  • the terminal 10 may be a smart phone, a tablet computer, a notebook computer, a wearable device (a smart watch, a smart bracelet, a smart glasses, a smart helmet, etc.) and the like.
  • the electronic device 200 may be a smart phone, a tablet computer, a notebook computer, a desktop computer, a wearable device (smart watch, smart bracelet, smart glasses, smart helmet, etc.), and the like.
  • the diagnostic tool 20 is a client installed on the electronic device 200.
  • the diagnostic tool 20 is an application installed on a mobile phone
  • the diagnostic tool 20 is installed Application software on a desktop computer.
  • the terminal 10 communicates with the server 30 through the diagnostic tool 20.
  • the server 30 includes a processing chip 31 and one or more storage media 32.
  • One or more storage media 32 are used to store one or more computer-executable instructions 33 and data.
  • the processing chip 31 is used to process and calculate all data on the server 30, and read computer-executable instructions 33 stored in the storage medium 32, and generate corresponding operation control signals.
  • the processing chip 31 may be used to implement step 013. .
  • the terminal 10 includes a laser projector 11, an infrared camera 12, and a processor 13.
  • the processor 13 is connected to the laser projector 11, and the processor 13 is connected to the infrared camera 12.
  • the processor 13 may be configured to control the laser projector 11 to project a laser pattern on a target object.
  • the processor 13 may also be used to control the infrared camera 12 to collect a laser pattern modulated by a target object.
  • the processor 13 further processes the collected laser pattern to obtain depth information of the target object.
  • the processor 13 must calculate the depth information of the target object according to the calibration data of the laser projector 11 and the infrared camera 12 stored on the terminal 10. Therefore, when the terminal 10 replaces the laser projector 11, the calibration data corresponding to the laser projector 11 must be burned before the laser projector 11 can be used normally.
  • the terminal 10 needs to obtain the calibration data of the laser projector 11 currently installed on the terminal 10 from the server 30.
  • each laser projector 11 corresponds to a unique identification code (Chip ID).
  • the identification code of each laser projector 11 is stored in the database of the server 30.
  • the terminal 10 first obtains the identity identification code of the current laser projector 11, and then generates a random number including the identity identification code according to the identity identification code, and encrypts the random number to form first data.
  • the terminal 10 sends the first data to the diagnostic tool 20, and then the diagnostic tool 20 sends the first data to the server 30.
  • the server 30 After receiving the first data, the server 30 searches the database for calibration data that matches the identification code, and encrypts the calibration data in a first encryption manner to form the first encrypted data.
  • the server 30 sends the second data including the first encrypted data and the identification code to the diagnostic tool 20.
  • the diagnostic tool 20 After receiving the second data, the diagnostic tool 20 needs to verify whether the second data has been tampered with. When it is determined that the second data has been tampered with, the diagnostic tool 20 sends a request for reacquiring the second data to the server 30 until it is determined that the acquired second data has not been tampered with. When determining that the second data has not been tampered with, the diagnostic tool 20 sends the second data including the first encrypted data and the identification code to the terminal 10. After receiving the second data, the terminal 10 decrypts the first encrypted data in a first decryption manner to obtain the calibration data.
  • the first decryption method matches the first encryption method.
  • the first encryption method includes a symmetric encryption algorithm, for example, a Data Encryption Standard (DES) algorithm, a Triple Data Encryption Algorithm (TDEA) algorithm, and an Advanced Encryption Standard , AES) algorithm and so on.
  • DES Data Encryption Standard
  • TDEA Triple Data Encryption Algorithm
  • AES Advanced Encryption Standard
  • the server 30 uses the DES algorithm to randomly generate an encryption key, and uses this encryption key to encrypt the calibration data stored in the server 30 to form the first encrypted data.
  • the server 10 then sends the encryption key together with the second data to the diagnostic tool 20, and then sends the diagnostic tool 20 to the terminal 10. In this way, the terminal 10 can use the encryption key generated by the server 10 to decrypt the first encrypted data.
  • the first encryption method further includes an asymmetric encryption algorithm, such as an RSA encryption algorithm, an ElGamal algorithm, and an Elliptic Curve Cryptography (ECC).
  • an asymmetric encryption algorithm such as an RSA encryption algorithm, an ElGamal algorithm, and an Elliptic Curve Cryptography (ECC).
  • ECC Elliptic Curve Cryptography
  • the terminal 10 uses the RSA encryption algorithm to generate a pair of RSA keys, one of which is a private key, the private key is stored by the server 30, and the other is a public key, and the public key can be sent to the terminal 10.
  • the server 30 uses the private key to encrypt the calibration data stored in the server 30, and the terminal 10 uses the public key to decrypt the calibration data. This is to ensure the confidentiality of the calibration data.
  • the terminal 10 is used to send the first data including the identification code of the laser projector 11 to the server 30; then, the server 30 is used to find and identify the identity according to the identification code.
  • the calibration data matching the identification code is encrypted with the first encryption method to generate the first encrypted data.
  • the server 30 sends the second data including the first encrypted data to the diagnostic tool 20;
  • the diagnostic tool 20 determines whether the second data has been tampered with, and uses the diagnostic tool 20 to send the second data to the terminal 10 when the second data has not been tampered with; finally, the terminal 10 is used to decrypt the first encrypted data in a first decryption manner to obtain Calibration data. In this way, the terminal 10 can obtain complete and accurate calibration data of the laser projector 11 from the server 30.
  • the second data further includes second encrypted data.
  • the data acquisition method further includes steps:
  • Step 014 uses a diagnostic tool to determine whether the second data has been tampered with, including the following sub-steps:
  • 0141 Determine whether the second encrypted data can be decrypted by the second decryption method, and the second decryption method matches the second encryption method;
  • the second data further includes second encrypted data.
  • the server 30 is further configured to encrypt the first encrypted data in a second encryption manner to form the second encrypted data.
  • the diagnostic tool 20 is further configured to determine whether the second encrypted data can be decrypted with the second decryption method, and the second decryption method matches the second encryption method; and if so, it is determined that the second data has not been tampered with. That is, the server 30 is further configured to implement step 016, and the diagnostic tool 20 is further configured to implement steps 0141 and 0142.
  • the server 30 before sending the second data to the diagnostic tool 20 using the server 30 in step 013, the server 30 also encrypts the first encrypted data in a second encryption manner to form the second encrypted data. Therefore, the second data includes the first encrypted data, the identification code, and the second encrypted data.
  • the diagnostic tool 20 determines whether the second encrypted data can be decrypted in the second decryption manner. The two encryption methods match. When it is determined that the second decryption method can decrypt the second encrypted data, the diagnostic tool 20 determines that the second data has not been tampered with, and sends the second data to the terminal 10.
  • the diagnostic tool 20 determines that the second data has been tampered with. At this time, the diagnostic tool 20 stops sending the second data to the terminal 10 and sends a request for acquiring the second data to the server 30 until the diagnostic tool 20 determines that the second data has not been tampered with.
  • step 016 the server 30 is used to encrypt the first encrypted data in a second encryption manner to form the second encrypted data, and further includes the following sub-steps:
  • 0161 generate a first data digest for the first encrypted data
  • 0162 Encrypt the first data digest with the first private key to form a digital signature.
  • the server 30 is further configured to generate a first data digest for the first encrypted data; and encrypt the first data digest with a first private key to form a digital signature. . That is, the server 30 is further configured to implement sub-steps 0161 and 0162.
  • the server 30 may use a digest algorithm (such as a Hash function) to generate a first data digest of the first encrypted data, and then encrypt the first data digest with a first private key to form a digital signature.
  • the first private key is stored on the server 30 only. Therefore, the second encrypted data is a digital signature of the first encrypted data.
  • the digital signature can be used to judge the integrity of the first encrypted data, that is, to determine that the calibration data received by the sink (diagnostic tool 20 and terminal 10) must be information sent by the source (server 30) There is absolutely no change in the middle.
  • step 0141 it is determined whether the second encrypted data can be decrypted in the second decryption mode, including the following sub-steps:
  • 01411 Determine whether the first public key can decrypt the digital signature, and the first public key and the first private key are paired;
  • 01413 Determine whether the second data digest is consistent with the first data digest
  • the diagnostic tool 20 is further configured to determine whether the first public key can decrypt the digital signature, and the first public key and the first private key are paired; if yes, generate the A second data digest for the first encrypted data; determining whether the second data digest is consistent with the first data digest; and, if so, determining whether the second encrypted data can be decrypted in a second decryption manner. That is, the diagnostic tool 20 is also used to implement sub-steps 01411, 01412, 01413, and 01414.
  • the diagnostic tool 20 determines whether the first public key can decrypt the digital signature.
  • the first public key is paired with the first private key
  • the server 30 stores the first private key
  • the diagnostic tool 20 stores the first public key.
  • the diagnostic tool 20 determines that the source of the second data is not trusted, it will not send the second data to the terminal 10, thereby ensuring the integrity of the second data.
  • the diagnostic tool 20 When determining that the first public key can decrypt the digital signature, the diagnostic tool 20 first uses a digest algorithm (such as a Hash function) to generate a second data digest for the first encrypted data, and then determines whether the second data digest is consistent with the first data digest. . When it is judged that the second data digest is consistent with the first data digest, it is judged that the second encrypted data can be decrypted in the second decryption manner, thereby determining that the second encrypted data has not been tampered with, and ensuring the integrity of the second data.
  • a digest algorithm such as a Hash function
  • the second data further includes an identification code.
  • the data acquisition method further includes: The following steps:
  • the second data further includes an identification code
  • the terminal 10 is further configured to determine whether the identification code is consistent with the original identification code stored in the terminal 10; and if not, Then, the terminal 10 is used to decrypt the first encrypted data in a first decryption manner to obtain the calibration data. That is, the terminal 10 is further configured to perform steps 0151 and 0152.
  • the terminal 10 stores an identification code of the original laser projector 11. After receiving the second data including the identification code of the current laser projector 11, the terminal 10 needs to determine whether the current identification code is consistent with the original identification code. When judging that the current identity identification code is consistent with the original identity identification code, the terminal 10 determines that the current laser projector 11 is the original laser projector 11, that is, the terminal 10 has not replaced the new laser projector 11. Therefore, the terminal 10 does not need to decrypt the first encrypted data or store the first encrypted data. When judging that the current identity identification code is inconsistent with the original identity identification code, the terminal 10 determines that the current laser projector 11 is not the original laser projector 11, that is, the terminal 10 has replaced the new laser projector 11. Therefore, the terminal 10 decrypts the first encrypted data in a first decryption manner to obtain the calibration data.
  • the terminal 10 is formed with a Trusted Execution Environment (TEE) 1321.
  • TEE Trusted Execution Environment
  • the terminal 10 is used to encrypt the identity identification code in the trusted execution environment 1321 in a third encryption manner to obtain the first data.
  • the data acquisition method further includes the following steps:
  • 018 Decrypt the first data in a third decryption manner to obtain an identification code, and the third decryption manner matches the third encryption manner.
  • the terminal 10 is formed with a trusted execution environment 1321.
  • the terminal 10 is further configured to encrypt the identity identification code in a third encryption manner in the trusted execution environment 1321 to obtain the first data.
  • the server 30 is further configured to decrypt the first data in a third decryption manner to obtain an identification code, and the third decryption manner matches the third encryption manner. That is, the terminal 10 is further configured to perform step 017, and the server 30 is further configured to perform step 018.
  • the processor 13 includes a microprocessor 131 and an Application Processor (AP) 132.
  • the microprocessor 131 may be a processing chip, and the microprocessor 131 is connected to the application processor 132.
  • the application processor 132 may be used to reset the microprocessor 131, wake the microprocessor 131, and debug Microprocessor 131 and the like.
  • the application processor 132 includes a trusted execution environment 1321 and an untrusted execution environment 1322.
  • the microprocessor 131 is connected to the trusted execution environment 1322 of the application processor 132 through a mobile industry processor interface, so as to directly transmit data in the microprocessor 131 to the trusted execution environment 1322 for storage.
  • the code and memory area in the trusted execution environment 1322 are controlled by the access control unit, and cannot be accessed by programs in the untrusted execution environment 1322.
  • the identification code of the laser projector 11 is stored in the trusted execution environment 1322. In this way, the identification code of the laser projector 11 is not easy to be tampered with and misappropriated, and the security of the information of the terminal 10 is high.
  • the terminal 10 encrypts the identity identification code in the trusted execution environment 1321 to ensure the confidentiality of the identity identification code.
  • the third encryption method and the third decryption method may be asymmetric encryption algorithms.
  • the server 30 uses the asymmetric encryption algorithm to generate a matching second public key and a second private key, the server 30 stores the second private key, and the terminal 10 stores the second public key.
  • the terminal 10 uses the second public key to encrypt the identification code to obtain the first data. Therefore, when the server 30 receives the first data, it can use the second private key to decrypt the first data, thereby obtaining the identity identification code.
  • the third encryption method and the third decryption method may also be a symmetric encryption algorithm. Since the first decryption method and the first encryption method using the symmetric encryption algorithm have been discussed in the foregoing embodiment, the third encryption method and the third decryption method using the symmetric encryption algorithm are not described herein again.
  • step 015 uses the terminal 10 to decrypt the first encrypted data in a first decryption manner to obtain the calibration data
  • the data acquisition method further includes steps:
  • the terminal 10 is further configured to determine whether the second data has been tampered with; and if not, the first encrypted data is decrypted in a first decryption manner to obtain the calibration data. That is to say, the terminal 10 is further configured to perform steps 0153 and 0152.
  • the method for judging whether the second data is tampered with the terminal 10 is consistent with the method for judging whether the second data is tampered with the diagnostic tool in step 014, that is, judging whether the second encryption can be encrypted by the second decryption method
  • the data is decrypted.
  • the terminal 10 determines whether the digital signature formed by the server 30 can be decrypted by using the first public key.
  • the first public key is paired with the first private key
  • the server 30 stores the first private key
  • the diagnostic tool 20 and the terminal 10 both store the first public key.
  • the terminal 10 determines that the digital signature has been tampered with.
  • the terminal 10 judges that the source of the second data is untrusted, it does not store the second data.
  • the terminal 10 first generates a third data digest for the first encrypted data by using a digest algorithm (such as a Hash function), and then determines whether the third data digest is consistent with the first data digest.
  • a digest algorithm such as a Hash function
  • the terminal 10 can perform the first decryption method in step 05 to decrypt the first encrypted data to obtain the calibration data.
  • the terminal 10 will not perform step 015.
  • the present application provides a data acquisition method for the terminal 10.
  • the terminal 10 communicates with the server 30 through the diagnostic tool 20.
  • the terminal 10 includes a laser projector 11.
  • Data acquisition methods include:
  • the first data includes the encrypted identification code of the laser projector 11.
  • the diagnostic tool 20 determines that the second data has not been tampered with, the second data sent by the diagnostic tool 20 is received.
  • the second data is sent by the server 30 to the diagnostic tool 20, and the second data includes the first encrypted data and the first encrypted data. Including calibration data matched with an identification code encrypted in a first encryption manner;
  • the present application provides a terminal 10.
  • the terminal 10 communicates with the server 30 through the diagnostic tool 20.
  • the terminal 10 is configured to send the first data to the diagnostic tool 20, so that the diagnostic tool 20 sends the first data to the server 30.
  • the first data includes the encrypted identification code of the laser projector 11;
  • the second data sent by the diagnostic tool 20 is received.
  • the second data is sent by the server 30 to the diagnostic tool 20.
  • the second data includes the first encrypted data, and the first encrypted data includes the first encrypted data
  • the calibration data matching the identity identification code; and, the first encrypted data is decrypted in a first decryption manner to obtain the calibration data, and the first decryption manner matches the first encryption manner. That is, the terminal 10 may be used to implement steps 021, 022, and 023.
  • the terminal 10 sends the first data including the identification code of the laser projector 11 to the server 30, so that the server 30 can find a matching calibration according to the identification code And receive the second data including the first encrypted data, and then decrypt the first encrypted data in a first decryption manner to obtain the calibration data. In this way, the terminal 10 can obtain accurate and complete calibration data of the laser projector 11 from the server 30.
  • the terminal 10 is formed with a trusted execution environment 1321.
  • the data acquisition method further includes the following steps:
  • the identity identification code is encrypted in a third encryption manner to obtain the first data.
  • the terminal 10 is further configured to implement step 024.
  • the second data further includes an identification code.
  • the data acquisition method further includes the following steps:
  • the first encrypted data is decrypted in a first decryption manner to obtain calibration data.
  • the second data further includes an identification code.
  • the terminal 10 is further configured to implement steps 025 and 023.
  • step 023 decrypts the first encrypted data in a first decryption manner to obtain calibration data
  • the data acquisition method further includes the following steps:
  • the first encrypted data is decrypted in a first decryption manner to obtain calibration data.
  • the terminal 10 is further configured to implement steps 026 and 023.
  • the present application provides a data acquisition method for a diagnostic tool 20.
  • the diagnostic tool 20 communicates with the terminal 10 and the server 30.
  • the terminal 10 includes a laser projector 11.
  • the data acquisition method includes the following steps:
  • the third data includes the encrypted identification code of the laser projector 11.
  • the second data includes first encrypted data, and the first encrypted data includes calibration data that is encrypted in a first encryption manner and matches an identification code;
  • the present application provides an electronic device 200.
  • the electronic device 200 includes a diagnostic tool 20 that communicates with the terminal 10 and the server 30.
  • the diagnostic tool 30 is configured to receive the first data sent by the terminal 10 and forward the data to the server 30.
  • the first data includes the encrypted identification code of the laser projector 11.
  • the second data sent by the server 30 includes the first data.
  • the first encrypted data includes calibration data that is encrypted with the first encryption method and matches the identification code; and, determines whether the second data has been tampered with, and sends the second data when it is determined that the second data has not been tampered with
  • the terminal 10 is used to decrypt the first encrypted data in the first decryption mode to obtain the calibration data, and the first decryption mode matches the first encryption mode.
  • the diagnostic tool 20 serves as a data transmission channel and a data determination channel between the terminal 10 and the server 30, and sends the second data to the second data when it is determined that the second data has not been tampered with.
  • the terminal 10 ensures that the terminal 10 can obtain accurate and complete calibration data of the laser projector 11 from the server 30.
  • the second data further includes second encrypted data.
  • the server 30 is configured to encrypt the first encrypted data in a second encryption manner to form the second encrypted data.
  • the data acquisition method also includes the following steps:
  • the diagnostic tool 30 is further configured to perform steps 034 and 035.
  • the server 30 is further configured to generate a first data digest for the first encrypted data; and encrypt the first data digest with a first private key to form a digital signature.
  • step 034 it is determined whether the second encrypted data can be decrypted in the second decryption mode, including the following steps:
  • the diagnostic tool 30 is further configured to perform steps 0341, 0342, 0343, and 0344.
  • the present application further provides a non-volatile computer-readable storage medium 300.
  • One or more non-volatile computer-readable storage media 300 store computer-executable instructions 400.
  • the processor 500 is caused to execute the data acquisition method for the data acquisition system 100 according to any one of the foregoing embodiments.
  • the processor 500 may include a processor 13 in the terminal 10 and a processing circuit in the electronic device 200.
  • the processor 500 when executed by the processor 500, the processor 500 performs the following steps:
  • 011 Use the terminal 10 to send the first data to the diagnostic tool 20, where the first data includes the encrypted identification code of the laser projector 11;
  • the server 30 uses the server 30 to send the second data to the diagnostic tool 20, the second data includes the first encrypted data, and the first encrypted data includes the calibration data that is encrypted in the first encryption mode and matches the identification code;
  • the processor 500 when the computer-executable instructions 400 are executed by the processor 500, the processor 500 causes the processor 500 to perform the following steps:
  • the processor 500 when the computer-executable instructions 400 are executed by the processor 500, the processor 500 causes the processor 500 to perform the following steps:
  • the first data includes the encrypted identification code of the laser projector 11.
  • the diagnostic tool 20 determines that the second data has not been tampered with, the second data sent by the diagnostic tool 20 is received.
  • the second data is sent by the server 30 to the diagnostic tool 20, and the second data includes the first encrypted data and the first encrypted data. Including calibration data matched with an identification code encrypted in a first encryption manner;
  • the present application further provides a computer device 1000.
  • the computer device 1000 includes a memory 600 and a processor 500.
  • Computer readable instructions 601 are stored in the memory 600.
  • the processor 500 is caused to execute the data acquisition method for the data acquisition system 100 according to any one of the foregoing embodiments.
  • the processor 500 may include a processor 13 in the terminal 10 and a processing circuit in the electronic device 200.
  • the processor 500 when the computer-readable instruction 601 is executed by the processor 500, the processor 500 causes the processor 500 to perform the following steps:
  • 011 Use the terminal 10 to send the first data to the diagnostic tool 20, where the first data includes the encrypted identification code of the laser projector 11;
  • the server 30 uses the server 30 to send the second data to the diagnostic tool 20, the second data includes the first encrypted data, and the first encrypted data includes the calibration data that is encrypted in the first encryption mode and matches the identification code;
  • the processor 500 when the computer-readable instruction 601 is executed by the processor 500, the processor 500 causes the processor 500 to perform the following steps:
  • the processor 500 when the computer-readable instruction 601 is executed by the processor 500, the processor 500 causes the processor 500 to perform the following steps:
  • the first data includes the encrypted identification code of the laser projector 11.
  • the diagnostic tool 20 determines that the second data has not been tampered with, the second data sent by the diagnostic tool 20 is received.
  • the second data is sent by the server 30 to the diagnostic tool 20, and the second data includes the first encrypted data and the first encrypted data. Including calibration data matched with an identification code encrypted in a first encryption manner;
  • the present application further provides a computer device 1000.
  • the computer device 1000 includes a memory 600 and a processor 500.
  • Computer readable instructions 601 are stored in the memory 600.
  • the processor 500 is caused to execute the data acquisition method for the data acquisition system 100 according to any one of the foregoing embodiments.
  • the processor 500 is the processor 13 in the terminal 10.
  • the processor 500 when the computer-readable instruction 601 is executed by the processor 500, the processor 500 causes the processor 500 to perform the following steps:
  • the first data includes the encrypted identification code of the laser projector 11.
  • the diagnostic tool 20 determines that the second data has not been tampered with, the second data sent by the diagnostic tool 20 is received.
  • the second data is sent by the server 30 to the diagnostic tool 20, and the second data includes the first encrypted data and the first encrypted data. Including calibration data matched with an identification code encrypted in a first encryption manner;
  • the processor 500 when the computer-readable instruction 601 is executed by the processor 500, the processor 500 causes the processor 500 to perform the following steps:
  • the first encrypted data is decrypted in a first decryption manner to obtain calibration data.
  • the present application further provides a computer device 1000.
  • the computer device 1000 includes a memory 600 and a processor 500.
  • Computer readable instructions 601 are stored in the memory 600.
  • the processor 500 is caused to execute the data acquisition method for the data acquisition system 100 according to any one of the foregoing embodiments.
  • the processor 500 is a processing circuit in the electronic device 200.
  • the processor 500 when the computer-readable instruction 601 is executed by the processor 500, the processor 500 causes the processor 500 to perform the following steps:
  • the third data includes the encrypted identification code of the laser projector 11.
  • the second data includes first encrypted data, and the first encrypted data includes calibration data that is encrypted in a first encryption manner and matches an identification code;
  • the processor 500 when the computer-readable instruction 601 is executed by the processor 500, the processor 500 causes the processor 500 to perform the following steps:
  • first and second are used for descriptive purposes only and cannot be understood as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Therefore, the features defined as “first” and “second” may explicitly or implicitly include at least one of the features. In the description of the present application, the meaning of "plurality” is at least two, for example, two, three, etc., unless it is specifically and specifically defined otherwise.
  • Any process or method description in a flowchart or otherwise described herein can be understood as representing a module, fragment, or portion of code that includes one or more executable instructions for implementing a particular logical function or step of a process
  • the scope of the preferred embodiments of the present application includes additional implementations, in which the functions may be performed out of the order shown or discussed, including performing functions in a substantially simultaneous manner or in the reverse order according to the functions involved, which should It is understood by those skilled in the art to which the embodiments of the present application pertain.
  • a sequenced list of executable instructions that can be considered to implement a logical function can be embodied in any computer-readable medium, For instruction execution systems, devices, or devices (such as computer-based systems, systems including processors, or other systems that can fetch instructions from and execute instructions) Or equipment.
  • a "computer-readable medium” may be any device that can contain, store, communicate, propagate, or transmit a program for use by or in connection with an instruction execution system, apparatus, or device.
  • computer readable media include the following: electrical connections (electronic devices) with one or more wirings, portable computer disk cartridges (magnetic devices), random access memory (RAM), Read-only memory (ROM), erasable and editable read-only memory (EPROM or flash memory), fiber optic devices, and portable optical disk read-only memory (CDROM).
  • the computer-readable medium may even be paper or other suitable medium on which the program can be printed, because, for example, by optically scanning the paper or other medium, followed by editing, interpretation, or other suitable Processing to obtain the program electronically and then store it in computer memory.
  • each part of the application may be implemented by hardware, software, firmware, or a combination thereof.
  • multiple steps or methods may be implemented by software or firmware stored in a memory and executed by a suitable instruction execution system.
  • a suitable instruction execution system For example, if implemented in hardware, as in another embodiment, it may be implemented using any one or a combination of the following techniques known in the art: Discrete logic circuits, application specific integrated circuits with suitable combinational logic gate circuits, programmable gate arrays (PGA), field programmable gate arrays (FPGA), etc.
  • a person of ordinary skill in the art can understand that all or part of the steps carried by the methods in the foregoing embodiments may be implemented by a program instructing related hardware.
  • the program may be stored in a computer-readable storage medium.
  • the program is When executed, one or a combination of the steps of the method embodiment is included.
  • each functional unit in each embodiment of the present application may be integrated into one processing module, or each unit may exist separately physically, or two or more units may be integrated into one module.
  • the above integrated modules can be implemented in the form of hardware or software functional modules. If the integrated module is implemented in the form of a software functional module and sold or used as an independent product, it may also be stored in a computer-readable storage medium.
  • the aforementioned storage medium may be a read-only memory, a magnetic disk, or an optical disk.

Abstract

A data acquisition method. The data acquisition method is applicable to a data acquisition system (100). The data acquisition system (100) comprises a terminal (10), a diagnostic tool (20), and a server (30). The terminal (10) comprises a laser projector (11). The data acquisition method comprises: (011) sending, by means of the terminal (10), first data to the diagnostic tool (20), the first data comprising an encrypted identity identifier of the laser projector (11); (012) sending, by means of the diagnostic tool (20), the first data to the server (30); (013) sending, by means of the server (30), second data to the diagnostic tool (20), the second data comprising first encrypted data, and the first encrypted data comprising calibration data encrypted in a first encrypting manner and matching the identity identifier; (014) determining, by means of the diagnostic tool (20), whether the second data has been tampered with, and sending the second data to the terminal (10) when it is determined that the second data has not been tampered with; and (015) decrypting, by means of the terminal (10), the first encrypted data in a first decrypting manner, so as to obtain the calibration data, the first decrypting manner matching the first encrypting manner.

Description

数据获取方法、数据获取系统、终端及诊断工具Data acquisition method, data acquisition system, terminal and diagnostic tool
优先权信息Priority information
本申请请求2018年07月13日向中国国家知识产权局提交的、专利申请号为201810771805.4的专利申请的优先权和权益,并且通过参照将其全文并入此处。This application claims the priority and rights of a patent application filed with the State Intellectual Property Office of China on July 13, 2018, with a patent application number of 201810771805.4, which is hereby incorporated by reference in its entirety.
技术领域Technical field
本申请涉及涉及数据交互技术领域,更具体而言,涉及一种数据获取方法、数据获取系统、终端、诊断工具、非易失性计算机可读存储介质及计算机设备。The present application relates to the field of data interaction technology, and more particularly, to a data acquisition method, a data acquisition system, a terminal, a diagnostic tool, a non-volatile computer-readable storage medium, and a computer device.
背景技术Background technique
现有的手机利用激光投射器向目标场景中目标物体投射激光图案,并利用图像采集器来获取被目标物体调制后的激光图案,然后依据存储在手机中的激光投射器和图像采集器的标定数据来计算目标物体的深度。激光投射器更换后,原本的标定数据不能供新的激光投射器使用,因此,需要提供一种获取新的激光投射器的标定数据的方式。Existing mobile phones use a laser projector to project a laser pattern on a target object in a target scene, and use an image collector to obtain a laser pattern modulated by the target object, and then calibrate according to the laser projector and image collector stored in the mobile phone Data to calculate the depth of the target object. After the laser projector is replaced, the original calibration data cannot be used by the new laser projector. Therefore, it is necessary to provide a way to obtain the calibration data of the new laser projector.
发明内容Summary of the invention
本申请实施方式提供一种数据获取系统的数据获取方法、数据获取系统、终端、诊断工具、非易失性计算机可读存储介质及计算机设备。The embodiments of the present application provide a data acquisition method, a data acquisition system, a terminal, a diagnostic tool, a non-volatile computer-readable storage medium, and a computer device of a data acquisition system.
本申请实施方式的数据获取方法用于数据获取系统。所述数据获取系统包括终端、诊断工具和服务器,所述终端包括激光投射器。所述数据获取方法包括:利用所述终端发送第一数据至所述诊断工具,所述第一数据包括被加密的所述激光投射器的身份标识码;利用所述诊断工具将所述第一数据发送至所述服务器;利用所述服务器发送第二数据至所述诊断工具,所述第二数据包括第一加密数据,所述第一加密数据包括被以第一加密方式加密的与所述身份标识码相匹配的标定数据;利用所述诊断工具判断所述第二数据是否被篡改,并在判断所述第二数据未被篡改时发送所述第二数据至所述终端;及利用所述终端以第一解密方式对所述第一加密数据进行解密以得到所述标定数据,所述第一解密方式与所述第一加密方式相匹配。The data acquisition method according to the embodiment of the present application is used in a data acquisition system. The data acquisition system includes a terminal, a diagnostic tool, and a server, and the terminal includes a laser projector. The data acquisition method includes: using the terminal to send first data to the diagnostic tool, the first data includes an encrypted identification code of the laser projector; and using the diagnostic tool to send the first data Sending data to the server; using the server to send second data to the diagnostic tool, the second data includes first encrypted data, and the first encrypted data includes the first encrypted data and the second encrypted data. Calibration data that matches an identification code; uses the diagnostic tool to determine whether the second data has been tampered with, and sends the second data to the terminal when it is determined that the second data has not been tampered with; and The terminal decrypts the first encrypted data in a first decryption manner to obtain the calibration data, and the first decryption manner matches the first encryption manner.
本申请实施方式的数据获取方法用于终端。所述终端通过诊断工具与服务器通信。所述终端包括激光投射器。所述数据获取方法包括:发送第一数据至所述诊断工具,以使所述诊断工具将所述第一数据发送至所述服务器,所述第一数据包括被加密的所述激光投射器的身份标识码;在所述诊断工具判断所述第二数据未被篡改时,接收所述诊断工具发送的第二数据,所述第二数据由所述服务器发送至所述诊断工具,所述第二数据包括第一加密数据,所述第一加密数据包括被以第一加密方式加密的与所述身份标识码相匹配的标定数据;及以第一解密方式对所述第一加密数据进行解密以得到所述标定数据,所述第一解密方式与所述第一加密方式相匹配。The data acquisition method according to the embodiment of the present application is applied to a terminal. The terminal communicates with the server through a diagnostic tool. The terminal includes a laser projector. The data acquisition method includes: sending first data to the diagnostic tool, so that the diagnostic tool sends the first data to the server, and the first data includes the encrypted data of the laser projector. An identification code; when the diagnostic tool determines that the second data has not been tampered with, the second data sent by the diagnostic tool is received, the second data is sent by the server to the diagnostic tool, and the first The two data include first encrypted data, and the first encrypted data includes calibration data that is encrypted in a first encryption manner and matches the identification code; and the first encrypted data is decrypted in a first decryption manner. To obtain the calibration data, the first decryption mode matches the first encryption mode.
本申请实施方式的数据获取方法用于诊断工具,所述诊断工具与终端及服务器通信。所述终端包括激光投射器。所述数据获取方法包括:接收所述终端发送的第一数据并转发至所述服务器,所述第一数据包括被加密的所述激光投射器的身份标识码;接收所述服务器发送的第二数据,所述第二数据包括第一加密数据,所述第一加密数据包括被以第一加密方式加密的与所述身份标识码相匹配的标定数据;及判断所述第二数据是否被篡改,并在判断所述第二数据未被篡改时发送所述第二数据至所述终端,以利用所述终端以第一解密方式对所述第一加密数据进行解密以得到所述标定数据,所述第一解密方式与所述第一加密方式相匹配。The data acquisition method according to the embodiment of the present application is used for a diagnostic tool that communicates with a terminal and a server. The terminal includes a laser projector. The data acquisition method includes: receiving first data sent by the terminal and forwarding the first data to the server, the first data including an encrypted identification code of the laser projector; receiving a second data sent by the server Data, the second data includes first encrypted data, the first encrypted data includes calibration data that is encrypted in a first encryption manner and matches the identity identification code; and determines whether the second data has been tampered with And when determining that the second data has not been tampered with, send the second data to the terminal to decrypt the first encrypted data by using the terminal in a first decryption manner to obtain the calibration data, The first decryption method matches the first encryption method.
本申请实施方式的数据获取系统包括终端、诊断工具和服务器,所述终端包括激光投射器,其中:所述终端用于发送第一数据至所述诊断工具,所述第一数据包括被加密的所述激光投射器的身份标识码;所述诊断工具用于将所述第一数据发送至所述服务器;所述服务器用于发送第二数据至所述诊断工具,所述第二数据包括第一加密数据,所述第一加密数据包括被以第一加密方式加密的与所述身份标识码相匹配的标定数据;所述诊断工具还用于判断所述第二数据是否被篡改,并在判断所述第二数据未被篡改时发送所述第二数据至所述终端;所述终端还用于以第一解密方式对所述第一加密数据进行解密以 得到所述标定数据,所述第一解密方式与所述第一加密方式相匹配。The data acquisition system according to the embodiment of the present application includes a terminal, a diagnostic tool, and a server. The terminal includes a laser projector. The terminal is configured to send first data to the diagnostic tool. The first data includes an encrypted data. An identification code of the laser projector; the diagnostic tool is configured to send the first data to the server; the server is configured to send second data to the diagnostic tool, and the second data includes a first Encrypted data, the first encrypted data includes calibration data that is encrypted in a first encryption manner and matches the identification code; the diagnostic tool is further configured to determine whether the second data has been tampered with, and Sending the second data to the terminal when it is determined that the second data has not been tampered with; the terminal is further configured to decrypt the first encrypted data in a first decryption manner to obtain the calibration data, the The first decryption mode matches the first encryption mode.
本申请实施方式的终端通过诊断工具与服务器通信。所述终端包括激光投射器。所述终端用于:发送第一数据至所述诊断工具,以使所述诊断工具将所述第一数据发送至所述服务器,所述第一数据包括被加密的所述激光投射器的身份标识码;在所述诊断工具判断所述第二数据未被篡改时,接收所述诊断工具发送的第二数据,所述第二数据由所述服务器发送至所述诊断工具,所述第二数据包括第一加密数据,所述第一加密数据包括被以第一加密方式加密的与所述身份标识码相匹配的标定数据;及以第一解密方式对所述第一加密数据进行解密以得到所述标定数据,所述第一解密方式与所述第一加密方式相匹配。The terminal according to the embodiment of the present application communicates with the server through a diagnostic tool. The terminal includes a laser projector. The terminal is configured to send first data to the diagnostic tool, so that the diagnostic tool sends the first data to the server, where the first data includes an identity of the laser projector being encrypted. Identification code; when the diagnostic tool determines that the second data has not been tampered with, receives second data sent by the diagnostic tool, the second data sent by the server to the diagnostic tool, the second data The data includes first encrypted data, the first encrypted data includes calibration data that is encrypted in a first encryption manner and matches the identity identification code; and the first encrypted data is decrypted in a first decryption manner to The calibration data is obtained, and the first decryption mode matches the first encryption mode.
本申请实施方式的电子设备包括诊断工具,所述诊断工具与终端及服务器通信。所述终端包括激光投射器。所述诊断工具用于:接收所述终端发送的第一数据并转发至所述服务器,所述第一数据包括被加密的所述激光投射器的身份标识码;接收所述服务器发送的第二数据,所述第二数据包括第一加密数据,所述第一加密数据包括被以第一加密方式加密的与所述身份标识码相匹配的标定数据;及判断所述第二数据是否被篡改,并在判断所述第二数据未被篡改时发送所述第二数据至所述终端,以利用所述终端以第一解密方式对所述第一加密数据进行解密以得到所述标定数据,所述第一解密方式与所述第一加密方式相匹配。The electronic device according to the embodiment of the present application includes a diagnostic tool, and the diagnostic tool communicates with the terminal and the server. The terminal includes a laser projector. The diagnostic tool is configured to receive first data sent by the terminal and forward the data to the server, where the first data includes an encrypted identification code of the laser projector; and receive a second data sent by the server. Data, the second data includes first encrypted data, the first encrypted data includes calibration data that is encrypted in a first encryption manner and matches the identity identification code; and determines whether the second data has been tampered with And when determining that the second data has not been tampered with, send the second data to the terminal to decrypt the first encrypted data by using the terminal in a first decryption manner to obtain the calibration data, The first decryption method matches the first encryption method.
本申请实施方式的计算机可执行指令的非易失性计算机可读存储介质,当所述计算机可执行指令被一个或多个处理器执行时,使得所述处理器执行上述任一实施方式所述的数据获取方法。The non-transitory computer-readable storage medium of the computer-executable instructions according to the embodiments of the present application, when the computer-executable instructions are executed by one or more processors, cause the processors to execute any one of the foregoing embodiments. Data acquisition method.
本申请实施方式的计算机设备包括存储器及处理器,所述存储器中存储有计算机可读指令,所述指令被所述处理器执行时,使得所述处理器执行上述任一实施方式所述的数据获取方法。The computer device according to the embodiment of the present application includes a memory and a processor. The memory stores computer-readable instructions. When the instructions are executed by the processor, the processor causes the processor to execute data according to any one of the foregoing embodiments. Get method.
本申请的实施方式的附加方面和优点将在下面的描述中部分给出,部分将从下面的描述中变得明显,或通过本申请的实施方式的实践了解到。Additional aspects and advantages of the embodiments of the present application will be partially given in the following description, and part of them will become apparent from the following description, or be learned through practice of the embodiments of the present application.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
本申请的上述和/或附加的方面和优点从结合下面附图对实施方式的描述中将变得明显和容易理解,其中:The above and / or additional aspects and advantages of the present application will become apparent and easily understood from the description of the embodiments in conjunction with the following drawings, in which:
图1是本申请某些实施方式的用于数据获取系统的数据获取方法的流程示意图。FIG. 1 is a schematic flowchart of a data acquisition method for a data acquisition system according to some embodiments of the present application.
图2是本申请某些实施方式的数据获取系统的构成示意图。FIG. 2 is a schematic structural diagram of a data acquisition system according to some embodiments of the present application.
图3是本申请某些实施方式的终端的结构示意图。FIG. 3 is a schematic structural diagram of a terminal according to some embodiments of the present application.
图4是本申请某些实施方式的电子设备的模块示意图。FIG. 4 is a schematic block diagram of an electronic device according to some embodiments of the present application.
图5是本申请某些实施方式的服务器的模块示意图。FIG. 5 is a schematic block diagram of a server according to some embodiments of the present application.
图6至图10是本申请某些实施方式的用于数据获取系统的数据获取方法的流程示意图。6 to 10 are schematic flowcharts of a data acquisition method for a data acquisition system according to some embodiments of the present application.
图11至图14是本申请某些实施方式的用于终端的数据获取方法的流程示意图。11 to 14 are schematic flowcharts of a data acquisition method for a terminal according to some embodiments of the present application.
图15至图17是本申请某些实施方式的用于诊断工具的数据获取方法的流程示意图。15 to 17 are schematic flowcharts of a data acquisition method for a diagnostic tool according to some embodiments of the present application.
图18是本申请某些实施方式的计算机可读存储介质和处理器的模块示意图。18 is a schematic block diagram of a computer-readable storage medium and a processor according to some embodiments of the present application.
图19是本申请某些实施方式的计算机设备的模块示意图。FIG. 19 is a schematic block diagram of a computer device according to some embodiments of the present application.
具体实施方式detailed description
以下结合附图对本申请的实施方式作进一步说明。附图中相同或类似的标号自始至终表示相同或类似的元件或具有相同或类似功能的元件。The embodiments of the present application are further described below with reference to the accompanying drawings. The same or similar reference numerals in the drawings indicate the same or similar elements or elements having the same or similar functions.
另外,下面结合附图描述的本申请的实施方式是示例性的,仅用于解释本申请的实施方式,而不能理解为对本申请的限制。在本申请中,除非另有明确的规定和限定,第一特征在第二特征“上”或“下”可以是第一和第二特征直接接触,或第一和第二特征通过中间媒介间接接触。而且,第一特征在第二特征“之上”、“上方”和“上面”可是第一特征在第二特征正上方或斜上方,或仅仅表示第一特征水平高度高于第二特征。第一特征在第二特征“之下”、“下方”和“下面”可以是第一特征在第二特征正下方或斜下方,或仅仅表示第一特征水平高度小于第二特征。In addition, the embodiments of the present application described below with reference to the drawings are exemplary, and are only used to explain the embodiments of the present application, and should not be construed as limiting the present application. In this application, unless explicitly stated and limited otherwise, the first feature "on" or "down" of the second feature may be the first and second features in direct contact, or the first and second features indirectly through an intermediate medium. contact. Moreover, the first feature is "above", "above", and "above" the second feature. The first feature is directly above or obliquely above the second feature, or it only indicates that the first feature is higher in level than the second feature. The first feature is “below”, “below”, and “below” of the second feature. The first feature may be directly below or obliquely below the second feature, or it may simply indicate that the first feature is less horizontal than the second feature.
本申请实施方式的数据获取方法用于数据获取系统100。所述数据获取系统100包括终端10、诊断工具20和服务器30,所述终端10包括激光投射器11。所述数据获取方法包括:利用所述终端10发送 第一数据至所述诊断工具20,所述第一数据包括被加密的所述激光投射器11的身份标识码;利用所述诊断工具20将所述第一数据发送至所述服务器30;利用所述服务器30发送第二数据至所述诊断工具20,所述第二数据包括第一加密数据,所述第一加密数据包括被以第一加密方式加密的与所述身份标识码相匹配的标定数据;利用所述诊断工具20判断所述第二数据是否被篡改,并在判断所述第二数据未被篡改时发送所述第二数据至所述终端10;及利用所述终端10以第一解密方式对所述第一加密数据进行解密以得到所述标定数据,所述第一解密方式与所述第一加密方式相匹配。The data acquisition method according to the embodiment of the present application is used in a data acquisition system 100. The data acquisition system 100 includes a terminal 10, a diagnostic tool 20, and a server 30. The terminal 10 includes a laser projector 11. The data acquisition method includes: using the terminal 10 to send first data to the diagnostic tool 20, where the first data includes an encrypted identification code of the laser projector 11; using the diagnostic tool 20 to The first data is sent to the server 30; the server 30 is used to send second data to the diagnostic tool 20, the second data includes first encrypted data, and the first encrypted data includes Calibration data encrypted with an encryption method that matches the identification code; using the diagnostic tool 20 to determine whether the second data has been tampered with, and sending the second data when it is determined that the second data has not been tampered with To the terminal 10; and using the terminal 10 to decrypt the first encrypted data in a first decryption manner to obtain the calibration data, the first decryption manner matches the first encryption manner.
在某些实施方式中,所述第二数据还包括第二加密数据,所述数据获取方法还包括:利用所述服务器30对所述第一加密数据以第二加密方式加密,以形成所述第二加密数据;所述利用所述诊断工具20判断所述第二数据是否被篡改,包括:判断以第二解密方式是否能够对所述第二加密数据进行解密,所述第二解密方式与所述第二加密方式相匹配;及若是,则判断所述第二数据未被篡改。In some embodiments, the second data further includes second encrypted data, and the data acquisition method further includes: using the server 30 to encrypt the first encrypted data in a second encryption manner to form the second encrypted data. The second encrypted data; and determining whether the second data has been tampered with by using the diagnostic tool 20 includes: determining whether the second encrypted data can be decrypted in a second decryption manner, and the second decryption manner and The second encryption methods match; and if so, it is determined that the second data has not been tampered with.
在某些实施方式中,所述利用所述服务器30对所述第一加密数据以第二加密方式加密,以形成所述第二加密数据,包括:生成针对所述第一加密数据的第一数据摘要;及对所述第一数据摘要以第一私钥进行加密以形成数字签名。In some embodiments, the using the server 30 to encrypt the first encrypted data in a second encryption manner to form the second encrypted data includes: generating a first encrypted data for the first encrypted data; A data digest; and encrypting the first data digest with a first private key to form a digital signature.
在某些实施方式中,所述判断以第二解密方式是否能够对所述第二加密数据进行解密,包括:判断第一公钥是否能够对所述数字签名解密,所述第一公钥与所述第一私钥成对;若是,则生成针对所述第一加密数据的第二数据摘要;判断所述第二数据摘要是否与所述第一数据摘要一致;及若是,则判断以第二解密方式能够对所述第二加密数据进行解密。In some embodiments, the determining whether the second encrypted data can be decrypted in a second decryption manner includes: determining whether the first public key can decrypt the digital signature, and the first public key and the The first private key is paired; if it is, a second data digest for the first encrypted data is generated; whether the second data digest is consistent with the first data digest; and if it is, the first The two decryption modes can decrypt the second encrypted data.
在某些实施方式中,所述第二数据还包括所述身份标识码,在所述利用所述终端10以第一解密方式对所述第一加密数据进行解密以得到所述标定数据前,所述数据获取方法还包括:判断所述身份标识码是否与所述终端10内存储的原始身份标识码一致;及若否,则利用所述终端10以第一解密方式对所述第一加密数据进行解密以得到所述标定数据。In some embodiments, the second data further includes the identification code, and before the using the terminal 10 to decrypt the first encrypted data in a first decryption manner to obtain the calibration data, The data acquisition method further includes: determining whether the identity identification code is consistent with the original identity identification code stored in the terminal 10; and if not, using the terminal 10 to encrypt the first encryption in a first decryption manner The data is decrypted to obtain the calibration data.
在某些实施方式中,所述终端10形成有可信执行环境1321,在所述利用所述终端10发送第一数据至所述诊断工具20前,所述数据获取方法还包括:利用所述终端10在所述可信执行环境1321中以第三加密方式加密所述身份识别码以得到所述第一数据;在所述利用所述服务器30发送第二数据至所述诊断工具20前,所述数据获取方法还包括:以第三解密方式解密所述第一数据以得到所述身份识别码,所述第三解密方式与所述第三加密方式相匹配。In some embodiments, the terminal 10 is formed with a trusted execution environment 1321, and before the using the terminal 10 to send the first data to the diagnostic tool 20, the data acquisition method further includes: using the The terminal 10 encrypts the identification code in a third encryption manner in the trusted execution environment 1321 to obtain the first data; before using the server 30 to send the second data to the diagnostic tool 20, The data acquisition method further includes: decrypting the first data in a third decryption manner to obtain the identity identification code, and the third decryption manner matches the third encryption manner.
在某些实施方式中,在所述利用所述终端10以第一解密方式对所述第一加密数据进行解密以得到所述标定数据前,所述数据获取方法还包括:利用所述终端10判断所述第二数据是否被篡改;及若否,则利用所述终端10以第一解密方式对所述第一加密数据进行解密以得到所述标定数据。In some embodiments, before the using the terminal 10 to decrypt the first encrypted data in a first decryption manner to obtain the calibration data, the data acquisition method further includes: using the terminal 10 Determining whether the second data has been tampered with; and if not, using the terminal 10 to decrypt the first encrypted data in a first decryption manner to obtain the calibration data.
本申请实施方式的数据获取方法用于终端10。所述终端10通过诊断工具20与服务器30通信。所述终端10包括激光投射器11。所述数据获取方法包括:发送第一数据至所述诊断工具20,以使所述诊断工具20将所述第一数据发送至所述服务器30,所述第一数据包括被加密的所述激光投射器11的身份标识码;在所述诊断工具20判断所述第二数据未被篡改时,接收所述诊断工具20发送的第二数据,所述第二数据由所述服务器30发送至所述诊断工具20,所述第二数据包括第一加密数据,所述第一加密数据包括被以第一加密方式加密的与所述身份标识码相匹配的标定数据;及以第一解密方式对所述第一加密数据进行解密以得到所述标定数据,所述第一解密方式与所述第一加密方式相匹配。The data acquisition method according to the embodiment of the present application is applied to the terminal 10. The terminal 10 communicates with the server 30 through the diagnostic tool 20. The terminal 10 includes a laser projector 11. The data acquisition method includes: sending first data to the diagnostic tool 20, so that the diagnostic tool 20 sends the first data to the server 30, and the first data includes the laser that is encrypted The identification code of the projector 11; when the diagnostic tool 20 determines that the second data has not been tampered with, the second data sent by the diagnostic tool 20 is received, and the second data is sent by the server 30 to all In the diagnostic tool 20, the second data includes first encrypted data, and the first encrypted data includes calibration data that is encrypted in a first encryption manner and matches the identity identification code; and The first encrypted data is decrypted to obtain the calibration data, and the first decryption mode matches the first encryption mode.
在某些实施方式中,所述第二数据还包括所述身份识别码,在所述以第一解密方式对所述第一加密数据进行解密以得到所述标定数据前,所述数据获取方法还包括:判断所述身份标识码是否与所述终端10内存储的原始身份标识码一致;及若否,则以第一解密方式对所述第一加密数据进行解密以得到所述标定数据。In some implementation manners, the second data further includes the identification code, and the data acquisition method is performed before decrypting the first encrypted data in a first decryption manner to obtain the calibration data. The method further includes: determining whether the identity identification code is consistent with the original identity identification code stored in the terminal 10; and if not, decrypting the first encrypted data in a first decryption manner to obtain the calibration data.
在某些实施方式中,所述终端10形成有可信执行环境1321,在所述发送第一数据至所述诊断工具20前,所述数据获取方法还包括:在所述可信执行环境1321中以第三加密方式加密所述身份识别码以得到所述第一数据。In some embodiments, the terminal 10 is formed with a trusted execution environment 1321, and before the sending of the first data to the diagnostic tool 20, the data acquisition method further includes: in the trusted execution environment 1321 The third encryption method is used to encrypt the identity identification code to obtain the first data.
在某些实施方式中,在所述以第一解密方式对所述第一加密数据进行解密以得到所述标定数据前,所述数据获取方法还包括:判断所述第二数据是否被篡改;及若否,则以第一解密方式对所述第一加密数据进行解密以得到所述标定数据。In some embodiments, before the decrypting the first encrypted data in a first decryption manner to obtain the calibration data, the data acquisition method further includes: determining whether the second data has been tampered with; And if not, the first encrypted data is decrypted in a first decryption manner to obtain the calibration data.
本申请实施方式的数据获取方法用于诊断工具20,所述诊断工具20与终端10及服务器30通信。 所述终端10包括激光投射器11。所述数据获取方法包括:接收所述终端10发送的第一数据并转发至所述服务器30,所述第一数据包括被加密的所述激光投射器11的身份标识码;接收所述服务器30发送的第二数据,所述第二数据包括第一加密数据,所述第一加密数据包括被以第一加密方式加密的与所述身份标识码相匹配的标定数据;及判断所述第二数据是否被篡改,并在判断所述第二数据未被篡改时发送所述第二数据至所述终端10,以利用所述终端10以第一解密方式对所述第一加密数据进行解密以得到所述标定数据,所述第一解密方式与所述第一加密方式相匹配。The data acquisition method according to the embodiment of the present application is used for a diagnostic tool 20 that communicates with the terminal 10 and the server 30. The terminal 10 includes a laser projector 11. The data acquisition method includes: receiving first data sent by the terminal 10 and forwarding the first data to the server 30, where the first data includes an encrypted identification code of the laser projector 11; receiving the server 30 The second data sent, the second data including first encrypted data, the first encrypted data including calibration data that is encrypted in a first encryption manner and matches the identity identification code; and determining the second data Whether the data has been tampered with, and when determining that the second data has not been tampered with, the second data is sent to the terminal 10 to use the terminal 10 to decrypt the first encrypted data in a first decryption manner to The calibration data is obtained, and the first decryption mode matches the first encryption mode.
在某些实施方式中,所述第二数据还包括第二加密数据,所述服务器30用于对所述第一加密数据以第二加密方式加密,以形成所述第二加密数据;所述数据获取方法还包括:判断以第二解密方式是否能够对所述第二加密数据进行解密,所述第二解密方式与所述第二加密方式相匹配;及若是,则判断所述第二数据未被篡改。In some embodiments, the second data further includes second encrypted data, and the server 30 is configured to encrypt the first encrypted data in a second encryption manner to form the second encrypted data; the The data acquisition method further includes: judging whether the second encrypted data can be decrypted by a second decryption method, the second decryption method matches the second encryption method; and if so, judging the second data Not tampered with.
在某些实施方式中,所述服务器30还用于生成针对所述第一加密数据的第一数据摘要;及对所述第一数据摘要以第一私钥进行加密以形成数字签名;所述判断以第二解密方式是否能够对所述第二加密数据进行解密,包括:判断第一公钥是否能够对所述数字签名解密,所述第一公钥与所述第一私钥成对;若是,则生成针对所述第一加密数据的第二数据摘要;判断所述第二数据摘要是否与所述第一数据摘要一致;及若是,则判断以第二解密方式能够对所述第二加密数据进行解密。In some embodiments, the server 30 is further configured to generate a first data digest for the first encrypted data; and encrypt the first data digest with a first private key to form a digital signature; the Determining whether the second encrypted data can be decrypted in a second decryption manner includes determining whether the first public key can decrypt the digital signature, and the first public key is paired with the first private key; If yes, generate a second data digest for the first encrypted data; determine whether the second data digest is consistent with the first data digest; and if so, determine whether the second decryption can be performed on the second Encrypted data is decrypted.
本申请实施方式的数据获取系统100包括终端10、诊断工具20和服务器30,所述终端10包括激光投射器11,其中:所述终端10用于发送第一数据至所述诊断工具20,所述第一数据包括被加密的所述激光投射器11的身份标识码;所述诊断工具20用于将所述第一数据发送至所述服务器30;所述服务器30用于发送第二数据至所述诊断工具20,所述第二数据包括第一加密数据,所述第一加密数据包括被以第一加密方式加密的与所述身份标识码相匹配的标定数据;所述诊断工具20还用于判断所述第二数据是否被篡改,并在判断所述第二数据未被篡改时发送所述第二数据至所述终端10;所述终端10还用于以第一解密方式对所述第一加密数据进行解密以得到所述标定数据,所述第一解密方式与所述第一加密方式相匹配。The data acquisition system 100 according to the embodiment of the present application includes a terminal 10, a diagnostic tool 20, and a server 30. The terminal 10 includes a laser projector 11. The terminal 10 is configured to send first data to the diagnostic tool 20. The first data includes an encrypted identification code of the laser projector 11; the diagnostic tool 20 is configured to send the first data to the server 30; and the server 30 is configured to send second data to In the diagnostic tool 20, the second data includes first encrypted data, and the first encrypted data includes calibration data that is encrypted in a first encryption manner and matches the identification code; the diagnostic tool 20 further Configured to determine whether the second data has been tampered with, and send the second data to the terminal 10 when it is determined that the second data has not been tampered with; the terminal 10 is further configured to perform The first encrypted data is decrypted to obtain the calibration data, and the first decryption method matches the first encryption method.
在某些实施方式中,所述第二数据还包括第二加密数据,所述服务器30还用于对所述第一加密数据以第二加密方式加密,以形成所述第二加密数据;所述诊断工具20还用于判断以第二解密方式是否能够对所述第二加密数据进行解密,所述第二解密方式与所述第二加密方式相匹配;及若是,则判断所述第二数据未被篡改。In some embodiments, the second data further includes second encrypted data, and the server 30 is further configured to encrypt the first encrypted data in a second encryption manner to form the second encrypted data; The diagnostic tool 20 is further configured to determine whether the second encrypted data can be decrypted in a second decryption mode, and the second decryption mode matches the second encryption mode; and if so, determine the second encrypted data. The data has not been tampered with.
在某些实施方式中,所述服务器30还用于:生成针对所述第一加密数据的第一数据摘要;及对所述第一数据摘要以第一私钥进行加密以形成数字签名。In some implementations, the server 30 is further configured to: generate a first data digest for the first encrypted data; and encrypt the first data digest with a first private key to form a digital signature.
在某些实施方式中,所述诊断工具20还用于:判断第一公钥是否能够对所述数字签名解密,所述第一公钥与所述第一私钥成对;若是,则生成针对所述第一加密数据的第二数据摘要;判断所述第二数据摘要是否与所述第一数据摘要一致;及若是,则判断以第二解密方式能够对所述第二加密数据进行解密。In some embodiments, the diagnostic tool 20 is further configured to: determine whether a first public key can decrypt the digital signature, and the first public key is paired with the first private key; if yes, generate the A second data digest for the first encrypted data; determining whether the second data digest is consistent with the first data digest; and if so, determining whether the second encrypted data can be decrypted in a second decryption manner .
在某些实施方式中,所述第二数据还包括所述身份标识码,所述终端10还用于:判断所述身份标识码是否与所述终端10内存储的原始身份标识码一致;及若否,则利用所述终端10以第一解密方式对所述第一加密数据进行解密以得到所述标定数据。In some embodiments, the second data further includes the identity identification code, and the terminal 10 is further configured to determine whether the identity identification code is consistent with an original identity identification code stored in the terminal 10; and If not, the terminal 10 is used to decrypt the first encrypted data in a first decryption manner to obtain the calibration data.
在某些实施方式中,所述终端10形成有可信执行环境1321,所述终端10还用于在所述可信执行环境1321中以第三加密方式加密所述身份识别码以得到所述第一数据;所述服务器30还用于以第三解密方式解密所述第一数据以得到所述身份识别码,所述第三解密方式与所述第三加密方式相匹配。In some implementation manners, the terminal 10 is formed with a trusted execution environment 1321, and the terminal 10 is further configured to encrypt the identity identification code in a third encryption manner in the trusted execution environment 1321 to obtain the The first data; the server 30 is further configured to decrypt the first data in a third decryption manner to obtain the identification code, and the third decryption manner matches the third encryption manner.
在某些实施方式中,所述终端10还用于:判断所述第二数据是否被篡改;及若否,则以第一解密方式对所述第一加密数据进行解密以得到所述标定数据。In some embodiments, the terminal 10 is further configured to: determine whether the second data has been tampered with; and if not, decrypt the first encrypted data in a first decryption manner to obtain the calibration data. .
本申请实施方式的终端10通过诊断工具20与服务器30通信。所述终端10包括激光投射器11。所述终端10用于:发送第一数据至所述诊断工具20,以使所述诊断工具20将所述第一数据发送至所述服务器30,所述第一数据包括被加密的所述激光投射器11的身份标识码;在所述诊断工具20判断所述第二数据未被篡改时,接收所述诊断工具20发送的第二数据,所述第二数据由所述服务器30发送至所述诊断工具20,所述第二数据包括第一加密数据,所述第一加密数据包括被以第一加密方式加密的与所述身份标识码相匹配的标定数据;及以第一解密方式对所述第一加密数据进行解密以得到所述标定数据, 所述第一解密方式与所述第一加密方式相匹配。The terminal 10 according to the embodiment of the present application communicates with the server 30 through the diagnostic tool 20. The terminal 10 includes a laser projector 11. The terminal 10 is configured to send first data to the diagnostic tool 20, so that the diagnostic tool 20 sends the first data to the server 30, where the first data includes the encrypted laser light. The identification code of the projector 11; when the diagnostic tool 20 determines that the second data has not been tampered with, the second data sent by the diagnostic tool 20 is received, and the second data is sent by the server 30 to all In the diagnostic tool 20, the second data includes first encrypted data, and the first encrypted data includes calibration data that is encrypted in a first encryption manner and matches the identity identification code; and The first encrypted data is decrypted to obtain the calibration data, and the first decryption method matches the first encryption method.
本申请实施方式的电子设备包括诊断工具20,所述诊断工具20与终端10及服务器30通信。所述终端10包括激光投射器11。所述诊断工具20用于:接收所述终端10发送的第一数据并转发至所述服务器30,所述第一数据包括被加密的所述激光投射器11的身份标识码;接收所述服务器30发送的第二数据,所述第二数据包括第一加密数据,所述第一加密数据包括被以第一加密方式加密的与所述身份标识码相匹配的标定数据;及判断所述第二数据是否被篡改,并在判断所述第二数据未被篡改时发送所述第二数据至所述终端10,以利用所述终端10以第一解密方式对所述第一加密数据进行解密以得到所述标定数据,所述第一解密方式与所述第一加密方式相匹配。The electronic device according to the embodiment of the present application includes a diagnostic tool 20 that communicates with the terminal 10 and the server 30. The terminal 10 includes a laser projector 11. The diagnostic tool 20 is configured to: receive first data sent by the terminal 10 and forward the first data to the server 30, where the first data includes an encrypted identification code of the laser projector 11; and receive the server 30 second data sent, the second data includes first encrypted data, the first encrypted data includes calibration data that is encrypted in a first encryption manner and matches the identification code; and determines the first Whether the two data have been tampered with, and when determining that the second data has not been tampered with, send the second data to the terminal 10 to use the terminal 10 to decrypt the first encrypted data in a first decryption manner To obtain the calibration data, the first decryption mode matches the first encryption mode.
本申请实施方式的包括计算机可执行指令400的非易失性计算机可读存储介质300,当所述计算机可执行指令400被一个或多个处理器500执行时,使得所述处理器500执行上述任一实施方式所述的数据获取方法。The non-volatile computer-readable storage medium 300 including computer-executable instructions 400 according to the embodiment of the present application, when the computer-executable instructions 400 are executed by one or more processors 500, causes the processor 500 to execute the foregoing. The data acquisition method according to any one of the embodiments.
本申请实施方式的计算机设备1000包括存储器600及处理器500,所述存储器600中存储有计算机可读指令601,所述指令601被所述处理器500执行时,使得所述处理器500执行上述任一实施方式所述的数据获取方法。The computer device 1000 according to the embodiment of the present application includes a memory 600 and a processor 500. The memory 600 stores computer-readable instructions 601. When the instructions 601 are executed by the processor 500, the processor 500 executes the foregoing. The data acquisition method according to any one of the embodiments.
请参阅图1至图3,本申请提供一种用于数据获取系统100的数据获取方法。数据获取系统100包括终端10、诊断工具20和服务器30。终端10包括激光投射器11。诊断工具20装设在电子设备200上。数据获取方法包括:Referring to FIG. 1 to FIG. 3, the present application provides a data acquisition method for a data acquisition system 100. The data acquisition system 100 includes a terminal 10, a diagnostic tool 20, and a server 30. The terminal 10 includes a laser projector 11. The diagnostic tool 20 is mounted on the electronic device 200. Data acquisition methods include:
011,利用终端10发送第一数据至诊断工具20,第一数据包括被加密的激光投射器11的身份标识码;011: Use the terminal 10 to send the first data to the diagnostic tool 20, where the first data includes the encrypted identification code of the laser projector 11;
012,利用诊断工具20将第一数据发送至服务器30;012. Use the diagnostic tool 20 to send the first data to the server 30.
013,利用服务器30发送第二数据至诊断工具20,第二数据包括第一加密数据,第一加密数据包括被以第一加密方式加密的与身份标识码相匹配的标定数据;013. Use the server 30 to send the second data to the diagnostic tool 20, the second data includes the first encrypted data, and the first encrypted data includes the calibration data that is encrypted in the first encryption mode and matches the identification code;
014,利用诊断工具20判断第二数据是否被篡改,并在判断第二数据未被篡改时发送第二数据至终端10;及014. Use the diagnostic tool 20 to determine whether the second data has been tampered with, and send the second data to the terminal 10 when it is determined that the second data has not been tampered with; and
015,利用终端10以第一解密方式对第一加密数据进行解密以得到标定数据,第一解密方式与第一加密方式相匹配。015. Use the terminal 10 to decrypt the first encrypted data in the first decryption mode to obtain the calibration data, and the first decryption mode matches the first encryption mode.
请参阅图1至图5,本申请提供一种数据获取系统100。数据获取系统100包括终端10、诊断工具20和服务器30。终端10包括激光投射器11。其中:Please refer to FIG. 1 to FIG. 5, the present application provides a data acquisition system 100. The data acquisition system 100 includes a terminal 10, a diagnostic tool 20, and a server 30. The terminal 10 includes a laser projector 11. among them:
终端10用于发送第一数据至诊断工具20,第一数据包括被加密的激光投射器11的身份标识码;The terminal 10 is configured to send first data to the diagnostic tool 20, where the first data includes an identification code of the encrypted laser projector 11;
诊断工具20用于将第一数据发送至服务器30;The diagnostic tool 20 is configured to send the first data to the server 30;
服务器30用于发送第二数据至诊断工具20,第二数据包括第一加密数据,第一加密数据包括被以第一加密方式加密的与身份标识码相匹配的标定数据;The server 30 is configured to send second data to the diagnostic tool 20, where the second data includes first encrypted data, and the first encrypted data includes calibration data that is encrypted in a first encryption manner and matches an identification code;
诊断工具20还用于判断第二数据是否被篡改,并在判断第二数据未被篡改时发送第二数据至终端10;The diagnostic tool 20 is further configured to determine whether the second data has been tampered with, and send the second data to the terminal 10 when it is determined that the second data has not been tampered with;
终端10还用于以第一解密方式对第一加密数据进行解密以得到标定数据,第一解密方式与第一加密方式相匹配。The terminal 10 is further configured to decrypt the first encrypted data in a first decryption manner to obtain calibration data, and the first decryption manner matches the first encryption manner.
也即是说,终端10用于实现步骤011和015,诊断工具20用于实现步骤012和014,服务器30用于实现步骤013。That is, the terminal 10 is used to implement steps 011 and 015, the diagnostic tool 20 is used to implement steps 012 and 014, and the server 30 is used to implement steps 013.
具体地,终端10可以是智能手机、平板电脑、笔记本电脑、可穿戴设备(智能手表、智能手环、智能眼镜、智能头盔等)等。电子设备200可以是智能手机、平板电脑、笔记本电脑、台式电脑、可穿戴设备(智能手表、智能手环、智能眼镜、智能头盔等)等。Specifically, the terminal 10 may be a smart phone, a tablet computer, a notebook computer, a wearable device (a smart watch, a smart bracelet, a smart glasses, a smart helmet, etc.) and the like. The electronic device 200 may be a smart phone, a tablet computer, a notebook computer, a desktop computer, a wearable device (smart watch, smart bracelet, smart glasses, smart helmet, etc.), and the like.
诊断工具20为装设在电子设备200上的客户端,例如,电子设备200为手机时,诊断工具20为装设在手机上的应用程序,电子设备200为台式电脑时,诊断工具20为装设在台式电脑上的应用软件。终端10通过诊断工具20与服务器30通信。The diagnostic tool 20 is a client installed on the electronic device 200. For example, when the electronic device 200 is a mobile phone, the diagnostic tool 20 is an application installed on a mobile phone, and when the electronic device 200 is a desktop computer, the diagnostic tool 20 is installed Application software on a desktop computer. The terminal 10 communicates with the server 30 through the diagnostic tool 20.
服务器30包括处理芯片31和一个或多个存储介质32。一个或多个存储介质32用于存储一个或多个计算机可执行指令33和数据。处理芯片31用于处理、运算服务器30上的所有数据、以及读取存储在存储介质32的计算机可执行指令33、并产生相应的操作控制信号等,例如,处理芯片31可以用于实 现步骤013。The server 30 includes a processing chip 31 and one or more storage media 32. One or more storage media 32 are used to store one or more computer-executable instructions 33 and data. The processing chip 31 is used to process and calculate all data on the server 30, and read computer-executable instructions 33 stored in the storage medium 32, and generate corresponding operation control signals. For example, the processing chip 31 may be used to implement step 013. .
终端10包括用于激光投射器11、红外摄像头12和处理器13。处理器13与激光投射器11、处理器13与红外摄像头12均连接。处理器13可用于控制激光投射器11向目标物体投射激光图案。处理器13还可用于控制红外摄像头12采集被目标物体调制后的激光图案。处理器13对采集到激光图案进一步处理以得到目标物体的深度信息。然而处理器13必须依据存储在终端10上的激光投射器11和红外摄像头12的标定数据,才能计算出目标物体的深度信息。因此,当终端10更换激光投射器11时,必须烧录与激光投射器11对应的标定数据,激光投射器11才能正常使用。The terminal 10 includes a laser projector 11, an infrared camera 12, and a processor 13. The processor 13 is connected to the laser projector 11, and the processor 13 is connected to the infrared camera 12. The processor 13 may be configured to control the laser projector 11 to project a laser pattern on a target object. The processor 13 may also be used to control the infrared camera 12 to collect a laser pattern modulated by a target object. The processor 13 further processes the collected laser pattern to obtain depth information of the target object. However, the processor 13 must calculate the depth information of the target object according to the calibration data of the laser projector 11 and the infrared camera 12 stored on the terminal 10. Therefore, when the terminal 10 replaces the laser projector 11, the calibration data corresponding to the laser projector 11 must be burned before the laser projector 11 can be used normally.
在本申请实施例中,终端10需要向服务器30获取当前安装在终端10上的激光投射器11的标定数据。具体地,每一个激光投射器11对应唯一一个身份标识码(Chip ID)。在出厂前,每一个激光投射器11的身份标识码均存储在服务器30的数据库中。终端10先获取当前激光投射器11的身份标识码,然后根据身份标识码生成包含身份标识码的随机数,并对随机数进行加密,以形成第一数据。终端10发送第一数据至诊断工具20,然后诊断工具20再发送第一数据至服务器30。在接收到第一数据后,服务器30在数据库中查找与身份标识码相匹配的标定数据,并以第一加密方式加密该标定数据,以形成第一加密数据。服务器30发送包括第一加密数据和身份标识码的第二数据至诊断工具20。在接收到第二数据后,诊断工具20需要验证第二数据是否被篡改。在判断第二数据已被篡改时,诊断工具20向服务器30发出重新获取第二数据的请求,直至判断获取的第二数据未被篡改。在判断第二数据未被篡改时,诊断工具20将包括第一加密数据和身份标识码的第二数据发送至终端10。终端10接收到第二数据后,以第一解密方式对第一加密数据进行解密以得到标定数据。In the embodiment of the present application, the terminal 10 needs to obtain the calibration data of the laser projector 11 currently installed on the terminal 10 from the server 30. Specifically, each laser projector 11 corresponds to a unique identification code (Chip ID). Before leaving the factory, the identification code of each laser projector 11 is stored in the database of the server 30. The terminal 10 first obtains the identity identification code of the current laser projector 11, and then generates a random number including the identity identification code according to the identity identification code, and encrypts the random number to form first data. The terminal 10 sends the first data to the diagnostic tool 20, and then the diagnostic tool 20 sends the first data to the server 30. After receiving the first data, the server 30 searches the database for calibration data that matches the identification code, and encrypts the calibration data in a first encryption manner to form the first encrypted data. The server 30 sends the second data including the first encrypted data and the identification code to the diagnostic tool 20. After receiving the second data, the diagnostic tool 20 needs to verify whether the second data has been tampered with. When it is determined that the second data has been tampered with, the diagnostic tool 20 sends a request for reacquiring the second data to the server 30 until it is determined that the acquired second data has not been tampered with. When determining that the second data has not been tampered with, the diagnostic tool 20 sends the second data including the first encrypted data and the identification code to the terminal 10. After receiving the second data, the terminal 10 decrypts the first encrypted data in a first decryption manner to obtain the calibration data.
其中,第一解密方式与第一加密方式相匹配。在一个实施例中,第一加密方式包括对称性加密算法,例如,数据加密标准(Data Encryption Standard,DES)算法、三重数据加密(Triple Data Encryption Algorithm,TDEA)算法、高级加密标准(Advanced Encryption Standard,AES)算法等。以DES算法为例,服务器30利用DES算法随机产生一个加密密钥,并利用此加密密钥对存储在服务器30内的标定数据进行加密,以形成第一加密数据。随后服务器10将该加密密钥连同第二数据一起发送至诊断工具20,再由诊断工具20发送至终端10,如此,终端10可以利用服务器10产生的加密密钥对第一加密数据进行解密,从而得到标定数据。在另一个实施例中,第一加密方式还包括非对称性加密算法,例如RSA加密算法、ElGamal算法、椭圆曲线算法(Elliptic curve cryptography,ECC)。以RSA加密算法为例,终端10利用RSA加密算法产生一对RSA密钥,其中之一为私钥,由服务器30保存私钥,另外一个为公钥,可将公钥发送至终端10。服务器30利用私钥对存储在服务器30内的标定数据进行加密,终端10利用公钥对标定数据进行解密。如此,以确保标定数据的保密性。The first decryption method matches the first encryption method. In one embodiment, the first encryption method includes a symmetric encryption algorithm, for example, a Data Encryption Standard (DES) algorithm, a Triple Data Encryption Algorithm (TDEA) algorithm, and an Advanced Encryption Standard , AES) algorithm and so on. Taking the DES algorithm as an example, the server 30 uses the DES algorithm to randomly generate an encryption key, and uses this encryption key to encrypt the calibration data stored in the server 30 to form the first encrypted data. The server 10 then sends the encryption key together with the second data to the diagnostic tool 20, and then sends the diagnostic tool 20 to the terminal 10. In this way, the terminal 10 can use the encryption key generated by the server 10 to decrypt the first encrypted data. Thereby, calibration data is obtained. In another embodiment, the first encryption method further includes an asymmetric encryption algorithm, such as an RSA encryption algorithm, an ElGamal algorithm, and an Elliptic Curve Cryptography (ECC). Taking the RSA encryption algorithm as an example, the terminal 10 uses the RSA encryption algorithm to generate a pair of RSA keys, one of which is a private key, the private key is stored by the server 30, and the other is a public key, and the public key can be sent to the terminal 10. The server 30 uses the private key to encrypt the calibration data stored in the server 30, and the terminal 10 uses the public key to decrypt the calibration data. This is to ensure the confidentiality of the calibration data.
本申请实施方式的数据获取方法和数据获取系统100中,首先,利用终端10向服务器30发送包括激光投射器11的身份标识码的第一数据;然后,利用服务器30根据身份标识码查找与身份标识码相匹配的标定数据,并以第一加密方式加密标定数据,以生成第一加密数据;接着,利用服务器30发送包括第一加密数据的第二数据至诊断工具20中;再接着,利用诊断工具20判断第二数据是否被篡改,并在第二数据未被篡改时,利用诊断工具20发送第二数据至终端10;最后,利用终端10以第一解密方式解密第一加密数据以得到标定数据。如此,终端10可以从服务器30中获取完整且准确的激光投射器11的标定数据。In the data acquisition method and the data acquisition system 100 according to the embodiment of the present application, first, the terminal 10 is used to send the first data including the identification code of the laser projector 11 to the server 30; then, the server 30 is used to find and identify the identity according to the identification code. The calibration data matching the identification code is encrypted with the first encryption method to generate the first encrypted data. Then, the server 30 sends the second data including the first encrypted data to the diagnostic tool 20; The diagnostic tool 20 determines whether the second data has been tampered with, and uses the diagnostic tool 20 to send the second data to the terminal 10 when the second data has not been tampered with; finally, the terminal 10 is used to decrypt the first encrypted data in a first decryption manner to obtain Calibration data. In this way, the terminal 10 can obtain complete and accurate calibration data of the laser projector 11 from the server 30.
请参阅图6,在某些实施方式中,第二数据还包括第二加密数据。数据获取方法还包括步骤:Referring to FIG. 6, in some embodiments, the second data further includes second encrypted data. The data acquisition method further includes steps:
016,利用服务器30对第一加密数据以第二加密方式加密,以形成第二加密数据。016. Use the server 30 to encrypt the first encrypted data in a second encryption manner to form the second encrypted data.
步骤014中利用诊断工具判断第二数据是否被篡改,包括以下子步骤:Step 014 uses a diagnostic tool to determine whether the second data has been tampered with, including the following sub-steps:
0141,判断以第二解密方式是否能够对第二加密数据进行解密,第二解密方式与第二加密方式相匹配;及0141: Determine whether the second encrypted data can be decrypted by the second decryption method, and the second decryption method matches the second encryption method; and
0142,若是,则判断第二数据未被篡改。0142. If yes, determine that the second data has not been tampered with.
请参阅图2和图6,在某些实施方式中,第二数据还包括第二加密数据。服务器30还用于对第一加密数据以第二加密方式加密,以形成第二加密数据。诊断工具20还用于判断以第二解密方式是否能够对第二加密数据进行解密,第二解密方式与第二加密方式相匹配;及,若是,则判断第二数据未被篡改。也即是说,服务器30还用于实现步骤016,诊断工具20还用于实现步骤0141和0142。Please refer to FIG. 2 and FIG. 6. In some embodiments, the second data further includes second encrypted data. The server 30 is further configured to encrypt the first encrypted data in a second encryption manner to form the second encrypted data. The diagnostic tool 20 is further configured to determine whether the second encrypted data can be decrypted with the second decryption method, and the second decryption method matches the second encryption method; and if so, it is determined that the second data has not been tampered with. That is, the server 30 is further configured to implement step 016, and the diagnostic tool 20 is further configured to implement steps 0141 and 0142.
具体地,在步骤013利用服务器30发送第二数据至诊断工具20之前,服务器30还对第一加密数 据以第二加密方式加密,以形成第二加密数据。因此,第二数据包括第一加密数据、身份标识码和第二加密数据。诊断工具20在接收到包括第一加密数据、身份标识码和第二加密数据的第二数据后,判断以第二解密方式是否能够对第二加密数据进行解密,其中,第二解密方式与第二加密方式相匹配。在判断第二解密方式能够对第二加密数据进行解密时,诊断工具20判断第二数据未被篡改,并发送第二数据至终端10。在判断第二解密方式不能对第二加密数据进行解密时,诊断工具20判断第二数据已被篡改。此时,诊断工具20停止发送第二数据至终端10,并向服务器30发出获取第二数据的请求,直至诊断工具20判断第二数据未被篡改。Specifically, before sending the second data to the diagnostic tool 20 using the server 30 in step 013, the server 30 also encrypts the first encrypted data in a second encryption manner to form the second encrypted data. Therefore, the second data includes the first encrypted data, the identification code, and the second encrypted data. After receiving the second data including the first encrypted data, the identification code, and the second encrypted data, the diagnostic tool 20 determines whether the second encrypted data can be decrypted in the second decryption manner. The two encryption methods match. When it is determined that the second decryption method can decrypt the second encrypted data, the diagnostic tool 20 determines that the second data has not been tampered with, and sends the second data to the terminal 10. When it is determined that the second decryption method cannot decrypt the second encrypted data, the diagnostic tool 20 determines that the second data has been tampered with. At this time, the diagnostic tool 20 stops sending the second data to the terminal 10 and sends a request for acquiring the second data to the server 30 until the diagnostic tool 20 determines that the second data has not been tampered with.
请参阅图7,在某些实施方式中,步骤016中利用服务器30对第一加密数据以第二加密方式加密,以形成第二加密数据,还包括以下子步骤:Referring to FIG. 7, in some implementations, in step 016, the server 30 is used to encrypt the first encrypted data in a second encryption manner to form the second encrypted data, and further includes the following sub-steps:
0161:生成针对第一加密数据的第一数据摘要;及0161: generate a first data digest for the first encrypted data; and
0162:对第一数据摘要以第一私钥进行加密以形成数字签名。0162: Encrypt the first data digest with the first private key to form a digital signature.
请参阅图2和图7,在某些实施方式中,服务器30还用于生成针对第一加密数据的第一数据摘要;及,对第一数据摘要以第一私钥进行加密以形成数字签名。也即是说,服务器30还用于实现子步骤0161和0162。Please refer to FIG. 2 and FIG. 7. In some embodiments, the server 30 is further configured to generate a first data digest for the first encrypted data; and encrypt the first data digest with a first private key to form a digital signature. . That is, the server 30 is further configured to implement sub-steps 0161 and 0162.
具体地,服务器30可以利用摘要算法(例如Hash函数)生成第一加密数据的第一数据摘要,然后再用第一私钥对第一数据摘要进行加密,从而形成数字签名。其中,第一私钥仅存储在服务器30上。因此,第二加密数据为第一加密数据的数字签名。在本申请实施例中,数字签名能够用于判断第一加密数据的完整性,即判断信宿(诊断工具20和终端10)接收到的标定数据一定是由信源(服务器30)发送的信息,而中间绝无任何更改。Specifically, the server 30 may use a digest algorithm (such as a Hash function) to generate a first data digest of the first encrypted data, and then encrypt the first data digest with a first private key to form a digital signature. The first private key is stored on the server 30 only. Therefore, the second encrypted data is a digital signature of the first encrypted data. In the embodiment of the present application, the digital signature can be used to judge the integrity of the first encrypted data, that is, to determine that the calibration data received by the sink (diagnostic tool 20 and terminal 10) must be information sent by the source (server 30) There is absolutely no change in the middle.
请继续参阅图7,在某些实施方式中,步骤0141中判断以第二解密方式是否能够对第二加密数据进行解密,包括以下子步骤:Please continue to refer to FIG. 7. In some embodiments, in step 0141, it is determined whether the second encrypted data can be decrypted in the second decryption mode, including the following sub-steps:
01411,判断第一公钥是否能够对数字签名解密,第一公钥与第一私钥成对;01411: Determine whether the first public key can decrypt the digital signature, and the first public key and the first private key are paired;
01412,若是,则生成针对第一加密数据的第二数据摘要;01412, if yes, generate a second data digest for the first encrypted data;
01413,判断第二数据摘要是否与第一数据摘要一致;及01413: Determine whether the second data digest is consistent with the first data digest; and
01414,若是,则判断以第二解密方式能够对第二加密数据进行解密。01414, if yes, it is determined that the second encrypted data can be decrypted in the second decryption mode.
请参阅图2和图7,在某些实施方式中,诊断工具20还用于:判断第一公钥是否能够对数字签名解密,第一公钥与第一私钥成对;若是,则生成针对第一加密数据的第二数据摘要;判断第二数据摘要是否与第一数据摘要一致;及,若是,则判断以第二解密方式能够对第二加密数据进行解密。也就是说,诊断工具20还用于实现子步骤01411、01412、01413和01414。Please refer to FIG. 2 and FIG. 7. In some embodiments, the diagnostic tool 20 is further configured to determine whether the first public key can decrypt the digital signature, and the first public key and the first private key are paired; if yes, generate the A second data digest for the first encrypted data; determining whether the second data digest is consistent with the first data digest; and, if so, determining whether the second encrypted data can be decrypted in a second decryption manner. That is, the diagnostic tool 20 is also used to implement sub-steps 01411, 01412, 01413, and 01414.
具体地,诊断工具20在接收到数字签名后,判断第一公钥是否能够对数字签名解密。其中,第一公钥与第一私钥成对,服务器30存储第一私钥,诊断工具20存储第一公钥。在判断第一公钥不能对数字签名解密时,表明该数字签名已被篡改,例如该数字签名是由其他服务器30伪造而成。因此,诊断工具20确定第二数据的来源不可信,则不会发送第二数据至终端10,确保了第二数据的完整性。在判断第一公钥能够对数字签名解密时,诊断工具20先利用摘要算法(例如Hash函数)生成针对第一加密数据的第二数据摘要,然后判断第二数据摘要是否与第一数据摘要一致。在判断第二数据摘要与第一数据摘要一致时,则判断以第二解密方式能够对第二加密数据进行解密,从而确定第二加密数据未被篡改,确保了第二数据的完整性。在判断第二数据摘要与第一数据摘要不一致时,则判断以第二解密方式不能对第二加密数据进行解密,从而确定第二加密数据已被篡改,诊断工具20不会发送第二数据至终端10。Specifically, after receiving the digital signature, the diagnostic tool 20 determines whether the first public key can decrypt the digital signature. The first public key is paired with the first private key, the server 30 stores the first private key, and the diagnostic tool 20 stores the first public key. When it is judged that the first public key cannot decrypt the digital signature, it indicates that the digital signature has been tampered with, for example, the digital signature was forged by another server 30. Therefore, if the diagnostic tool 20 determines that the source of the second data is not trusted, it will not send the second data to the terminal 10, thereby ensuring the integrity of the second data. When determining that the first public key can decrypt the digital signature, the diagnostic tool 20 first uses a digest algorithm (such as a Hash function) to generate a second data digest for the first encrypted data, and then determines whether the second data digest is consistent with the first data digest. . When it is judged that the second data digest is consistent with the first data digest, it is judged that the second encrypted data can be decrypted in the second decryption manner, thereby determining that the second encrypted data has not been tampered with, and ensuring the integrity of the second data. When it is judged that the second data digest is inconsistent with the first data digest, it is judged that the second encrypted data cannot be decrypted in the second decryption manner, thereby determining that the second encrypted data has been tampered with, and the diagnostic tool 20 will not send the second data to Terminal 10.
请参阅图8,在某些实施方式中,第二数据还包括身份标识码,在步骤015利用终端10以第一解密方式对第一加密数据进行解密以得到标定数据前,数据获取方法还包括以下步骤:Referring to FIG. 8, in some embodiments, the second data further includes an identification code. Before step 015 uses the terminal 10 to decrypt the first encrypted data in a first decryption manner to obtain the calibration data, the data acquisition method further includes: The following steps:
0151,判断身份标识码是否与终端10内存储的原始身份标识码一致;及0151. Determine whether the identity identification code is consistent with the original identity identification code stored in the terminal 10; and
0152,若否,则利用终端10以第一解密方式对第一加密数据进行解密以得到标定数据。0152. If not, use the terminal 10 to decrypt the first encrypted data in a first decryption manner to obtain the calibration data.
请参阅图2和图8,在某些实施方式中,第二数据还包括身份标识码,终端10还用于判断身份标识码是否与终端10内存储的原始身份标识码一致;及,若否,则利用终端10以第一解密方式对第一加密数据进行解密以得到标定数据。也即是说,终端10还用于实施步骤0151和0152。Referring to FIG. 2 and FIG. 8, in some embodiments, the second data further includes an identification code, and the terminal 10 is further configured to determine whether the identification code is consistent with the original identification code stored in the terminal 10; and if not, Then, the terminal 10 is used to decrypt the first encrypted data in a first decryption manner to obtain the calibration data. That is, the terminal 10 is further configured to perform steps 0151 and 0152.
具体地,终端10内存储有原始激光投射器11的身份标识码。终端10在接收到包括当前激光投射器11的身份标识码的第二数据后,需要判断当前身份标识码是否与原始身份标识码一致。在判断当前 身份标识码与原始身份标识码一致时,终端10确定当前的激光投射器11为原始的激光投射器11,也就是说,终端10没有更换新的激光投射器11。因此,终端10不需要对第一加密数据进行解密,也不需要存储第一加密数据。在判断当前身份标识码与原始身份标识码不一致时,终端10确定当前的激光投射器11不是原始的激光投射器11,也就是说,终端10已经更换新的激光投射器11。因此,终端10以第一解密方式对第一加密数据进行解密以得到标定数据。Specifically, the terminal 10 stores an identification code of the original laser projector 11. After receiving the second data including the identification code of the current laser projector 11, the terminal 10 needs to determine whether the current identification code is consistent with the original identification code. When judging that the current identity identification code is consistent with the original identity identification code, the terminal 10 determines that the current laser projector 11 is the original laser projector 11, that is, the terminal 10 has not replaced the new laser projector 11. Therefore, the terminal 10 does not need to decrypt the first encrypted data or store the first encrypted data. When judging that the current identity identification code is inconsistent with the original identity identification code, the terminal 10 determines that the current laser projector 11 is not the original laser projector 11, that is, the terminal 10 has replaced the new laser projector 11. Therefore, the terminal 10 decrypts the first encrypted data in a first decryption manner to obtain the calibration data.
请参阅图3和图9,在某些实施方式中,终端10形成有可信执行环境(Trusted Execution Environment,TEE)1321,步骤011中利用终端10发送第一数据至诊断工具20前,数据获取方法还包括步骤:Please refer to FIG. 3 and FIG. 9. In some embodiments, the terminal 10 is formed with a Trusted Execution Environment (TEE) 1321. In step 011, before the terminal 10 sends the first data to the diagnostic tool 20, the data is acquired. The method also includes steps:
017,利用终端10在可信执行环境1321中以第三加密方式加密身份识别码以得到第一数据。在步骤013利用服务器30发送第二数据至诊断工具20前,数据获取方法还包括步骤:017. The terminal 10 is used to encrypt the identity identification code in the trusted execution environment 1321 in a third encryption manner to obtain the first data. Before the server 30 sends the second data to the diagnostic tool 20 in step 013, the data acquisition method further includes the following steps:
018,以第三解密方式解密第一数据以得到身份识别码,第三解密方式与第三加密方式相匹配。018: Decrypt the first data in a third decryption manner to obtain an identification code, and the third decryption manner matches the third encryption manner.
请参阅图3和图9,在某些实施方式中,终端10形成有可信执行环境1321。终端10还用于在可信执行环境1321中以第三加密方式加密身份识别码以得到第一数据。服务器30还用于以第三解密方式解密第一数据以得到身份识别码,第三解密方式与第三加密方式相匹配。也即是说,终端10还用于实施步骤017,服务器30还用于实施步骤018。Referring to FIG. 3 and FIG. 9, in some embodiments, the terminal 10 is formed with a trusted execution environment 1321. The terminal 10 is further configured to encrypt the identity identification code in a third encryption manner in the trusted execution environment 1321 to obtain the first data. The server 30 is further configured to decrypt the first data in a third decryption manner to obtain an identification code, and the third decryption manner matches the third encryption manner. That is, the terminal 10 is further configured to perform step 017, and the server 30 is further configured to perform step 018.
具体地,处理器13包括微处理器131和应用处理器(Application Processor,AP)132。微处理器131可以是处理芯片,微处理器131与应用处理器132连接,具体地,应用处理器132可用于重置微处理器131、唤醒(wake)微处理器131、纠错(debug)微处理器131等。应用处理器132包括可信执行环境1321和非可信执行环境1322。微处理器131通过移动产业处理器接口与应用处理器132的可信执行环境1322连接,以将微处理器131中的数据直接传输到可信执行环境1322中存储。其中,可信执行环境1322中的代码和内存区域都是受访问控制单元控制的,不能被非可信执行环境1322中的程序所访问。激光投射器11的身份标识码存储在可信执行环境1322中,如此,激光投射器11的身份标识码不易被篡改和盗用,终端10的信息的安全性较高。Specifically, the processor 13 includes a microprocessor 131 and an Application Processor (AP) 132. The microprocessor 131 may be a processing chip, and the microprocessor 131 is connected to the application processor 132. Specifically, the application processor 132 may be used to reset the microprocessor 131, wake the microprocessor 131, and debug Microprocessor 131 and the like. The application processor 132 includes a trusted execution environment 1321 and an untrusted execution environment 1322. The microprocessor 131 is connected to the trusted execution environment 1322 of the application processor 132 through a mobile industry processor interface, so as to directly transmit data in the microprocessor 131 to the trusted execution environment 1322 for storage. The code and memory area in the trusted execution environment 1322 are controlled by the access control unit, and cannot be accessed by programs in the untrusted execution environment 1322. The identification code of the laser projector 11 is stored in the trusted execution environment 1322. In this way, the identification code of the laser projector 11 is not easy to be tampered with and misappropriated, and the security of the information of the terminal 10 is high.
终端10在可信执行环境1321中加密身份识别码,保证了身份识别码的保密性。在一个例子中,第三加密方式和第三解密方式可以为非对称性加密算法。例如服务器30利用非对称性加密算法生成相匹配的第二公钥和第二私钥,服务器30存储第二私钥,终端10存储第二公钥。终端10利用第二公钥加密身份识别码以得到第一数据。因此,在服务器30接收到第一数据时,能够利用第二私钥对第一数据进行解密,从而得到身份标识码。在另一个例子中,第三加密方式和第三解密方式还可以为对称性加密算法。由于在上述实施方式中已经论述采用对称性加密算法的第一解密方式与第一加密方式,故在此不再赘述采用对称性加密算法的第三加密方式和第三解密方式。The terminal 10 encrypts the identity identification code in the trusted execution environment 1321 to ensure the confidentiality of the identity identification code. In one example, the third encryption method and the third decryption method may be asymmetric encryption algorithms. For example, the server 30 uses the asymmetric encryption algorithm to generate a matching second public key and a second private key, the server 30 stores the second private key, and the terminal 10 stores the second public key. The terminal 10 uses the second public key to encrypt the identification code to obtain the first data. Therefore, when the server 30 receives the first data, it can use the second private key to decrypt the first data, thereby obtaining the identity identification code. In another example, the third encryption method and the third decryption method may also be a symmetric encryption algorithm. Since the first decryption method and the first encryption method using the symmetric encryption algorithm have been discussed in the foregoing embodiment, the third encryption method and the third decryption method using the symmetric encryption algorithm are not described herein again.
请参阅图10,在某些实施方式中,在步骤015利用终端10以第一解密方式对第一加密数据进行解密以得到标定数据前,数据获取方法还包括步骤:Referring to FIG. 10, in some embodiments, before step 015 uses the terminal 10 to decrypt the first encrypted data in a first decryption manner to obtain the calibration data, the data acquisition method further includes steps:
0153,利用终端10判断第二数据是否被篡改;及0153: Use the terminal 10 to determine whether the second data has been tampered with; and
0152,若否,则利用终端10以第一解密方式对第一加密数据进行解密以得到标定数据。0152. If not, use the terminal 10 to decrypt the first encrypted data in a first decryption manner to obtain the calibration data.
请参阅2和图10,在某些实施方式中,终端10还用于判断第二数据是否被篡改;及,若否,则以第一解密方式对第一加密数据进行解密以得到标定数据。也即是说,终端10还用于实施步骤0153和0152。Referring to 2 and FIG. 10, in some embodiments, the terminal 10 is further configured to determine whether the second data has been tampered with; and if not, the first encrypted data is decrypted in a first decryption manner to obtain the calibration data. That is to say, the terminal 10 is further configured to perform steps 0153 and 0152.
在本申请实施例中,利用终端10判断第二数据是否被篡改的方法与步骤014中利用诊断工具判断第二数据是否被篡改的方法一致,即判断以第二解密方式是否能够对第二加密数据进行解密。具体地,终端10在接收到数字签名后,判断利用第一公钥是否能够对服务器30形成的数字签名解密。其中,第一公钥与第一私钥成对,服务器30存储第一私钥,诊断工具20和终端10均存储第一公钥。在判断第一公钥不能对数字签名解密时,终端10确定该数字签名已被篡改。因此,终端10判断第二数据的来源不可信,则不会存储第二数据。在判断第一公钥能够对数字签名解密时,终端10先利用摘要算法(例如Hash函数)生成针对第一加密数据的第三数据摘要,然后判断第三数据摘要是否与第一数据摘要一致。在判断第三数据摘要与第一数据摘要一致时,则判断以第二解密方式能够对第二加密数据进行解密,从而确定第二加密数据未被篡改,确保了第二数据的完整性,即确保了第一加密数据的完整性。如此,终端10就可以实施步骤05中的以第一解密方式对第一加密数据进行解密以得到标定数据。在判断第三数据摘要与第一数据摘要不一致时,则判断以第二解密方式不能对第二加密数据进行解密,从而确定第 二加密数据已被篡改,则终端10不会实施步骤015。In the embodiment of the present application, the method for judging whether the second data is tampered with the terminal 10 is consistent with the method for judging whether the second data is tampered with the diagnostic tool in step 014, that is, judging whether the second encryption can be encrypted by the second decryption method The data is decrypted. Specifically, after receiving the digital signature, the terminal 10 determines whether the digital signature formed by the server 30 can be decrypted by using the first public key. The first public key is paired with the first private key, the server 30 stores the first private key, and the diagnostic tool 20 and the terminal 10 both store the first public key. When determining that the first public key cannot decrypt the digital signature, the terminal 10 determines that the digital signature has been tampered with. Therefore, if the terminal 10 judges that the source of the second data is untrusted, it does not store the second data. When determining that the first public key can decrypt the digital signature, the terminal 10 first generates a third data digest for the first encrypted data by using a digest algorithm (such as a Hash function), and then determines whether the third data digest is consistent with the first data digest. When it is judged that the third data digest is consistent with the first data digest, it is judged that the second encrypted data can be decrypted in the second decryption manner, thereby determining that the second encrypted data has not been tampered with, and ensuring the integrity of the second data, that is, The integrity of the first encrypted data is ensured. In this way, the terminal 10 can perform the first decryption method in step 05 to decrypt the first encrypted data to obtain the calibration data. When it is judged that the third data digest is inconsistent with the first data digest, it is judged that the second encrypted data cannot be decrypted in the second decryption manner, so as to determine that the second encrypted data has been tampered with, the terminal 10 will not perform step 015.
请参阅图11,本申请提供一种用于终端10的数据获取方法。终端10通过诊断工具20与服务器30通信。终端10包括激光投射器11。数据获取方法包括:Referring to FIG. 11, the present application provides a data acquisition method for the terminal 10. The terminal 10 communicates with the server 30 through the diagnostic tool 20. The terminal 10 includes a laser projector 11. Data acquisition methods include:
021,发送第一数据至诊断工具20,以使诊断工具20将第一数据发送至服务器30,第一数据包括被加密的激光投射器11的身份标识码;021. Send the first data to the diagnostic tool 20, so that the diagnostic tool 20 sends the first data to the server 30. The first data includes the encrypted identification code of the laser projector 11.
022,在诊断工具20判断第二数据未被篡改时,接收诊断工具20发送的第二数据,第二数据由服务器30发送至诊断工具20,第二数据包括第一加密数据,第一加密数据包括被以第一加密方式加密的与身份标识码相匹配的标定数据;及022. When the diagnostic tool 20 determines that the second data has not been tampered with, the second data sent by the diagnostic tool 20 is received. The second data is sent by the server 30 to the diagnostic tool 20, and the second data includes the first encrypted data and the first encrypted data. Including calibration data matched with an identification code encrypted in a first encryption manner; and
023,以第一解密方式对第一加密数据进行解密以得到标定数据,第一解密方式与第一加密方式相匹配。023: Decrypt the first encrypted data in the first decryption mode to obtain the calibration data. The first decryption mode matches the first encryption mode.
请参阅图2和图3,在某些实施方式中,本申请提供一种终端10。终端10通过诊断工具20与服务器30通信。终端10用于发送第一数据至诊断工具20,以使诊断工具20将第一数据发送至服务器30,第一数据包括被加密的激光投射器11的身份标识码;在诊断工具20判断第二数据未被篡改时,接收诊断工具20发送的第二数据,第二数据由服务器30发送至诊断工具20,第二数据包括第一加密数据,第一加密数据包括被以第一加密方式加密的与身份标识码相匹配的标定数据;和,以第一解密方式对第一加密数据进行解密以得到标定数据,第一解密方式与第一加密方式相匹配。也就是说,终端10可以用于实现步骤021、022和023。Please refer to FIG. 2 and FIG. 3. In some embodiments, the present application provides a terminal 10. The terminal 10 communicates with the server 30 through the diagnostic tool 20. The terminal 10 is configured to send the first data to the diagnostic tool 20, so that the diagnostic tool 20 sends the first data to the server 30. The first data includes the encrypted identification code of the laser projector 11; When the data has not been tampered with, the second data sent by the diagnostic tool 20 is received. The second data is sent by the server 30 to the diagnostic tool 20. The second data includes the first encrypted data, and the first encrypted data includes the first encrypted data The calibration data matching the identity identification code; and, the first encrypted data is decrypted in a first decryption manner to obtain the calibration data, and the first decryption manner matches the first encryption manner. That is, the terminal 10 may be used to implement steps 021, 022, and 023.
本申请实施方式的用于终端10的数据获取方法中,终端10通过发送包括激光投射器11的身份标识码的第一数据至服务器30,以使服务器30能够根据身份标识码查找相匹配的标定数据,并接收包括第一加密数据的第二数据,然后以第一解密方式对第一加密数据进行解密以得到标定数据。如此,终端10可以从服务器30中获取到准确且完整的激光投射器11的标定数据。In the data acquisition method for the terminal 10 according to the embodiment of the present application, the terminal 10 sends the first data including the identification code of the laser projector 11 to the server 30, so that the server 30 can find a matching calibration according to the identification code And receive the second data including the first encrypted data, and then decrypt the first encrypted data in a first decryption manner to obtain the calibration data. In this way, the terminal 10 can obtain accurate and complete calibration data of the laser projector 11 from the server 30.
请参阅图12,在某些实施方式中,终端10形成有可信执行环境1321。在步骤021发送第一数据至诊断工具20前,数据获取方法还包括以下步骤:Referring to FIG. 12, in some embodiments, the terminal 10 is formed with a trusted execution environment 1321. Before sending the first data to the diagnostic tool 20 in step 021, the data acquisition method further includes the following steps:
024,在可信执行环境1321中以第三加密方式加密身份识别码以得到第一数据。024. In the trusted execution environment 1321, the identity identification code is encrypted in a third encryption manner to obtain the first data.
请参阅图3和图12,在某些实施方式中,终端10还用于实现步骤024。Referring to FIG. 3 and FIG. 12, in some embodiments, the terminal 10 is further configured to implement step 024.
请参阅图13,在某些实施方式中,第二数据还包括身份识别码。在步骤023以第一解密方式对第一加密数据进行解密以得到标定数据前,数据获取方法还包括以下步骤:Referring to FIG. 13, in some embodiments, the second data further includes an identification code. Before the first encrypted data is decrypted in step 023 to obtain the calibration data, the data acquisition method further includes the following steps:
025,判断身份标识码是否与终端10内存储的原始身份标识码一致;及025: Determine whether the identity identification code is consistent with the original identity identification code stored in the terminal 10; and
023,若否,则以第一解密方式对第一加密数据进行解密以得到标定数据。023. If not, the first encrypted data is decrypted in a first decryption manner to obtain calibration data.
请参阅图3和图13,在某些实施方式中,第二数据还包括身份识别码。终端10还用于实现步骤025和023。Please refer to FIG. 3 and FIG. 13. In some embodiments, the second data further includes an identification code. The terminal 10 is further configured to implement steps 025 and 023.
请参阅图14,在某些实施方式中,在步骤023以第一解密方式对第一加密数据进行解密以得到标定数据前,数据获取方法还包括以下步骤:Referring to FIG. 14, in some embodiments, before step 023 decrypts the first encrypted data in a first decryption manner to obtain calibration data, the data acquisition method further includes the following steps:
026,判断第二数据是否被篡改;及026: Determine whether the second data has been tampered with; and
023,若否,则以第一解密方式对第一加密数据进行解密以得到标定数据。023. If not, the first encrypted data is decrypted in a first decryption manner to obtain calibration data.
请参阅图3和图14,在某些实施方式中,终端10还用于实现步骤026和023。Referring to FIG. 3 and FIG. 14, in some embodiments, the terminal 10 is further configured to implement steps 026 and 023.
请参阅图15,本申请提供一种用于诊断工具20的数据获取方法。诊断工具20与终端10及服务器30通信。终端10包括激光投射器11。数据获取方法包括以下步骤:Referring to FIG. 15, the present application provides a data acquisition method for a diagnostic tool 20. The diagnostic tool 20 communicates with the terminal 10 and the server 30. The terminal 10 includes a laser projector 11. The data acquisition method includes the following steps:
031,接收终端10发送的第一数据并转发至服务器30,第一数据包括被加密的激光投射器11的身份标识码;031. Receive the first data sent by the terminal 10 and forward it to the server 30. The first data includes the encrypted identification code of the laser projector 11.
032,接收服务器30发送的第二数据,第二数据包括第一加密数据,第一加密数据包括被以第一加密方式加密的与身份标识码相匹配的标定数据;及032. Receive second data sent by the server 30. The second data includes first encrypted data, and the first encrypted data includes calibration data that is encrypted in a first encryption manner and matches an identification code; and
033,判断第二数据是否被篡改,并在判断第二数据未被篡改时发送第二数据至终端10,以利用终端10以第一解密方式对第一加密数据进行解密以得到标定数据,第一解密方式与第一加密方式相匹配。033. Determine whether the second data has been tampered with, and send the second data to the terminal 10 when it is determined that the second data has not been tampered with, so as to use the terminal 10 to decrypt the first encrypted data in a first decryption manner to obtain the calibration data. A decryption method matches the first encryption method.
请参阅图2和图4,本申请提供一种电子设备200。电子设备200包括诊断工具20,诊断工具20与终端10及服务器30通信。诊断工具30用于接收终端10发送的第一数据并转发至服务器30,第一数据包括被加密的激光投射器11的身份标识码;接收服务器30发送的第二数据,第二数据包括第一加密 数据,第一加密数据包括被以第一加密方式加密的与身份标识码相匹配的标定数据;及,判断第二数据是否被篡改,并在判断第二数据未被篡改时发送第二数据至终端10,以利用终端10以第一解密方式对第一加密数据进行解密以得到标定数据,第一解密方式与第一加密方式相匹配。Please refer to FIG. 2 and FIG. 4, the present application provides an electronic device 200. The electronic device 200 includes a diagnostic tool 20 that communicates with the terminal 10 and the server 30. The diagnostic tool 30 is configured to receive the first data sent by the terminal 10 and forward the data to the server 30. The first data includes the encrypted identification code of the laser projector 11. The second data sent by the server 30 includes the first data. Encrypted data, the first encrypted data includes calibration data that is encrypted with the first encryption method and matches the identification code; and, determines whether the second data has been tampered with, and sends the second data when it is determined that the second data has not been tampered with To the terminal 10, the terminal 10 is used to decrypt the first encrypted data in the first decryption mode to obtain the calibration data, and the first decryption mode matches the first encryption mode.
本申请实施方式的用于电子设备200的数据获取方法中,诊断工具20作为终端10和服务器30之间的数据传输通道和数据判断通道,在判断第二数据未被篡改时发送第二数据至终端10,保证了终端10可以从服务器30中获取到准确且完整的激光投射器11的标定数据。In the data acquisition method for the electronic device 200 according to the embodiment of the present application, the diagnostic tool 20 serves as a data transmission channel and a data determination channel between the terminal 10 and the server 30, and sends the second data to the second data when it is determined that the second data has not been tampered with. The terminal 10 ensures that the terminal 10 can obtain accurate and complete calibration data of the laser projector 11 from the server 30.
请参阅图16,在某些实施方式中,第二数据还包括第二加密数据。服务器30用于对第一加密数据以第二加密方式加密,以形成第二加密数据。数据获取方法还包括以下步骤:Referring to FIG. 16, in some embodiments, the second data further includes second encrypted data. The server 30 is configured to encrypt the first encrypted data in a second encryption manner to form the second encrypted data. The data acquisition method also includes the following steps:
034,判断以第二解密方式是否能够对第二加密数据进行解密,第二解密方式与第二加密方式相匹配;及034. Determine whether the second encrypted data can be decrypted by the second decryption method, and the second decryption method matches the second encryption method; and
035,若是,则判断第二数据未被篡改。035. If yes, determine that the second data has not been tampered with.
请参阅图2和图4,在某些实施方式中,诊断工具30还用于实施步骤034和035。Please refer to FIG. 2 and FIG. 4. In some embodiments, the diagnostic tool 30 is further configured to perform steps 034 and 035.
请参阅图17,在某些实施方式中,服务器30还用于生成针对第一加密数据的第一数据摘要;及对第一数据摘要以第一私钥进行加密以形成数字签名。步骤034中判断以第二解密方式是否能够对第二加密数据进行解密,包括以下步骤:Referring to FIG. 17, in some embodiments, the server 30 is further configured to generate a first data digest for the first encrypted data; and encrypt the first data digest with a first private key to form a digital signature. In step 034, it is determined whether the second encrypted data can be decrypted in the second decryption mode, including the following steps:
0341,判断第一公钥是否能够对数字签名解密,第一公钥与第一私钥成对;0341: Determine whether the first public key can decrypt the digital signature, and the first public key and the first private key are paired;
0342,若是,则生成针对第一加密数据的第二数据摘要;0342, if yes, generate a second data digest for the first encrypted data;
0343,判断第二数据摘要是否与第一数据摘要一致;及0343: Determine whether the second data digest is consistent with the first data digest; and
0344,若是,则判断以第二解密方式能够对第二加密数据进行解密。0344. If yes, determine that the second encrypted data can be decrypted in the second decryption mode.
请参阅图2和图4,在某些实施方式中,诊断工具30还用于实施步骤0341、0342、0343和0344。Please refer to FIG. 2 and FIG. 4. In some embodiments, the diagnostic tool 30 is further configured to perform steps 0341, 0342, 0343, and 0344.
请参阅图18,本申请还提供一种非易失性计算机可读存储介质300。一个或多个非易失性计算机可读存储介质300存储有计算机可执行指令400。当计算机可执行指令400被一个或多个处理器500执行时,使得处理器500执行上述任意一项实施方式所述的用于数据获取系统100的数据获取方法。此时处理器500可以包括终端10内的处理器13和电子设备200内的处理电路。Referring to FIG. 18, the present application further provides a non-volatile computer-readable storage medium 300. One or more non-volatile computer-readable storage media 300 store computer-executable instructions 400. When the computer-executable instructions 400 are executed by one or more processors 500, the processor 500 is caused to execute the data acquisition method for the data acquisition system 100 according to any one of the foregoing embodiments. At this time, the processor 500 may include a processor 13 in the terminal 10 and a processing circuit in the electronic device 200.
例如,计算机可执行指令400被处理器500执行时,使得处理器500执行以下步骤:For example, when the computer-executable instructions 400 are executed by the processor 500, the processor 500 performs the following steps:
011,利用终端10发送第一数据至诊断工具20,第一数据包括被加密的激光投射器11的身份标识码;011: Use the terminal 10 to send the first data to the diagnostic tool 20, where the first data includes the encrypted identification code of the laser projector 11;
012,利用诊断工具20将第一数据发送至服务器30;012. Use the diagnostic tool 20 to send the first data to the server 30.
013,利用服务器30发送第二数据至诊断工具20,第二数据包括第一加密数据,第一加密数据包括被以第一加密方式加密的与身份标识码相匹配的标定数据;013. Use the server 30 to send the second data to the diagnostic tool 20, the second data includes the first encrypted data, and the first encrypted data includes the calibration data that is encrypted in the first encryption mode and matches the identification code;
014,利用诊断工具20判断第二数据是否被篡改,并在判断第二数据未被篡改时发送第二数据至终端10;和014. Use the diagnostic tool 20 to determine whether the second data has been tampered with, and send the second data to the terminal 10 when it is determined that the second data has not been tampered with; and
015,利用终端10以第一解密方式对第一加密数据进行解密以得到标定数据,第一解密方式与第一加密方式相匹配。015. Use the terminal 10 to decrypt the first encrypted data in the first decryption mode to obtain the calibration data, and the first decryption mode matches the first encryption mode.
再例如,计算机可执行指令400被处理器500执行时,使得处理器500执行以下步骤:As another example, when the computer-executable instructions 400 are executed by the processor 500, the processor 500 causes the processor 500 to perform the following steps:
0153,利用终端10判断第二数据是否被篡改;及0153: Use the terminal 10 to determine whether the second data has been tampered with; and
0152,若否,则利用终端10以第一解密方式对第一加密数据进行解密以得到标定数据。0152. If not, use the terminal 10 to decrypt the first encrypted data in a first decryption manner to obtain the calibration data.
再例如,计算机可执行指令400被处理器500执行时,使得处理器500执行以下步骤:As another example, when the computer-executable instructions 400 are executed by the processor 500, the processor 500 causes the processor 500 to perform the following steps:
021,发送第一数据至诊断工具20,以使诊断工具20将第一数据发送至服务器30,第一数据包括被加密的激光投射器11的身份标识码;021. Send the first data to the diagnostic tool 20, so that the diagnostic tool 20 sends the first data to the server 30. The first data includes the encrypted identification code of the laser projector 11.
022,在诊断工具20判断第二数据未被篡改时,接收诊断工具20发送的第二数据,第二数据由服务器30发送至诊断工具20,第二数据包括第一加密数据,第一加密数据包括被以第一加密方式加密的与身份标识码相匹配的标定数据;及022. When the diagnostic tool 20 determines that the second data has not been tampered with, the second data sent by the diagnostic tool 20 is received. The second data is sent by the server 30 to the diagnostic tool 20, and the second data includes the first encrypted data and the first encrypted data. Including calibration data matched with an identification code encrypted in a first encryption manner; and
023,以第一解密方式对第一加密数据进行解密以得到标定数据,第一解密方式与第一加密方式相匹配。023: Decrypt the first encrypted data in the first decryption mode to obtain the calibration data. The first decryption mode matches the first encryption mode.
请参阅图19,本申请还提供一种计算机设备1000。计算机设备1000包括存储器600及处理器500。存储器600中存储有计算机可读指令601。计算机可读指令601被处理器500执行时,使得处理器500 执行上述任意一项实施方式所述的用于数据获取系统100的数据获取方法。此时处理器500可以包括终端10内的处理器13和电子设备200内的处理电路。Referring to FIG. 19, the present application further provides a computer device 1000. The computer device 1000 includes a memory 600 and a processor 500. Computer readable instructions 601 are stored in the memory 600. When the computer-readable instructions 601 are executed by the processor 500, the processor 500 is caused to execute the data acquisition method for the data acquisition system 100 according to any one of the foregoing embodiments. At this time, the processor 500 may include a processor 13 in the terminal 10 and a processing circuit in the electronic device 200.
例如,计算机可读指令601被处理器500执行时,使得处理器500执行以下步骤:For example, when the computer-readable instruction 601 is executed by the processor 500, the processor 500 causes the processor 500 to perform the following steps:
011,利用终端10发送第一数据至诊断工具20,第一数据包括被加密的激光投射器11的身份标识码;011: Use the terminal 10 to send the first data to the diagnostic tool 20, where the first data includes the encrypted identification code of the laser projector 11;
012,利用诊断工具20将第一数据发送至服务器30;012. Use the diagnostic tool 20 to send the first data to the server 30.
013,利用服务器30发送第二数据至诊断工具20,第二数据包括第一加密数据,第一加密数据包括被以第一加密方式加密的与身份标识码相匹配的标定数据;013. Use the server 30 to send the second data to the diagnostic tool 20, the second data includes the first encrypted data, and the first encrypted data includes the calibration data that is encrypted in the first encryption mode and matches the identification code;
014,利用诊断工具20判断第二数据是否被篡改,并在判断第二数据未被篡改时发送第二数据至终端10;和014. Use the diagnostic tool 20 to determine whether the second data has been tampered with, and send the second data to the terminal 10 when it is determined that the second data has not been tampered with; and
015,利用终端10以第一解密方式对第一加密数据进行解密以得到标定数据,第一解密方式与第一加密方式相匹配。015. Use the terminal 10 to decrypt the first encrypted data in the first decryption mode to obtain the calibration data, and the first decryption mode matches the first encryption mode.
再例如,计算机可读指令601被处理器500执行时,使得处理器500执行以下步骤:As another example, when the computer-readable instruction 601 is executed by the processor 500, the processor 500 causes the processor 500 to perform the following steps:
0153,利用终端10判断第二数据是否被篡改;及0153: Use the terminal 10 to determine whether the second data has been tampered with; and
0152,若否,则利用终端10以第一解密方式对第一加密数据进行解密以得到标定数据。0152. If not, use the terminal 10 to decrypt the first encrypted data in a first decryption manner to obtain the calibration data.
再例如,计算机可读指令601被处理器500执行时,使得处理器500执行以下步骤:As another example, when the computer-readable instruction 601 is executed by the processor 500, the processor 500 causes the processor 500 to perform the following steps:
021,发送第一数据至诊断工具20,以使诊断工具20将第一数据发送至服务器30,第一数据包括被加密的激光投射器11的身份标识码;021. Send the first data to the diagnostic tool 20, so that the diagnostic tool 20 sends the first data to the server 30. The first data includes the encrypted identification code of the laser projector 11.
022,在诊断工具20判断第二数据未被篡改时,接收诊断工具20发送的第二数据,第二数据由服务器30发送至诊断工具20,第二数据包括第一加密数据,第一加密数据包括被以第一加密方式加密的与身份标识码相匹配的标定数据;及022. When the diagnostic tool 20 determines that the second data has not been tampered with, the second data sent by the diagnostic tool 20 is received. The second data is sent by the server 30 to the diagnostic tool 20, and the second data includes the first encrypted data and the first encrypted data. Including calibration data matched with an identification code encrypted in a first encryption manner; and
023,以第一解密方式对第一加密数据进行解密以得到标定数据,第一解密方式与第一加密方式相匹配。023: Decrypt the first encrypted data in the first decryption mode to obtain the calibration data. The first decryption mode matches the first encryption mode.
请继续参阅图19,本申请还提供一种计算机设备1000。计算机设备1000包括存储器600及处理器500。存储器600中存储有计算机可读指令601。计算机可读指令601被处理器500执行时,使得处理器500执行上述任意一项实施方式所述的用于数据获取系统100的数据获取方法。此时处理器500为终端10内的处理器13。Please continue to refer to FIG. 19, the present application further provides a computer device 1000. The computer device 1000 includes a memory 600 and a processor 500. Computer readable instructions 601 are stored in the memory 600. When the computer-readable instruction 601 is executed by the processor 500, the processor 500 is caused to execute the data acquisition method for the data acquisition system 100 according to any one of the foregoing embodiments. At this time, the processor 500 is the processor 13 in the terminal 10.
例如,计算机可读指令601被处理器500执行时,使得处理器500执行以下步骤:For example, when the computer-readable instruction 601 is executed by the processor 500, the processor 500 causes the processor 500 to perform the following steps:
021,发送第一数据至诊断工具20,以使诊断工具20将第一数据发送至服务器30,第一数据包括被加密的激光投射器11的身份标识码;021. Send the first data to the diagnostic tool 20, so that the diagnostic tool 20 sends the first data to the server 30. The first data includes the encrypted identification code of the laser projector 11.
022,在诊断工具20判断第二数据未被篡改时,接收诊断工具20发送的第二数据,第二数据由服务器30发送至诊断工具20,第二数据包括第一加密数据,第一加密数据包括被以第一加密方式加密的与身份标识码相匹配的标定数据;及022. When the diagnostic tool 20 determines that the second data has not been tampered with, the second data sent by the diagnostic tool 20 is received. The second data is sent by the server 30 to the diagnostic tool 20, and the second data includes the first encrypted data and the first encrypted data. Including calibration data matched with an identification code encrypted in a first encryption manner; and
023,以第一解密方式对第一加密数据进行解密以得到标定数据,第一解密方式与第一加密方式相匹配。023: Decrypt the first encrypted data in the first decryption mode to obtain the calibration data. The first decryption mode matches the first encryption mode.
再例如,计算机可读指令601被处理器500执行时,使得处理器500执行以下步骤:As another example, when the computer-readable instruction 601 is executed by the processor 500, the processor 500 causes the processor 500 to perform the following steps:
026,判断第二数据是否被篡改;及026: Determine whether the second data has been tampered with; and
023,若否,则以第一解密方式对第一加密数据进行解密以得到标定数据。023. If not, the first encrypted data is decrypted in a first decryption manner to obtain calibration data.
请继续参阅图19,本申请还提供一种计算机设备1000。计算机设备1000包括存储器600及处理器500。存储器600中存储有计算机可读指令601。计算机可读指令601被处理器500执行时,使得处理器500执行上述任意一项实施方式所述的用于数据获取系统100的数据获取方法。此时处理器500为电子设备200内的处理电路。Please continue to refer to FIG. 19, the present application further provides a computer device 1000. The computer device 1000 includes a memory 600 and a processor 500. Computer readable instructions 601 are stored in the memory 600. When the computer-readable instruction 601 is executed by the processor 500, the processor 500 is caused to execute the data acquisition method for the data acquisition system 100 according to any one of the foregoing embodiments. At this time, the processor 500 is a processing circuit in the electronic device 200.
例如,计算机可读指令601被处理器500执行时,使得处理器500执行以下步骤:For example, when the computer-readable instruction 601 is executed by the processor 500, the processor 500 causes the processor 500 to perform the following steps:
031,接收终端10发送的第一数据并转发至服务器30,第一数据包括被加密的激光投射器11的身份标识码;031. Receive the first data sent by the terminal 10 and forward it to the server 30. The first data includes the encrypted identification code of the laser projector 11.
032,接收服务器30发送的第二数据,第二数据包括第一加密数据,第一加密数据包括被以第一加密方式加密的与身份标识码相匹配的标定数据;及032. Receive second data sent by the server 30. The second data includes first encrypted data, and the first encrypted data includes calibration data that is encrypted in a first encryption manner and matches an identification code; and
033,判断第二数据是否被篡改,并在判断第二数据未被篡改时发送第二数据至终端10,以利用终端10以第一解密方式对第一加密数据进行解密以得到标定数据,第一解密方式与第一加密方式相匹配。033. Determine whether the second data has been tampered with, and send the second data to the terminal 10 when it is determined that the second data has not been tampered with, so as to use the terminal 10 to decrypt the first encrypted data in a first decryption manner to obtain the calibration data. A decryption method matches the first encryption method.
再例如,计算机可读指令601被处理器500执行时,使得处理器500执行以下步骤:As another example, when the computer-readable instruction 601 is executed by the processor 500, the processor 500 causes the processor 500 to perform the following steps:
034,判断以第二解密方式是否能够对第二加密数据进行解密,第二解密方式与第二加密方式相匹配;及034. Determine whether the second encrypted data can be decrypted by the second decryption method, and the second decryption method matches the second encryption method; and
035,若是,则判断第二数据未被篡改。035. If yes, determine that the second data has not been tampered with.
在本说明书的描述中,参考术语“一个实施例”、“一些实施例”、“示例”、“具体示例”、或“一些示例”等的描述意指结合该实施例或示例描述的具体特征、结构、材料或者特点包含于本申请的至少一个实施例或示例中。在本说明书中,对上述术语的示意性表述不必须针对的是相同的实施例或示例。而且,描述的具体特征、结构、材料或者特点可以在任一个或多个实施例或示例中以合适的方式结合。此外,在不相互矛盾的情况下,本领域的技术人员可以将本说明书中描述的不同实施例或示例以及不同实施例或示例的特征进行结合和组合。In the description of this specification, the description with reference to the terms “one embodiment”, “some embodiments”, “examples”, “specific examples”, or “some examples” and the like means specific features described in conjunction with the embodiments or examples , Structure, materials, or features are included in at least one embodiment or example of the present application. In this specification, the schematic expressions of the above terms are not necessarily directed to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. In addition, without any contradiction, those skilled in the art may combine and combine different embodiments or examples and features of the different embodiments or examples described in this specification.
此外,术语“第一”、“第二”仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括至少一个该特征。在本申请的描述中,“多个”的含义是至少两个,例如两个,三个等,除非另有明确具体的限定。In addition, the terms "first" and "second" are used for descriptive purposes only and cannot be understood as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Therefore, the features defined as "first" and "second" may explicitly or implicitly include at least one of the features. In the description of the present application, the meaning of "plurality" is at least two, for example, two, three, etc., unless it is specifically and specifically defined otherwise.
流程图中或在此以其他方式描述的任何过程或方法描述可以被理解为,表示包括一个或更多个用于实现特定逻辑功能或过程的步骤的可执行指令的代码的模块、片段或部分,并且本申请的优选实施方式的范围包括另外的实现,其中可以不按所示出或讨论的顺序,包括根据所涉及的功能按基本同时的方式或按相反的顺序,来执行功能,这应被本申请的实施例所属技术领域的技术人员所理解。Any process or method description in a flowchart or otherwise described herein can be understood as representing a module, fragment, or portion of code that includes one or more executable instructions for implementing a particular logical function or step of a process And, the scope of the preferred embodiments of the present application includes additional implementations, in which the functions may be performed out of the order shown or discussed, including performing functions in a substantially simultaneous manner or in the reverse order according to the functions involved, which should It is understood by those skilled in the art to which the embodiments of the present application pertain.
在流程图中表示或在此以其他方式描述的逻辑和/或步骤,例如,可以被认为是用于实现逻辑功能的可执行指令的定序列表,可以具体实现在任何计算机可读介质中,以供指令执行系统、装置或设备(如基于计算机的系统、包括处理器的系统或其他可以从指令执行系统、装置或设备取指令并执行指令的系统)使用,或结合这些指令执行系统、装置或设备而使用。就本说明书而言,"计算机可读介质"可以是任何可以包含、存储、通信、传播或传输程序以供指令执行系统、装置或设备或结合这些指令执行系统、装置或设备而使用的装置。计算机可读介质的更具体的示例(非穷尽性列表)包括以下:具有一个或多个布线的电连接部(电子装置),便携式计算机盘盒(磁装置),随机存取存储器(RAM),只读存储器(ROM),可擦除可编辑只读存储器(EPROM或闪速存储器),光纤装置,以及便携式光盘只读存储器(CDROM)。另外,计算机可读介质甚至可以是可在其上打印所述程序的纸或其他合适的介质,因为可以例如通过对纸或其他介质进行光学扫描,接着进行编辑、解译或必要时以其他合适方式进行处理来以电子方式获得所述程序,然后将其存储在计算机存储器中。The logic and / or steps represented in the flowchart or otherwise described herein, for example, a sequenced list of executable instructions that can be considered to implement a logical function, can be embodied in any computer-readable medium, For instruction execution systems, devices, or devices (such as computer-based systems, systems including processors, or other systems that can fetch instructions from and execute instructions) Or equipment. For the purposes of this specification, a "computer-readable medium" may be any device that can contain, store, communicate, propagate, or transmit a program for use by or in connection with an instruction execution system, apparatus, or device. More specific examples (non-exhaustive list) of computer readable media include the following: electrical connections (electronic devices) with one or more wirings, portable computer disk cartridges (magnetic devices), random access memory (RAM), Read-only memory (ROM), erasable and editable read-only memory (EPROM or flash memory), fiber optic devices, and portable optical disk read-only memory (CDROM). In addition, the computer-readable medium may even be paper or other suitable medium on which the program can be printed, because, for example, by optically scanning the paper or other medium, followed by editing, interpretation, or other suitable Processing to obtain the program electronically and then store it in computer memory.
应当理解,本申请的各部分可以用硬件、软件、固件或它们的组合来实现。在上述实施方式中,多个步骤或方法可以用存储在存储器中且由合适的指令执行系统执行的软件或固件来实现。例如,如果用硬件来实现,和在另一实施方式中一样,可用本领域公知的下列技术中的任一项或他们的组合来实现:具有用于对数据信号实现逻辑功能的逻辑门电路的离散逻辑电路,具有合适的组合逻辑门电路的专用集成电路,可编程门阵列(PGA),现场可编程门阵列(FPGA)等。It should be understood that each part of the application may be implemented by hardware, software, firmware, or a combination thereof. In the above embodiments, multiple steps or methods may be implemented by software or firmware stored in a memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, it may be implemented using any one or a combination of the following techniques known in the art: Discrete logic circuits, application specific integrated circuits with suitable combinational logic gate circuits, programmable gate arrays (PGA), field programmable gate arrays (FPGA), etc.
本技术领域的普通技术人员可以理解实现上述实施例方法携带的全部或部分步骤是可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可读存储介质中,该程序在执行时,包括方法实施例的步骤之一或其组合。A person of ordinary skill in the art can understand that all or part of the steps carried by the methods in the foregoing embodiments may be implemented by a program instructing related hardware. The program may be stored in a computer-readable storage medium. The program is When executed, one or a combination of the steps of the method embodiment is included.
此外,在本申请各个实施例中的各功能单元可以集成在一个处理模块中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。所述集成的模块如果以软件功能模块的形式实现并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中。In addition, each functional unit in each embodiment of the present application may be integrated into one processing module, or each unit may exist separately physically, or two or more units may be integrated into one module. The above integrated modules can be implemented in the form of hardware or software functional modules. If the integrated module is implemented in the form of a software functional module and sold or used as an independent product, it may also be stored in a computer-readable storage medium.
上述提到的存储介质可以是只读存储器,磁盘或光盘等。尽管上面已经示出和描述了本申请的实施例,可以理解的是,上述实施例是示例性的,不能理解为对本申请的限制,本领域的普通技术人员在本申请的范围内可以对上述实施例进行变化、修改、替换和变型。The aforementioned storage medium may be a read-only memory, a magnetic disk, or an optical disk. Although the embodiments of the present application have been shown and described above, it can be understood that the above embodiments are exemplary and should not be construed as limitations on the present application. Those skilled in the art can interpret the above within the scope of the present application. Embodiments are subject to change, modification, substitution, and modification.

Claims (25)

  1. 一种数据获取方法,用于数据获取系统,所述数据获取系统包括终端、诊断工具和服务器,所述终端包括激光投射器,其特征在于,所述数据获取方法包括:A data acquisition method for a data acquisition system. The data acquisition system includes a terminal, a diagnostic tool, and a server. The terminal includes a laser projector. The data acquisition method includes:
    利用所述终端发送第一数据至所述诊断工具,所述第一数据包括被加密的所述激光投射器的身份标识码;Using the terminal to send first data to the diagnostic tool, where the first data includes an encrypted identification code of the laser projector;
    利用所述诊断工具将所述第一数据发送至所述服务器;Sending the first data to the server by using the diagnostic tool;
    利用所述服务器发送第二数据至所述诊断工具,所述第二数据包括第一加密数据,所述第一加密数据包括被以第一加密方式加密的与所述身份标识码相匹配的标定数据;Using the server to send second data to the diagnostic tool, the second data includes first encrypted data, and the first encrypted data includes a calibration that matches the identity identification code encrypted by the first encryption data;
    利用所述诊断工具判断所述第二数据是否被篡改,并在判断所述第二数据未被篡改时发送所述第二数据至所述终端;及Using the diagnostic tool to determine whether the second data has been tampered with, and sending the second data to the terminal when determining that the second data has not been tampered with; and
    利用所述终端以第一解密方式对所述第一加密数据进行解密以得到所述标定数据,所述第一解密方式与所述第一加密方式相匹配。The terminal is used to decrypt the first encrypted data in a first decryption manner to obtain the calibration data, and the first decryption manner matches the first encryption manner.
  2. 根据权利要求1所述的数据获取方法,其特征在于,所述第二数据还包括第二加密数据,所述数据获取方法还包括:利用所述服务器对所述第一加密数据以第二加密方式加密,以形成所述第二加密数据;The data acquisition method according to claim 1, wherein the second data further comprises a second encrypted data, and the data acquisition method further comprises: using the server to encrypt the first encrypted data with a second encryption Way encryption to form the second encrypted data;
    所述利用所述诊断工具判断所述第二数据是否被篡改,包括:判断以第二解密方式是否能够对所述第二加密数据进行解密,所述第二解密方式与所述第二加密方式相匹配;及The use of the diagnostic tool to determine whether the second data has been tampered with includes: determining whether the second encrypted data can be decrypted by a second decryption method, the second decryption method and the second encryption method Match; and
    若是,则判断所述第二数据未被篡改。If yes, it is determined that the second data has not been tampered with.
  3. 根据权利要求2所述的数据获取方法,其特征在于,所述利用所述服务器对所述第一加密数据以第二加密方式加密,以形成所述第二加密数据,包括:The data acquisition method according to claim 2, wherein the using the server to encrypt the first encrypted data in a second encryption manner to form the second encrypted data comprises:
    生成针对所述第一加密数据的第一数据摘要;及Generating a first data digest for the first encrypted data; and
    对所述第一数据摘要以第一私钥进行加密以形成数字签名。The first data digest is encrypted with a first private key to form a digital signature.
  4. 根据权利要求3所述的数据获取方法,其特征在于,所述判断以第二解密方式是否能够对所述第二加密数据进行解密,包括:The data acquisition method according to claim 3, wherein the determining whether the second encrypted data can be decrypted in a second decryption manner comprises:
    判断第一公钥是否能够对所述数字签名解密,所述第一公钥与所述第一私钥成对;Determining whether a first public key can decrypt the digital signature, and the first public key is paired with the first private key;
    若是,则生成针对所述第一加密数据的第二数据摘要;If yes, generating a second data digest for the first encrypted data;
    判断所述第二数据摘要是否与所述第一数据摘要一致;及Determining whether the second data digest is consistent with the first data digest; and
    若是,则判断以第二解密方式能够对所述第二加密数据进行解密。If yes, it is determined that the second encrypted data can be decrypted in a second decryption manner.
  5. 根据权利要求1所述的数据获取方法,其特征在于,所述第二数据还包括所述身份标识码,在所述利用所述终端以第一解密方式对所述第一加密数据进行解密以得到所述标定数据前,所述数据获取方法还包括:The data acquisition method according to claim 1, wherein the second data further comprises the identification code, and the first encrypted data is decrypted in a first decryption manner by the terminal to Before obtaining the calibration data, the data acquisition method further includes:
    判断所述身份标识码是否与所述终端内存储的原始身份标识码一致;及Determining whether the identity identification code is consistent with the original identity identification code stored in the terminal; and
    若否,则利用所述终端以第一解密方式对所述第一加密数据进行解密以得到所述标定数据。If not, use the terminal to decrypt the first encrypted data in a first decryption manner to obtain the calibration data.
  6. 根据权利要求1所述的数据获取方法,其特征在于,所述终端形成有可信执行环境,在所述利用所述终端发送第一数据至所述诊断工具前,所述数据获取方法还包括:利用所述终端在所述可信执行环境中以第三加密方式加密所述身份识别码以得到所述第一数据;The data acquisition method according to claim 1, wherein the terminal forms a trusted execution environment, and before the using the terminal to send the first data to the diagnostic tool, the data acquisition method further comprises Using the terminal to encrypt the identity identification code in a third encryption manner in the trusted execution environment to obtain the first data;
    在所述利用所述服务器发送第二数据至所述诊断工具前,所述数据获取方法还包括:Before the using the server to send second data to the diagnostic tool, the data acquisition method further includes:
    以第三解密方式解密所述第一数据以得到所述身份识别码,所述第三解密方式与所述第三加密方式相匹配。The first data is decrypted in a third decryption manner to obtain the identification code, and the third decryption manner matches the third encryption manner.
  7. 根据权利要求1所述的数据获取方法,其特征在于,在所述利用所述终端以第一解密方式对所述第一加密数据进行解密以得到所述标定数据前,所述数据获取方法还包括:The data acquisition method according to claim 1, wherein before the using the terminal to decrypt the first encrypted data in a first decryption manner to obtain the calibration data, the data acquisition method further comprises: include:
    利用所述终端判断所述第二数据是否被篡改;及Using the terminal to determine whether the second data has been tampered with; and
    若否,则利用所述终端以第一解密方式对所述第一加密数据进行解密以得到所述标定数据。If not, use the terminal to decrypt the first encrypted data in a first decryption manner to obtain the calibration data.
  8. 一种数据获取方法,用于终端,所述终端通过诊断工具与服务器通信,所述终端包括激光投射器,其特征在于,所述数据获取方法包括:A data acquisition method for a terminal, the terminal communicates with a server through a diagnostic tool, the terminal includes a laser projector, and the data acquisition method includes:
    发送第一数据至所述诊断工具,以使所述诊断工具将所述第一数据发送至所述服务器,所述第一数据包括被加密的所述激光投射器的身份标识码;Sending first data to the diagnostic tool, so that the diagnostic tool sends the first data to the server, the first data includes an encrypted identification code of the laser projector;
    在所述诊断工具判断所述第二数据未被篡改时,接收所述诊断工具发送的第二数据,所述第二数据由所述服务器发送至所述诊断工具,所述第二数据包括第一加密数据,所述第一加密数据包括被以第一加密方式加密的与所述身份标识码相匹配的标定数据;及When the diagnostic tool determines that the second data has not been tampered with, the second data sent by the diagnostic tool is received, the second data is sent by the server to the diagnostic tool, and the second data includes a first Encrypted data, the first encrypted data includes calibration data that is encrypted in a first encryption manner and matches the identity identification code; and
    以第一解密方式对所述第一加密数据进行解密以得到所述标定数据,所述第一解密方式与所述第一加密方式相匹配。The first encrypted data is decrypted in a first decryption manner to obtain the calibration data, and the first decryption manner matches the first encryption manner.
  9. 根据权利要求8所述的数据获取方法,其特征在于,所述第二数据还包括所述身份识别码,在所述以第一解密方式对所述第一加密数据进行解密以得到所述标定数据前,所述数据获取方法还包括:The data acquisition method according to claim 8, wherein the second data further comprises the identification code, and the first encrypted data is decrypted in the first decryption manner to obtain the calibration Before data, the data acquisition method further includes:
    判断所述身份标识码是否与所述终端内存储的原始身份标识码一致;及Determining whether the identity identification code is consistent with the original identity identification code stored in the terminal; and
    若否,则以第一解密方式对所述第一加密数据进行解密以得到所述标定数据。If not, the first encrypted data is decrypted in a first decryption manner to obtain the calibration data.
  10. 根据权利要求8所述的数据获取方法,其特征在于,所述终端形成有可信执行环境,在所述发送第一数据至所述诊断工具前,所述数据获取方法还包括:在所述可信执行环境中以第三加密方式加密所述身份识别码以得到所述第一数据。The data acquisition method according to claim 8, wherein the terminal forms a trusted execution environment, and before the sending the first data to the diagnostic tool, the data acquisition method further comprises: The trusted execution environment encrypts the identity identification code in a third encryption manner to obtain the first data.
  11. 根据权利要求8所述的数据获取方法,其特征在于,在所述以第一解密方式对所述第一加密数据进行解密以得到所述标定数据前,所述数据获取方法还包括:The data acquisition method according to claim 8, wherein before the decrypting the first encrypted data in a first decryption manner to obtain the calibration data, the data acquisition method further comprises:
    判断所述第二数据是否被篡改;及Determining whether the second data has been tampered with; and
    若否,则以第一解密方式对所述第一加密数据进行解密以得到所述标定数据。If not, the first encrypted data is decrypted in a first decryption manner to obtain the calibration data.
  12. 一种数据获取方法,用于诊断工具,所述诊断工具与终端及服务器通信,所述终端包括激光投射器,其特征在于,所述数据获取方法包括:A data acquisition method is used for a diagnostic tool, the diagnostic tool communicates with a terminal and a server, the terminal includes a laser projector, and the data acquisition method includes:
    接收所述终端发送的第一数据并转发至所述服务器,所述第一数据包括被加密的所述激光投射器的身份标识码;Receiving the first data sent by the terminal and forwarding it to the server, where the first data includes an encrypted identification code of the laser projector;
    接收所述服务器发送的第二数据,所述第二数据包括第一加密数据,所述第一加密数据包括被以第一加密方式加密的与所述身份标识码相匹配的标定数据;及Receiving second data sent by the server, the second data including first encrypted data, the first encrypted data including calibration data that is encrypted in a first encryption manner and matches the identity identification code; and
    判断所述第二数据是否被篡改,并在判断所述第二数据未被篡改时发送所述第二数据至所述终端,以利用所述终端以第一解密方式对所述第一加密数据进行解密以得到所述标定数据,所述第一解密方式与所述第一加密方式相匹配。Determine whether the second data has been tampered with, and send the second data to the terminal when it is determined that the second data has not been tampered with, so as to use the terminal to decrypt the first encrypted data in a first decryption manner Decryption is performed to obtain the calibration data, and the first decryption method matches the first encryption method.
  13. 根据权利要求12所述的数据获取方法,其特征在于,所述第二数据还包括第二加密数据,所述服务器用于对所述第一加密数据以第二加密方式加密,以形成所述第二加密数据;所述数据获取方法还包括:The data acquisition method according to claim 12, wherein the second data further comprises second encrypted data, and the server is configured to encrypt the first encrypted data in a second encryption manner to form the second encrypted data. Second encrypted data; the data acquisition method further includes:
    判断以第二解密方式是否能够对所述第二加密数据进行解密,所述第二解密方式与所述第二加密方式相匹配;及Judging whether the second encrypted data can be decrypted by a second decryption method that matches the second encryption method; and
    若是,则判断所述第二数据未被篡改。If yes, it is determined that the second data has not been tampered with.
  14. 根据权利要求13所述的数据获取方法,其特征在于,所述服务器还用于生成针对所述第一加密数据的第一数据摘要;及对所述第一数据摘要以第一私钥进行加密以形成数字签名;所述判断以第二解密方式是否能够对所述第二加密数据进行解密,包括:The data acquisition method according to claim 13, wherein the server is further configured to generate a first data digest for the first encrypted data; and encrypt the first data digest with a first private key To form a digital signature; the determining whether the second encrypted data can be decrypted in a second decryption manner includes:
    判断第一公钥是否能够对所述数字签名解密,所述第一公钥与所述第一私钥成对;Determining whether a first public key can decrypt the digital signature, and the first public key is paired with the first private key;
    若是,则生成针对所述第一加密数据的第二数据摘要;If yes, generating a second data digest for the first encrypted data;
    判断所述第二数据摘要是否与所述第一数据摘要一致;及Determining whether the second data digest is consistent with the first data digest; and
    若是,则判断以第二解密方式能够对所述第二加密数据进行解密。If yes, it is determined that the second encrypted data can be decrypted in a second decryption manner.
  15. 一种数据获取系统,所述数据获取系统包括终端、诊断工具和服务器,所述终端包括激光投射器,其特征在于:A data acquisition system includes a terminal, a diagnostic tool, and a server, and the terminal includes a laser projector, which is characterized by:
    所述终端用于发送第一数据至所述诊断工具,所述第一数据包括被加密的所述激光投射器的身份标识码;The terminal is configured to send first data to the diagnostic tool, where the first data includes an encrypted identification code of the laser projector;
    所述诊断工具用于将所述第一数据发送至所述服务器;The diagnostic tool is configured to send the first data to the server;
    所述服务器用于发送第二数据至所述诊断工具,所述第二数据包括第一加密数据,所述第一加密数据包括被以第一加密方式加密的与所述身份标识码相匹配的标定数据;The server is configured to send second data to the diagnostic tool, where the second data includes first encrypted data, and the first encrypted data includes a first encrypted data that matches the identity identification code. Calibration data
    所述诊断工具还用于判断所述第二数据是否被篡改,并在判断所述第二数据未被篡改时发送所述第二数据至所述终端;The diagnostic tool is further configured to determine whether the second data has been tampered with, and send the second data to the terminal when it is determined that the second data has not been tampered with;
    所述终端还用于以第一解密方式对所述第一加密数据进行解密以得到所述标定数据,所述第一解密方式与所述第一加密方式相匹配。The terminal is further configured to decrypt the first encrypted data in a first decryption manner to obtain the calibration data, and the first decryption manner matches the first encryption manner.
  16. 根据权利要求15所述的数据获取系统,其特征在于,所述第二数据还包括第二加密数据,所述服务器还用于对所述第一加密数据以第二加密方式加密,以形成所述第二加密数据;The data acquisition system according to claim 15, wherein the second data further includes second encrypted data, and the server is further configured to encrypt the first encrypted data in a second encryption manner to form the encrypted data. Mentioned second encrypted data;
    所述诊断工具还用于判断以第二解密方式是否能够对所述第二加密数据进行解密,所述第二解密方式与所述第二加密方式相匹配;及The diagnostic tool is further configured to determine whether the second encrypted data can be decrypted in a second decryption mode, and the second decryption mode matches the second encryption mode; and
    若是,则判断所述第二数据未被篡改。If yes, it is determined that the second data has not been tampered with.
  17. 根据权利要求16所述的数据获取系统,其特征在于,所述服务器还用于:The data acquisition system according to claim 16, wherein the server is further configured to:
    生成针对所述第一加密数据的第一数据摘要;及Generating a first data digest for the first encrypted data; and
    对所述第一数据摘要以第一私钥进行加密以形成数字签名。The first data digest is encrypted with a first private key to form a digital signature.
  18. 根据权利要求17所述的数据获取系统,其特征在于,所述诊断工具还用于:The data acquisition system according to claim 17, wherein the diagnostic tool is further configured to:
    判断第一公钥是否能够对所述数字签名解密,所述第一公钥与所述第一私钥成对;Determining whether a first public key can decrypt the digital signature, and the first public key is paired with the first private key;
    若是,则生成针对所述第一加密数据的第二数据摘要;If yes, generating a second data digest for the first encrypted data;
    判断所述第二数据摘要是否与所述第一数据摘要一致;及Determining whether the second data digest is consistent with the first data digest; and
    若是,则判断以第二解密方式能够对所述第二加密数据进行解密。If yes, it is determined that the second encrypted data can be decrypted in a second decryption manner.
  19. 根据权利要求15所述的数据获取系统,其特征在于,所述第二数据还包括所述身份标识码,所述终端还用于:The data acquisition system according to claim 15, wherein the second data further includes the identity identification code, and the terminal is further configured to:
    判断所述身份标识码是否与所述终端内存储的原始身份标识码一致;及Determining whether the identity identification code is consistent with the original identity identification code stored in the terminal; and
    若否,则利用所述终端以第一解密方式对所述第一加密数据进行解密以得到所述标定数据。If not, use the terminal to decrypt the first encrypted data in a first decryption manner to obtain the calibration data.
  20. 根据权利要求15所述的数据获取系统,其特征在于,所述终端形成有可信执行环境,所述终端还用于在所述可信执行环境中以第三加密方式加密所述身份识别码以得到所述第一数据;The data acquisition system according to claim 15, wherein the terminal forms a trusted execution environment, and the terminal is further configured to encrypt the identity identification code in a third encryption manner in the trusted execution environment. To obtain the first data;
    所述服务器还用于以第三解密方式解密所述第一数据以得到所述身份识别码,所述第三解密方式与所述第三加密方式相匹配。The server is further configured to decrypt the first data in a third decryption manner to obtain the identification code, and the third decryption manner matches the third encryption manner.
  21. 根据权利要求15所述的数据获取系统,其特征在于,所述终端还用于:The data acquisition system according to claim 15, wherein the terminal is further configured to:
    判断所述第二数据是否被篡改;及Determining whether the second data has been tampered with; and
    若否,则以第一解密方式对所述第一加密数据进行解密以得到所述标定数据。If not, the first encrypted data is decrypted in a first decryption manner to obtain the calibration data.
  22. 一种终端,所述终端通过诊断工具与服务器通信,所述终端包括激光投射器,其特征在于,所述终端用于:A terminal, the terminal communicates with a server through a diagnostic tool, the terminal includes a laser projector, and the terminal is used for:
    发送第一数据至所述诊断工具,以使所述诊断工具将所述第一数据发送至所述服务器,所述第一数据包括被加密的所述激光投射器的身份标识码;Sending first data to the diagnostic tool, so that the diagnostic tool sends the first data to the server, the first data includes an encrypted identification code of the laser projector;
    在所述诊断工具判断所述第二数据未被篡改时,接收所述诊断工具发送的第二数据,所述第二数据由所述服务器发送至所述诊断工具,所述第二数据包括第一加密数据,所述第一加密数据包括被以第一加密方式加密的与所述身份标识码相匹配的标定数据;及When the diagnostic tool determines that the second data has not been tampered with, the second data sent by the diagnostic tool is received, the second data is sent by the server to the diagnostic tool, and the second data includes a first Encrypted data, the first encrypted data includes calibration data that is encrypted in a first encryption manner and matches the identity identification code; and
    以第一解密方式对所述第一加密数据进行解密以得到所述标定数据,所述第一解密方式与所述第一加密方式相匹配。The first encrypted data is decrypted in a first decryption manner to obtain the calibration data, and the first decryption manner matches the first encryption manner.
  23. 一种电子设备,所述电子设备包括诊断工具,所述诊断工具与终端及服务器通信,所述终端包括激光投射器,其特征在于,所述诊断工具用于:An electronic device includes a diagnostic tool, the diagnostic tool communicates with a terminal and a server, the terminal includes a laser projector, and the diagnostic tool is used for:
    接收所述终端发送的第一数据并转发至所述服务器,所述第一数据包括被加密的所述激光投射器的身份标识码;Receiving the first data sent by the terminal and forwarding it to the server, where the first data includes an encrypted identification code of the laser projector;
    接收所述服务器发送的第二数据,所述第二数据包括第一加密数据,所述第一加密数据包括被以第一加密方式加密的与所述身份标识码相匹配的标定数据;及Receiving second data sent by the server, the second data including first encrypted data, the first encrypted data including calibration data that is encrypted in a first encryption manner and matches the identity identification code; and
    判断所述第二数据是否被篡改,并在判断所述第二数据未被篡改时发送所述第二数据至所述终端,以利用所述终端以第一解密方式对所述第一加密数据进行解密以得到所述标定数据,所述第一解密方式与所述第一加密方式相匹配。Determine whether the second data has been tampered with, and send the second data to the terminal when it is determined that the second data has not been tampered with, so as to use the terminal to decrypt the first encrypted data in a first decryption manner Decryption is performed to obtain the calibration data, and the first decryption method matches the first encryption method.
  24. 一个或多个包含计算机可执行指令的非易失性计算机可读存储介质,当所述计算机可执行指令被一个或多个处理器执行时,使得所述处理器执行权利要求1至7中任意一项所述的数据获取方法;或One or more non-transitory computer-readable storage media containing computer-executable instructions that, when executed by one or more processors, cause said processors to perform any of claims 1 to 7 A data acquisition method as described in one item; or
    当所述计算机可执行指令被一个或多个处理器执行时,使得所述处理器执行权利要求8至11中任 意一项所述的数据获取方法;或When the computer-executable instructions are executed by one or more processors, causing the processors to execute the data acquisition method according to any one of claims 8 to 11; or
    当所述计算机可执行指令被一个或多个处理器执行时,使得所述处理器执行权利要求12至14中任意一项所述的数据获取方法。When the computer-executable instructions are executed by one or more processors, the processors are caused to execute the data acquisition method according to any one of claims 12 to 14.
  25. 一种计算机设备,包括存储器及处理器,所述存储器中存储有计算机可读指令,所述指令被所述处理器执行时,使得所述处理器执行权利要求1至7中任意一项所述的数据获取方法;或A computer device includes a memory and a processor. The memory stores computer-readable instructions. When the instructions are executed by the processor, the processor causes the processor to execute any one of claims 1 to 7. Method of data acquisition; or
    所述指令被所述处理器执行时,使得所述处理器执行权利要求8至11中任意一项所述的数据获取方法;或When the instruction is executed by the processor, the processor is caused to execute the data acquisition method according to any one of claims 8 to 11; or
    所述指令被所述处理器执行时,使得所述处理器执行权利要求12至14中任意一项所述的数据获取方法。When the instruction is executed by the processor, the processor is caused to execute the data acquisition method according to any one of claims 12 to 14.
PCT/CN2019/070846 2018-07-13 2019-01-08 Data acquisition method, data acquisition system, terminal, and diagnostic tool WO2020010831A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810771805.4 2018-07-13
CN201810771805.4A CN108924144B (en) 2018-07-13 2018-07-13 Data acquisition method, data acquisition system, terminal and diagnosis tool

Publications (1)

Publication Number Publication Date
WO2020010831A1 true WO2020010831A1 (en) 2020-01-16

Family

ID=64412095

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/070846 WO2020010831A1 (en) 2018-07-13 2019-01-08 Data acquisition method, data acquisition system, terminal, and diagnostic tool

Country Status (2)

Country Link
CN (1) CN108924144B (en)
WO (1) WO2020010831A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108924144B (en) * 2018-07-13 2020-12-22 Oppo广东移动通信有限公司 Data acquisition method, data acquisition system, terminal and diagnosis tool
CN110189434B (en) * 2019-05-29 2022-04-19 深圳市元征科技股份有限公司 Vehicle safety checking method and related equipment thereof

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105281904A (en) * 2014-06-06 2016-01-27 佛山市顺德区美的电热电器制造有限公司 Message data encryption method and system, internet of things server and internet of things terminal
CN106996745A (en) * 2017-04-28 2017-08-01 国网河南省电力公司电力科学研究院 A kind of laser monitoring system of the fault displacement of breaker body
US20170323087A1 (en) * 2016-05-03 2017-11-09 Pegasus Media Security, Llc Methods and apparatus for device authentication and secure data exchange between a server application and a device
CN108924144A (en) * 2018-07-13 2018-11-30 Oppo广东移动通信有限公司 Data capture method, data-acquisition system, terminal and diagnostic tool

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9355271B2 (en) * 2013-10-18 2016-05-31 Robert Bosch Gmbh System and method for dynamic, non-interactive, and parallelizable searchable symmetric encryption
CN105099686B (en) * 2014-05-13 2019-08-23 腾讯科技(深圳)有限公司 Data synchronous method, server, terminal and system
CN104158657A (en) * 2014-07-16 2014-11-19 中兴通讯股份有限公司 Information processing method and device, as well as encryption equipment
JP6566644B2 (en) * 2015-01-20 2019-08-28 Line株式会社 Authentication server device, program, authentication method, and authentication system
CN105635320A (en) * 2016-03-04 2016-06-01 江苏盟广信息技术有限公司 Method and equipment for calling configuration information
CN106790036B (en) * 2016-12-16 2019-05-07 Oppo广东移动通信有限公司 A kind of information tamper resistant method, device, server and terminal
CN107276756A (en) * 2017-07-27 2017-10-20 深圳市金立通信设备有限公司 A kind of method and server for obtaining root key
CN107733912A (en) * 2017-10-31 2018-02-23 珠海市魅族科技有限公司 Information ciphering method, information authentication method, terminal and computer-readable recording medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105281904A (en) * 2014-06-06 2016-01-27 佛山市顺德区美的电热电器制造有限公司 Message data encryption method and system, internet of things server and internet of things terminal
US20170323087A1 (en) * 2016-05-03 2017-11-09 Pegasus Media Security, Llc Methods and apparatus for device authentication and secure data exchange between a server application and a device
CN106996745A (en) * 2017-04-28 2017-08-01 国网河南省电力公司电力科学研究院 A kind of laser monitoring system of the fault displacement of breaker body
CN108924144A (en) * 2018-07-13 2018-11-30 Oppo广东移动通信有限公司 Data capture method, data-acquisition system, terminal and diagnostic tool

Also Published As

Publication number Publication date
CN108924144B (en) 2020-12-22
CN108924144A (en) 2018-11-30

Similar Documents

Publication Publication Date Title
CN112637166B (en) Data transmission method, device, terminal and storage medium
CN110677250B (en) Key and certificate distribution method, identity information processing method, device and medium
JP6382272B2 (en) How to use one device to unlock another
US20210192090A1 (en) Secure data storage device with security function implemented in a data security bridge
US11469885B2 (en) Remote grant of access to locked data storage device
US9912485B2 (en) Method and apparatus for embedding secret information in digital certificates
TWI725148B (en) Methods, systems, and media for using dynamic public key infrastructure to send and receive encrypted messages
US11212671B2 (en) Method and system for securing communication links using enhanced authentication
US10944579B2 (en) Device pairing and authentication
EP3206329A1 (en) Security check method, device, terminal and server
US11831752B2 (en) Initializing a data storage device with a manager device
US10439809B2 (en) Method and apparatus for managing application identifier
US11334677B2 (en) Multi-role unlocking of a data storage device
WO2020010831A1 (en) Data acquisition method, data acquisition system, terminal, and diagnostic tool
WO2020010832A1 (en) Data acquisition method, mobile terminal, electronic device, production line calibration system, readable storage medium and computer device
US11366933B2 (en) Multi-device unlocking of a data storage device
US20230289456A1 (en) Certificates in data storage devices
US20230291548A1 (en) Authorization requests from a data storage device to multiple manager devices
WO2022250927A1 (en) Binding with cryptographic key attestation
US11616769B2 (en) Runtime identity confirmation for restricted server communication control
US11265152B2 (en) Enrolment of pre-authorized device
KR20110114990A (en) Apparatus and method for securing a keyboard
WO2023145240A1 (en) Information processing device and information processing system
US20230291579A1 (en) Cryptographic keys for authorization requests from a data storage device
US20220244866A1 (en) Data storage device, system, and method for digital signature

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19833502

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19833502

Country of ref document: EP

Kind code of ref document: A1