WO2021237542A1 - 数据处理、加密、解密方法、设备和存储介质 - Google Patents

数据处理、加密、解密方法、设备和存储介质 Download PDF

Info

Publication number
WO2021237542A1
WO2021237542A1 PCT/CN2020/092736 CN2020092736W WO2021237542A1 WO 2021237542 A1 WO2021237542 A1 WO 2021237542A1 CN 2020092736 W CN2020092736 W CN 2020092736W WO 2021237542 A1 WO2021237542 A1 WO 2021237542A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
information
data decryption
record information
encrypted
Prior art date
Application number
PCT/CN2020/092736
Other languages
English (en)
French (fr)
Inventor
郑文强
Original Assignee
深圳市大疆创新科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市大疆创新科技有限公司 filed Critical 深圳市大疆创新科技有限公司
Priority to PCT/CN2020/092736 priority Critical patent/WO2021237542A1/zh
Priority to CN202080015620.6A priority patent/CN113545022A/zh
Publication of WO2021237542A1 publication Critical patent/WO2021237542A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C5/00Registering or indicating the working of vehicles
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C5/00Registering or indicating the working of vehicles
    • G07C5/008Registering or indicating the working of vehicles communicating information to a remotely located station
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C5/00Registering or indicating the working of vehicles
    • G07C5/08Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle or waiting time
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C5/00Registering or indicating the working of vehicles
    • G07C5/08Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle or waiting time
    • G07C5/0841Registering performance data
    • G07C5/085Registering performance data using electronic data carriers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD

Definitions

  • This application relates to the technical field of data security for mobile platforms, and in particular to a method, device, and storage medium for data processing, encryption, and decryption.
  • operating records are usually generated during the operation.
  • Some operating records can be stored on terminal devices that can communicate with the mobile platform.
  • this application provides a data processing, encryption, and decryption method, device, and storage medium, aiming at encrypting and decrypting the running record of the mobile platform to prevent the running record from being cracked.
  • an embodiment of the present application provides a data processing method, and the method includes:
  • the terminal equipment obtains the operation record information of the movable platform
  • the terminal device encrypts the operation log information according to the AES key to obtain encrypted log information
  • the terminal device encrypts the AES key according to the RSA public key to obtain an encryption key
  • the terminal device sends the encrypted record information and the encryption key to a data decryption device
  • the data decryption device sends the encryption key to the server
  • the server returns the AES key to the data decryption device
  • the data decryption device decrypts the encrypted record information according to the AES key to obtain the operation record information.
  • an embodiment of the present application provides a data encryption method for terminal equipment, and the method includes:
  • an embodiment of the present application provides a data decryption method for a data decryption device, and the method includes:
  • the encrypted record information is obtained by encrypting the running record information of the movable platform by the terminal device according to the AES key, and the encryption key is obtained by the terminal device according to the RSA Obtained by encrypting the AES key with a public key;
  • the encrypted record information is decrypted according to the AES key to obtain the operation record information.
  • an embodiment of the present application provides a data decryption method for a server, and the method includes:
  • the encryption key is obtained by encrypting the AES key by the terminal device according to the RSA public key, and the AES key is used for the terminal device to encrypt the running record information of the movable platform Obtain encrypted record information;
  • the AES key is transmitted back to the data decryption device, so that the data decryption device decrypts the encrypted record information according to the AES key to obtain the operation record information.
  • the embodiments of the present application provide a terminal device capable of communicating with a mobile platform, including one or more processors, working individually or together, for performing the following steps:
  • an embodiment of the present application provides a data decryption device, including one or more processors, which work individually or collectively, and are configured to perform the following steps:
  • the encrypted record information is obtained by encrypting the running record information of the movable platform by the terminal device according to the AES key, and the encryption key is obtained by the terminal device according to the RSA Obtained by encrypting the AES key with a public key;
  • the encrypted record information is decrypted according to the AES key to obtain the operation record information.
  • an embodiment of the present application provides a server, including one or more processors, which work individually or collectively, and are configured to perform the following steps:
  • the encryption key is obtained by encrypting the AES key by the terminal device according to the RSA public key, and the AES key is used for the terminal device to encrypt the running record information of the movable platform Obtain encrypted record information;
  • the AES key is transmitted back to the data decryption device, so that the data decryption device decrypts the encrypted record information according to the AES key to obtain the operation record information.
  • an embodiment of the present application provides a computer-readable storage medium, the computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, the processor implements the above-mentioned method.
  • the embodiments of the application provide a data processing, encryption, and decryption method, device, and storage medium.
  • the terminal device encrypts the operation record information according to the AES key and encrypts the AES key according to the RSA public key, and the encrypted operation record is stored on the terminal device.
  • the data decryption device can send the encrypted AES key to the server for decryption, and decrypt the encrypted operating record information according to the decrypted AES key; therefore, it is not necessary to run
  • the record information can be decrypted by uploading it to the server, which can protect the user's private data, and only after obtaining the AES key decrypted by the server can the encrypted running record information be decrypted, which improves the security of the data, such as preventing the running record information Cracked and tampered.
  • FIG. 1 is a schematic flowchart of a data processing method provided by an embodiment of the present application
  • Fig. 2 is a schematic diagram of an application scenario of a data processing method in an embodiment of the present application
  • Fig. 3 is a schematic diagram of a running log file generated by a terminal device in an embodiment of the present application
  • FIG. 4 is a schematic flowchart of a data encryption method provided by an embodiment of the present application.
  • FIG. 5 is a schematic flowchart of a data decryption method provided by an embodiment of the present application.
  • FIG. 6 is a schematic flowchart of a data decryption method provided by an embodiment of the present application.
  • FIG. 7 is a schematic block diagram of a terminal device provided by an embodiment of the present application.
  • FIG. 8 is a schematic block diagram of a data decryption device provided by an embodiment of the present application.
  • Fig. 9 is a schematic block diagram of a server provided by an embodiment of the present application.
  • FIG. 1 is a schematic flowchart of a data processing method provided by an embodiment of the present application.
  • the data processing method can be applied to the system shown in FIG. 2, which includes a terminal device, a data decryption device, and a server, and the data processing method is used to process the operating record information of the mobile platform obtained by the terminal device. Waiting for the process.
  • the movable platform may include at least one of an unmanned aerial vehicle, a pan/tilt, an unmanned vehicle, and the like. As shown in FIG. 2, the movable platform includes an unmanned aerial vehicle. Furthermore, the unmanned aerial vehicle may be a rotary-wing unmanned aerial vehicle, such as a four-rotor unmanned aerial vehicle, a hexa-rotor unmanned aerial vehicle, an eight-rotor unmanned aerial vehicle, or a fixed-wing unmanned aerial vehicle.
  • the terminal device may include at least one of a mobile phone, a tablet computer, a notebook computer, a desktop computer, a personal digital assistant, a wearable device, a remote control, and the like.
  • the terminal device and the mobile platform can transmit data through a wireless channel.
  • the wireless channel from the mobile platform to the terminal device is called the downlink channel, which is used to transmit data collected by the mobile platform, such as videos, pictures, sensor data, and the mobile platform.
  • data collected by the mobile platform such as videos, pictures, sensor data, and the mobile platform.
  • OSD unmanned aerial vehicle status information
  • other telemetry data such as unmanned aerial vehicle status information (OSD) and other telemetry data.
  • the wireless channel from the terminal device to the movable platform is called the uplink channel, which is used to transmit remote control data; for example, when the movable platform is an unmanned aerial vehicle, the uplink channel is used to transmit flight control commands. And control instructions such as taking photos, videos, and returning to home.
  • the mobile platform may generate operation records during operation.
  • the operation record may include at least one of power information, posture information, speed information, and instructions received from the terminal device.
  • the terminal device when the terminal device communicates with the movable platform, it can obtain operation records sent by the movable platform, such as power information, attitude information, speed information, etc. of the movable platform; for example, the terminal device is communicating with the movable platform.
  • operation records sent by the movable platform, such as power information, attitude information, speed information, etc. of the movable platform; for example, the terminal device is communicating with the movable platform.
  • record information such as control instructions to the movable platform can be recorded; or the operation record of the movable platform can be generated according to the state of the movable platform.
  • the data decryption device may include at least one of a mobile phone, a tablet computer, a notebook computer, a desktop computer, a personal digital assistant, and the like.
  • the user of the data decryption device can decrypt the data encrypted by the terminal device, so that the decrypted data can be used.
  • the data decryption device may include a terminal used by a repairer of a movable platform, an insurance provider of a movable platform, and the like. According to the operation records of the movable platform, the movable platform can be health checked, repaired, or the pilot's flying habits can be judged.
  • the data decryption device may also be the user's equipment of the mobile platform.
  • the user's mobile phone, tablet computer, notebook computer, desktop computer, personal digital assistant, etc. can be used as a terminal device to control the mobile platform and obtain the mobile platform.
  • the platform's operating record information, encrypting the operating record information, etc. can also be used as a data decryption device to decrypt the encrypted operating record information.
  • the server may be an independent server or a server cluster.
  • the server can be a server deployed by a mobile platform manufacturer, seller, or mobile platform control software service provider; wherein the mobile platform control software can be installed on a terminal device to control the mobile platform.
  • the data processing method of the embodiment of the present application includes step S110 to step S180.
  • Step S110 The terminal device obtains the operation record information of the movable platform.
  • the operation record information may include at least one of the attitude, altitude, speed, battery information, remaining battery life, forced landing information, and flight restriction information of the movable platform.
  • the battery information can include the output voltage and remaining power of the mobile platform battery
  • the flight restriction information can include the mobile platform, such as whether the unmanned aerial vehicle approaches or enters the restricted flight zone.
  • the unmanned aerial vehicle when an unmanned aerial vehicle is detected violently flying, the unmanned aerial vehicle is forced to land, and the unmanned aerial vehicle and/or the unmanned aerial vehicle record the relevant information of the forced landing to obtain the forced landing information.
  • the terminal device may obtain the operation record information of the movable platform when controlling the movable platform, and/or obtain the operation record information from the movable platform after using the movable platform.
  • the running log information can be classified according to different rules. For example, by marking the attributes of the running record information to classify the running record information, it is possible to realize the differentiated processing of different running record information.
  • the attribute of the operation log information includes at least one of the permission level, acquisition time, and storage location of the operation log information.
  • the attribute of the operation log information includes at least one of the permission level, acquisition time, and storage location of the operation log information.
  • the permission level of running log information can include sensitive, general, and so on.
  • the permission level of operation log information with higher confidentiality requirements is sensitive, and users with higher permissions can obtain the operation log information;
  • the permission level of operation log information with lower confidentiality requirements The level is general-purpose, and users with lower authority can obtain the running record information.
  • the sensitive operation log information may include at least one of battery information, remaining battery life, emergency landing information, and flight restriction information;
  • the general operation log information may include the attitude, altitude, speed, etc. of the movable platform.
  • time periods corresponding to the running record information obtained in different time periods may be classified to determine the corresponding attributes.
  • different types of running record information may be stored in different storage areas of the terminal device.
  • the operation log information obtained from the mobile platform is stored in a location area of the terminal device memory
  • the operation log information generated by the terminal device is stored in another location area of the terminal device memory.
  • the running log information of the mobile platform obtained by the terminal device is stored as a running log file, and the running log file includes several data blocks, such as data block 1, data block 2. &Data block N, the running record information in different data blocks has different attributes.
  • data block 1 is sensitive running record information
  • data block N is general running record information
  • data block 1 is running record information acquired in a period of time
  • data block N is Run log information obtained for another time period.
  • the operating record information of the mobile platform obtained by the terminal device may include one data block, two data blocks or more data blocks; or the operating record information of the movable platform obtained by the terminal device may include one data block, two data blocks or more.
  • the running record information of one attribute, the running record information of two attributes, or the running record information of multiple attributes; of course, the running record information of the mobile platform acquired by the terminal device can also be part of the attribute, but as a whole data.
  • Step S120 The terminal device encrypts the operation log information according to the AES key to obtain encrypted log information.
  • AES Advanced Encryption Standard
  • AES Advanced Encryption Standard
  • the security of the running log information can be improved. Only the party who has obtained the AES key can decrypt the encrypted log information and restore the original running log information.
  • the AES key may be randomly generated by the terminal device.
  • the mobile platform software of the terminal device is turned on, one or more AES keys are randomly generated, which can improve the randomness and security of the AES key. .
  • the AES key may be obtained by the terminal device from the server.
  • the AES key may be requested from the server when needed according to a preset rule.
  • the encrypting the operation log information according to the AES key to obtain the encrypted log information includes: determining the corresponding AES key according to the attribute of the operation log information; and according to the AES key pair The running record information of the attribute is encrypted to obtain the encrypted record information.
  • data block 1 can be encrypted according to AES key 1 to obtain encrypted record information, namely encrypted data block 1; data block 2 can be encrypted according to another AES key 2 to obtain Encrypted record information, that is, encrypted data block 2.
  • AES key may be used to encrypt some data blocks, for example, the data block N is encrypted according to the AES key 2 to obtain encrypted record information, that is, the encrypted data block N.
  • the data block N can also be encrypted according to the AES key N to obtain encrypted record information, that is, the encrypted data block N.
  • the AES keys corresponding to the running record information of different attributes are different.
  • the length of the AES key corresponding to the log information of different attributes is different.
  • the length of the AES key of the sensitive log information is longer, so the security is higher.
  • the AES key of the general log information The length is shorter, so the encryption and decryption efficiency is higher.
  • multiple AES keys can be obtained, for example, N AES keys are generated for respectively encrypting the running record information of the multiple attributes. It is understandable that because the AES key is usually generated randomly, it is not necessary to determine whether the obtained multiple AES keys are the same, and may be different by default.
  • the AES keys corresponding to the running record information of the multiple attributes are stored in a key array.
  • Step S130 The terminal device encrypts the AES key according to the RSA public key to obtain an encryption key.
  • the RSA public key encryption algorithm is an asymmetric encryption algorithm, also known as public key encryption.
  • the key used for encryption and the key used for decryption are not the same. Among them, the public key is used to encrypt data blocks, and then , Only the corresponding private key can be used for decryption.
  • the terminal device can obtain the RSA public key from the server, or when the terminal device installs the control software of the mobile platform, the control software comes with the RSA public key distributed by the server.
  • the AES key is encrypted by the RSA public key to obtain the encrypted AES key, that is, the encryption key.
  • the confidentiality of the AES key can be improved, and the AES key can be prevented from being cracked or leaked.
  • all AES keys in the key array can be encrypted uniformly by using the RSA public key, or each AES key in the key array can be encrypted separately to obtain the encryption key corresponding to each AES key .
  • the encrypting the AES key according to the RSA public key to obtain the encryption key includes: determining the corresponding RSA public key according to the attribute of the running log information; and according to the RSA public key pair The AES key is encrypted to obtain an encryption key.
  • different RSA public keys may be used to respectively encrypt different AES keys in the key array.
  • the AES key 1 can be encrypted according to the RSA public key 1 to obtain the encryption key 1 corresponding to the operation record information of the data block 1
  • the AES key 2 can be encrypted according to the RSA public key 2 to obtain the operation of the data block 2.
  • the AES keys corresponding to some data blocks may also be encrypted using the same RSA public key.
  • the AES key N corresponding to the data block N is encrypted according to the RSA public key 2 to obtain the data block N
  • the encryption key N corresponding to the running log information.
  • the RSA public keys corresponding to the running record information of different attributes are different.
  • the length of the RSA public key corresponding to the running record information of different attributes is different.
  • the length of the RSA public key corresponding to the sensitive running record information is longer, so the security is higher.
  • the general running record information corresponds to the RSA public key. The length of the key is shorter, so the encryption and decryption efficiency is higher.
  • the corresponding encrypted record information is obtained by separately encrypting the AES keys of the running record information of different attributes with different RSA public keys, which facilitates the distinguishing processing of the running record information of different attributes.
  • the encryption keys corresponding to the running log information of multiple attributes are stored in a key array.
  • the terminal device stores a key array of encryption keys corresponding to each of the running record information of multiple attributes and the encrypted record information corresponding to each of the running record information of multiple attributes as one
  • the operation log file since the encryption key and the encrypted log information are all encrypted data, the operation log file can be prevented from being cracked on the terminal device side.
  • Step S140 The terminal device sends the encrypted record information and the encryption key to the data decryption device.
  • the terminal device sends the encrypted record information and the encryption key to the data decryption device according to a user's information upload operation on the terminal device.
  • the data decryption device obtains the encrypted record information and the encryption key from the terminal device according to the user's information upload operation on the terminal device.
  • the user of the terminal device can freely choose whether to provide the encrypted encrypted record information and the encryption key to the maintenance party of the movable platform, the insurance provider of the movable platform, and the like.
  • the sending the encrypted record information and the encryption key to the data decryption device includes: sending the encrypted record information corresponding to the running record information of the multiple attributes and the key array to the data Decryption device.
  • the data decryption device obtains the encrypted record information corresponding to the running record information of the multiple attributes and the key array from the terminal device, and the key array includes the encryption key corresponding to the running record information of the multiple attributes.
  • the key array includes AES key 1, AES key 2,... AES key N encrypted according to an RSA public key.
  • the terminal device sends the encrypted record information and the encryption key to a data decryption device, so that the data decryption device decrypts the encrypted record information according to the encryption key, so as to obtain Describes the running record information of the movable platform.
  • Step S150 The data decryption device sends the encryption key to the server.
  • the data decryption device obtains the encrypted record information and the encryption key from the terminal device, and sends the encryption key to the server, so that the server decrypts the encryption key to obtain the AES key.
  • the encrypted record information is obtained by the terminal device encrypting the running record information of the movable platform according to the AES key
  • the encryption key is obtained by the terminal device encrypting the AES according to the RSA public key.
  • the key is encrypted.
  • the data decryption apparatus when the data decryption apparatus receives the operation log file uploaded by the terminal device, it may send the encryption key in the operation log file to the server, so that the server decrypts the encryption key.
  • the data decryption device sends the key array to the server, wherein the key array includes encryption keys corresponding to each of the log information of multiple attributes.
  • the data decryption device sends the encryption key corresponding to the operation record information that needs to be decrypted or has the authority to decrypt to the server.
  • Step S160 The server decrypts the encryption key to obtain the AES key.
  • the server decrypts the encryption key according to the RSA private key corresponding to the RSA public key to obtain the AES key.
  • the server may be a server deployed by a mobile platform manufacturer, seller, or mobile platform control software service provider, and the server can generate an RSA public key and an RSA private key for encrypting and decrypting AES keys, where The RSA private key can decrypt data encrypted by the RSA public key.
  • the RSA private key is kept by the server and used to decrypt the encryption key sent by the data decryption device to obtain the corresponding AES key.
  • the RSA public keys corresponding to the running log information of different attributes are different.
  • the key array includes an encryption key corresponding to the running record information of a plurality of attributes, and each encryption key is encrypted by a different RSA public key.
  • the server may determine the corresponding RSA private key according to the attribute of the running record information corresponding to the encryption key, and decrypt the encryption key corresponding to the running record information of a specific attribute according to the RSA private key, to obtain the AES key of the running record information of the attribute.
  • the RSA private keys corresponding to the running record information of different attributes are different.
  • the server decrypts the encryption key according to the authority of the data decryption device to obtain the AES key.
  • the data decryption device sends the device information and/or account information of the data decryption device to the server, and the server obtains the device information and/or account information of the data decryption device, and according to the The device information and/or account information determines the authority of the data decryption device.
  • the data decryption device sends the device information and/or account information of the data decryption device to the server, and the server determines that the data decryption device has the authority to acquire according to the device information and/or account information Attributes of running log information.
  • the data decryption device may include a terminal used by a repairer of a movable platform, an insurance provider of a movable platform, and the like.
  • the server can provide different platform maintenance parties, insurance providers, etc., with different operating record acquisition permissions.
  • the platform maintenance party has the authority to obtain general operating record information
  • the insurance provider has the authority to obtain general operating record information and sensitive operating record information.
  • the server decrypts the encryption key corresponding to the operation log information that the data decryption device has the authority to obtain.
  • the encryption key corresponding to the operation log information that the data decryption device does not have the authority to obtain may not be decrypted. Therefore, when the server decrypts the encryption key, it can determine which data blocks are allowed to be decrypted by the data decryption device according to different situations.
  • the method further includes: the server sends a non-authority prompt to the data decryption device according to the authority of the data decryption device, and the data decryption device receives the non-authority prompt sent by the server.
  • the non-authority prompt indicates that the data decryption device does not have the authority to obtain the running record information of a specific attribute.
  • the server when the server receives the encryption key sent by the data decryption device, and determines that the data decryption device does not have the authority to obtain the running record information of the attribute corresponding to the encryption key, it may send an unauthorized prompt to the data decryption device, To prompt that the data decryption device does not have the authority to obtain the running record information of this attribute.
  • Step S170 The server returns the AES key to the data decryption device.
  • the server decrypts the encryption key to obtain the AES key in step S160, and sends the AES key to the data decryption device.
  • the AES keys corresponding to the running log information of different attributes are different.
  • the server may return the AES keys corresponding to the running record information of different attributes to the data decryption device.
  • the server decrypts the AES key 1, AES key 2, ... AES key N in the key array encrypted by the RSA public key in step S160 to obtain the original AES key 1, AES key 2 ,...AES key N, and then send the decrypted AES key 1, AES key 2,...AES key N to the data decryption device in the form of a key array.
  • Step S180 The data decryption device decrypts the encrypted record information according to the AES key to obtain the operation record information.
  • the encrypted record information is obtained by the terminal device encrypting the running record information according to the AES key, so the data decryption device can decrypt the encrypted record information according to the AES key to obtain the original running record information.
  • the data decryption device may perform preset tasks based on the operation record information obtained by decryption, for example, display the operation record information to maintenance personnel, or perform further data analysis, for example, generate terminal equipment corresponding to the mobile platform's health Score and/or pilot’s flying habits.
  • the method further includes: the terminal device generates a check value of the operation log information; the terminal device sends the check value to the data decryption device, and the data decryption device The check value of the operation log information is obtained from the terminal device, and the data decryption device determines whether the operation log information obtained by decryption has been tampered with according to the check value.
  • the check value may include an MD5 check value and the like.
  • the respective check values of the running record information of multiple attributes are generated.
  • the respective check values MD5-1, MD5-2,...MD5-N of the aforementioned data block 1, data block 2, ... data block N are generated.
  • the data decryption device may determine whether the running record information of the corresponding attribute has been tampered with according to the check value. For example, the data decryption device generates the check value of the running record information of a certain attribute obtained in step S180, compares the check value with the check value generated by the terminal device, and if they are the same, it is determined that the running record information of the attribute is not Tampering, if they are not the same, it is determined that the running record information of the attribute has been tampered with.
  • the terminal device generates a check value of the operation log information, encrypts the check value according to the RSA public key, and the terminal device sends the encrypted check value to The data decryption device.
  • the data decryption device determines whether the decrypted log information has been tampered with according to the encrypted check value.
  • the data decryption device obtains the encrypted check value from the terminal device, and sends the encrypted check value to the server; the server decrypts the encrypted check value to obtain the The check value, and the check value obtained by decryption is sent back to the data decryption device.
  • the data decryption device determines whether the operation log information obtained by decryption has been tampered with according to the check value.
  • Encrypting the check value by the RSA public key can improve the security of the check value, thereby ensuring the credibility of the running log information obtained by decryption.
  • the server decrypts the encrypted check value according to the RSA private key corresponding to the RSA public key to obtain the check value.
  • the terminal device encrypts the running record information according to the AES key and encrypts the AES key according to the RSA public key, and sends the encrypted running record information and the encrypted AES key to the data decryption at the terminal device.
  • the data decryption device can send the encrypted AES key to the server for decryption, and decrypt the encrypted operation log information according to the decrypted AES key; therefore, the operation log information can be decrypted without uploading the operation log information to the server.
  • Protect the user's private data, and only after obtaining the AES key decrypted by the server can the encrypted running log information be decrypted, which improves the security of the data, such as preventing the running log information from being cracked and tampered with.
  • FIG. 4 is a schematic flowchart of a data encryption method provided by another embodiment of the present application.
  • the data encryption method can be used in the aforementioned terminal equipment to encrypt the operation record information of the movable platform and other processes.
  • the data encryption method in the embodiment of this specification includes step S210 to step S240.
  • Step S210 Obtain the running record information of the movable platform.
  • Step S220 Encrypt the running log information according to the AES key to obtain encrypted log information.
  • Step S230 Encrypt the AES key according to the RSA public key to obtain an encryption key.
  • Step S240 Send the encrypted record information and the encryption key to a data decryption device, so that the data decryption device decrypts the encrypted record information according to the encryption key, thereby obtaining the mobile platform The running log information.
  • the encrypting the running log information according to the AES key to obtain the encrypted log information includes:
  • the AES keys corresponding to the running log information of different attributes are different.
  • the AES key is randomly generated by the terminal device, or the AES key is obtained by the terminal device from a server.
  • the encrypting the AES key according to the RSA public key to obtain the encryption key includes:
  • the AES key is encrypted according to the RSA public key to obtain an encryption key.
  • the RSA public keys corresponding to the running log information of different attributes are different.
  • the encryption keys corresponding to the running record information of the multiple attributes are stored in a key array
  • the sending the encrypted record information and the encryption key to a data decryption device includes:
  • the encrypted record information corresponding to the running record information of the multiple attributes and the key array are sent to the data decryption device.
  • the attribute of the running log information includes at least one of the permission level, the acquisition time, and the storage location of the running log information.
  • the sending the encrypted record information and the encryption key to a data decryption device includes:
  • the encrypted record information and the encryption key are sent to the data decryption device.
  • the method further includes:
  • the check value is sent to the data decryption device, so that the data decryption device determines, according to the check value, whether the operation log information obtained by decryption has been tampered with.
  • the generating the check value of the running log information includes:
  • the sending the check value to the data decryption device so that the data decryption device determines whether the running log information obtained by decryption has been tampered with according to the check value includes:
  • the encrypted check value is sent to the data decryption device, so that the data decryption device determines whether the decrypted log information has been tampered with according to the encrypted check value.
  • the movable platform includes at least one of the following: an unmanned aerial vehicle, a pan/tilt, and an unmanned vehicle.
  • FIG. 5 is a schematic flowchart of a data decryption method provided by another embodiment of the present application.
  • the data decryption method can be used in the aforementioned data decryption device for processes such as the operation record information of the mobile platform encrypted by the decryption terminal device.
  • the data encryption method in the embodiment of this specification includes step S310 to step S340.
  • Step S310 Obtain encrypted record information and an encryption key from a terminal device, where the encrypted record information is obtained by the terminal device encrypting the operation record information of the movable platform according to the AES key, and the encryption key is the terminal Obtained by the device encrypting the AES key according to the RSA public key.
  • Step S320 Send the encryption key to the server, so that the server decrypts the encryption key to obtain the AES key.
  • Step S330 Receive the AES key returned by the server.
  • Step S340 Decrypt the encrypted record information according to the AES key to obtain the operation record information.
  • the AES keys corresponding to the running log information of different attributes are different.
  • the RSA public keys corresponding to the running log information of different attributes are different.
  • the obtaining the encrypted record information and the encryption key from the terminal device includes:
  • the key array includes the encryption keys corresponding to the running record information of the multiple attributes.
  • the sending the encryption key to the server so that the server decrypts the encryption key to obtain the AES key includes:
  • the encryption key is sent to the server, so that the server decrypts the encryption key according to the authority of the data decryption device to obtain the AES key.
  • the method further includes:
  • the device information and/or account information of the data decryption device are sent to the server, so that the server determines the authority of the data decryption device according to the device information and/or account information.
  • the device information and/or account information of the data decryption device are sent to the server, so that the server determines the authority of the data decryption device according to the device information and/or account information ,include:
  • the device information and/or account information of the data decryption device are sent to the server, so that the server determines, according to the device information and/or account information, the attributes of the operation log information that the data decryption device has the authority to obtain.
  • the method further includes:
  • the server decrypts the encryption key according to the RSA private key corresponding to the RSA public key to obtain the AES key.
  • the obtaining the encrypted record information and the encryption key from the terminal device includes:
  • the encrypted record information and the encryption key are obtained from the terminal device.
  • the method further includes:
  • the check value it is determined whether the operation log information obtained by decryption has been tampered with.
  • the obtaining the check value of the running log information from the terminal device includes:
  • the determining whether the operation log information obtained by decryption has been tampered with according to the check value includes:
  • the encrypted check value is sent to the server to obtain the check value for decryption, and it is determined whether the decrypted operation log information has been tampered with according to the check value returned by the server.
  • the attribute of the running log information includes at least one of the permission level, the acquisition time, and the storage location of the running log information.
  • FIG. 6 is a schematic flowchart of a data decryption method provided by another embodiment of the present application.
  • the data decryption method can be used in the aforementioned server to cooperate with the aforementioned data decryption device to decrypt the operation record information of the mobile platform encrypted by the terminal device and other processes.
  • the data encryption method in the embodiment of this specification includes step S410 to step S430.
  • Step S410 Obtain an encryption key from the data decryption device, where the encryption key is obtained by the terminal device encrypting the AES key according to the RSA public key, and the AES key is used for the operation of the terminal device on the mobile platform Encrypt the record information to obtain the encrypted record information.
  • Step S420 Decrypt the encryption key to obtain the AES key.
  • Step S430 Return the AES key to the data decryption device, so that the data decryption device decrypts the encrypted record information according to the AES key to obtain the operation record information.
  • the AES keys corresponding to the running log information of different attributes are different.
  • the RSA public keys corresponding to the running log information of different attributes are different.
  • the obtaining the encryption key from the data decryption device includes:
  • the key array including encryption keys corresponding to each of the log information of a plurality of attributes.
  • the decrypting the encryption key to obtain the AES key includes:
  • the encryption key is decrypted according to the authority of the data decryption device to obtain the AES key.
  • the method further includes:
  • the authority of the data decryption device is determined according to the device information and/or account information.
  • the determining the authority of the data decryption device according to the device information and/or account information includes:
  • the attributes of the running record information that the data decryption device has the authority to obtain are determined.
  • the method further includes:
  • the decrypting the encryption key to obtain the AES key includes:
  • the method further includes:
  • the check value obtained by the decryption is transmitted back to the data decryption device, so that the data decryption device determines whether the running log information obtained by decryption has been tampered with according to the check value.
  • the attribute of the running log information includes at least one of the permission level, the acquisition time, and the storage location of the running log information.
  • FIG. 7 is a schematic block diagram of a terminal device 600 provided in an embodiment of the present application.
  • the terminal device 600 includes one or more processors 601, and the one or more processors 601 work individually or collectively.
  • the terminal device 600 further includes a memory 602.
  • the processor 601 and the memory 602 are connected by a bus 603, and the bus 603 is, for example, an I2C (Inter-integrated Circuit) bus.
  • I2C Inter-integrated Circuit
  • the processor 601 may be a micro-controller unit (MCU), a central processing unit (Central Processing Unit, CPU), a digital signal processor (Digital Signal Processor, DSP), or the like.
  • MCU micro-controller unit
  • CPU Central Processing Unit
  • DSP Digital Signal Processor
  • the memory 602 may be a Flash chip, a read-only memory (ROM, Read-Only Memory) disk, an optical disk, a U disk, or a mobile hard disk.
  • the processor 601 is configured to run a computer program stored in the memory 602, and implement the aforementioned data encryption method for a terminal device when the computer program is executed.
  • the processor 601 is configured to run a computer program stored in the memory 602, and implement the following steps when the computer program is executed:
  • the embodiments of the embodiments of the present application also provide a computer-readable storage medium, the computer-readable storage medium stores a computer program, the computer program includes program instructions, and the processor executes the program instructions to implement The steps of the data encryption method for terminal equipment provided in the above embodiment.
  • the computer-readable storage medium may be the internal storage unit of the terminal device described in any of the foregoing embodiments, such as the hard disk or memory of the terminal device.
  • the computer-readable storage medium may also be an external storage device of the terminal device, such as a plug-in hard disk equipped on the terminal device, a Smart Media Card (SMC), or Secure Digital (SD) ) Card, Flash Card, etc.
  • SMC Smart Media Card
  • SD Secure Digital
  • FIG. 8 is a schematic block diagram of a data decryption apparatus 700 provided in an embodiment of the present application.
  • the data decryption device 700 includes one or more processors 701, and the one or more processors 701 work individually or collectively.
  • the data decryption device 700 further includes a memory 702.
  • the processor 701 and the memory 702 are connected by a bus 703, and the bus 703 is, for example, an I2C (Inter-integrated Circuit) bus.
  • I2C Inter-integrated Circuit
  • the processor 701 may be a micro-controller unit (MCU), a central processing unit (CPU), a digital signal processor (Digital Signal Processor, DSP), or the like.
  • MCU micro-controller unit
  • CPU central processing unit
  • DSP Digital Signal Processor
  • the memory 702 may be a Flash chip, a read-only memory (ROM, Read-Only Memory) disk, an optical disk, a U disk, or a mobile hard disk.
  • the processor 701 is configured to run a computer program stored in the memory 702, and implement the aforementioned data decryption method for a data decryption device when the computer program is executed.
  • the processor 701 is configured to run a computer program stored in the memory 702, and implement the following steps when the computer program is executed:
  • the encrypted record information is obtained by encrypting the running record information of the movable platform by the terminal device according to the AES key, and the encryption key is obtained by the terminal device according to the RSA Obtained by encrypting the AES key with a public key;
  • the encrypted record information is decrypted according to the AES key to obtain the operation record information.
  • the embodiments of the embodiments of the present application also provide a computer-readable storage medium, the computer-readable storage medium stores a computer program, the computer program includes program instructions, and the processor executes the program instructions to implement The steps of the data decryption method for the data decryption device provided in the above embodiment.
  • the computer-readable storage medium may be an internal storage unit of the data decryption device described in any of the foregoing embodiments, for example, the hard disk or memory of the data decryption device.
  • the computer-readable storage medium may also be an external storage device of the data decryption device, such as a plug-in hard disk equipped on the data decryption device, a Smart Media Card (SMC), or Secure Digital (Secure Digital). , SD) card, flash card (Flash Card), etc.
  • FIG. 9 is a schematic block diagram of a server 800 provided in an embodiment of the present application.
  • the server 800 includes one or more processors 801, and the one or more processors 801 work individually or collectively.
  • the server 800 further includes a memory 802.
  • the processor 801 and the memory 802 are connected by a bus 803, and the bus 803 is, for example, an I2C (Inter-integrated Circuit) bus.
  • I2C Inter-integrated Circuit
  • the processor 801 may be a micro-controller unit (MCU), a central processing unit (CPU), a digital signal processor (Digital Signal Processor, DSP), or the like.
  • MCU micro-controller unit
  • CPU central processing unit
  • DSP Digital Signal Processor
  • the memory 802 may be a Flash chip, a read-only memory (ROM, Read-Only Memory) disk, an optical disk, a U disk, or a mobile hard disk.
  • the processor 801 is configured to run a computer program stored in the memory 802, and implement the aforementioned data decryption method for the server when the computer program is executed.
  • the processor 801 is configured to run a computer program stored in the memory 802, and implement the following steps when the computer program is executed:
  • the encryption key is obtained by encrypting the AES key by the terminal device according to the RSA public key, and the AES key is used for the terminal device to encrypt the running record information of the movable platform Obtain encrypted record information;
  • the AES key is transmitted back to the data decryption device, so that the data decryption device decrypts the encrypted record information according to the AES key to obtain the operation record information.
  • the embodiments of the embodiments of the present application also provide a computer-readable storage medium, the computer-readable storage medium stores a computer program, the computer program includes program instructions, and the processor executes the program instructions to implement The steps of the data decryption method for the server provided in the above embodiment.
  • the computer-readable storage medium may be the internal storage unit of the server described in any of the foregoing embodiments, such as the hard disk or memory of the server.
  • the computer-readable storage medium may also be an external storage device of the server, such as a plug-in hard disk equipped on the server, a Smart Media Card (SMC), or a Secure Digital (SD) card , Flash Card, etc.
  • SMC Smart Media Card
  • SD Secure Digital
  • the data processing, encryption and decryption methods, equipment, and storage medium provided by the embodiments of the present application encrypt the running record information according to the AES key and encrypt the AES key according to the RSA public key through the terminal device, and combine the encrypted running record information with the terminal device.
  • the data decryption device can send the encrypted AES key to the server for decryption, and decrypt the encrypted running log information according to the decrypted AES key; therefore, the running log information is not required Upload to the server can be decrypted, which can protect the user's private data, and the AES key decrypted by the server can decrypt the encrypted running log information, which improves the security of the data, such as preventing the running log information from being cracked And tampering.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

一种数据处理方法,包括:获取运行记录(S110);根据AES密钥加密运行记录得到加密记录(S120);对AES密钥加密得到加密密钥(S130);将加密记录和加密密钥发送给数据解密装置(S140);将加密密钥发送给服务器(S150);解密加密密钥得到AES密钥(S160);AES密钥回传(S170);根据AES密钥解密加密记录(S180)。本申请提高数据安全性,还提供加密、解密方法、设备和存储介质。

Description

数据处理、加密、解密方法、设备和存储介质 技术领域
本申请涉及可移动平台的数据安全技术领域,尤其涉及一种数据处理、加密、解密方法、设备和存储介质。
背景技术
在可移动平台,例如无人飞行器运行过程中通常会产生运行记录,有些运行记录可以存储在能够和可移动平台通信连接的终端设备上。为了保证终端设备上运行记录的准确性和保密性,通常需要对这些运行记录进行加密,而在一些场景,如对可移动平台进行维修或健康检查时可以对加密的运行记录进行解密。如何对运行记录进行加密、解密,以防止运行记录被破解是比较难解决的问题。
发明内容
基于此,本申请提供了一种数据处理、加密、解密方法、设备和存储介质,旨在对可移动平台的运行记录进行加密、解密,以防止运行记录被破解。
第一方面,本申请实施例提供了一种数据处理方法,所述方法包括:
终端设备获取可移动平台的运行记录信息;
所述终端设备根据AES密钥对所述运行记录信息进行加密,得到加密记录信息;
所述终端设备根据RSA公钥对所述AES密钥进行加密,得到加密密钥;
所述终端设备将所述加密记录信息和所述加密密钥发送给数据解密装置;
所述数据解密装置将所述加密密钥发送给服务器;
所述服务器解密所述加密密钥得到所述AES密钥;
所述服务器将所述AES密钥回传给所述数据解密装置;
所述数据解密装置根据所述AES密钥解密所述加密记录信息,得到所述运行记录信息。
第二方面,本申请实施例提供了一种数据加密方法,用于终端设备,所述方法包括:
获取可移动平台的运行记录信息;
根据AES密钥对所述运行记录信息进行加密,得到加密记录信息;
根据RSA公钥对所述AES密钥进行加密,得到加密密钥;
将所述加密记录信息和所述加密密钥发送给数据解密装置,以使所述数据解密装置根据所述加密密钥对所述加密记录信息进行解密,从而获取所述可移动平台的运行记录信息。
第三方面,本申请实施例提供了一种数据解密方法,用于数据解密装置,所述方法包括:
从终端设备获取加密记录信息和加密密钥,所述加密记录信息是所述终端设备根据AES密钥对可移动平台的运行记录信息加密得到的,所述加密密钥是所述终端设备根据RSA公钥对所述AES密钥进行加密得到的;
将所述加密密钥发送给服务器,以使所述服务器解密所述加密密钥得到所述AES密钥;
接收所述服务器回传的AES密钥;
根据所述AES密钥解密所述加密记录信息,得到所述运行记录信息。
第四方面,本申请实施例提供了一种数据解密方法,用于服务器,所述方法包括:
从数据解密装置获取加密密钥,所述加密密钥是终端设备根据RSA公钥对AES密钥进行加密得到的,所述AES密钥用于所述终端设备对可移动平台的运行记录信息加密得到加密记录信息;
解密所述加密密钥得到所述AES密钥;
将所述AES密钥回传给所述数据解密装置,以使所述数据解密装置根据所述AES密钥解密所述加密记录信息,得到所述运行记录信息。
第五方面,本申请实施例提供了一种终端设备,能够与可移动平台通信连接,包括一个或多个处理器,单独地或共同地工作,用于执行如下步骤:
获取可移动平台的运行记录信息;
根据AES密钥对所述运行记录信息进行加密,得到加密记录信息;
根据RSA公钥对所述AES密钥进行加密,得到加密密钥;
将所述加密记录信息和所述加密密钥发送给数据解密装置,以使所述数据解密装置根据所述加密密钥对所述加密记录信息进行解密,从而获取所述可移动平台的运行记录信息。
第六方面,本申请实施例提供了一种数据解密装置,包括一个或多个处理器,单独地或共同地工作,用于执行如下步骤:
从终端设备获取加密记录信息和加密密钥,所述加密记录信息是所述终端设备根据AES密钥对可移动平台的运行记录信息加密得到的,所述加密密钥是所述终端设备根据RSA公钥对所述AES密钥进行加密得到的;
将所述加密密钥发送给服务器,以使所述服务器解密所述加密密钥得到所述AES密钥;
接收所述服务器回传的AES密钥;
根据所述AES密钥解密所述加密记录信息,得到所述运行记录信息。
第七方面,本申请实施例提供了一种服务器,包括一个或多个处理器,单独地或共同地工作,用于执行如下步骤:
从数据解密装置获取加密密钥,所述加密密钥是终端设备根据RSA公钥对AES密钥进行加密得到的,所述AES密钥用于所述终端设备对可移动平台的运行记录信息加密得到加密记录信息;
解密所述加密密钥得到所述AES密钥;
将所述AES密钥回传给所述数据解密装置,以使所述数据解密装置根据所述AES密钥解密所述加密记录信息,得到所述运行记录信息。
第八方面,本申请实施例提供了一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序被处理器执行时使所述处理器实现上述的方法。
本申请实施例提供了一种数据处理、加密、解密方法、设备和存储介质,通过终端设备根据AES密钥加密运行记录信息和根据RSA公钥加密AES密钥,在终端设备将加密的运行记录信息和加密的AES密钥发送给数据解密装置时,数据解密装置可以将加密的AES密钥发送给服务器解密,以及根据解密得到的AES密钥解密经过加密的运行记录信息;因此可以不将运行记录信息上传给服 务器即可以实现解密,可以保护用户的隐私数据,而且获取到服务器解密出的AES密钥才能够对加密的运行记录信息进行解密,提高了数据的安全性,例如防止运行记录信息被破解和篡改。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本申请实施例的公开内容。
附图说明
为了更清楚地说明本申请实施例的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本申请实施例提供的一种数据处理方法的流程示意图;
图2是本申请一实施方式中数据处理方法的应用场景的示意图;
图3是本申请一实施方式中终端设备生成的运行记录文件的示意图;
图4是本申请实施例提供的一种数据加密方法的流程示意图;
图5是本申请实施例提供的一种数据解密方法的流程示意图;
图6是本申请实施例提供的一种数据解密方法的流程示意图;
图7是本申请实施例提供的一种终端设备的示意性框图;
图8是本申请实施例提供的一种数据解密装置的示意性框图;
图9是本申请实施例提供的一种服务器的示意性框图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
附图中所示的流程图仅是示例说明,不是必须包括所有的内容和操作/步骤,也不是必须按所描述的顺序执行。例如,有的操作/步骤还可以分解、组合或部分合并,因此实际执行的顺序有可能根据实际情况改变。
下面结合附图,对本申请的一些实施方式作详细说明。在不冲突的情况下,下述的实施例及实施例中的特征可以相互组合。
请参阅图1,图1是本申请实施例提供的一种数据处理方法的流程示意图。所述数据处理方法可以应用在如图2所示的系统中,该系统包括终端设备、数据解密装置和服务器,所述数据处理方法用于对终端设备获取的可移动平台的运行记录信息进行处理等过程。
在一些实施方式中,可移动平台可以包括无人飞行器、云台、无人车等中的至少一种,如图2所示,可移动平台包括无人飞行器。进一步而言,无人飞行器可以为旋翼型无人飞行器,例如四旋翼无人飞行器、六旋翼无人飞行器、八旋翼无人飞行器,也可以是固定翼无人飞行器。
终端设备可以包括手机、平板电脑、笔记本电脑、台式电脑、个人数字助理、穿戴式设备、遥控器等中的至少一项。
进一步而言,终端设备和可移动平台之间能够通过无线信道传输数据。
示例性的,如图2所示,从可移动平台到终端设备的无线信道,称为下行信道,用于传输可移动平台采集到的数据,例如视频、图片、传感器数据、以及可移动平台,如无人飞行器的状态信息(OSD)等遥测数据。
示例性的,如图2所示,从终端设备到可移动平台的无线信道,称为上行信道,用于传输遥控数据;例如可移动平台为无人飞行器时,上行信道用于传输飞控指令以及拍照、录像、返航等控制指令。
示例性的,可移动平台在运行过程中可以生成运行记录。例如运行记录可以包括电量信息、姿态信息、速度信息、从终端设备接收的指令等信息中的至少一种。
示例性的,终端设备在与可移动平台通信时,可以获取可移动平台发送的运行记录,例如可移动平台的电量信息、姿态信息、速度信息等;示例性的,终端设备在与可移动平台通信时,可以记录对可移动平台的控制指令等记录信息;或者可以根据可移动平台的状态生成可移动平台的运行记录。
在一些实施方式中,数据解密装置可以包括手机、平板电脑、笔记本电脑、台式电脑、个人数字助理等中的至少一种。示例性的,数据解密装置的使用者可以对终端设备加密的数据进行解密,从而可以利用解密的数据。
示例性的,数据解密装置可以包括可移动平台维修方、可移动平台的保险 提供方等使用的终端。根据可移动平台的运行记录可以对可移动平台进行健康检查、维修,或者对飞手的飞行习惯进行判别等。
示例性的,数据解密装置也可以是可移动平台的用户的设备,例如用户的手机、平板电脑、笔记本电脑、台式电脑、个人数字助理等可以作为终端设备对可移动平台进行控制、获取可移动平台的运行记录信息,对运行记录信息进行加密等,也可以作为数据解密装置对加密的运行记录信息进行解密。
示例性的,服务器可以为独立的服务器,也可以为服务器集群。例如,服务器可以为可移动平台生产方、销售方、可移动平台控制软件服务方部署的服务器;其中可移动平台控制软件可以安装在终端设备上,用于对可移动平台进行控制。
如图1所示,本申请实施例的数据处理方法包括步骤S110至步骤S180。
步骤S110、终端设备获取可移动平台的运行记录信息。
示例性的,所述运行记录信息可以包括所述可移动平台的姿态、高度、速度、电池信息、剩余续航时长、迫降信息、限飞信息中的至少一种。其中电池信息可以包括可移动平台电池的输出电压、剩余电量等,限飞信息可以包括可移动平台,如无人飞行器是否靠近或进入限飞区的行为等。
例如,在检测到无人飞行器暴力飞行时进行迫降该无人飞行器,无人飞行器和/或无人飞行器对这次迫降的相关信息进行记录,得到迫降信息。
示例性的,终端设备可以在对可移动平台进行控制时获取可移动平台的运行记录信息,和/或在使用可移动平台结束后从可移动平台获取运行记录信息。
在一些实施方式中,可以根据不同的规则对运行记录信息进行分类。例如通过标记运行记录信息的属性对运行记录信息进行分类,因此可以实现对不同运行记录信息进行区别处理。
示例性的,所述运行记录信息的属性包括运行记录信息的权限级别、获取时间、存储位置中的至少一种。
示例性的,所述运行记录信息的属性包括运行记录信息的权限级别、获取时间、存储位置中的至少一种。
例如,运行记录信息的权限级别可以包括敏感型、通用型等。示例性的,对保密性要求较高的运行记录信息的权限级别为敏感型,具有较高权限的用户可以获取该运行记录信息;示例性的,对保密性要求较低的运行记录信息的权 限级别为通用型,具有较低权限的用户可以获取该运行记录信息。例如,敏感型运行记录信息可以包括电池信息、剩余续航时长、迫降信息、限飞信息中的至少一种;通用型运行记录信息可以包括可移动平台的姿态、高度、速度等。
示例性的,可以将不同时间段获取的运行记录信息对应的时间段分类,确定对应的属性。
示例性的,可以将不同类别的运行记录信息存储在终端设备的不同存储区域。例如,将从可移动平台获取的运行记录信息存储在终端设备存储器的一位置区域,将终端设备生成的运行记录信息存储在终端设备存储器的另一位置区域。
在一些实施方式中,如图3所示,终端设备获取的可移动平台的运行记录信息存储为一个运行记录文件,该运行记录文件包括若干数据区块,如数据区块1、数据区块2、……数据区块N,不同的数据区块中的运行记录信息具有不同的属性。例如数据区块1中为敏感型的运行记录信息,数据区块N中为通用型的运行记录信息;或者例如数据区块1中为在一时间段获取的运行记录信息,数据区块N中为另一时间段获取的的运行记录信息。可以理解的,终端设备获取的可移动平台的运行记录信息可以包括一个数据区块、两个数据区块或更多的数据区块;或者终端设备获取的可移动平台的运行记录信息可以包括一种属性的运行记录信息、两种属性的运行记录信息或更多种属性的运行记录信息;当然终端设备获取的可移动平台的运行记录信息也可以部分属性,而作为一个整体的数据。
步骤S120、所述终端设备根据AES密钥对所述运行记录信息进行加密,得到加密记录信息。
AES(Advanced Encryption Standard),可以称为对称加密算法,能有效抵御所有已知攻击,且具有较高的加解密过程效率。通过对所述运行记录信息进行对称加密,可以提高运行记录信息的安全性,只有获取到AES密钥的一方才可以解密该加密记录信息,恢复原始的运行记录信息。
示例性的,所述AES密钥可以是所述终端设备随机生成的,例如终端设备的可移动平台软件开启时随机生成一个或多个AES密钥,可以提高AES密钥的随机性和安全性。
示例性的,所述AES密钥可以是所述终端设备从服务器获取的,例如终端 设备的可移动平台软件开启时,根据预设规则在需要时从服务器请求AES密钥。
在一些实施方式中,所述根据AES密钥对所述运行记录信息进行加密,得到加密记录信息,包括:根据所述运行记录信息的属性确定对应的AES密钥;根据所述AES密钥对所述属性的运行记录信息进行加密,得到所述加密记录信息。
示例性的,可以用不同的AES密钥对运行记录文件中的运行记录信息进行加密。如图3所示,可以根据AES密钥1对数据区块1进行加密,得到加密记录信息,即加密的数据区块1;可以根据另一AES密钥2对数据区块2进行加密,得到加密记录信息,即加密的数据区块2。示例性的,也可以对部分数据区块使用同样的AES密钥进行加密,例如根据AES密钥2对数据区块N进行加密,得到加密记录信息,即加密的数据区块N。当然也可以根据AES密钥N对数据区块N进行加密,得到加密记录信息,即加密的数据区块N。
示例性的,不同属性的运行记录信息对应的AES密钥不同。例如,不同属性的运行记录信息对应的AES密钥的长度不同,比如敏感型的运行记录信息的AES密钥的长度更长,因此安全性更高,通用型的运行记录信息的AES密钥的长度更短,因此加密解密效率更高。
通过对不同属性的运行记录信息采用不同的AES密钥分别进行加密得到对应的加密记录信息,便于对不同属性的运行记录信息区别处理。
在一些实施方式中,终端设备的可移动平台软件开启时可以获取多个AES密钥,例如生成N个AES密钥,用于对所述多个属性的运行记录信息分别进行加密。可以理解的,因为AES密钥通常是随机生成的,所以可以不去判断获取的多个AES密钥是否相同,可以默认是不同的。
在一些实施方式中,如图3所示,多个属性的运行记录信息各自对应的AES密钥存储在一个密钥数组中。
步骤S130、所述终端设备根据RSA公钥对所述AES密钥进行加密,得到加密密钥。
RSA公钥加密算法是一种非对称加密算法,也被称为公钥加密,用来加密的密钥和用来解密的密钥不是同一个,其中,公钥用来对数据块加密,之后,只有对应的私钥才能用来解密。
在一些实施方式中,终端设备可以从服务器获取RSA公钥,或者终端设备 在安装可移动平台的控制软件时,控制软件自带服务器分配的RSA公钥。
通过RSA公钥对所述AES密钥进行加密,得到加密的AES密钥,即加密密钥。
通过根据RSA公钥对用于加密运行记录信息的AES密钥进行加密,可以提高AES密钥的保密性,防止AES密钥被破解或泄露。
示例性的,可以通过RSA公钥对密钥数组中的全部AES密钥统一进行加密,或者,对密钥数组中的各AES密钥分别进行加密,以得到各AES密钥对应的加密密钥。
在一些实施方式中,所述根据RSA公钥对所述AES密钥进行加密,得到加密密钥,包括:根据所述运行记录信息的属性确定对应的RSA公钥;根据所述RSA公钥对所述AES密钥进行加密,得到加密密钥。
示例性的,可以用不同的RSA公钥对密钥数组中不同的AES密钥分别进行加密。例如,可以根据RSA公钥1对AES密钥1进行加密得到数据区块1的运行记录信息对应的加密密钥1,根据RSA公钥2对AES密钥2进行加密得到数据区块2的运行记录信息对应的加密密钥2。示例性的,也可以对部分数据区块对应的AES密钥使用同样的RSA公钥进行加密,例如根据RSA公钥2对数据区块N对应的AES密钥N进行加密,得到数据区块N的运行记录信息对应的加密密钥N。
示例性的,不同属性的运行记录信息对应的RSA公钥不同。例如,不同属性的运行记录信息对应的RSA公钥的长度不同,比如敏感型的运行记录信息对应的RSA公钥的长度更长,因此安全性更高,通用型的运行记录信息对应的RSA公钥的长度更短,因此加密解密效率更高。
通过对不同属性的运行记录信息的AES密钥采用不同的RSA公钥分别进行加密得到对应的加密记录信息,便于对不同属性的运行记录信息区别处理。
在一些实施方式中,如图3所示,多个属性的运行记录信息各自对应的加密密钥存储在一个密钥数组中。
在一些实施方式中,如图3所示,终端设备将包括多个属性的运行记录信息各自对应的加密密钥的密钥数组和多个属性的运行记录信息各自对应的加密记录信息存储为一个运行记录文件,由于加密密钥、加密记录信息均是已经加密的数据,可以防止在终端设备侧破解运行记录文件。
步骤S140、所述终端设备将所述加密记录信息和所述加密密钥发送给数据解密装置。
在一些实施方式中,所述终端设备根据用户在所述终端设备上的信息上传操作,将所述加密记录信息和所述加密密钥发送给数据解密装置。或者所述数据解密装置根据用户在所述终端设备上的信息上传操作,从所述终端设备获取加密记录信息和加密密钥。
示例性的,终端设备的用户可以自由选择是否将加密的加密记录信息和所述加密密钥提供给可移动平台维修方、可移动平台的保险提供方等。
示例性的,所述将所述加密记录信息和所述加密密钥发送给数据解密装置,包括:将所述多个属性的运行记录信息对应的加密记录信息和所述密钥数组发送给数据解密装置。所述数据解密装置从所述终端设备获取多个属性的运行记录信息对应的加密记录信息和所述密钥数组,所述密钥数组包括多个属性的运行记录信息各自对应的加密密钥。例如,所述密钥数组包括根据RSA公钥加密的AES密钥1、AES密钥2、……AES密钥N。
具体的,所述终端设备将所述加密记录信息和所述加密密钥发送给数据解密装置,以使所述数据解密装置根据所述加密密钥对所述加密记录信息进行解密,从而获取所述可移动平台的运行记录信息。
步骤S150、所述数据解密装置将所述加密密钥发送给服务器。
示例性的,所述数据解密装置从终端设备获取加密记录信息和加密密钥,以及将所述加密密钥发送给服务器,以使所述服务器解密所述加密密钥得到所述AES密钥。
如前所述,所述加密记录信息是所述终端设备根据AES密钥对可移动平台的运行记录信息加密得到的,所述加密密钥是所述终端设备根据RSA公钥对所述AES密钥进行加密得到的。
示例性的,所述数据解密装置接收到终端设备上传的运行记录文件时,可以将运行记录文件中的加密密钥发送给服务器,以由服务器对加密密钥进行解密。
在一些实施方式中,所述数据解密装置将所述密钥数组发送给所述服务器,其中,所述密钥数组包括多个属性的运行记录信息各自对应的加密密钥。
在另一些实施方式中,所述数据解密装置将需要解密或者有权限解密的运 行记录信息对应的加密密钥发送给服务器。
步骤S160、所述服务器解密所述加密密钥得到所述AES密钥。
示例性的,所述服务器根据所述RSA公钥对应的RSA私钥解密所述加密密钥得到所述AES密钥。
示例性的,所述服务器可以为可移动平台生产方、销售方、可移动平台控制软件服务方部署的服务器,该服务器可以生成用于加密解密AES密钥的RSA公钥和RSA私钥,其中RSA私钥能够解密经RSA公钥加密的数据。RSA私钥由服务器保管,用于对数据解密装置发送的加密密钥进行解密,以得到对应的AES密钥。
在一些实施方式中,不同属性的运行记录信息对应的RSA公钥不同。
示例性的,所述密钥数组包括多个属性的运行记录信息各自对应的加密密钥,各加密密钥由不同的RSA公钥加密得到。服务器可以根据加密密钥对应的运行记录信息的属性确定对应的RSA私钥,根据该RSA私钥解密特定属性运行记录信息对应的加密密钥,得到该属性的运行记录信息的AES密钥。示例性的,不同属性的运行记录信息对应的RSA私钥不同。
在一些实施方式中,所述服务器根据所述数据解密装置的权限解密所述加密密钥得到所述AES密钥。
示例性的,所述数据解密装置将所述数据解密装置的装置信息和/或账号信息发送所述服务器,所述服务器获取所述数据解密装置的装置信息和/或账号信息,以及根据所述装置信息和/或账号信息确定所述数据解密装置的权限。
例如,所述数据解密装置将所述数据解密装置的装置信息和/或账号信息发送所述服务器,以及所述服务器根据所述装置信息和/或账号信息确定所述数据解密装置有权限获取的运行记录信息的属性。
示例性的,数据解密装置可以包括可移动平台维修方、可移动平台的保险提供方等使用的终端。服务器可以为不同的平台维修方、保险提供方等提供不同的运行记录获取权限。例如平台维修方有权限获取通用型运行记录信息,保险提供方有权限获取通用型运行记录信息和敏感型运行记录信息。
示例性的,所述服务器解密所述数据解密装置有权限获取的运行记录信息对应的加密密钥。例如可以不解密数据解密装置没有权限获取的运行记录信息对应的加密密钥。因此服务器解密加密密钥时,可以根据不同情况确定允许哪 几个数据区块可以被所述数据解密装置解密。
示例性的,所述方法还包括:所述服务器根据所述数据解密装置的权限向所述数据解密装置发送无权限提示,以及所述数据解密装置接收所述服务器发送的无权限提示。所述无权限提示表示所述数据解密装置没有权限获取特定属性的运行记录信息。
例如,当服务器接收到所述数据解密装置发送的加密密钥,且确定该数据解密装置没有权限获取该加密密钥对应属性的运行记录信息,则可以向所述数据解密装置发送无权限提示,以提示数据解密装置没有权限获取这一属性的运行记录信息。
步骤S170、所述服务器将所述AES密钥回传给所述数据解密装置。
示例性的,服务器在步骤S160对加密密钥解密得到所述AES密钥,将所述AES密钥发送给所述数据解密装置。
在一些实施方式中,不同属性的运行记录信息对应的AES密钥不同。例如,服务器可以将不同属性的运行记录信息对应的AES密钥回传给所述数据解密装置。
示例性的,服务器在步骤S160对密钥数组中经RSA公钥加密的AES密钥1、AES密钥2、……AES密钥N进行解密,得到原始的AES密钥1、AES密钥2、……AES密钥N,然后将解密后的AES密钥1、AES密钥2、……AES密钥N以密钥数组的形式发送给所述数据解密装置。
步骤S180、所述数据解密装置根据所述AES密钥解密所述加密记录信息,得到所述运行记录信息。
可以理解的,所述加密记录信息是由终端设备根据AES密钥对运行记录信息加密得到的,因此所述数据解密装置可以根据所述AES密钥解密所述加密记录信息,得到原始的运行记录信息。
示例性的,所述数据解密装置可以根据解密得到的运行记录信息执行预设任务,例如将运行记录信息显示给维修人员,或者进行进一步的数据分析等,例如生成终端设备对应可移动平台的健康评分和/或飞手的飞行习惯。
在一些实施方式中,所述方法还包括:所述终端设备生成所述运行记录信息的校验值;所述终端设备将所述校验值发送给所述数据解密装置,所述数据解密装置从终端设备获取所述运行记录信息的校验值,以及所述数据解密装置 根据所述校验值确定解密得到的运行记录信息是否被篡改。
示例性的,所述校验值可以包括MD5校验值等。
示例性的,生成多个属性的运行记录信息各自的校验值。例如生成前述数据区块1、数据区块2、……数据区块N各自的校验值MD5-1、MD5-2、……MD5-N。
示例性的,所述数据解密装置可以根据所述校验值确定对应属性的运行记录信息是否被篡改。例如所述数据解密装置生成步骤S180得到的某属性运行记录信息的校验值,将该校验值与所述终端设备生成的校验值比较,若相同则确定该属性的运行记录信息未被篡改,若不相同则确定该属性的运行记录信息被篡改。
在一些实施方式中,所述终端设备生成所述运行记录信息的校验值,并根据所述RSA公钥对所述校验值进行加密,以及所述终端设备将加密的校验值发送给所述数据解密装置。所述数据解密装置根据所述加密的校验值确定解密得到的运行记录信息是否被篡改。
示例性的,所述数据解密装置从所述终端设备获取加密的校验值,将所述加密的校验值发送给所述服务器;所述服务器对所述加密的校验值进行解密得到所述校验值,以及将解密得到所述校验值回传给所述数据解密装置。所述数据解密装置根据所述校验值确定解密得到的运行记录信息是否被篡改。
通过RSA公钥对所述校验值进行加密,可以提高校验值的安全性,从而保障解密得到的运行记录信息的可信度。
示例性的,所述服务器根据所述RSA公钥对应的RSA私钥对所述加密的校验值进行解密得到所述校验值。
本申请实施例提供的数据处理方法,通过终端设备根据AES密钥加密运行记录信息和根据RSA公钥加密AES密钥,在终端设备将加密的运行记录信息和加密的AES密钥发送给数据解密装置时,数据解密装置可以将加密的AES密钥发送给服务器解密,以及根据解密得到的AES密钥解密经过加密的运行记录信息;因此可以不将运行记录信息上传给服务器即可以实现解密,可以保护用户的隐私数据,而且获取到服务器解密出的AES密钥才能够对加密的运行记录信息进行解密,提高了数据的安全性,例如防止运行记录信息被破解和篡改。
请结合前述实施例参阅图4,图4是本申请另一实施例提供的一种数据加密方法的流程示意图。所述数据加密方法可以用于前述的终端设备,用于对可 移动平台的运行记录信息进行加密等过程。
如图4所示,本说明书实施例数据加密方法包括步骤S210至步骤S240。
步骤S210、获取可移动平台的运行记录信息。
步骤S220、根据AES密钥对所述运行记录信息进行加密,得到加密记录信息。
步骤S230、根据RSA公钥对所述AES密钥进行加密,得到加密密钥。
步骤S240、将所述加密记录信息和所述加密密钥发送给数据解密装置,以使所述数据解密装置根据所述加密密钥对所述加密记录信息进行解密,从而获取所述可移动平台的运行记录信息。
在一些实施方式中,所述根据AES密钥对所述运行记录信息进行加密,得到加密记录信息,包括:
根据所述运行记录信息的属性确定对应的AES密钥;
根据所述AES密钥对所述属性的运行记录信息进行加密,得到所述加密记录信息。
在一些实施方式中,不同属性的运行记录信息对应的AES密钥不同。
在一些实施方式中,所述AES密钥是所述终端设备随机生成的,或者,所述AES密钥是所述终端设备从服务器获取的。
在一些实施方式中,所述根据RSA公钥对所述AES密钥进行加密,得到加密密钥,包括:
根据所述运行记录信息的属性确定对应的RSA公钥;
根据所述RSA公钥对所述AES密钥进行加密,得到加密密钥。
在一些实施方式中,不同属性的运行记录信息对应的RSA公钥不同。
在一些实施方式中,多个属性的运行记录信息各自对应的加密密钥存储在一个密钥数组中;
所述将所述加密记录信息和所述加密密钥发送给数据解密装置,包括:
将所述多个属性的运行记录信息对应的加密记录信息和所述密钥数组发送给数据解密装置。
在一些实施方式中,所述运行记录信息的属性包括运行记录信息的权限级别、获取时间、存储位置中的至少一种。
在一些实施方式中,所述将所述加密记录信息和所述加密密钥发送给数据 解密装置,包括:
根据用户在所述终端设备上的信息上传操作,将所述加密记录信息和所述加密密钥发送给数据解密装置。
在一些实施方式中,所述方法还包括:
生成所述运行记录信息的校验值;
将所述校验值发送给所述数据解密装置,以使所述数据解密装置根据所述校验值确定解密得到的运行记录信息是否被篡改。
在一些实施方式中,所述生成所述运行记录信息的校验值,包括:
生成所述运行记录信息的校验值,并根据所述RSA公钥对所述校验值进行加密;
所述将所述校验值发送给所述数据解密装置,以使所述数据解密装置根据所述校验值确定解密得到的运行记录信息是否被篡改,包括:
将加密的校验值发送给所述数据解密装置,以使所述数据解密装置根据所述加密的校验值确定解密得到的运行记录信息是否被篡改。
在一些实施方式中,所述可移动平台包括如下至少一种:无人飞行器、云台、无人车。
本申请实施例提供的数据加密方法的具体原理和实现方式均与前述实施例的数据处理方法类似,此处不再赘述。
请结合前述实施例参阅图5,图5是本申请另一实施例提供的一种数据解密方法的流程示意图。所述数据解密方法可以用于前述的数据解密装置,用于对解密终端设备加密的可移动平台的运行记录信息等过程。
如图5所示,本说明书实施例数据加密方法包括步骤S310至步骤S340。
步骤S310、从终端设备获取加密记录信息和加密密钥,所述加密记录信息是所述终端设备根据AES密钥对可移动平台的运行记录信息加密得到的,所述加密密钥是所述终端设备根据RSA公钥对所述AES密钥进行加密得到的。
步骤S320、将所述加密密钥发送给服务器,以使所述服务器解密所述加密密钥得到所述AES密钥。
步骤S330、接收所述服务器回传的AES密钥。
步骤S340、根据所述AES密钥解密所述加密记录信息,得到所述运行记录信息。
在一些实施方式中,不同属性的运行记录信息对应的AES密钥不同。
在一些实施方式中,不同属性的运行记录信息对应的RSA公钥不同。
在一些实施方式中,所述从终端设备获取加密记录信息和加密密钥,包括:
从终端设备获取多个属性的运行记录信息对应的加密记录信息和密钥数组,所述密钥数组包括多个属性的运行记录信息各自对应的加密密钥。
在一些实施方式中,所述将所述加密密钥发送给服务器,以使所述服务器解密所述加密密钥得到所述AES密钥,包括:
将所述加密密钥发送给服务器,以使所述服务器根据所述数据解密装置的权限解密所述加密密钥得到所述AES密钥。
在一些实施方式中,所述方法还包括:
将所述数据解密装置的装置信息和/或账号信息发送所述服务器,以使所述服务器根据所述装置信息和/或账号信息确定所述数据解密装置的权限。
在一些实施方式中,所述将所述数据解密装置的装置信息和/或账号信息发送所述服务器,以使所述服务器根据所述装置信息和/或账号信息确定所述数据解密装置的权限,包括:
将所述数据解密装置的装置信息和/或账号信息发送所述服务器,以使所述服务器根据所述装置信息和/或账号信息确定所述数据解密装置有权限获取的运行记录信息的属性。
在一些实施方式中,所述方法还包括:
接收所述服务器发送的无权限提示,所述无权限提示表示所述数据解密装置没有权限获取特定属性的运行记录信息。
在一些实施方式中,所述服务器根据所述RSA公钥对应的RSA私钥解密所述加密密钥得到所述AES密钥。
在一些实施方式中,所述从终端设备获取加密记录信息和加密密钥,包括:
根据用户在所述终端设备上的信息上传操作,从所述终端设备获取加密记录信息和加密密钥。
在一些实施方式中,所述方法还包括:
从终端设备获取所述运行记录信息的校验值;
根据所述校验值确定解密得到的运行记录信息是否被篡改。
在一些实施方式中,所述从终端设备获取所述运行记录信息的校验值,包 括:
从终端设备获取加密的校验值,所述加密的校验值是所述终端设备根据所述RSA公钥对所述运行记录信息的校验值进行加密得到的;
所述根据所述校验值确定解密得到的运行记录信息是否被篡改,包括:
将所述加密的校验值发送给服务器解密得到所述校验值,以及根据所述服务器回传的校验值确定解密得到的运行记录信息是否被篡改。
在一些实施方式中,所述运行记录信息的属性包括运行记录信息的权限级别、获取时间、存储位置中的至少一种。
本申请实施例提供的数据解密方法的具体原理和实现方式均与前述实施例的数据处理方法类似,此处不再赘述。
请结合前述实施例参阅图6,图6是本申请另一实施例提供的一种数据解密方法的流程示意图。所述数据解密方法可以用于前述的服务器,用于配合前述的数据解密装置解密终端设备加密的可移动平台的运行记录信息等过程。
如图6所示,本说明书实施例数据加密方法包括步骤S410至步骤S430。
步骤S410、从数据解密装置获取加密密钥,所述加密密钥是终端设备根据RSA公钥对AES密钥进行加密得到的,所述AES密钥用于所述终端设备对可移动平台的运行记录信息加密得到加密记录信息。
步骤S420、解密所述加密密钥得到所述AES密钥。
步骤S430、将所述AES密钥回传给所述数据解密装置,以使所述数据解密装置根据所述AES密钥解密所述加密记录信息,得到所述运行记录信息。
在一些实施方式中,不同属性的运行记录信息对应的AES密钥不同。
在一些实施方式中,不同属性的运行记录信息对应的RSA公钥不同。
在一些实施方式中,所述从数据解密装置获取加密密钥,包括:
从数据解密装置获取密钥数组,所述密钥数组包括多个属性的运行记录信息各自对应的加密密钥。
在一些实施方式中,所述解密所述加密密钥得到所述AES密钥,包括:
根据所述数据解密装置的权限解密所述加密密钥得到所述AES密钥。
在一些实施方式中,所述方法还包括:
获取所述数据解密装置的装置信息和/或账号信息;
根据所述装置信息和/或账号信息确定所述数据解密装置的权限。
在一些实施方式中,所述根据所述装置信息和/或账号信息确定所述数据解密装置的权限,包括:
根据所述装置信息和/或账号信息确定所述数据解密装置有权限获取的运行记录信息的属性。
在一些实施方式中,所述方法还包括:
根据所述数据解密装置的权限向所述数据解密装置发送无权限提示,所述无权限提示表示所述数据解密装置没有权限获取特定属性的运行记录信息。
在一些实施方式中,所述解密所述加密密钥得到所述AES密钥,包括:
根据所述RSA公钥对应的RSA私钥解密所述加密密钥得到所述AES密钥。
在一些实施方式中,所述方法还包括:
从所述数据解密装置获取加密的校验值,所述加密的校验值是所述终端设备根据所述RSA公钥对所述运行记录信息的校验值进行加密得到和发送给所述数据解密装置的;
对所述加密的校验值进行解密得到所述校验值;
将解密得到所述校验值回传给所述数据解密装置,以使所述数据解密装置根据所述校验值确定解密得到的运行记录信息是否被篡改。
在一些实施方式中,所述运行记录信息的属性包括运行记录信息的权限级别、获取时间、存储位置中的至少一种。
本申请实施例提供的数据解密方法的具体原理和实现方式均与前述实施例的数据处理方法类似,此处不再赘述。
请结合上述实施例参阅图7,图7是本申请实施例提供的终端设备600的示意性框图。该终端设备600包括一个或多个处理器601,一个或多个处理器601单独地或共同地工作。
示例性的,终端设备600还包括存储器602。
示例性的,处理器601和存储器602通过总线603连接,该总线603比如为I2C(Inter-integrated Circuit)总线。
具体地,处理器601可以是微控制单元(Micro-controller Unit,MCU)、中央处理单元(Central Processing Unit,CPU)或数字信号处理器(Digital Signal Processor,DSP)等。
具体地,存储器602可以是Flash芯片、只读存储器(ROM,Read-Only Memory) 磁盘、光盘、U盘或移动硬盘等。
其中,所述处理器601用于运行存储在存储器602中的计算机程序,并在执行所述计算机程序时实现前述的用于终端设备的数据加密方法。
示例性的,所述处理器601用于运行存储在存储器602中的计算机程序,并在执行所述计算机程序时实现如下步骤:
获取可移动平台的运行记录信息;
根据AES密钥对所述运行记录信息进行加密,得到加密记录信息;
根据RSA公钥对所述AES密钥进行加密,得到加密密钥;
将所述加密记录信息和所述加密密钥发送给数据解密装置,以使所述数据解密装置根据所述加密密钥对所述加密记录信息进行解密,从而获取所述可移动平台的运行记录信息。
本申请实施例提供的终端设备的具体原理和实现方式均与前述实施例的用于终端设备的数据加密方法类似,此处不再赘述。
本申请实施例的实施例中还提供一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序中包括程序指令,所述处理器执行所述程序指令,实现上述实施例提供的用于终端设备的数据加密方法的步骤。
其中,所述计算机可读存储介质可以是前述任一实施例所述的终端设备的内部存储单元,例如所述终端设备的硬盘或内存。所述计算机可读存储介质也可以是所述终端设备的外部存储设备,例如所述终端设备上配备的插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)等。
请结合上述实施例参阅图8,图8是本申请实施例提供的数据解密装置700的示意性框图。该数据解密装置700包括一个或多个处理器701,一个或多个处理器701单独地或共同地工作。
示例性的,数据解密装置700还包括存储器702。
示例性的,处理器701和存储器702通过总线703连接,该总线703比如为I2C(Inter-integrated Circuit)总线。
具体地,处理器701可以是微控制单元(Micro-controller Unit,MCU)、中央处理单元(Central Processing Unit,CPU)或数字信号处理器(Digital  Signal Processor,DSP)等。
具体地,存储器702可以是Flash芯片、只读存储器(ROM,Read-Only Memory)磁盘、光盘、U盘或移动硬盘等。
其中,所述处理器701用于运行存储在存储器702中的计算机程序,并在执行所述计算机程序时实现前述的用于数据解密装置的数据解密方法。
示例性的,所述处理器701用于运行存储在存储器702中的计算机程序,并在执行所述计算机程序时实现如下步骤:
从终端设备获取加密记录信息和加密密钥,所述加密记录信息是所述终端设备根据AES密钥对可移动平台的运行记录信息加密得到的,所述加密密钥是所述终端设备根据RSA公钥对所述AES密钥进行加密得到的;
将所述加密密钥发送给服务器,以使所述服务器解密所述加密密钥得到所述AES密钥;
接收所述服务器回传的AES密钥;
根据所述AES密钥解密所述加密记录信息,得到所述运行记录信息。
本申请实施例提供的数据解密装置的具体原理和实现方式均与前述实施例的用于数据解密装置的数据解密方法类似,此处不再赘述。
本申请实施例的实施例中还提供一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序中包括程序指令,所述处理器执行所述程序指令,实现上述实施例提供的用于数据解密装置的数据解密方法的步骤。
其中,所述计算机可读存储介质可以是前述任一实施例所述的数据解密装置的内部存储单元,例如所述数据解密装置的硬盘或内存。所述计算机可读存储介质也可以是所述数据解密装置的外部存储设备,例如所述数据解密装置上配备的插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)等。
请结合上述实施例参阅图9,图9是本申请实施例提供的服务器800的示意性框图。该服务器800包括一个或多个处理器801,一个或多个处理器801单独地或共同地工作。
示例性的,服务器800还包括存储器802。
示例性的,处理器801和存储器802通过总线803连接,该总线803比如 为I2C(Inter-integrated Circuit)总线。
具体地,处理器801可以是微控制单元(Micro-controller Unit,MCU)、中央处理单元(Central Processing Unit,CPU)或数字信号处理器(Digital Signal Processor,DSP)等。
具体地,存储器802可以是Flash芯片、只读存储器(ROM,Read-Only Memory)磁盘、光盘、U盘或移动硬盘等。
其中,所述处理器801用于运行存储在存储器802中的计算机程序,并在执行所述计算机程序时实现前述的用于服务器的数据解密方法。
示例性的,所述处理器801用于运行存储在存储器802中的计算机程序,并在执行所述计算机程序时实现如下步骤:
从数据解密装置获取加密密钥,所述加密密钥是终端设备根据RSA公钥对AES密钥进行加密得到的,所述AES密钥用于所述终端设备对可移动平台的运行记录信息加密得到加密记录信息;
解密所述加密密钥得到所述AES密钥;
将所述AES密钥回传给所述数据解密装置,以使所述数据解密装置根据所述AES密钥解密所述加密记录信息,得到所述运行记录信息。
本申请实施例提供的服务器的具体原理和实现方式均与前述实施例的用于服务器的数据解密方法类似,此处不再赘述。
本申请实施例的实施例中还提供一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序中包括程序指令,所述处理器执行所述程序指令,实现上述实施例提供的用于服务器的数据解密方法的步骤。
其中,所述计算机可读存储介质可以是前述任一实施例所述的服务器的内部存储单元,例如所述服务器的硬盘或内存。所述计算机可读存储介质也可以是所述服务器的外部存储设备,例如所述服务器上配备的插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)等。
本申请实施例提供的数据处理、加密、解密方法、设备和存储介质,通过终端设备根据AES密钥加密运行记录信息和根据RSA公钥加密AES密钥,在终端设备将加密的运行记录信息和加密的AES密钥发送给数据解密装置时,数据解密装置可以将加密的AES密钥发送给服务器解密,以及根据解密得到的AES 密钥解密经过加密的运行记录信息;因此可以不将运行记录信息上传给服务器即可以实现解密,可以保护用户的隐私数据,而且获取到服务器解密出的AES密钥才能够对加密的运行记录信息进行解密,提高了数据的安全性,例如防止运行记录信息被破解和篡改。
应当理解,在此本申请中所使用的术语仅仅是出于描述特定实施例的目的而并不意在限制本申请。
还应当理解,在本申请和所附权利要求书中使用的术语“和/或”是指相关联列出的项中的一个或多个的任何组合以及所有可能组合,并且包括这些组合。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到各种等效的修改或替换,这些修改或替换都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以权利要求的保护范围为准。

Claims (41)

  1. 一种数据处理方法,其特征在于,所述方法包括:
    终端设备获取可移动平台的运行记录信息;
    所述终端设备根据AES密钥对所述运行记录信息进行加密,得到加密记录信息;
    所述终端设备根据RSA公钥对所述AES密钥进行加密,得到加密密钥;
    所述终端设备将所述加密记录信息和所述加密密钥发送给数据解密装置;
    所述数据解密装置将所述加密密钥发送给服务器;
    所述服务器解密所述加密密钥得到所述AES密钥;
    所述服务器将所述AES密钥回传给所述数据解密装置;
    所述数据解密装置根据所述AES密钥解密所述加密记录信息,得到所述运行记录信息。
  2. 一种数据加密方法,其特征在于,用于终端设备,所述方法包括:
    获取可移动平台的运行记录信息;
    根据AES密钥对所述运行记录信息进行加密,得到加密记录信息;
    根据RSA公钥对所述AES密钥进行加密,得到加密密钥;
    将所述加密记录信息和所述加密密钥发送给数据解密装置,以使所述数据解密装置根据所述加密密钥对所述加密记录信息进行解密,从而获取所述可移动平台的运行记录信息。
  3. 根据权利要求2所述的方法,其特征在于,所述根据AES密钥对所述运行记录信息进行加密,得到加密记录信息,包括:
    根据所述运行记录信息的属性确定对应的AES密钥;
    根据所述AES密钥对所述属性的运行记录信息进行加密,得到所述加密记录信息。
  4. 根据权利要求3所述的方法,其特征在于,不同属性的运行记录信息对应的AES密钥不同。
  5. 根据权利要求3或4所述的方法,其特征在于,所述AES密钥是所述终端设备随机生成的,或者,所述AES密钥是所述终端设备从服务器获取的。
  6. 根据权利要求2-5中任一项所述的方法,其特征在于,所述根据RSA公钥对所述AES密钥进行加密,得到加密密钥,包括:
    根据所述运行记录信息的属性确定对应的RSA公钥;
    根据所述RSA公钥对所述AES密钥进行加密,得到加密密钥。
  7. 根据权利要求6所述的方法,其特征在于,不同属性的运行记录信息对应的RSA公钥不同。
  8. 根据权利要求2-7中任一项所述的方法,其特征在于,多个属性的运行记录信息各自对应的加密密钥存储在一个密钥数组中;
    所述将所述加密记录信息和所述加密密钥发送给数据解密装置,包括:
    将所述多个属性的运行记录信息对应的加密记录信息和所述密钥数组发送给数据解密装置。
  9. 根据权利要求2-8中任一项所述的方法,其特征在于,所述运行记录信息的属性包括运行记录信息的权限级别、获取时间、存储位置中的至少一种。
  10. 根据权利要求2-9中任一项所述的方法,其特征在于,所述将所述加密记录信息和所述加密密钥发送给数据解密装置,包括:
    根据用户在所述终端设备上的信息上传操作,将所述加密记录信息和所述加密密钥发送给数据解密装置。
  11. 根据权利要求2-10中任一项所述的方法,其特征在于,所述方法还包括:
    生成所述运行记录信息的校验值;
    将所述校验值发送给所述数据解密装置,以使所述数据解密装置根据所述校验值确定解密得到的运行记录信息是否被篡改。
  12. 根据权利要求11所述的方法,其特征在于,所述生成所述运行记录信息的校验值,包括:
    生成所述运行记录信息的校验值,并根据所述RSA公钥对所述校验值进行加密;
    所述将所述校验值发送给所述数据解密装置,以使所述数据解密装置根据所述校验值确定解密得到的运行记录信息是否被篡改,包括:
    将加密的校验值发送给所述数据解密装置,以使所述数据解密装置根据所述加密的校验值确定解密得到的运行记录信息是否被篡改。
  13. 根据权利要求2-12中任一项所述的方法,其特征在于,所述可移动平台包括如下至少一种:无人飞行器、云台、无人车。
  14. 一种数据解密方法,其特征在于,用于数据解密装置,所述方法包括:
    从终端设备获取加密记录信息和加密密钥,所述加密记录信息是所述终端设备根据AES密钥对可移动平台的运行记录信息加密得到的,所述加密密钥是所述终端设备根据RSA公钥对所述AES密钥进行加密得到的;
    将所述加密密钥发送给服务器,以使所述服务器解密所述加密密钥得到所述AES密钥;
    接收所述服务器回传的AES密钥;
    根据所述AES密钥解密所述加密记录信息,得到所述运行记录信息。
  15. 根据权利要求14所述的方法,其特征在于,不同属性的运行记录信息对应的AES密钥不同。
  16. 根据权利要求14或15所述的方法,其特征在于,不同属性的运行记录信息对应的RSA公钥不同。
  17. 根据权利要求14-16中任一项所述的方法,其特征在于,所述从终端设备获取加密记录信息和加密密钥,包括:
    从终端设备获取多个属性的运行记录信息对应的加密记录信息和密钥数组,所述密钥数组包括多个属性的运行记录信息各自对应的加密密钥。
  18. 根据权利要求14-17中任一项所述的方法,其特征在于,所述将所述加密密钥发送给服务器,以使所述服务器解密所述加密密钥得到所述AES密钥,包括:
    将所述加密密钥发送给服务器,以使所述服务器根据所述数据解密装置的权限解密所述加密密钥得到所述AES密钥。
  19. 根据权利要求18所述的方法,其特征在于,所述方法还包括:
    将所述数据解密装置的装置信息和/或账号信息发送所述服务器,以使所述服务器根据所述装置信息和/或账号信息确定所述数据解密装置的权限。
  20. 根据权利要求19所述的方法,其特征在于,所述将所述数据解密装置的装置信息和/或账号信息发送所述服务器,以使所述服务器根据所述装置信息和/或账号信息确定所述数据解密装置的权限,包括:
    将所述数据解密装置的装置信息和/或账号信息发送所述服务器,以使所述 服务器根据所述装置信息和/或账号信息确定所述数据解密装置有权限获取的运行记录信息的属性。
  21. 根据权利要求18所述的方法,其特征在于,所述方法还包括:
    接收所述服务器发送的无权限提示,所述无权限提示表示所述数据解密装置没有权限获取特定属性的运行记录信息。
  22. 根据权利要求14-21中任一项所述的方法,其特征在于,所述服务器根据所述RSA公钥对应的RSA私钥解密所述加密密钥得到所述AES密钥。
  23. 根据权利要求14-22中任一项所述的方法,其特征在于,所述从终端设备获取加密记录信息和加密密钥,包括:
    根据用户在所述终端设备上的信息上传操作,从所述终端设备获取加密记录信息和加密密钥。
  24. 根据权利要求14-23中任一项所述的方法,其特征在于,所述方法还包括:
    从终端设备获取所述运行记录信息的校验值;
    根据所述校验值确定解密得到的运行记录信息是否被篡改。
  25. 根据权利要求24所述的方法,其特征在于,所述从终端设备获取所述运行记录信息的校验值,包括:
    从终端设备获取加密的校验值,所述加密的校验值是所述终端设备根据所述RSA公钥对所述运行记录信息的校验值进行加密得到的;
    所述根据所述校验值确定解密得到的运行记录信息是否被篡改,包括:
    将所述加密的校验值发送给服务器解密得到所述校验值,以及根据所述服务器回传的校验值确定解密得到的运行记录信息是否被篡改。
  26. 根据权利要求14-25中任一项所述的方法,其特征在于,所述运行记录信息的属性包括运行记录信息的权限级别、获取时间、存储位置中的至少一种。
  27. 一种数据解密方法,其特征在于,用于服务器,所述方法包括:
    从数据解密装置获取加密密钥,所述加密密钥是终端设备根据RSA公钥对AES密钥进行加密得到的,所述AES密钥用于所述终端设备对可移动平台的运行记录信息加密得到加密记录信息;
    解密所述加密密钥得到所述AES密钥;
    将所述AES密钥回传给所述数据解密装置,以使所述数据解密装置根据所 述AES密钥解密所述加密记录信息,得到所述运行记录信息。
  28. 根据权利要求27所述的方法,其特征在于,不同属性的运行记录信息对应的AES密钥不同。
  29. 根据权利要求27或28所述的方法,其特征在于,不同属性的运行记录信息对应的RSA公钥不同。
  30. 根据权利要求27-29中任一项所述的方法,其特征在于,所述从数据解密装置获取加密密钥,包括:
    从数据解密装置获取密钥数组,所述密钥数组包括多个属性的运行记录信息各自对应的加密密钥。
  31. 根据权利要求27-30中任一项所述的方法,其特征在于,所述解密所述加密密钥得到所述AES密钥,包括:
    根据所述数据解密装置的权限解密所述加密密钥得到所述AES密钥。
  32. 根据权利要求31所述的方法,其特征在于,所述方法还包括:
    获取所述数据解密装置的装置信息和/或账号信息;
    根据所述装置信息和/或账号信息确定所述数据解密装置的权限。
  33. 根据权利要求32所述的方法,其特征在于,所述根据所述装置信息和/或账号信息确定所述数据解密装置的权限,包括:
    根据所述装置信息和/或账号信息确定所述数据解密装置有权限获取的运行记录信息的属性。
  34. 根据权利要求31所述的方法,其特征在于,所述方法还包括:
    根据所述数据解密装置的权限向所述数据解密装置发送无权限提示,所述无权限提示表示所述数据解密装置没有权限获取特定属性的运行记录信息。
  35. 根据权利要求27-34中任一项所述的方法,其特征在于,所述解密所述加密密钥得到所述AES密钥,包括:
    根据所述RSA公钥对应的RSA私钥解密所述加密密钥得到所述AES密钥。
  36. 根据权利要求27-35中任一项所述的方法,其特征在于,所述方法还包括:
    从所述数据解密装置获取加密的校验值,所述加密的校验值是所述终端设备根据所述RSA公钥对所述运行记录信息的校验值进行加密得到和发送给所述数据解密装置的;
    对所述加密的校验值进行解密得到所述校验值;
    将解密得到所述校验值回传给所述数据解密装置,以使所述数据解密装置根据所述校验值确定解密得到的运行记录信息是否被篡改。
  37. 根据权利要求27-36中任一项所述的方法,其特征在于,所述运行记录信息的属性包括运行记录信息的权限级别、获取时间、存储位置中的至少一种。
  38. 一种终端设备,其特征在于,能够与可移动平台通信连接,包括一个或多个处理器,单独地或共同地工作,用于执行如下步骤:
    获取可移动平台的运行记录信息;
    根据AES密钥对所述运行记录信息进行加密,得到加密记录信息;
    根据RSA公钥对所述AES密钥进行加密,得到加密密钥;
    将所述加密记录信息和所述加密密钥发送给数据解密装置,以使所述数据解密装置根据所述加密密钥对所述加密记录信息进行解密,从而获取所述可移动平台的运行记录信息。
  39. 一种数据解密装置,其特征在于,包括一个或多个处理器,单独地或共同地工作,用于执行如下步骤:
    从终端设备获取加密记录信息和加密密钥,所述加密记录信息是所述终端设备根据AES密钥对可移动平台的运行记录信息加密得到的,所述加密密钥是所述终端设备根据RSA公钥对所述AES密钥进行加密得到的;
    将所述加密密钥发送给服务器,以使所述服务器解密所述加密密钥得到所述AES密钥;
    接收所述服务器回传的AES密钥;
    根据所述AES密钥解密所述加密记录信息,得到所述运行记录信息。
  40. 一种服务器,其特征在于,包括一个或多个处理器,单独地或共同地工作,用于执行如下步骤:
    从数据解密装置获取加密密钥,所述加密密钥是终端设备根据RSA公钥对AES密钥进行加密得到的,所述AES密钥用于所述终端设备对可移动平台的运行记录信息加密得到加密记录信息;
    解密所述加密密钥得到所述AES密钥;
    将所述AES密钥回传给所述数据解密装置,以使所述数据解密装置根据所述AES密钥解密所述加密记录信息,得到所述运行记录信息。
  41. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机程序,所述计算机程序被处理器执行时使所述处理器实现:
    如权利要求2-13中任一项所述的数据加密方法;和/或
    如权利要求14-26中任一项所述的数据解密方法;和/或
    如权利要求27-37中任一项所述的数据解密方法。
PCT/CN2020/092736 2020-05-27 2020-05-27 数据处理、加密、解密方法、设备和存储介质 WO2021237542A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2020/092736 WO2021237542A1 (zh) 2020-05-27 2020-05-27 数据处理、加密、解密方法、设备和存储介质
CN202080015620.6A CN113545022A (zh) 2020-05-27 2020-05-27 数据处理、加密、解密方法、设备和存储介质

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/092736 WO2021237542A1 (zh) 2020-05-27 2020-05-27 数据处理、加密、解密方法、设备和存储介质

Publications (1)

Publication Number Publication Date
WO2021237542A1 true WO2021237542A1 (zh) 2021-12-02

Family

ID=78094436

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/092736 WO2021237542A1 (zh) 2020-05-27 2020-05-27 数据处理、加密、解密方法、设备和存储介质

Country Status (2)

Country Link
CN (1) CN113545022A (zh)
WO (1) WO2021237542A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115208697A (zh) * 2022-09-15 2022-10-18 广州万协通信息技术有限公司 基于攻击行为的自适应数据加密方法及装置

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114338113B (zh) * 2021-12-09 2023-08-01 安天科技集团股份有限公司 一种数据加密、解密方法、装置、电子设备及存储介质

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101123495A (zh) * 2007-09-07 2008-02-13 农革 一种数据加密、解密系统和方法
CN102025505A (zh) * 2010-12-16 2011-04-20 浪潮(北京)电子信息产业有限公司 一种基于aes算法的加密、解密方法及装置
CN104219041A (zh) * 2014-09-23 2014-12-17 中国南方电网有限责任公司 一种适用于移动互联网的数据传输加密方法
CN105447407A (zh) * 2015-11-11 2016-03-30 中国建设银行股份有限公司 一种离线数据的加密方法、解密方法及相应装置和系统
US9485096B2 (en) * 2013-02-06 2016-11-01 Apurva Shrivastava Encryption / decryption of data with non-persistent, non-shared passkey
CN107659397A (zh) * 2017-08-11 2018-02-02 深圳市钱海网络技术有限公司 一种敏感信息传输方法及系统
CN107896223A (zh) * 2017-12-04 2018-04-10 山东渔翁信息技术股份有限公司 一种数据处理方法及系统、数据采集系统及数据接收系统
CN109802825A (zh) * 2017-11-17 2019-05-24 深圳市金证科技股份有限公司 一种数据加密、解密的方法、系统及终端设备
CN110188551A (zh) * 2019-05-21 2019-08-30 中国平安人寿保险股份有限公司 一种保单加密传输方法及系统

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10607026B2 (en) * 2016-03-21 2020-03-31 Acronis International Gmbh System and method for data backup using unmanned aerial vehicle (UAV)
WO2020107486A1 (zh) * 2018-11-30 2020-06-04 深圳市大疆创新科技有限公司 一种数据传输方法、设备、终端、服务器及存储介质
CN110460579B (zh) * 2019-07-10 2022-03-01 视联动力信息技术股份有限公司 一种飞行数据显示方法、系统、装置及可读存储介质

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101123495A (zh) * 2007-09-07 2008-02-13 农革 一种数据加密、解密系统和方法
CN102025505A (zh) * 2010-12-16 2011-04-20 浪潮(北京)电子信息产业有限公司 一种基于aes算法的加密、解密方法及装置
US9485096B2 (en) * 2013-02-06 2016-11-01 Apurva Shrivastava Encryption / decryption of data with non-persistent, non-shared passkey
CN104219041A (zh) * 2014-09-23 2014-12-17 中国南方电网有限责任公司 一种适用于移动互联网的数据传输加密方法
CN105447407A (zh) * 2015-11-11 2016-03-30 中国建设银行股份有限公司 一种离线数据的加密方法、解密方法及相应装置和系统
CN107659397A (zh) * 2017-08-11 2018-02-02 深圳市钱海网络技术有限公司 一种敏感信息传输方法及系统
CN109802825A (zh) * 2017-11-17 2019-05-24 深圳市金证科技股份有限公司 一种数据加密、解密的方法、系统及终端设备
CN107896223A (zh) * 2017-12-04 2018-04-10 山东渔翁信息技术股份有限公司 一种数据处理方法及系统、数据采集系统及数据接收系统
CN110188551A (zh) * 2019-05-21 2019-08-30 中国平安人寿保险股份有限公司 一种保单加密传输方法及系统

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115208697A (zh) * 2022-09-15 2022-10-18 广州万协通信息技术有限公司 基于攻击行为的自适应数据加密方法及装置

Also Published As

Publication number Publication date
CN113545022A (zh) 2021-10-22

Similar Documents

Publication Publication Date Title
US10375116B2 (en) System and method to provide server control for access to mobile client data
US10614216B2 (en) Paravirtualized security threat protection of a computer-driven system with networked devices
EP3195555B1 (en) Secure key management for roaming protected content
EP3216188B1 (en) Roaming content wipe actions across devices
US9298930B2 (en) Generating a data audit trail for cross perimeter data transfer
CN102792313A (zh) 对数据的基于证书的访问
US9529733B1 (en) Systems and methods for securely accessing encrypted data stores
CN103763313A (zh) 一种文档保护方法和系统
WO2021237542A1 (zh) 数据处理、加密、解密方法、设备和存储介质
US20230237193A1 (en) Security processor configured to authenticate user and authorize user for user data and computing system including the same
CN112567441A (zh) 信息处理系统、信息处理方法和信息处理装置
CN105933503B (zh) 一种信息处理方法和电子设备
CN109960935B (zh) 确定tpm可信状态的方法、装置及存储介质
US11520655B1 (en) Systems and methods for self correcting secure computer systems
US11231988B1 (en) Systems and methods for secure deletion of information on self correcting secure computer systems
US10235541B2 (en) System and method for confidential data management
WO2024060756A1 (zh) 计算机设备及其运行方法、安全芯片
JP2017050858A (ja) データ転送システムに埋め込まれた暗号鍵サーバ
TWM587350U (zh) 具有加解密功能之隨身碟
CN110990828A (zh) 一种多信息系统的聚合管理系统及方法
TW201822058A (zh) 機密資料管理系統與方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20937958

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20937958

Country of ref document: EP

Kind code of ref document: A1