WO2023212943A1 - Procédé et appareil d'interaction de données, dispositif électronique et support de stockage - Google Patents

Procédé et appareil d'interaction de données, dispositif électronique et support de stockage Download PDF

Info

Publication number
WO2023212943A1
WO2023212943A1 PCT/CN2022/091265 CN2022091265W WO2023212943A1 WO 2023212943 A1 WO2023212943 A1 WO 2023212943A1 CN 2022091265 W CN2022091265 W CN 2022091265W WO 2023212943 A1 WO2023212943 A1 WO 2023212943A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
interaction
terminal device
encrypted
data packets
Prior art date
Application number
PCT/CN2022/091265
Other languages
English (en)
Chinese (zh)
Inventor
赵增浩
郑凯文
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to CN202280004232.7A priority Critical patent/CN116097621A/zh
Priority to PCT/CN2022/091265 priority patent/WO2023212943A1/fr
Publication of WO2023212943A1 publication Critical patent/WO2023212943A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/14Digital output to display device ; Cooperation and interconnection of the display device with other functional units
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/436Interfacing a local distribution network, e.g. communicating with another STB or one or more peripheral devices inside the home
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup

Definitions

  • the present disclosure relates to the field of data interaction technology, and specifically relates to a data interaction method, device, electronic device and storage medium.
  • embodiments of the present disclosure provide a data interaction method, device, electronic device and storage medium to solve the defects in the related technology.
  • a data interaction method is provided, applied to a first terminal device, and the first terminal and a second terminal perform screen projection interaction.
  • the method includes:
  • it also includes:
  • the key data obtained in the interactive data include:
  • the key data in the interaction data is obtained.
  • determining interaction data according to interaction control instructions and obtaining the interaction data includes:
  • determining whether key data exists in the interaction data includes:
  • encrypting N first data packets among the M first data packets includes:
  • the first N first data packets among the M first data packets are encrypted.
  • it also includes:
  • the encryption ratio is determined based on the computing power of the first terminal device and the quality parameters of the data transmission link.
  • encrypting N first data packets among the M first data packets includes:
  • the encrypted identification, the encrypted information and the first data packet are encrypted to obtain an encrypted first data packet, wherein the encrypted identification is used by the second terminal device to determine the process from the plurality of first data packets. Encryption of the first packet processed.
  • it also includes:
  • non-critical data in the interaction data encapsulate the critical data into a plurality of second data packets, and send the plurality of second data packets to the second terminal device, so that the second terminal
  • the device parses and displays the non-critical data.
  • the interaction data includes video and/or audio.
  • a data interaction method is provided, applied to a second terminal device, including:
  • the encrypted information is sent to the first terminal device, so that the first terminal device continues to send the interaction data.
  • the method before decrypting the encrypted N first data packets to obtain encrypted information, the method further includes:
  • At least one first data packet with an encryption identifier among the M first data packets is determined as an encrypted first data packet.
  • the method further includes:
  • it also includes:
  • it also includes:
  • a data interaction device applied to a first terminal device, and the first terminal and a second terminal perform screen projection interaction.
  • the device includes:
  • the first acquisition module is used to acquire key data in the interactive data, and encapsulate the key data into M first data packets, where M is a natural number greater than 1;
  • An encryption module configured to encrypt N first data packets among the M first data packets, and send the M first data packets to the second terminal device in sequence, where N is greater than or equal to 1 , and less than M;
  • a verification module configured to receive encrypted information returned by the second terminal device within a preset time period, and determine whether to continue sending the interactive data according to the encrypted information, wherein the encrypted information is sent by the second terminal device Obtained by decrypting the encrypted first data packet.
  • a determining module is also included for:
  • the first acquisition module is specifically used for:
  • the key data in the interaction data is obtained.
  • the determination module is used to determine interaction data according to interaction control instructions, and when acquiring the interaction data, it is specifically used to:
  • the determination module is used to determine whether key data exists in the interaction data, specifically for:
  • the encryption module is used to encrypt N first data packets among the M first data packets, specifically for:
  • the first N first data packets among the M first data packets are encrypted.
  • a proportional module is also included for:
  • the encryption ratio is determined based on the computing power of the first terminal device and the quality parameters of the data transmission link.
  • the encryption module is used to encrypt N first data packets among the M first data packets, specifically for:
  • the encrypted identification, the encrypted information and the first data packet are encrypted to obtain an encrypted first data packet, wherein the encrypted identification is used by the second terminal device to determine the process from the plurality of first data packets. Encryption of the first packet processed.
  • a second acquisition module is also included, used for:
  • non-critical data in the interaction data encapsulate the critical data into a plurality of second data packets, and send the plurality of second data packets to the second terminal device, so that the second terminal
  • the device parses and displays the non-critical data.
  • the interaction data includes video and/or audio.
  • a data interaction device is provided, applied to a second terminal device, including:
  • a receiving module configured to receive M first data packets sent by the first terminal device, wherein the M first data packets are obtained by the first terminal device encapsulating key data in the interaction data, and the M first data packets are obtained by encapsulating key data in the interactive data.
  • N first data packets among the first data packets have been encrypted by the first terminal device, M is a natural number greater than 1, N is greater than or equal to 1, and less than M;
  • a decryption module used to decrypt the encrypted N first data packets to obtain encrypted information
  • a sending module configured to send the encrypted information to the first terminal device, so that the first terminal device continues to send the interactive data.
  • an identification module is also included for:
  • the first data packet with an encryption identifier among the M first data packets is determined to be the encrypted first data packet.
  • a first display module is also included for:
  • a first display module is also included for:
  • a control module is also included for:
  • an electronic device includes a memory and a processor.
  • the memory is used to store computer instructions executable on the processor.
  • the processor is used to execute the The computer instructions are based on the data interaction method described in the first aspect.
  • a computer-readable storage medium on which a computer program is stored, and when the program is executed by a processor, the method described in the first aspect is implemented.
  • This disclosure obtains the key data in the interaction data and encapsulates the key data into M first data packets. Then, the N first data packets among the M first data packets can be encrypted and sent in sequence. The M first data packets are sent to the second terminal device, and finally the encrypted information returned by the second terminal device is received, and whether to continue sending the interactive data is determined according to the encrypted information, wherein the encrypted information is provided by the third terminal device. The second terminal device decrypts the encrypted first data packet to obtain the encrypted data packet.
  • the second terminal device can be encrypted according to whether the second terminal device Encrypted information that can pass verification is returned to determine whether the second terminal device has successfully decrypted the encrypted first data packet, and then can determine whether the data sent to the second terminal device is safe, and stop sending interactions if it is unsafe. data, thereby avoiding data leakage and ensuring data security.
  • Figure 1 is a flow chart of a data interaction method applied to a first terminal device according to an exemplary embodiment of the present disclosure
  • Figure 2 is a schematic diagram of the interaction process between a first terminal device and a second terminal device according to an exemplary embodiment of the present disclosure
  • Figure 3 is a schematic diagram of the encapsulation process of key data according to an exemplary embodiment of the present disclosure
  • Figure 4 is a schematic diagram of the encryption process of key data according to an exemplary embodiment of the present disclosure
  • Figure 5 is a schematic diagram of an encryption method of key data according to an exemplary embodiment of the present disclosure
  • Figure 6 is a flow chart of a data interaction method applied to a second terminal device according to an exemplary embodiment of the present disclosure
  • Figure 7 is a processing flow of the second terminal device after receiving interactive data according to an exemplary embodiment of the present disclosure
  • Figure 8 is a schematic structural diagram of a data interaction device applied to a first terminal device according to an exemplary embodiment of the present disclosure
  • Figure 9 is a schematic structural diagram of a data interaction device applied to a second terminal device according to an exemplary embodiment of the present disclosure.
  • FIG. 10 is a structural block diagram of an electronic device according to an exemplary embodiment of the present disclosure.
  • first, second, third, etc. may be used in this disclosure to describe various information, the information should not be limited to these terms. These terms are only used to distinguish information of the same type from each other.
  • first information may also be called second information, and similarly, the second information may also be called first information.
  • word “if” as used herein may be interpreted as "when” or “when” or “in response to determining.”
  • one terminal device saves its video, audio and other data into multi-frame data through screen recording, audio recording, etc., and then transmits it to another terminal device through wired connection or wireless connection, and the other terminal device Then you can parse the multi-frame data to obtain the original video, audio and other data, and then perform display operations such as display or playback.
  • the data may be intercepted by malicious applications, that is, the security of data interaction is poor. If the data contains the user's call data, contacts, account passwords, etc., It may lead to the leakage of this information and seriously affect the security of users' personal information.
  • one terminal device encrypts the data before transmitting the data, and the other terminal device decrypts the data after receiving the data.
  • the above-mentioned encryption and decryption process will not only reduce the efficiency of data interaction, but also increase the computing load of the terminal device. Taking the screen-casting connection scenario as an example, the above-mentioned encryption and encryption processes will greatly reduce the efficiency of video and audio transmission, causing problems such as stuck or blurred video images, and audio stuck or distortion.
  • the malicious application that intercepts the interactive data has the decryption capability, it will continue to obtain and decrypt the interactive data, causing the continuous leakage of important information and having a greater impact on data security.
  • At least one embodiment of the present disclosure provides a data interaction method. Please refer to FIG. 1 , which shows the flow of the method, including step S101 and step S103.
  • the first terminal device may be a user equipment (User Equipment, UE), a mobile device, a user terminal, a terminal, a cellular phone, a cordless phone, a personal digital assistant (Personal Digital Assistant, PDA) handheld device, a computing device, a wearable device, etc.
  • the first terminal device can be the data source in a data interaction scenario, that is, the side that sends data outward. For example, in a scenario where a smartphone projects a screen to a TV, the smartphone is the data source and the TV is the data destination.
  • terminal A as the first terminal device has application C for data interaction.
  • Application C can communicate and connect with other application programs such as application 1, application 2, application 3, etc., thereby obtaining information from other application programs.
  • Interactive data such as audio data, video data, etc. are encapsulated and sent to Terminal B as the second terminal device.
  • Terminal B is the data end point of data interaction. It can receive the data sent by Application C and process the received data.
  • the data is decapsulated, and at the same time, the application of terminal A can be counter-controlled, that is, control instructions are sent to application C, and then application C sends these control instructions to the corresponding application.
  • These other applications may be music applications, video applications, navigation applications, social applications, etc.
  • step S101 key data in the interaction data is obtained, and the key data is encapsulated into M first data packets, where M is a natural number greater than 1.
  • the interaction data is data targeted by data interaction, that is, data sent by the first terminal device to the second terminal device.
  • the interactive data is video, audio and other data.
  • Key data can be data related to user privacy or account security.
  • the first terminal device can determine the interaction data and the application program to which the interaction data belongs according to the interaction control instruction, and obtain the interaction data from the application program to which the interaction data belongs, wherein the interaction control instruction is based on Generated by a user's operation on the first terminal device or the second terminal device.
  • the interaction control instruction is based on Generated by a user's operation on the first terminal device or the second terminal device.
  • the default screen can be the current screen of the first terminal device, the desktop, or the dedicated initial screen of the screen projection program; next, the user can operate the first terminal device, and the first terminal device generates an interactive control instruction based on the operation, or The second terminal device operates on the above-mentioned default screen displayed on the second terminal device.
  • the second terminal device generates an interactive control instruction based on the operation and sends the interactive control instruction to the first terminal device.
  • the first terminal device sends a request to the corresponding application according to the interactive control instruction.
  • the program obtains picture, audio and other data. For example, if the interactive control instruction is to start an application on the desktop, then the first terminal device starts the application and obtains the initial interface after the application is started as the interaction data.
  • the first terminal device can determine whether there is key data in the interaction data in the following manner: first, determine whether there is data belonging to the preset key data list in the interaction data. For example, first A preset key data list is preset in the terminal device; next, if there is data belonging to the preset key data list in the interaction data, it is determined that key data exists in the interaction data, and the interaction data is determined , the data belonging to the preset key data list is key data; when there is no data in the preset key data list in the interaction data, it is determined that there is no key data in the interaction data.
  • this step can be performed, that is, obtaining the key data in the interaction data. Due to the influence of the bandwidth of the transmission channel, the key data cannot be directly transmitted to the second terminal device. Therefore, the key data can be encapsulated into M first data packets with reference to Figure 3.
  • non-critical data in the interactive data can also be obtained, the critical data can be encapsulated into a plurality of second data packets, and the plurality of second data packets can be sent to the second terminal device, so that all The second terminal device parses and displays the non-critical data.
  • the interaction data may be encapsulated into a plurality of third data packets, and the plurality of third data packets may be sent to the second terminal device, so that the The second terminal device parses and displays the interaction data.
  • step S102 N first data packets among the M first data packets are encrypted, and the M first data packets are sent to the second terminal device in sequence, where N is greater than or equal to 1, and Less than M.
  • the first data packet to be encrypted may be part of the M first data packets.
  • the encryption ratio K can be determined first based on the computing power p of the first terminal device and the quality parameter q of the data transmission link.
  • the computing power p of the first terminal device can be used to characterize the first terminal device.
  • the encryption speed, the quality parameter q of the data transmission link can be used to characterize the packet loss rate. If the packet loss rate is too high, the first encrypted data packet may be lost, which will make the encryption meaningless. Take the screen projection scenario as an example. , the packet loss rate is extremely low, and the value of q is between 0.98-1.
  • N M*K
  • the first N first data packets among the plurality of first data packets are encrypted.
  • the first three first data packets are encrypted. It can be understood that Figure 4 is only an example, and the general encryption ratio K is between 20% and 30%.
  • the first data packet can be encrypted as shown in Figure 5: the encryption identifier F, the encryption information I and the first data packet are encrypted to obtain the encrypted first data. package, wherein the encryption identifier F is used by the second terminal device to determine the encrypted first data packet from the plurality of first data packets.
  • the first terminal device will continuously obtain the interaction data according to the interaction control instructions, and determine whether there is key data in the interaction data. If there is key data, the key data will be encapsulated into multiple Part or all of the first data packet is encrypted and sent to the second terminal device, and the multiple second data packets obtained by encapsulating non-critical data are directly sent to the second terminal device. If there is no critical data, the interaction is directly The plurality of third data packets obtained after data encapsulation are sent to the second terminal device. The order of processing and sending the above interactive data can be determined according to the order in which the interactive data is obtained.
  • step S103 the encrypted information returned by the second terminal device is received, and whether to continue sending the interactive data is determined according to the encrypted information, wherein the encrypted information is used by the second terminal device to encrypt the encrypted information.
  • the first data packet is decrypted and obtained.
  • the second terminal device continues to receive the interaction data sent by the first terminal device in the form of data packets during the data interaction process, and then processes the received interaction data in sequence, that is, processes the received data packets in sequence.
  • the plurality of second data packets After receiving a plurality of second data packets sent by the first terminal device, the plurality of second data packets can be parsed in sequence according to the order of reception, to obtain the non-critical data, and display the non-critical data according to the method to display the non-critical data. For example, if the non-key data is a picture, the image can be displayed; if the non-key data is a video, the video can be played.
  • the plurality of third data packets may be parsed and processed in sequence according to the reception order to obtain the interactive data, and according to the display method of the interactive data, Display the interactive data. For example, if the interactive data is a picture, the image can be displayed; if the interactive data is a video, the video can be played.
  • the first data packet with an encryption identifier among the plurality of first data packets may first be determined as the encrypted first data packet, and then the first data packet may be The N first data packets that have been encrypted are decrypted to obtain the encrypted information and the decrypted first data packets, and then the multiple first data packets are parsed in sequence according to the order of reception to obtain the key data, and display the key data according to the display method of the key data. For example, if the key data is a picture, the image can be displayed; if the key data is a video, the video can be played; at the same time, Send the encrypted information to the first terminal device.
  • the first terminal device receives the encrypted information returned by the second terminal device within the preset time period, and the encrypted information passes the verification, it will continue to send the interactive data, that is, continue to send the existence key in the form of data packets.
  • Key data and non-key data in the interactive data of the data as well as interactive data without critical data; otherwise (that is, the first terminal device does not receive the encrypted information returned by the second terminal device within the preset time period, or the first terminal device does not receive the encrypted information returned by the second terminal device within the preset time period, or the When a terminal device receives the encrypted information returned by the second terminal device within a preset time period, but the encrypted information fails to pass verification), it stops sending interactive data, that is, it stops sending key interactive data in which critical data exists. Data and non-critical data, as well as interactive data without critical data. For example, in a screencasting scenario, you can stop screencasting and disconnect the screencasting connection with the second terminal device.
  • the first terminal device does not receive the encrypted information returned by the second terminal device within the preset time period, or the first terminal device receives the encrypted information returned by the second terminal device within the preset time period. If the device returns encrypted information, but the encrypted information fails to pass verification, it can also generate prompt information, such as text prompt information displayed on the display, or audio prompt information played by the speaker.
  • This disclosure obtains the key data in the interactive data and encapsulates the key data into M first data packets. Then, the N first data packets among the M first data packets can be encrypted and sent in sequence. The M first data packets are sent to the second terminal device, and finally the encrypted information returned by the second terminal device is received, and whether to continue sending the interactive data is determined according to the encrypted information, wherein the encrypted information is provided by the third terminal device. The second terminal device decrypts the encrypted first data packet to obtain the encrypted data packet.
  • the second terminal device can be encrypted according to whether the second terminal device Encrypted information that can pass verification is returned to determine whether the second terminal device has successfully decrypted the encrypted first data packet, and then can determine whether the data sent to the second terminal device is safe, and stop sending interactions if it is unsafe. data, thereby avoiding data leakage and ensuring data security.
  • some of the encapsulated first data packets are encrypted, thereby reducing the computational load of the encryption process of the first terminal device and the computational load of the decryption process of the second terminal device, thereby avoiding the occurrence of Problems with lags and interruptions.
  • the present disclosure further controls the subsequent data interaction of the first terminal device based on the decryption of the encrypted first data packet by the second terminal device, that is, when the second terminal device successfully decrypts the encrypted first data packet. Continue data interaction, and stop data interaction if the second terminal device fails to decrypt the encrypted first data packet, thereby avoiding the possibility that a malicious application in the second terminal device cannot decrypt the encrypted first data.
  • the present disclosure encrypts the first N first data packets among multiple first data packets, which can prevent subsequent unencrypted data packets from being intercepted when there is a malicious application intercepting data, thus ensuring data security to the greatest extent. .
  • At least one embodiment of the present disclosure provides a data interaction method. Please refer to FIG. 6 , which shows the flow of the method, including step S601 and step S503.
  • the method can be applied to the second terminal device.
  • the second terminal device may be a television, a vehicle-mounted terminal, etc.
  • the second terminal device can be the data destination in a data interaction scenario, that is, the side that receives data. For example, in a scenario where a smartphone projects a screen to a TV, the smartphone is the data source and the TV is the data destination.
  • step S601 M first data packets sent by the first terminal device are received, wherein the plurality of first data packets are obtained by the first terminal device encapsulating key data in the interactive data, and the M N first data packets among the first data packets have been encrypted by the first terminal device.
  • M is a natural number greater than 1, and N is greater than or equal to 1 and less than M.
  • step S602 the N first data packets that have been encrypted are decrypted to obtain encrypted information.
  • the first data packet with the encryption identifier among the M first data packets may be determined as the encrypted first data packet.
  • the encrypted first data packet may be decrypted. After decryption, not only the decrypted first data packet is obtained, but also the encrypted information added by the first terminal device during the decryption process is obtained.
  • the M first data packets can be parsed in sequence according to the receiving order to obtain the key data, and according to the key data Display method to display the key data. For example, if the non-key data is a picture, the image can be displayed; if the non-key data is a video, the video can be played.
  • step S603 the encrypted information is sent to the first terminal device, so that the first terminal device continues to send the interaction data.
  • the second terminal device may also receive a plurality of second data packets sent by the first terminal device, wherein the plurality of second data packets are obtained by the first terminal device encapsulating non-critical data in the interactive data. ; and sequentially parse and process the plurality of second data packets according to the order of reception to obtain the non-critical data; and display the non-critical data according to the display method of the non-critical data. For example, if the non-key data is a picture, the image can be displayed; if the non-key data is a video, the video can be played.
  • the second terminal device may also receive a plurality of third data packets sent by the first terminal device, wherein the plurality of third data packets are obtained by the first terminal device encapsulating interactive data without critical data. ; and sequentially parse and process the plurality of third data packets according to the order of reception to obtain the interactive data; and display the interactive data according to the display method of the interactive data. For example, if the non-key data is a picture, the image can be displayed; if the non-key data is a video, the video can be played.
  • FIG. 7 shows the processing flow of terminal B as the second terminal device after receiving interactive data.
  • terminal B After receiving the data, terminal B first determines whether decryption is required; if decryption is not required, that is, the data is non-critical data in the interactive data where critical data exists, or interactive data where critical data does not exist, the data will be parsed and displayed; if necessary To decrypt, the data is encrypted, and the decrypted data is parsed and displayed. At the same time, the encrypted information I is obtained during the decryption process, and then the encrypted information I is sent to terminal A as the first terminal device. Terminal A determines whether the information I is correct. , if it is correct (that is, it passes the verification), it will continue to send the data, if it is incorrect (that is, it does not pass the verification), it will stop sending the data.
  • the user can operate on the display result of the interactive data, such as operating the screen projection interface displayed by the second terminal device; the second terminal device can then operate on the display result of the interactive data based on the user's display of the interactive data.
  • the operation of displaying the results generates an interaction control instruction, and sends the interaction control instruction to the first terminal device, so that the terminal device continues to return the interaction data.
  • the first terminal device continuously obtains interaction data according to the interaction control instructions (the interaction control instructions are generated based on the user's operation of the first terminal device or the second terminal device), and
  • the interactive data is encapsulated and sent to the second terminal device.
  • the second terminal device decapsulates the data and then displays it, such as displaying pictures and playing audio and video.
  • key data in the above interactive data.
  • the key data involves user privacy or account information, so it needs to be encrypted for protection. Therefore, after the key data is encapsulated, parts of the multiple first data packets obtained are encrypted and then sent.
  • the second terminal device receives the encrypted first data packet and needs to first decrypt it, then decapsulate it, and then display it.
  • the encrypted first data packet in the key data also serves as a security verification method during the data interaction process. That is, the first data packet adds encrypted information during the encryption process, and the second terminal device will obtain the encrypted information after decryption. information and returns the encrypted information to the first terminal device. Therefore, if the first terminal device receives the correct encrypted information, it means that the current interaction process is safe and data interaction can continue. If the first terminal device does not receive the correct encrypted information, then Indicates that the current interaction process is unsafe and data interaction can be stopped.
  • a data interaction device which is applied to a first terminal device.
  • the first terminal and the second terminal perform screen projection interaction.
  • the device includes:
  • the first acquisition module 801 is used to acquire key data in the interaction data, and encapsulate the key data into M first data packets, where M is a natural number greater than 1;
  • the encryption module 802 is used to encrypt N first data packets among the M first data packets, and send the M first data packets to the second terminal device in sequence, where N is greater than or equal to 1, And less than M;
  • Verification module 803 configured to receive the encrypted information returned by the second terminal device, and determine whether to continue sending the interactive data according to the encrypted information, wherein the encrypted information is encrypted by the second terminal device.
  • the first data packet is decrypted and obtained.
  • a determining module is further included for:
  • the first acquisition module is specifically used for:
  • the key data in the interaction data is obtained.
  • the determination module is used to determine interaction data according to interaction control instructions, and when acquiring the interaction data, it is specifically used to:
  • the determination module is used to determine whether key data exists in the interaction data, specifically for:
  • the encryption module is used to encrypt N first data packets among the M first data packets, specifically for:
  • the first N first data packets among the plurality of first data packets are encrypted.
  • a proportional module is also included for:
  • the encryption ratio is determined based on the computing power of the first terminal device and the quality parameters of the data transmission link.
  • the encryption module is used to encrypt N first data packets among the M first data packets, specifically for:
  • the encrypted identification, the encrypted information and the first data packet are encrypted to obtain an encrypted first data packet, wherein the encrypted identification is used by the second terminal device to determine the process from the plurality of first data packets. Encryption of the first packet processed.
  • a second acquisition module is also included, used for:
  • non-critical data in the interaction data encapsulate the critical data into a plurality of second data packets, and send the plurality of second data packets to the second terminal device, so that the second terminal
  • the device parses and displays the non-critical data.
  • the interaction data includes video and/or audio.
  • a data interaction device is provided, which is applied to a second terminal device. Please refer to FIG. 9.
  • the device includes:
  • the receiving module 901 is configured to receive M first data packets sent by the first terminal device, wherein the M first data packets are obtained by the first terminal device encapsulating key data in the interaction data, and the N first data packets among the M first data packets have been encrypted by the first terminal device, M is a natural number greater than 1, N is greater than or equal to 1, and less than M;
  • the decryption module 902 is used to decrypt the encrypted N first data packets to obtain encrypted information
  • the sending module 903 is configured to send the encrypted information to the first terminal device, so that the first terminal device continues to send the interactive data.
  • an identification module is also included for:
  • the first data packet with an encryption identifier among the M first data packets is determined to be the encrypted first data packet.
  • a first display module is also included, used for:
  • a first display module is also included, used for:
  • control module is also included for:
  • the device 1000 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, a fitness device, a personal digital assistant, or the like.
  • the device 1000 may include one or more of the following components: a processing component 1002, a memory 1004, a power supply component 1006, a multimedia component 1008, an audio component 1010, an input/output (I/O) interface 1012, a sensor component 1014, and communications component 1016.
  • Processing component 1002 generally controls the overall operations of device 1000, such as operations associated with display, phone calls, data communications, camera operations, and recording operations.
  • the processing element 1002 may include one or more processors 1020 to execute instructions to complete all or part of the steps of the above method.
  • processing component 1002 may include one or more modules that facilitate interaction between processing component 1002 and other components.
  • processing component 1002 may include a multimedia module to facilitate interaction between multimedia component 1008 and processing component 1002.
  • Memory 1004 is configured to store various types of data to support operations at device 1000 . Examples of such data include instructions for any application or method operating on device 1000, contact data, phonebook data, messages, pictures, videos, etc.
  • Memory 1004 may be implemented by any type of volatile or non-volatile storage device, or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EEPROM), Programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read-only memory
  • EEPROM erasable programmable read-only memory
  • EPROM Programmable read-only memory
  • PROM programmable read-only memory
  • ROM read-only memory
  • magnetic memory flash memory, magnetic or optical disk.
  • Power component 1006 provides power to various components of device 1000.
  • Power components 1006 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power to device 1000 .
  • Multimedia component 1008 includes a screen that provides an output interface between the device 1000 and the user.
  • the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from the user.
  • the touch panel includes one or more touch sensors to sense touches, slides, and gestures on the touch panel. The touch sensor may not only sense the boundary of the touch or sliding operation, but also detect the duration and pressure associated with the touch or sliding operation.
  • multimedia component 1008 includes a front-facing camera and/or a rear-facing camera. When the device 1000 is in an operating mode, such as a shooting mode or a video mode, the front camera and/or the rear camera may receive external multimedia data.
  • Each front-facing camera and rear-facing camera can be a fixed optical lens system or have a focal length and optical zoom capabilities.
  • Audio component 1010 is configured to output and/or input audio signals.
  • audio component 1010 includes a microphone (MIC) configured to receive external audio signals when device 1000 is in operating modes, such as call mode, recording mode, and speech recognition mode. The received audio signals may be further stored in memory 1004 or sent via communications component 1016 .
  • audio component 1010 also includes a speaker for outputting audio signals.
  • the I/O interface 1012 provides an interface between the processing component 1002 and a peripheral interface module.
  • the peripheral interface module may be a keyboard, a click wheel, a button, etc. These buttons may include, but are not limited to: Home button, Volume buttons, Start button, and Lock button.
  • Sensor component 1014 includes one or more sensors for providing various aspects of status assessment for device 1000 .
  • the sensor component 1014 can detect the open/closed state of the device 1000, the relative positioning of components, such as the display and keypad of the device 1000, and the sensor component 1014 can also detect a change in position of the device 1000 or a component of the device 1000. , the presence or absence of user contact with the device 1000 , device 1000 orientation or acceleration/deceleration and temperature changes of the device 1000 .
  • Sensor assembly 1014 may also include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
  • Sensor assembly 1014 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
  • the sensor component 1014 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
  • Communication component 1016 is configured to facilitate wired or wireless communication between apparatus 1000 and other devices.
  • the device 1000 can access a wireless network based on a communication standard, such as WiFi, 2G or 3G, 4G or 5G, or a combination thereof.
  • the communication component 1016 receives broadcast signals or broadcast related information from an external broadcast management system via a broadcast channel.
  • the communication component 1016 also includes a near field communication (NFC) module to facilitate short-range communications.
  • NFC near field communication
  • the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology and other technologies.
  • RFID radio frequency identification
  • IrDA infrared data association
  • UWB ultra-wideband
  • Bluetooth Bluetooth
  • apparatus 1000 may be configured by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable Gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are implemented for executing the power supply method of the above electronic device.
  • ASICs application specific integrated circuits
  • DSPs digital signal processors
  • DSPDs digital signal processing devices
  • PLDs programmable logic devices
  • FPGA field programmable Gate array
  • controller microcontroller, microprocessor or other electronic components are implemented for executing the power supply method of the above electronic device.
  • the present disclosure also provides a non-transitory computer-readable storage medium including instructions, such as a memory 1004 including instructions, which can be executed by the processor 1020 of the device 1000 to complete the above.
  • a non-transitory computer-readable storage medium may be ROM, random access memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

La présente divulgation concerne un procédé et un appareil d'interaction de données, un dispositif électronique et un support de stockage. Le procédé est appliqué à un premier dispositif terminal, et le premier terminal réalise une interaction de miroir d'écran avec un second terminal. Le procédé comprend : l'acquisition de données clés dans des données d'interaction, et la mise en paquets des données clés dans M premiers paquets de données, M étant un entier naturel supérieur à 1 ; le chiffrement de N premiers paquets de données parmi les M premiers paquets de données, et l'envoi de manière séquentielle des M premiers paquets de données au second dispositif terminal, N étant supérieur ou égal à 1 et inférieur à M ; et la réception d'informations de chiffrement renvoyées par le second dispositif terminal, et le fait de déterminer, selon les informations de chiffrement, s'il faut poursuivre l'envoi des données d'interaction, les informations de chiffrement étant obtenues par le déchiffrement, par le second dispositif terminal, des premiers paquets de données chiffrés.
PCT/CN2022/091265 2022-05-06 2022-05-06 Procédé et appareil d'interaction de données, dispositif électronique et support de stockage WO2023212943A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202280004232.7A CN116097621A (zh) 2022-05-06 2022-05-06 数据交互方法、装置、电子设备和存储介质
PCT/CN2022/091265 WO2023212943A1 (fr) 2022-05-06 2022-05-06 Procédé et appareil d'interaction de données, dispositif électronique et support de stockage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/091265 WO2023212943A1 (fr) 2022-05-06 2022-05-06 Procédé et appareil d'interaction de données, dispositif électronique et support de stockage

Publications (1)

Publication Number Publication Date
WO2023212943A1 true WO2023212943A1 (fr) 2023-11-09

Family

ID=86214309

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/091265 WO2023212943A1 (fr) 2022-05-06 2022-05-06 Procédé et appareil d'interaction de données, dispositif électronique et support de stockage

Country Status (2)

Country Link
CN (1) CN116097621A (fr)
WO (1) WO2023212943A1 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190028532A1 (en) * 2016-01-11 2019-01-24 Lg Electronics Inc. Mobile terminal and control method therefor
CN109996097A (zh) * 2019-03-12 2019-07-09 广州虎牙信息科技有限公司 一种投屏方法、系统及存储装置
CN113179555A (zh) * 2021-05-19 2021-07-27 北京小米移动软件有限公司 投屏方法、投屏设备、投屏系统、电子设备、存储介质
CN113965789A (zh) * 2021-12-15 2022-01-21 荣耀终端有限公司 一种投屏方法、终端和通信系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190028532A1 (en) * 2016-01-11 2019-01-24 Lg Electronics Inc. Mobile terminal and control method therefor
CN109996097A (zh) * 2019-03-12 2019-07-09 广州虎牙信息科技有限公司 一种投屏方法、系统及存储装置
CN113179555A (zh) * 2021-05-19 2021-07-27 北京小米移动软件有限公司 投屏方法、投屏设备、投屏系统、电子设备、存储介质
CN113965789A (zh) * 2021-12-15 2022-01-21 荣耀终端有限公司 一种投屏方法、终端和通信系统

Also Published As

Publication number Publication date
CN116097621A (zh) 2023-05-09

Similar Documents

Publication Publication Date Title
US9819652B2 (en) Information interaction methods and devices
US9769667B2 (en) Methods for controlling smart device
US9961393B2 (en) Method and device for playing multimedia file
CN107819572B (zh) 命令传输方法、装置及电子设备
US20160219032A1 (en) Method and apparatus for controlling access to surveillance video
KR102244436B1 (ko) 애플리케이션 인터페이스의 디스플레이 방법, 장치 및 컴퓨터 판독가능 저장매체
US20220382884A1 (en) Method and device for parsing shared password
US9723486B2 (en) Method and apparatus for accessing network
WO2018228051A1 (fr) Procédé, appareil et système d'accès à un dispositif
US20170171794A1 (en) Method and apparatus for acquiring routing information
CN108900553B (zh) 一种通信方法、装置及计算机可读存储介质
CN108053241B (zh) 数据分析方法、装置及计算机可读存储介质
CN113179555A (zh) 投屏方法、投屏设备、投屏系统、电子设备、存储介质
WO2022205906A1 (fr) Procédé et appareil de chiffrement de données, dispositif électronique et support de stockage
US10681533B2 (en) Information writing method and device
WO2023212943A1 (fr) Procédé et appareil d'interaction de données, dispositif électronique et support de stockage
CN113206832B (zh) 一种数据处理方法、装置和用于数据处理的装置
US11444927B2 (en) Method and apparatus for encrypting data
CN113225691B (zh) 音频处理方法、装置及存储介质
CN216437496U (zh) 投屏设备、接收设备、投屏系统
CN118041649A (zh) 总线的加密通讯方法、系统、装置、设备及可读存储介质
CN116167065A (zh) 密文数据库的数据安全加密和安全解密方法
CN115473736A (zh) 数据请求消息验证方法、装置、设备及存储介质
CN115514479A (zh) 基于区块链的数据信息处理方法、装置及设备
CN112422487A (zh) 数据传输方法、装置、系统及计算机可读存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22940637

Country of ref document: EP

Kind code of ref document: A1