CN105120452A - Information transmission method, device and system - Google Patents
Information transmission method, device and system Download PDFInfo
- Publication number
- CN105120452A CN105120452A CN201510373613.4A CN201510373613A CN105120452A CN 105120452 A CN105120452 A CN 105120452A CN 201510373613 A CN201510373613 A CN 201510373613A CN 105120452 A CN105120452 A CN 105120452A
- Authority
- CN
- China
- Prior art keywords
- key
- cipher
- terminal
- wearable device
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to an information transmission method, device and system, and belongs to the data transmission technology field. The method comprises steps: a first secret key corresponding to a first terminal is obtained, and the first secret key is generated by a first wearable device according to a logo of the first wearable device and a cipher instruction inputted by a user; appointed information is subjected to encryption by utilization of the first secret key and first cryptograph information is obtained; the first cryptograph information is sent to the first terminal, and the first terminal is used for employing the first wearable device to decrypt the first cryptograph information. The first secret key corresponding to the first terminal is obtained, the appointed information is subjected to encryption by utilization of the first secret key, the first cryptograph information is obtained, the first cryptograph information is sent to the first terminal, even if the appointed information is intercepted by a third party during the transmission process, the third party only obtains appointed information in the cryptograph form and cannot obtain real information, and leakage of appointed information is avoided effectively.
Description
Technical field
The disclosure relates to technical field of data transmission, particularly relates to a kind of method of transmission information, Apparatus and system.
Background technology
Along with the development of development of Mobile Internet technology, the data grows that people are transmitted by mobile terminal is many.These are comprised as sensitive informations such as the identifying code of payment, the account of bank and passwords by the data that mobile terminal transmits.
In correlation technique, all data of mobile terminal all adopt plaintext transmission.
Because data exist the risk intercepted and captured by third party in the process of transmission, when third party intercepts and captures the sensitive information adopting plaintext transmission, the true content of sensitive information can be got, cause sensitive information leakage.
Summary of the invention
For overcoming the problem of the leakage user sensitive information existed in correlation technique, the disclosure provides a kind of method, Apparatus and system of transmission information.
According to the first aspect of disclosure embodiment, a kind of method of transmission information is provided, comprises:
Obtain the first key that first terminal is corresponding, described first key is that the first wearable device generates according to the cipher instruction of the mark of described first wearable device and user's input;
Use described first double secret key appointed information to be encrypted, obtain the first cipher-text information;
Send described first cipher-text information to described first terminal, described first terminal is decrypted described first cipher-text information for adopting described first wearable device.
In a kind of possible implementation of first aspect, when described method is performed by server, the first key that described acquisition first terminal is corresponding, comprising:
According to the terminal of storage and the corresponding relation of key, obtain the first key that described first terminal is corresponding.
Alternatively, described method also comprises:
Receive the second key of ciphertext form, second key of described ciphertext form is that described first wearable device uses the 3rd double secret key second key to be encrypted to obtain, described second key and described 3rd key are all that described first wearable device generates according to the cipher instruction of the mark of described first wearable device and user's input, and described 3rd key and described first key are the same key used in the pair of secret keys or symmetric encipherment algorithm used in rivest, shamir, adelman;
Use the second key of ciphertext form described in described first double secret key to be decrypted, obtain described second key;
Be described second key by the first corresponding for described first terminal key updating.
In the another kind of possible implementation of first aspect, when described method is performed by server, described method also comprises:
Receive the second cipher-text information, described second cipher-text information be the second wearable device use the second terminal corresponding the 4th double secret key described in appointed information be encrypted and obtain, described 4th key is that described second wearable device generates according to the cipher instruction of the mark of described second Intelligent bracelet and user's input, and described 4th key is the key used in symmetry algorithm;
Use the second cipher-text information described in described 4th double secret key to be decrypted, obtain described appointed information.
Alternatively, described method also comprises:
Receive the 5th key of ciphertext form, 5th key of described ciphertext form is that described second wearable device uses described 4th double secret key the 5th key to be encrypted to obtain, and described 5th key is that described second wearable device generates according to the cipher instruction of the mark of described second wearable device and user's input;
Use the 5th key of ciphertext form described in described 4th double secret key to be decrypted, obtain described 5th key;
Be described 5th key by the 4th corresponding for described second terminal key updating.
In another possible implementation of first aspect, when described method is performed by the second terminal, the first key that described acquisition first terminal is corresponding, comprising:
Send key request to server, described key request is for obtaining described first key;
Receive described first key, described first key is that described server obtains according to the corresponding relation of the terminal stored and key.
In another possible implementation of first aspect, when described method is performed by the second terminal, described in described first double secret key of described use, appointed information is encrypted, and obtains the first cipher-text information, comprising:
Described first key and described appointed information is sent to the second wearable device;
Receive described first cipher-text information, described first cipher-text information is that described second wearable device uses appointed information described in described first double secret key to be encrypted to obtain.
According to the second aspect of disclosure embodiment, a kind of method of transmission information is provided, comprises:
Receive the first cipher-text information, described first cipher-text information uses the first double secret key appointed information corresponding to first terminal to be encrypted to obtain, and described first key is that the first wearable device generates according to the cipher instruction of the mark of described first wearable device and user's input;
Described first cipher-text information is sent to described first wearable device;
Receive described appointed information, described appointed information is that described first wearable device uses the first cipher-text information described in the 3rd double secret key to be decrypted to obtain, described 3rd key is that described first wearable device generates according to the cipher instruction of the mark of described first wearable device and user's input, and described 3rd key and described first key are the same key used in the pair of secret keys or symmetric encipherment algorithm used in rivest, shamir, adelman.
In a kind of possible implementation of second aspect, described method also comprises:
Receive the second key of ciphertext form, second key of described ciphertext form is that described first wearable device uses described 3rd double secret key second key to be encrypted to obtain, and described second key is that described first wearable device generates according to the cipher instruction of the mark of described first wearable device and user's input;
The second key of described ciphertext form is sent to server, the second key of ciphertext form described in described first double secret key is used to be decrypted to make described server, obtain described second key, and be described second key by the first corresponding for described first terminal key updating.
According to the third aspect of disclosure embodiment, a kind of device of transmission information is provided, comprises:
Key Acquisition Module, for obtaining the first key corresponding to first terminal, described first key is that the first wearable device generates according to the cipher instruction of the mark of described first wearable device and user's input;
Information encryption module, for using described first double secret key appointed information to be encrypted, obtains the first cipher-text information;
Information sending module, for sending described first cipher-text information to described first terminal, described first terminal is decrypted described first cipher-text information for adopting described first wearable device.
In a kind of possible implementation of the third aspect, when described device is server, described Key Acquisition Module is used for,
According to the terminal of storage and the corresponding relation of key, obtain the first key that described first terminal is corresponding.
Alternatively, described device also comprises:
First key reception module, for receiving the second key of ciphertext form, second key of described ciphertext form is that described first wearable device uses the 3rd double secret key second key to be encrypted to obtain, described second key and described 3rd key are all that described first wearable device generates according to the cipher instruction of the mark of described first wearable device and user's input, and described 3rd key and described first key are the same key used in the pair of secret keys or symmetric encipherment algorithm used in rivest, shamir, adelman;
First cipher key decryption block, for using the second key of ciphertext form described in described first double secret key to be decrypted, obtains described second key;
First key updating module, for being described second key by the first corresponding for described first terminal key updating.
In the another kind of possible implementation of the third aspect, when described device is server, described device also comprises:
Information receiving module, for receiving the second cipher-text information, described second cipher-text information be the second wearable device use the second terminal corresponding the 4th double secret key described in appointed information be encrypted and obtain, described 4th key is that described second wearable device generates according to the cipher instruction of the mark of described second Intelligent bracelet and user's input, and described 4th key is the key used in symmetry algorithm;
Decrypts information module, for using the second cipher-text information described in described 4th double secret key to be decrypted, obtains described appointed information.
Alternatively, described device also comprises:
Second key reception module, for receiving the 5th key of ciphertext form, 5th key of described ciphertext form is that described second wearable device uses described 4th double secret key the 5th key to be encrypted to obtain, and described 5th key is that described second wearable device generates according to the cipher instruction of the mark of described second wearable device and user's input;
Second cipher key decryption block, for using the 5th key of ciphertext form described in described 4th double secret key to be decrypted, obtains described 5th key;
Second key updating module, for being described 5th key by the 4th corresponding for described second terminal key updating.
In another possible implementation of the third aspect, when described device is the second terminal, described data obtaining module comprises:
Request sends submodule, and for sending key request to server, described key request is for obtaining described first key;
Key reception submodule, for receiving described first key, described first key is that described server obtains according to the corresponding relation of the terminal stored and key.
In another possible implementation of the third aspect, when described device is the second terminal, described information encryption module comprises:
Information sends submodule, for sending described first key and described appointed information to the second wearable device;
Receives information submodule, for receiving described first cipher-text information, described first cipher-text information is that described second wearable device uses appointed information described in described first double secret key to be encrypted to obtain.
According to the fourth aspect of disclosure embodiment, a kind of device of transmission information is provided, comprises:
First receiver module, for receiving the first cipher-text information, described first cipher-text information uses the first double secret key appointed information corresponding to first terminal to be encrypted to obtain, and described first key is that the first wearable device generates according to the cipher instruction of the mark of described first wearable device and user's input;
First sending module, for sending described first cipher-text information to described first wearable device;
Second receiver module, for receiving described appointed information, described appointed information is that described first wearable device uses the first cipher-text information described in the 3rd double secret key to be decrypted to obtain, described 3rd key is that described first wearable device generates according to the cipher instruction of the mark of described first wearable device and user's input, and described 3rd key and described first key are the same key used in the pair of secret keys or symmetric encipherment algorithm used in rivest, shamir, adelman.
In a kind of possible implementation of fourth aspect, described device also comprises:
3rd receiver module, for receiving the second key of ciphertext form, second key of described ciphertext form is that described first wearable device uses described 3rd double secret key second key to be encrypted to obtain, and described second key is that described first wearable device generates according to the cipher instruction of the mark of described first wearable device and user's input;
Second sending module, for sending the second key of described ciphertext form to server, the second key of ciphertext form described in described first double secret key is used to be decrypted to make described server, obtain described second key, and be described second key by the first corresponding for described first terminal key updating.
According to the 5th aspect of disclosure embodiment, a kind of device of transmission information is provided, comprises:
Processor;
For the memory of storage of processor executable instruction;
Wherein, described processor is configured to:
Obtain the first key that first terminal is corresponding, described first key is that the first wearable device generates according to the cipher instruction of the mark of described first wearable device and user's input;
Use described first double secret key appointed information to be encrypted, obtain the first cipher-text information;
Send described first cipher-text information to described first terminal, described first terminal is decrypted described first cipher-text information for adopting described first wearable device.
According to the 6th aspect of disclosure embodiment, a kind of device of transmission information is provided, comprises:
Processor;
For the memory of storage of processor executable instruction;
Wherein, described processor is configured to:
Receive the first cipher-text information, described first cipher-text information uses the first double secret key appointed information corresponding to first terminal to be encrypted to obtain, and described first key is that the first wearable device generates according to the cipher instruction of the mark of described first wearable device and user's input;
Described first cipher-text information is sent to described first wearable device;
Receive described appointed information, described appointed information is that described first wearable device uses the first cipher-text information described in the 3rd double secret key to be decrypted to obtain, described 3rd key is that described first wearable device generates according to the cipher instruction of the mark of described first wearable device and user's input, and described 3rd key and described first key are the same key used in the pair of secret keys or symmetric encipherment algorithm used in rivest, shamir, adelman.
According to the 7th aspect of disclosure embodiment, a kind of system of transmission information is provided, comprises:
First wearable device, for generating the first key corresponding to first terminal and the 3rd key according to the mark of described first wearable device and the cipher instruction of user's input, described 3rd key and described first key are the same key used in the pair of secret keys or symmetric encipherment algorithm used in rivest, shamir, adelman;
Server, for obtaining described first key; Use described first double secret key appointed information to be encrypted, obtain the first cipher-text information; Described first cipher-text information is sent to described first terminal;
Described first terminal, for receiving described first cipher-text information; Described first cipher-text information is sent to described first wearable device;
Described first wearable device also for, receive described first cipher-text information; Use the first cipher-text information described in described 3rd double secret key to be decrypted, obtain described appointed information; Described appointed information is sent to described first terminal;
Described first terminal also for, receive described appointed information.
According to the eighth aspect of disclosure embodiment, a kind of system of transmission information is provided, comprises:
First wearable device, for generating the first key corresponding to first terminal and the 3rd key according to the mark of described first wearable device and the cipher instruction of user's input, described 3rd key and described first key are the same key used in the pair of secret keys or symmetric encipherment algorithm used in rivest, shamir, adelman;
Second terminal, for sending key request to server, described key request is for obtaining described first key;
Described server, for receiving described key request; According to the terminal of storage and the corresponding relation of key, obtain described first key; Described first key is sent to described second terminal;
Described second terminal also for, receive described first key; Described first key is sent to the second wearable device;
Described second wearable device, for receiving described first key; Use described first double secret key appointed information to be encrypted, obtain the first cipher-text information; Described first cipher-text information is sent to described second terminal;
Described second terminal also for, receive described first cipher-text information; Described first cipher-text information is sent to described first terminal;
Described first terminal, for receiving described first cipher-text information; Described first cipher-text information is sent to described first wearable device;
Described first wearable device also for, receive described first cipher-text information; Use the first cipher-text information described in described 3rd double secret key to be decrypted, obtain described appointed information; Described appointed information is sent to described first terminal;
Described first terminal also for, receive described appointed information.
According to the 9th aspect of disclosure embodiment, a kind of system of transmission information is provided, comprises:
First wearable device, for generating the first key corresponding to first terminal and the 3rd key according to the mark of described first wearable device and the cipher instruction of user's input, described 3rd key and described first key are the same key used in the pair of secret keys or symmetric encipherment algorithm used in rivest, shamir, adelman;
Second wearable device, for generating the 4th key corresponding to the second terminal according to the mark of described second wearable device and the cipher instruction of user's input, described 4th key is the key used in symmetry algorithm; Use described 4th double secret key appointed information to be encrypted, obtain the second cipher-text information; Described second cipher-text information is sent to described second terminal;
Described second terminal, for receiving described second cipher-text information; Described second cipher-text information is sent to server;
Described server, for receiving described second cipher-text information; Use the second cipher-text information described in described 4th double secret key to be decrypted, obtain described appointed information; Obtain described first key; Use appointed information described in described first double secret key to be encrypted, obtain the first cipher-text information; Described first cipher-text information is sent to described first terminal;
Described first terminal, for receiving described first cipher-text information; Described first cipher-text information is sent to described first wearable device;
Described first wearable device also for, receive described first cipher-text information; Use the first cipher-text information described in described 3rd double secret key to be decrypted, obtain described appointed information; Described appointed information is sent to described first terminal;
Described first terminal also for, receive described appointed information.
The technical scheme that embodiment of the present disclosure provides can comprise following beneficial effect: by obtain first terminal corresponding first key, the first double secret key appointed information is used to be encrypted, obtain the first cipher-text information, and send the first cipher-text information to first terminal, even if appointed information is intercepted and captured by third party in the process of transmission, third party also can only obtain the appointed information of ciphertext form, cannot get real information, effectively prevent the leakage of appointed information.
Should be understood that, it is only exemplary and explanatory that above general description and details hereinafter describe, and can not limit the disclosure.
Accompanying drawing explanation
Accompanying drawing to be herein merged in specification and to form the part of this specification, shows embodiment according to the invention, and is used from specification one and explains principle of the present invention.
Fig. 1 is the application scenarios figure of the method for a kind of transmission information according to an exemplary embodiment;
Fig. 2 is the application scenarios figure of the method for another kind of transmission information according to an exemplary embodiment;
Fig. 3 is the flow chart of the method for a kind of transmission information according to an exemplary embodiment;
Fig. 4 is the flow chart of the method for another kind of transmission information according to an exemplary embodiment;
Fig. 5 be the method for another transmission information according to an exemplary embodiment flow chart;
Fig. 6 is the flow chart of the method for another transmission information according to an exemplary embodiment;
Fig. 7 is the flow chart of the method for a kind of transmission information according to an exemplary embodiment;
Fig. 8 is the block diagram of the device of a kind of transmission information according to an exemplary embodiment;
Fig. 9 is the block diagram of the device of another kind of transmission information according to an exemplary embodiment;
Figure 10 is the block diagram of the device of another transmission information according to an exemplary embodiment;
Figure 11 is the block diagram of the device of another transmission information according to an exemplary embodiment;
Figure 12 is the block diagram of the device of another transmission information according to an exemplary embodiment;
Figure 13 is the block diagram of the device of another transmission information according to an exemplary embodiment;
Figure 14 is the block diagram of a kind of device according to an exemplary embodiment;
Figure 15 is the block diagram of a kind of device according to an exemplary embodiment;
Figure 16 is the block diagram of the system of a kind of transmission information according to an exemplary embodiment;
Figure 17 is the block diagram of the system of another kind of transmission information according to an exemplary embodiment;
Figure 18 is the block diagram of the system of another transmission information according to an exemplary embodiment.
Embodiment
Here will be described exemplary embodiment in detail, its sample table shows in the accompanying drawings.When description below relates to accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawing represents same or analogous key element.Execution mode described in following exemplary embodiment does not represent all execution modes consistent with the present invention.On the contrary, they only with as in appended claims describe in detail, the example of apparatus and method that aspects more of the present invention are consistent.
First composition graphs 1 and Fig. 2 simply introduce the application scenarios of the method for the transmission information that disclosure embodiment provides below.
As shown in Figure 1, server 10 is connected with terminal 20, and terminal 20 (as millet mobile phone) provides service by server 10 (as millet server).Terminal 20 is connected with wearable device 30 (as Intelligent bracelet), and wearable device 30 is identical with the system account that terminal 20 logs in, and wearable device 30 generates key for terminal 20, and accessory terminal 20 realizes the encryption and decryption of information.Sensitive information (as identifying code, login password etc.) ciphertext is transferred to terminal 20 by server 10.
As shown in Figure 2, be interconnected between two between server 10, terminal 20, terminal 40, terminal 20 and terminal 40 provide service by server 10.Terminal 20 is connected with wearable device 30 (as Intelligent bracelet), and wearable device 30 is identical with the system account that terminal 20 logs in, and wearable device 30 generates key for terminal 20, and accessory terminal 20 realizes the encryption and decryption of information.Terminal 40 is connected with wearable device 50 (as Intelligent bracelet), and wearable device 50 is identical with the system account that terminal 40 logs in, and wearable device 50 generates key for terminal 40, and accessory terminal 40 realizes the encryption and decryption of information.Sensitive information (as identifying code, login password etc.) ciphertext, under the help of server 10, is transferred to terminal 20 by terminal 40.
It should be noted that, above-mentioned application scenarios is only citing, and the disclosure is not restricted to this.
Fig. 3 is the flow chart of the method for a kind of transmission information according to an exemplary embodiment, and as shown in Figure 3, the method for this transmission information is used for, in terminal or server, comprising the following steps.
In step s 11, obtain first terminal corresponding first key.
In the present embodiment, the first key is that the first wearable device generates according to the cipher instruction of the mark of the first wearable device and user's input.
Easily know, the mark of each wearable device is different, and wearable device generates key according to its mark, and two wearable devices can be avoided to generate identical key.
Alternatively, the first wearable device can be Intelligent bracelet.
It should be noted that, key corresponding to terminal for sending to the information of terminal to be encrypted used key (being namely decrypted used key to the information that terminal sends), also can be encrypted used key (namely to sending to the information of terminal to be decrypted used key) for the information sent terminal.In the present embodiment, the first key is for sending to the information of first terminal to be encrypted used key.
In step s 12, use the first double secret key appointed information to be encrypted, obtain the first cipher-text information.
In the present embodiment, the sensitive informations such as the identifying code of payment, the account of bank and password are designated the information as.First cipher-text information is the appointed information of ciphertext form.
In step s 13, the first cipher-text information is sent to first terminal.
In the present embodiment, first terminal is decrypted the first cipher-text information for adopting the first wearable device.
Disclosure embodiment by obtain first terminal corresponding first key, the first double secret key appointed information is used to be encrypted, obtain the first cipher-text information, and send the first cipher-text information to first terminal, even if appointed information is intercepted and captured by third party in the process of transmission, third party also can only obtain the appointed information of ciphertext form, cannot get real information, effectively prevent the leakage of appointed information.
Fig. 4 is the flow chart of the method for another kind of transmission information according to an exemplary embodiment, and as shown in Figure 4, the method for this transmission information is used for, in terminal, comprising the following steps.
In the step s 21, the first cipher-text information is received.
In the present embodiment, the first cipher-text information uses the first double secret key appointed information corresponding to first terminal to be encrypted to obtain, i.e. the appointed information of ciphertext form.First key is that the first wearable device generates according to the cipher instruction of the mark of the first wearable device and user's input.Designate the information as the sensitive informations such as the identifying code of payment, the account of bank and password.
Easily know, the mark of each wearable device is different, and wearable device generates key according to its mark, and two wearable devices can be avoided to generate identical key.
Alternatively, the first wearable device can be Intelligent bracelet.
In step S22, send the first cipher-text information to the first wearable device.
In step S23, receive appointed information.
In the present embodiment, appointed information is that the first wearable device uses the 3rd double secret key first cipher-text information to be decrypted and to obtain.3rd key is that the first wearable device generates according to the cipher instruction of the mark of the first wearable device and user's input.3rd key and the first key are the same key used in the pair of secret keys or symmetric encipherment algorithm used in rivest, shamir, adelman.
It should be noted that, key corresponding to terminal for sending to the information of terminal to be encrypted used key (being namely decrypted used key to the information that terminal sends), also can be encrypted used key (namely to sending to the information of terminal to be decrypted used key) for the information sent terminal.In the present embodiment, the first key is for sending to the information of first terminal to be encrypted used key, and the 3rd key is encrypted used key for the information sent first terminal.
Disclosure embodiment is by reception first cipher-text information, and use the 3rd double secret key first cipher-text information to be decrypted by the first wearable device, obtain appointed information, even if appointed information is intercepted and captured by third party in the process of transmission, third party also can only obtain the appointed information of ciphertext form, cannot real information be got, effectively prevent the leakage of appointed information.
Fig. 5 is the flow chart of the method for another transmission information according to an exemplary embodiment, as shown in Figure 5, the method of this transmission information is used for server transmission appointed information to first terminal (application scenarios as shown in Figure 1), comprises the following steps.
In step S31, server obtains the first key corresponding to first terminal.
In the present embodiment, the first key is that the first wearable device generates according to the cipher instruction of the mark of the first wearable device and user's input.
Alternatively, the first key can, for the public-key cryptography used in rivest, shamir, adelman, also can be the key used in symmetric encipherment algorithm.Easily know, when the first key is the public-key cryptography used in rivest, shamir, adelman, due to the information of public key encryption, corresponding private cipher key is only had to decipher, and private cipher key is only stored in first terminal, can not cause leakage due to transmission, therefore only have first terminal that the information of private cipher key to public key encryption could be used to be decrypted, the fail safe of information in transmitting procedure of public key encryption is very high.When the first key is the key used in symmetric encipherment algorithm, owing to using single key in symmetric encipherment algorithm, the algorithm therefore using the first key to encrypt and decrypt is simple, and computational speed is fast, and lower to the equipment requirement generating key, realize cost low.
In a kind of implementation of the present embodiment, this step S31 can comprise:
According to the terminal of storage and the corresponding relation of key, obtain the first key that first terminal is corresponding.
In actual applications, in order to administer and maintain the corresponding relation between each terminal and key, can arrange cipher key list in server, cipher key list comprises the corresponding relation of multiple terminal and key, and the key of each terminal easy to use encrypts and decrypts.In the present embodiment, server can obtain the first key corresponding to first terminal from cipher key list.
Alternatively, key corresponding to each terminal can be revised, and improves flexibility and the fail safe of key.Preferably, during its key of each terminal modifications, can report to server, the key that terminal is reported by server replaces key corresponding to this terminal of cipher key list, to use amended key in the future.
In step s 32, server uses the first double secret key appointed information to be encrypted, and obtains the first cipher-text information.
In the present embodiment, the sensitive informations such as the identifying code of payment, the account of bank and password are designated the information as.First cipher-text information is the appointed information of ciphertext form.
In step S33, server sends the first cipher-text information to first terminal.
In step S34, first terminal sends the first cipher-text information to the first wearable device.
In step s 35, the first wearable device uses the 3rd double secret key first cipher-text information to be decrypted, and obtains appointed information.
In the present embodiment, the 3rd key is that the first wearable device generates according to the cipher instruction of the mark of the first wearable device and user's input.3rd key and the first key are the same key used in the pair of secret keys or symmetric encipherment algorithm used in rivest, shamir, adelman.
In actual applications, when adopting the instrument of wearable device (as Intelligent bracelet) as terminal encryption and deciphering, wearable device is identical with the system account that terminal logs in, thus make the mutual biography that can realize information between wearable device and terminal, wearable device can generate the key of counterpart terminal, and is terminal encryption or decryption information.
Wearable device can give tacit consent to the key of public-key cryptography and private cipher key or the symmetric encipherment algorithm use being provided with a pair rivest, shamir, adelman use when producing, so that first time transmits key that it generates, improve the fail safe of cipher key delivery.Wearable device is given tacit consent to the key be provided with and can be stored in advance in the cipher key list of server, wearable device first time generates key, after the secret key encryption that the double secret key first time of acquiescence can be used to generate, the system account logged in together with wearable device sends to server.Server uses the key given tacit consent in cipher key list to be decrypted, obtain key that wearable device first time generates and this double secret key terminal (terminal is identical with the system account that wearable device logs in) of answering, and the mark (system account as logged in) of the key generated wearable device first time and corresponding terminal is stored in cipher key list, improves the fail safe of cipher key delivery.
Alternatively, the method can also comprise:
First wearable device generates the second key according to the cipher instruction of the mark of the first wearable device and user's input;
First wearable device uses the 3rd double secret key second key to be encrypted, and obtains the second key of ciphertext form;
First wearable device sends the second key of ciphertext form to first terminal;
First terminal sends the second key of ciphertext form to server;
Server uses the second key of the first double secret key ciphertext form to be decrypted, and obtains the second key;
The first corresponding for first terminal key updating is the second key by server.
Understandably, the key corresponding to terminal is modified, and can promote the difficulty that key is cracked, thus promotes the fail safe of information encryption.And rear transmission is encrypted to the second key, the second Key Exposure can be prevented, improve the fail safe of the information transmission that use second key is encrypted.
In step S36, the first wearable device sends appointed information to first terminal.
It should be noted that, key corresponding to terminal for sending to the information of terminal to be encrypted used key (being namely decrypted used key to the information that terminal sends), also can be encrypted used key (namely to sending to the information of terminal to be decrypted used key) for the information sent terminal.In the present embodiment, the first key is for sending to the information of first terminal to be encrypted used key, and the 3rd key is encrypted used key for the information sent first terminal.
Step S31 achieves and obtains the first key corresponding to first terminal, step S32 achieves use first double secret key appointed information and is encrypted, obtain the first cipher-text information, step S33 and step S34 achieves transmission and the reception of the first cipher-text information, step S35 and step S36 achieves use the 3rd double secret key first cipher-text information and is decrypted, and obtains appointed information.
Disclosure embodiment by obtain first terminal corresponding first key, the first double secret key appointed information is used to be encrypted, obtain the first cipher-text information, and send the first cipher-text information to first terminal, even if appointed information is intercepted and captured by third party in the process of transmission, third party also can only obtain the appointed information of ciphertext form, cannot get real information, effectively prevent the leakage of appointed information.Because wearable device is compared with terminal, the possibility being subject to assault is low, therefore the first key is that the first wearable device generates, first terminal also adopts the first wearable device to be decrypted the first cipher-text information, the fail safe of key and information can be improved, effectively prevent the leakage of appointed information further.
Fig. 6 is the flow chart of the method for another transmission information according to an exemplary embodiment, as shown in Figure 6, the method of this transmission information is used for the second terminal transmission appointed information to first terminal (application scenarios as shown in Figure 2), and first terminal uses public-key cryptography and the private cipher key of a pair rivest, shamir, adelman, comprises the following steps.
In step S41, the second terminal obtains the first key corresponding to first terminal.
In the present embodiment, the first key is that the first wearable device generates according to the cipher instruction of the mark of the first wearable device and user's input.
In a kind of implementation of the present embodiment, this step S41 can comprise:
Second terminal to server sends key request, and key request is for obtaining the first key;
The terminal of server according to storage and the corresponding relation of key, obtain the first key;
Server sends the first key to the second terminal.
In actual applications, in order to administer and maintain the corresponding relation between each terminal and key, can arrange cipher key list in server, cipher key list comprises the corresponding relation of multiple terminal and key, and the key of each terminal easy to use encrypts and decrypts.In the present embodiment, server can obtain the first key corresponding to first terminal from cipher key list.
In step S42, the second terminal sends the first key to the second wearable device.
In step S43, the second wearable device uses the first double secret key appointed information to be encrypted, and obtains the first cipher-text information.
In the present embodiment, the sensitive informations such as the identifying code of payment, the account of bank and password are designated the information as.First cipher-text information is the appointed information of ciphertext form.
Alternatively, appointed information can send to the second wearable device by the second terminal, and also can input the second wearable device by user, the disclosure is not restricted this.
In actual applications, when adopting the instrument of wearable device (as Intelligent bracelet) as terminal encryption and deciphering, wearable device is identical with the system account that terminal logs in, thus make the mutual biography that can realize information between wearable device and terminal, wearable device can generate the key of counterpart terminal, and is terminal encryption or decryption information.
In step S44, the second wearable device sends the first cipher-text information to the second terminal.
In step S45, the second terminal sends the first cipher-text information to first terminal.
In step S46, first terminal sends the first cipher-text information to the first wearable device.
Alternatively, this step S46 can be identical with step S34, is not described in detail in this.
In step S47, the first wearable device uses the 3rd double secret key first cipher-text information to be decrypted, and obtains appointed information.
Alternatively, this step S47 can be identical with step S35, is not described in detail in this.
In step S48, the first wearable device sends appointed information to first terminal.
Alternatively, this step S48 can be identical with step S36, is not described in detail in this.
It should be noted that, key corresponding to terminal for sending to the information of terminal to be encrypted used key (being namely decrypted used key to the information that terminal sends), also can be encrypted used key (namely to sending to the information of terminal to be decrypted used key) for the information sent terminal.In the present embodiment, the first key and the second key are for sending to the information of first terminal to be encrypted used key, and the 3rd key is encrypted used key for the information sent first terminal.
Step S41 achieves and obtains the first key corresponding to first terminal, step S42 and step S43 achieves use first double secret key appointed information and is encrypted, obtain the first cipher-text information, step S44, step S45 and step S46 achieve transmission and the reception of the first cipher-text information, step S47 and step S48 achieves use the 3rd double secret key first cipher-text information and is decrypted, and obtains appointed information.
Disclosure embodiment by obtain first terminal corresponding first key, the first double secret key appointed information is used to be encrypted, obtain the first cipher-text information, and send the first cipher-text information to first terminal, even if appointed information is intercepted and captured by third party in the process of transmission, third party also can only obtain the appointed information of ciphertext form, cannot get real information, effectively prevent the leakage of appointed information.Because wearable device is compared with terminal, the possibility being subject to assault is low, therefore the first key is that the first wearable device generates, first terminal also adopts the first wearable device to be decrypted the first cipher-text information, the fail safe of key and information can be improved, effectively prevent the leakage of appointed information further.
Fig. 7 is the flow chart of the method for another transmission information according to an exemplary embodiment, as shown in Figure 7, the method of this transmission information is used for the second terminal transmission appointed information to first terminal (application scenarios as shown in Figure 2), and first terminal uses the key of a symmetric encipherment algorithm, comprises the following steps.
In step s 51, the 4th double secret key appointed information that the second wearable device uses the second terminal corresponding is encrypted, and obtains the second cipher-text information.
In the present embodiment, the 4th key is that the second wearable device generates according to the cipher instruction of the mark of the second Intelligent bracelet and user's input.4th key is the key used in symmetry algorithm.Designate the information as the sensitive informations such as the identifying code of payment, the account of bank and password.Second cipher-text information is the appointed information of ciphertext form.
Alternatively, appointed information can send to the second wearable device by the second terminal, and also can input the second wearable device by user, the disclosure is not restricted this.
In actual applications, when adopting the instrument of wearable device (as Intelligent bracelet) as terminal encryption and deciphering, wearable device is identical with the system account that terminal logs in, thus make the mutual biography that can realize information between wearable device and terminal, wearable device can generate the key of counterpart terminal, and is terminal encryption or decryption information.
In order to administer and maintain the corresponding relation between each terminal and key, can arrange cipher key list in server, cipher key list comprises the corresponding relation of multiple terminal and key, and the key of each terminal easy to use encrypts and decrypts.
Alternatively, key corresponding to each terminal can be revised, and improves flexibility and the fail safe of key.Preferably, during its key of each terminal modifications, can report to server, the key that terminal is reported by server replaces key corresponding to this terminal of cipher key list, to use amended key in the future.
Alternatively, the method can also comprise:
Second wearable device generates the 5th key according to the cipher instruction of the mark of the second wearable device and user's input;
Second wearable device uses the 4th double secret key the 5th key to be encrypted, and obtains the 5th key of ciphertext form;
Second wearable device sends the 5th key of ciphertext form to the second terminal;
Second terminal to server sends the 5th key of ciphertext form;
Server uses the 5th key of the 4th double secret key ciphertext form to be decrypted, and obtains the 5th key;
The 4th corresponding for second terminal key updating is the 5th key by server.
Understandably, the key corresponding to terminal is modified, and can promote the difficulty that key is cracked, thus promotes the fail safe of information encryption.And rear transmission is encrypted to the 5th key, the 5th Key Exposure can be prevented, improve the fail safe of the information transmission that use the 5th key is encrypted.
In step S52, the second wearable device sends the second cipher-text information to the second terminal.
In step S53, the second terminal to server sends the second cipher-text information.
In step S54, server obtains the 4th key, and uses the 4th double secret key second cipher-text information to be decrypted, and obtains appointed information.
In step S55, server obtains the first key corresponding to first terminal, and the first double secret key appointed information using first terminal corresponding is encrypted, and obtains the first cipher-text information.
Alternatively, the first key obtaining first terminal corresponding can be identical with step S31, and use the first double secret key appointed information corresponding to first terminal to be encrypted, obtaining the first cipher-text information can be identical with step S32, is not described in detail in this.
In step S56, server sends the first cipher-text information to first terminal.
Alternatively, this step S56 can be identical with step S33, is not described in detail in this.
In step S57, first terminal sends the first cipher-text information to the first wearable device.
Alternatively, this step S57 can be identical with step S34, is not described in detail in this.
In step S58, the first wearable device uses the 3rd double secret key first cipher-text information to be decrypted, and obtains appointed information.
Alternatively, this step S58 can be identical with step S35, is not described in detail in this.
In step S59, the first wearable device sends appointed information to first terminal.
Alternatively, this step S59 can be identical with step S36, is not described in detail in this.
It should be noted that, key corresponding to terminal for sending to the information of terminal to be encrypted used key (being namely decrypted used key to the information that terminal sends), also can be encrypted used key (namely to sending to the information of terminal to be decrypted used key) for the information sent terminal.In the present embodiment, first key and the second key are for sending to the information of first terminal to be encrypted used key, 3rd key is encrypted used key for the information sent first terminal, the 4th key and the 5th key for the information sent to sending to the information of the second terminal to be encrypted, to the second terminal be encrypted the key that uses.
Step S55 achieve obtain first terminal corresponding first key and use the first double secret key appointed information be encrypted, obtain the first cipher-text information, step S56 and step S57 achieves transmission and the reception of the first cipher-text information, step S58 and step S59 achieves use the 3rd double secret key first cipher-text information and is decrypted, and obtains appointed information.
Disclosure embodiment by obtain first terminal corresponding first key, the first double secret key appointed information is used to be encrypted, obtain the first cipher-text information, and send the first cipher-text information to first terminal, even if appointed information is intercepted and captured by third party in the process of transmission, third party also can only obtain the appointed information of ciphertext form, cannot get real information, effectively prevent the leakage of appointed information.Because wearable device is compared with terminal, the possibility being subject to assault is low, therefore the first key is that the first wearable device generates, first terminal also adopts the first wearable device to be decrypted the first cipher-text information, the fail safe of key and information can be improved, effectively prevent the leakage of appointed information further.
Fig. 8 is the block diagram of the device of a kind of transmission information according to an exemplary embodiment, and with reference to Fig. 8, the device of this transmission information comprises Key Acquisition Module 601, information encryption module 602 and information sending module 603.
This Key Acquisition Module 601 is configured to obtain the first key corresponding to first terminal, and the first key is that the first wearable device generates according to the cipher instruction of the mark of the first wearable device and user's input.
This information encryption module 602 is configured to use first double secret key appointed information and is encrypted, and obtains the first cipher-text information.
This information sending module 603 is configured to send the first cipher-text information to first terminal, and first terminal is decrypted the first cipher-text information for adopting the first wearable device.
Disclosure embodiment by obtain first terminal corresponding first key, the first double secret key appointed information is used to be encrypted, obtain the first cipher-text information, and send the first cipher-text information to first terminal, even if appointed information is intercepted and captured by third party in the process of transmission, third party also can only obtain the appointed information of ciphertext form, cannot get real information, effectively prevent the leakage of appointed information.Because wearable device is compared with terminal, the possibility being subject to assault is low, therefore the first key is that the first wearable device generates, first terminal also adopts the first wearable device to be decrypted the first cipher-text information, the fail safe of key and information can be improved, effectively prevent the leakage of appointed information further.
Fig. 9 is the block diagram of the device of another kind of transmission information according to an exemplary embodiment, and with reference to Fig. 9, the device of this transmission information comprises Key Acquisition Module 701, information encryption module 702 and information sending module 703.
This Key Acquisition Module 701 is configured to obtain the first key corresponding to first terminal, and the first key is that the first wearable device generates according to the cipher instruction of the mark of the first wearable device and user's input.
This information encryption module 702 is configured to use first double secret key appointed information and is encrypted, and obtains the first cipher-text information.
This information sending module 703 is configured to send the first cipher-text information to first terminal, and first terminal is decrypted the first cipher-text information for adopting the first wearable device.
In a kind of implementation of the present embodiment, when this device is server, this Key Acquisition Module 701 can be configured to the corresponding relation according to the terminal stored and key, obtains the first key that first terminal is corresponding.
Alternatively, this device also can comprise the first key reception module 704, first cipher key decryption block 705 and the first key updating module 706.
This first key reception module 704 is configured to the second key receiving ciphertext form, second key of ciphertext form is that the first wearable device uses the 3rd double secret key second key to be encrypted to obtain, second key and the 3rd key are all that the first wearable device generates according to the cipher instruction of the mark of the first wearable device and user's input, and the 3rd key and the first key are the same key used in the pair of secret keys or symmetric encipherment algorithm used in rivest, shamir, adelman.
The second key that this first cipher key decryption block 705 is configured to use first double secret key ciphertext form is decrypted, and obtains the second key.
It is the second key that this first key updating module 706 is configured to the first corresponding for first terminal key updating.
Disclosure embodiment by obtain first terminal corresponding first key, the first double secret key appointed information is used to be encrypted, obtain the first cipher-text information, and send the first cipher-text information to first terminal, even if appointed information is intercepted and captured by third party in the process of transmission, third party also can only obtain the appointed information of ciphertext form, cannot get real information, effectively prevent the leakage of appointed information.Because wearable device is compared with terminal, the possibility being subject to assault is low, therefore the first key is that the first wearable device generates, first terminal also adopts the first wearable device to be decrypted the first cipher-text information, the fail safe of key and information can be improved, effectively prevent the leakage of appointed information further.
Figure 10 is the block diagram of the device of another transmission information according to an exemplary embodiment, and with reference to Figure 10, the device of this transmission information comprises Key Acquisition Module 801, information encryption module 802 and information sending module 803.
This Key Acquisition Module 801 is configured to obtain the first key corresponding to first terminal, and the first key is that the first wearable device generates according to the cipher instruction of the mark of the first wearable device and user's input.
This information encryption module 802 is configured to use first double secret key appointed information and is encrypted, and obtains the first cipher-text information.
This information sending module 803 is configured to send the first cipher-text information to first terminal, and first terminal is decrypted the first cipher-text information for adopting the first wearable device.
In a kind of implementation of the present embodiment, when this device is server, this device can also comprise information receiving module 804 and decrypts information module 805.
This information receiving module 804 is configured to reception second cipher-text information, second cipher-text information is that the 4th double secret key appointed information that the second wearable device uses the second terminal corresponding is encrypted and obtains, 4th key is that the second wearable device generates according to the cipher instruction of the mark of the second Intelligent bracelet and user's input, and the 4th key is the key used in symmetry algorithm.
This decrypts information module 805 is configured to use the 4th double secret key second cipher-text information and is decrypted, and obtains appointed information.
Alternatively, this device can also comprise the second key reception module 806, second cipher key decryption block 807 and the second key updating module 808.
This second key reception module 806 is configured to the 5th key receiving ciphertext form, 5th key of ciphertext form is that the second wearable device uses the 4th double secret key the 5th key to be encrypted to obtain, and the 5th key is that the second wearable device generates according to the cipher instruction of the mark of the second wearable device and user's input.
The 5th key that this second cipher key decryption block 807 is configured to use the 4th double secret key ciphertext form is decrypted, and obtains the 5th key.
It is the 5th key that this second key updating module 808 is configured to the 4th corresponding for the second terminal key updating.
In the another kind of implementation of the present embodiment, this device also can comprise the first key reception module, the first cipher key decryption block and the first key updating module.
This first key reception module is configured to the second key receiving ciphertext form, second key of ciphertext form is that the first wearable device uses the 3rd double secret key second key to be encrypted to obtain, second key and the 3rd key are all that the first wearable device generates according to the cipher instruction of the mark of the first wearable device and user's input, and the 3rd key and the first key are the same key used in the pair of secret keys or symmetric encipherment algorithm used in rivest, shamir, adelman.
The second key that this first cipher key decryption block is configured to use first double secret key ciphertext form is decrypted, and obtains the second key.
It is the second key that this first key updating module is configured to the first corresponding for first terminal key updating.
Disclosure embodiment by obtain first terminal corresponding first key, the first double secret key appointed information is used to be encrypted, obtain the first cipher-text information, and send the first cipher-text information to first terminal, even if appointed information is intercepted and captured by third party in the process of transmission, third party also can only obtain the appointed information of ciphertext form, cannot get real information, effectively prevent the leakage of appointed information.Because wearable device is compared with terminal, the possibility being subject to assault is low, therefore the first key is that the first wearable device generates, first terminal also adopts the first wearable device to be decrypted the first cipher-text information, the fail safe of key and information can be improved, effectively prevent the leakage of appointed information further.
Figure 11 is the block diagram of the device of another transmission information according to an exemplary embodiment, and with reference to Figure 11, the device of this transmission information comprises Key Acquisition Module 901, information encryption module 902 and information sending module 903.
This Key Acquisition Module 901 is configured to obtain the first key corresponding to first terminal, and the first key is that the first wearable device generates according to the cipher instruction of the mark of the first wearable device and user's input.
This information encryption module 902 is configured to use first double secret key appointed information and is encrypted, and obtains the first cipher-text information.
This information sending module 903 is configured to send the first cipher-text information to first terminal, and first terminal is decrypted the first cipher-text information for adopting the first wearable device.
In a kind of implementation of the present embodiment, when this device is the second terminal, this Key Acquisition Module 901 can comprise request and send submodule 901a and key reception submodule 901b.
This request sends submodule 901a and is configured to send key request to server, and key request is for obtaining the first key.
This key reception submodule 901b is configured to reception first key, and the first key is that server obtains according to the corresponding relation of the terminal stored and key.
In the another kind of implementation of the present embodiment, when this device is the second terminal, this information encryption module 902 can comprise information and send submodule 902a and receives information submodule 902b.
This information sends submodule 902a and is configured to send the first key to the second wearable device.
This receives information submodule 902b is configured to reception first cipher-text information, and the first cipher-text information is that the second wearable device uses the first double secret key appointed information to be encrypted to obtain.
In another implementation of the present embodiment, this device also can comprise the first key reception module, the first cipher key decryption block and the first key updating module.
This first key reception module is configured to the second key receiving ciphertext form, second key of ciphertext form is that the first wearable device uses the 3rd double secret key second key to be encrypted to obtain, second key and the 3rd key are all that the first wearable device generates according to the cipher instruction of the mark of the first wearable device and user's input, and the 3rd key and the first key are the same key used in the pair of secret keys or symmetric encipherment algorithm used in rivest, shamir, adelman.
The second key that this first cipher key decryption block is configured to use first double secret key ciphertext form is decrypted, and obtains the second key.
It is the second key that this first key updating module is configured to the first corresponding for first terminal key updating.
Disclosure embodiment by obtain first terminal corresponding first key, the first double secret key appointed information is used to be encrypted, obtain the first cipher-text information, and send the first cipher-text information to first terminal, even if appointed information is intercepted and captured by third party in the process of transmission, third party also can only obtain the appointed information of ciphertext form, cannot get real information, effectively prevent the leakage of appointed information.Because wearable device is compared with terminal, the possibility being subject to assault is low, therefore the first key is that the first wearable device generates, first terminal also adopts the first wearable device to be decrypted the first cipher-text information, the fail safe of key and information can be improved, effectively prevent the leakage of appointed information further.
Figure 12 is the block diagram of the device of another transmission information according to an exemplary embodiment, and with reference to Figure 12, the device of this transmission information comprises the first receiver module 1001, first sending module 1002 and the second receiver module 1003.
This first receiver module 1001 is configured to reception first cipher-text information, first cipher-text information uses the first double secret key appointed information corresponding to first terminal to be encrypted to obtain, and the first key is that the first wearable device generates according to the cipher instruction of the mark of the first wearable device and user's input.
This first sending module 1002 is configured to send the first cipher-text information to the first wearable device.
This second receiver module 1003 is configured to receive appointed information, appointed information is that the first wearable device uses the 3rd double secret key first cipher-text information to be decrypted and to obtain, 3rd key is that the first wearable device generates according to the cipher instruction of the mark of the first wearable device and user's input, and the 3rd key and the first key are the same key used in the pair of secret keys or symmetric encipherment algorithm used in rivest, shamir, adelman.
Disclosure embodiment is by reception first cipher-text information, and use the 3rd double secret key first cipher-text information to be decrypted by the first wearable device, obtain appointed information, even if appointed information is intercepted and captured by third party in the process of transmission, third party also can only obtain the appointed information of ciphertext form, cannot real information be got, effectively prevent the leakage of appointed information.Because wearable device is compared with terminal, the possibility being subject to assault is low, therefore the first key is that the first wearable device generates, first terminal also adopts the first wearable device to be decrypted the first cipher-text information, the fail safe of key and information can be improved, effectively prevent the leakage of appointed information further.
Figure 13 is the block diagram of the device of another transmission information according to an exemplary embodiment, and with reference to Figure 13, the device of this transmission information comprises the first receiver module 1101, first sending module 1102 and the second receiver module 1103.
This first receiver module 1101 is configured to reception first cipher-text information, first cipher-text information uses the first double secret key appointed information corresponding to first terminal to be encrypted to obtain, and the first key is that the first wearable device generates according to the cipher instruction of the mark of the first wearable device and user's input.
This first sending module 1102 is configured to send the first cipher-text information to the first wearable device.
This second receiver module 1103 is configured to receive appointed information, appointed information is that the first wearable device uses the 3rd double secret key first cipher-text information to be decrypted and to obtain, 3rd key is that the first wearable device generates according to the cipher instruction of the mark of the first wearable device and user's input, and the 3rd key and the first key are the same key used in the pair of secret keys or symmetric encipherment algorithm used in rivest, shamir, adelman.
In a kind of implementation of the present embodiment, this device can also comprise the 3rd receiver module 1104 and the second sending module 1105.
3rd receiver module 1104 is configured to the second key receiving ciphertext form, second key of ciphertext form is that the first wearable device uses the 3rd double secret key second key to be encrypted to obtain, and the second key is that the first wearable device generates according to the cipher instruction of the mark of the first wearable device and user's input.
This second sending module 1105 is configured to the second key sending ciphertext form to server, the second key of the first double secret key ciphertext form is used to be decrypted to make server, obtain the second key, and be the second key by the first corresponding for first terminal key updating.
Disclosure embodiment is by reception first cipher-text information, and use the 3rd double secret key first cipher-text information to be decrypted by the first wearable device, obtain appointed information, even if appointed information is intercepted and captured by third party in the process of transmission, third party also can only obtain the appointed information of ciphertext form, cannot real information be got, effectively prevent the leakage of appointed information.Because wearable device is compared with terminal, the possibility being subject to assault is low, therefore the first key is that the first wearable device generates, first terminal also adopts the first wearable device to be decrypted the first cipher-text information, the fail safe of key and information can be improved, effectively prevent the leakage of appointed information further.
About the device in above-described embodiment, wherein the concrete mode of modules executable operations has been described in detail in about the embodiment of the method, will not elaborate explanation herein.
Figure 14 is the block diagram of a kind of device 1400 for transmission information according to an exemplary embodiment.Such as, device 1400 can be mobile phone, computer, digital broadcast terminal, messaging devices, game console, flat-panel devices, Medical Devices, body-building equipment, personal digital assistant etc.
With reference to Figure 14, device 1400 can comprise following one or more assembly: processing components 1402, memory 1404, electric power assembly 1406, multimedia groupware 1408, audio-frequency assembly 1410, the interface 1412 of I/O (I/O), sensor cluster 1414, and communications component 1416.
The integrated operation of the usual control device 1400 of processing components 1402, such as with display, call, data communication, camera operation and record operate the operation be associated.Processing components 1402 can comprise one or more processor 1420 to perform instruction, to complete all or part of step of above-mentioned method.In addition, processing components 1402 can comprise one or more module, and what be convenient between processing components 1402 and other assemblies is mutual.Such as, processing components 1402 can comprise multi-media module, mutual with what facilitate between multimedia groupware 1408 and processing components 1402.
Memory 1404 is configured to store various types of data to be supported in the operation of equipment 1400.The example of these data comprises for any application program of operation on device 1400 or the instruction of method, contact data, telephone book data, message, picture, video etc.Memory 1404 can be realized by the volatibility of any type or non-volatile memory device or their combination, as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, disk or CD.
The various assemblies that electric power assembly 1406 is device 1400 provide electric power.Electric power assembly 1406 can comprise power-supply management system, one or more power supply, and other and the assembly generating, manage and distribute electric power for device 1400 and be associated.
Multimedia groupware 1408 is included in the screen providing an output interface between described device 1400 and user.In certain embodiments, screen can comprise liquid crystal display (LCD) and touch panel (TP).If screen comprises touch panel, screen may be implemented as touch-screen, to receive the input signal from user.Touch panel comprises one or more touch sensor with the gesture on sensing touch, slip and touch panel.Described touch sensor can the border of not only sensing touch or sliding action, but also detects the duration relevant to described touch or slide and pressure.In certain embodiments, multimedia groupware 1408 comprises a front-facing camera and/or post-positioned pick-up head.When equipment 1400 is in operator scheme, during as screening-mode or video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and post-positioned pick-up head can be fixing optical lens systems or have focal length and optical zoom ability.
Audio-frequency assembly 1410 is configured to export and/or input audio signal.Such as, audio-frequency assembly 1410 comprises a microphone (MIC), and when device 1400 is in operator scheme, during as call model, logging mode and speech recognition mode, microphone is configured to receive external audio signal.The audio signal received can be stored in memory 1404 further or be sent via communications component 1416.In certain embodiments, audio-frequency assembly 1410 also comprises a loud speaker, for output audio signal.
I/O interface 1412 is for providing interface between processing components 1402 and peripheral interface module, and above-mentioned peripheral interface module can be keyboard, some striking wheel, button etc.These buttons can include but not limited to: home button, volume button, start button and locking press button.
Sensor cluster 1414 comprises one or more transducer, for providing the state estimation of various aspects for device 1400.Such as, sensor cluster 1414 can detect the opening/closing state of equipment 1400, the relative positioning of assembly, such as described assembly is display and the keypad of device 1400, the position of all right checkout gear 1400 of sensor cluster 1414 or device 1400 assemblies changes, the presence or absence that user contacts with device 1400, the variations in temperature of device 1400 orientation or acceleration/deceleration and device 1400.Sensor cluster 1414 can comprise proximity transducer, be configured to without any physical contact time detect near the existence of object.Sensor cluster 1414 can also comprise optical sensor, as CMOS or ccd image sensor, for using in imaging applications.In certain embodiments, this sensor cluster 1414 can also comprise acceleration transducer, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communications component 1416 is configured to the communication being convenient to wired or wireless mode between device 1400 and other equipment.Device 1400 can access the wireless network based on communication standard, as WiFi, 2G or 3G, or their combination.In one exemplary embodiment, communications component 1416 receives from the broadcast singal of external broadcasting management system or broadcast related information via broadcast channel.In one exemplary embodiment, described communications component 1416 also comprises near-field communication (NFC) module, to promote junction service.Such as, can based on radio-frequency (RF) identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 1400 can be realized, for performing said method by one or more application specific integrated circuit (ASIC), digital signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components.
In the exemplary embodiment, additionally provide a kind of non-transitory computer-readable recording medium comprising instruction, such as, comprise the memory 1404 of instruction, above-mentioned instruction can perform said method by the processor 1420 of device 1400.Such as, described non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc.
A kind of non-transitory computer-readable recording medium, when the instruction in described storage medium is performed by the processor of mobile terminal, make mobile terminal can perform a kind of method of transmission information, described method comprises:
Obtain the first key that first terminal is corresponding, described first key is that the first wearable device generates according to the cipher instruction of the mark of described first wearable device and user's input;
Use described first double secret key appointed information to be encrypted, obtain the first cipher-text information;
Send described first cipher-text information to first terminal, described first terminal is decrypted described first cipher-text information for adopting described first wearable device.
A kind of non-transitory computer-readable recording medium, when the instruction in described storage medium is performed by the processor of mobile terminal, make mobile terminal can perform a kind of method of transmission information, described method comprises:
Receive the first cipher-text information, described first cipher-text information uses the first double secret key appointed information corresponding to first terminal to be encrypted to obtain, and described first key is that the first wearable device generates according to the cipher instruction of the mark of described first wearable device and user's input;
Described first cipher-text information is sent to described first wearable device;
Receive described appointed information, described appointed information is that described first wearable device uses the first cipher-text information described in the 3rd double secret key to be decrypted to obtain, described 3rd key is that described first wearable device generates according to the cipher instruction of the mark of described first wearable device and user's input, and described 3rd key and described first key are the same key used in the pair of secret keys or symmetric encipherment algorithm used in rivest, shamir, adelman.
Figure 15 is the block diagram of a kind of device 1500 for transmission information according to an exemplary embodiment.Such as, device 1500 may be provided in a server.With reference to Figure 15, device 1500 comprises processing components 1522, and it comprises one or more processor further, and the memory resource representated by memory 1532, can such as, by the instruction of the execution of processing components 1522, application program for storing.The application program stored in memory 1532 can comprise each module corresponding to one group of instruction one or more.In addition, processing components 1522 is configured to perform instruction, and to perform the above method, described method comprises:
Obtain the first key that first terminal is corresponding, described first key is that the first wearable device generates according to the cipher instruction of the mark of described first wearable device and user's input;
Use described first double secret key appointed information to be encrypted, obtain the first cipher-text information;
Send described first cipher-text information to first terminal, described first terminal is decrypted described first cipher-text information for adopting described first wearable device.
Device 1500 can also comprise the power management that a power supply module 1526 is configured to final controlling element 1500, and a wired or wireless network interface 1550 is configured to device 1500 to be connected to network, and input and output (I/O) interface 1558.Device 1500 can operate the operating system based on being stored in memory 1532, such as WindowsServerTM, MacOSXTM, UnixTM, LinuxTM, FreeBSDTM or similar.
Figure 16 is the block diagram of the system of a kind of transmission information according to an exemplary embodiment, and with reference to Figure 16, the system of this transmission information comprises the first wearable device 1601, first terminal 1602 and server 1603.
This first wearable device 1601 is configured to the first key and the 3rd key that generate first terminal 1602 correspondence according to the mark of the first wearable device 1601 and the cipher instruction of user's input, and the 3rd key and the first key are the same key used in the pair of secret keys or symmetric encipherment algorithm used in rivest, shamir, adelman.
This server 1603 is configured to acquisition first key; Use the first double secret key appointed information to be encrypted, obtain the first cipher-text information; The first cipher-text information is sent to first terminal 1602.
This first terminal 1602 is configured to reception first cipher-text information; The first cipher-text information is sent to the first wearable device 1601.
This first wearable device 1601 is also configured to reception first cipher-text information; Use the 3rd double secret key first cipher-text information to be decrypted, obtain appointed information; Appointed information is sent to first terminal 1602.
This first terminal 1602 is also configured to receive appointed information.
In a kind of implementation of the present embodiment, this server 1603 can be configured to the corresponding relation according to the terminal stored and key, obtains the first key that first terminal is corresponding.
In the another kind of implementation of the present embodiment, this first wearable device 1601 can also be configured to generate the second key according to the mark of the first wearable device 1601 and the cipher instruction of user's input; The 3rd double secret key second key is used to be encrypted, obtain the second key of ciphertext form, 3rd key is that the first wearable device 1601 generates according to the cipher instruction of the mark of the first wearable device 1601 and user's input, and the 3rd key and the first key are the same key used in the pair of secret keys or symmetric encipherment algorithm used in rivest, shamir, adelman; The second key of ciphertext form is sent to first terminal 1602.
This first terminal 1602 is also configured to the second key receiving ciphertext form; The second key of ciphertext form is sent to server 1603.
This server 1603 is also configured to the second key receiving ciphertext form; Use the second key of the first double secret key ciphertext form to be decrypted, obtain the second key; Be the second key by the first key updating of first terminal 1602 correspondence.
Disclosure embodiment by obtain first terminal corresponding first key, the first double secret key appointed information is used to be encrypted, obtain the first cipher-text information, and send the first cipher-text information to first terminal, even if appointed information is intercepted and captured by third party in the process of transmission, third party also can only obtain the appointed information of ciphertext form, cannot get real information, effectively prevent the leakage of appointed information.Because wearable device is compared with terminal, the possibility being subject to assault is low, therefore the first key is that the first wearable device generates, first terminal also adopts the first wearable device to be decrypted the first cipher-text information, the fail safe of key and information can be improved, effectively prevent the leakage of appointed information further.
Figure 17 is the block diagram of the system of another kind of transmission information according to an exemplary embodiment, with reference to Figure 17, the system of this transmission information comprises the first wearable device 1701, first terminal 1702, server 1703, second terminal 1704 and the second wearable device 1705.
This first wearable device 1701 is configured to the first key and the 3rd key that generate first terminal 1702 correspondence according to the mark of the first wearable device 1701 and the cipher instruction of user's input, and the 3rd key and the first key are the same key used in the pair of secret keys or symmetric encipherment algorithm used in rivest, shamir, adelman.
This second terminal 1704 is configured to send key request to server 1703, and key request is for obtaining the first key.
This server 1703 is configured to receive key request; According to the terminal of storage and the corresponding relation of key, obtain the first key; The first key is sent to the second terminal 1704.
This second terminal 1704 is also configured to reception first key; The first key is sent to the second wearable device 1705.
This second wearable device 1705 is configured to reception first key; Use the first double secret key appointed information to be encrypted, obtain the first cipher-text information; The first cipher-text information is sent to the second terminal 1704.
This second terminal 1704 is also configured to reception first cipher-text information; The first cipher-text information is sent to first terminal 1702.
This first terminal 1702 is configured to reception first cipher-text information; The first cipher-text information is sent to the first wearable device.
This first wearable device 1701 is also configured to reception first cipher-text information; Use the 3rd double secret key first cipher-text information to be decrypted, obtain appointed information; Appointed information is sent to first terminal.
This first terminal 1702 is also configured to receive appointed information.
In a kind of implementation of the present embodiment, this first wearable device 1701 can also be configured to generate the second key according to the mark of the first wearable device 1701 and the cipher instruction of user's input; The 3rd double secret key second key is used to be encrypted, obtain the second key of ciphertext form, 3rd key is that the first wearable device 1701 generates according to the cipher instruction of the mark of the first wearable device 1701 and user's input, and the 3rd key and the first key are the same key used in the pair of secret keys or symmetric encipherment algorithm used in rivest, shamir, adelman; The second key of ciphertext form is sent to first terminal 1702.
This first terminal 1702 is also configured to the second key receiving ciphertext form; The second key of ciphertext form is sent to server 1703.
This server 1703 is also configured to the second key receiving ciphertext form; Use the second key of the first double secret key ciphertext form to be decrypted, obtain the second key; Be the second key by the first key updating of first terminal 1702 correspondence.
Disclosure embodiment by obtain first terminal corresponding first key, the first double secret key appointed information is used to be encrypted, obtain the first cipher-text information, and send the first cipher-text information to first terminal, even if appointed information is intercepted and captured by third party in the process of transmission, third party also can only obtain the appointed information of ciphertext form, cannot get real information, effectively prevent the leakage of appointed information.Because wearable device is compared with terminal, the possibility being subject to assault is low, therefore the first key is that the first wearable device generates, first terminal also adopts the first wearable device to be decrypted the first cipher-text information, the fail safe of key and information can be improved, effectively prevent the leakage of appointed information further.
Figure 18 is the block diagram of the system of another transmission information according to an exemplary embodiment, with reference to Figure 18, the system of this transmission information comprises the first wearable device 1801, first terminal 1802, server 1803, second terminal 1804 and the second wearable device 1805.
This first wearable device 1801 is configured to the first key and the 3rd key that generate first terminal 1802 correspondence according to the mark of the first wearable device 1801 and the cipher instruction of user's input, and the 3rd key and the first key are the same key used in the pair of secret keys or symmetric encipherment algorithm used in rivest, shamir, adelman.
This second wearable device 1805 is configured to the 4th key generating the second terminal 1804 correspondence according to the mark of the second wearable device 1805 and the cipher instruction of user's input, and the 4th key is the key used in symmetry algorithm; Use the 4th double secret key appointed information to be encrypted, obtain the second cipher-text information; The second cipher-text information is sent to the second terminal 1804.
This second terminal 1804 is configured to reception second cipher-text information; The second cipher-text information is sent to server 1803.
This server 1803 is configured to reception second cipher-text information; Use the 4th double secret key second cipher-text information to be decrypted, obtain appointed information; Obtain the first key; Use the first double secret key appointed information to be encrypted, obtain the first cipher-text information; The first cipher-text information is sent to first terminal 1802.
This first terminal 1802 is configured to reception first cipher-text information; The first cipher-text information is sent to the first wearable device 1801.
This first wearable device 1801 is also configured to reception first cipher-text information; Use the 3rd double secret key first cipher-text information to be decrypted, obtain appointed information; Appointed information is sent to first terminal 1802.
This first terminal 1802 is also configured to receive appointed information.
In a kind of implementation of the present embodiment, this second wearable device 1805 can also be configured to generate the 5th key according to the mark of the second wearable device 1805 and the cipher instruction of user's input; Use the 4th double secret key the 5th key to be encrypted, obtain the 5th key of ciphertext form; The 5th key of ciphertext form is sent to the second terminal 1804.
This first terminal 1802 is also configured to the 5th key receiving ciphertext form; The 5th key of ciphertext form is sent to server 1803.
This server 1803 is also configured to the 5th key receiving ciphertext form; Use the 5th key of the 4th double secret key ciphertext form to be decrypted, obtain the 5th key; Be the 5th key by the 4th key updating of the second terminal 1804 correspondence.
In the another kind of implementation of the present embodiment, this first wearable device 1801 can also be configured to generate the second key according to the mark of the first wearable device 1801 and the cipher instruction of user's input; The 3rd double secret key second key is used to be encrypted, obtain the second key of ciphertext form, 3rd key is that the first wearable device 1801 generates according to the cipher instruction of the mark of the first wearable device 1801 and user's input, and the 3rd key and the first key are the same key used in the pair of secret keys or symmetric encipherment algorithm used in rivest, shamir, adelman; The second key of ciphertext form is sent to first terminal 1802.
This first terminal 1802 is also configured to the second key receiving ciphertext form; The second key of ciphertext form is sent to server 1803.
This server 1803 is also configured to the second key receiving ciphertext form; Use the second key of the first double secret key ciphertext form to be decrypted, obtain the second key; Be the second key by the first key updating of first terminal 1802 correspondence.
Disclosure embodiment by obtain first terminal corresponding first key, the first double secret key appointed information is used to be encrypted, obtain the first cipher-text information, and send the first cipher-text information to first terminal, even if appointed information is intercepted and captured by third party in the process of transmission, third party also can only obtain the appointed information of ciphertext form, cannot get real information, effectively prevent the leakage of appointed information.Because wearable device is compared with terminal, the possibility being subject to assault is low, therefore the first key is that the first wearable device generates, first terminal also adopts the first wearable device to be decrypted the first cipher-text information, the fail safe of key and information can be improved, effectively prevent the leakage of appointed information further.
Those skilled in the art, at consideration specification and after putting into practice invention disclosed herein, will easily expect other embodiment of the present invention.The application is intended to contain any modification of the present invention, purposes or adaptations, and these modification, purposes or adaptations are followed general principle of the present invention and comprised the undocumented common practise in the art of the disclosure or conventional techniques means.Specification and embodiment are only regarded as exemplary, and true scope of the present invention and spirit are pointed out by claim below.
Should be understood that, the present invention is not limited to precision architecture described above and illustrated in the accompanying drawings, and can carry out various amendment and change not departing from its scope.Scope of the present invention is only limited by appended claim.
Claims (23)
1. a method for transmission information, is characterized in that, comprising:
Obtain the first key that first terminal is corresponding, described first key is that the first wearable device generates according to the cipher instruction of the mark of described first wearable device and user's input;
Use described first double secret key appointed information to be encrypted, obtain the first cipher-text information;
Send described first cipher-text information to described first terminal, described first terminal is decrypted described first cipher-text information for adopting described first wearable device.
2. method according to claim 1, is characterized in that, when described method is performed by server, the first key that described acquisition first terminal is corresponding, comprising:
According to the terminal of storage and the corresponding relation of key, obtain the first key that described first terminal is corresponding.
3. method according to claim 2, is characterized in that, described method also comprises:
Receive the second key of ciphertext form, second key of described ciphertext form is that described first wearable device uses the 3rd double secret key second key to be encrypted to obtain, described second key and described 3rd key are all that described first wearable device generates according to the cipher instruction of the mark of described first wearable device and user's input, and described 3rd key and described first key are the same key used in the pair of secret keys or symmetric encipherment algorithm used in rivest, shamir, adelman;
Use the second key of ciphertext form described in described first double secret key to be decrypted, obtain described second key;
Be described second key by the first corresponding for described first terminal key updating.
4. method according to claim 1, is characterized in that, when described method is performed by server, described method also comprises:
Receive the second cipher-text information, described second cipher-text information be the second wearable device use the second terminal corresponding the 4th double secret key described in appointed information be encrypted and obtain, described 4th key is that described second wearable device generates according to the cipher instruction of the mark of described second Intelligent bracelet and user's input, and described 4th key is the key used in symmetry algorithm;
Use the second cipher-text information described in described 4th double secret key to be decrypted, obtain described appointed information.
5. method according to claim 4, is characterized in that, described method also comprises:
Receive the 5th key of ciphertext form, 5th key of described ciphertext form is that described second wearable device uses described 4th double secret key the 5th key to be encrypted to obtain, and described 5th key is that described second wearable device generates according to the cipher instruction of the mark of described second wearable device and user's input;
Use the 5th key of ciphertext form described in described 4th double secret key to be decrypted, obtain described 5th key;
Be described 5th key by the 4th corresponding for described second terminal key updating.
6. method according to claim 1, is characterized in that, when described method is performed by the second terminal, the first key that described acquisition first terminal is corresponding, comprising:
Send key request to server, described key request is for obtaining described first key;
Receive described first key, described first key is that described server obtains according to the corresponding relation of the terminal stored and key.
7. method according to claim 1, is characterized in that, when described method is performed by the second terminal, described in described first double secret key of described use, appointed information is encrypted, and obtains the first cipher-text information, comprising:
Described first key and described appointed information is sent to the second wearable device;
Receive described first cipher-text information, described first cipher-text information is that described second wearable device uses appointed information described in described first double secret key to be encrypted to obtain.
8. a method for transmission information, is characterized in that, comprising:
Receive the first cipher-text information, described first cipher-text information uses the first double secret key appointed information corresponding to first terminal to be encrypted to obtain, and described first key is that the first wearable device generates according to the cipher instruction of the mark of described first wearable device and user's input;
Described first cipher-text information is sent to described first wearable device;
Receive described appointed information, described appointed information is that described first wearable device uses the first cipher-text information described in the 3rd double secret key to be decrypted to obtain, described 3rd key is that described first wearable device generates according to the cipher instruction of the mark of described first wearable device and user's input, and described 3rd key and described first key are the same key used in the pair of secret keys or symmetric encipherment algorithm used in rivest, shamir, adelman.
9. method according to claim 8, is characterized in that, described method also comprises:
Receive the second key of ciphertext form, second key of described ciphertext form is that described first wearable device uses described 3rd double secret key second key to be encrypted to obtain, and described second key is that described first wearable device generates according to the cipher instruction of the mark of described first wearable device and user's input;
The second key of described ciphertext form is sent to server, the second key of ciphertext form described in described first double secret key is used to be decrypted to make described server, obtain described second key, and be described second key by the first corresponding for described first terminal key updating.
10. a device for transmission information, is characterized in that, comprising:
Key Acquisition Module, for obtaining the first key corresponding to first terminal, described first key is that the first wearable device generates according to the cipher instruction of the mark of described first wearable device and user's input;
Information encryption module, for using described first double secret key appointed information to be encrypted, obtains the first cipher-text information;
Information sending module, for sending described first cipher-text information to described first terminal, described first terminal is decrypted described first cipher-text information for adopting described first wearable device.
11. devices according to claim 10, is characterized in that, when described device is server, described Key Acquisition Module is used for,
According to the terminal of storage and the corresponding relation of key, obtain the first key that described first terminal is corresponding.
12. devices according to claim 11, is characterized in that, described device also comprises:
First key reception module, for receiving the second key of ciphertext form, second key of described ciphertext form is that described first wearable device uses the 3rd double secret key second key to be encrypted to obtain, described second key and described 3rd key are all that described first wearable device generates according to the cipher instruction of the mark of described first wearable device and user's input, and described 3rd key and described first key are the same key used in the pair of secret keys or symmetric encipherment algorithm used in rivest, shamir, adelman;
First cipher key decryption block, for using the second key of ciphertext form described in described first double secret key to be decrypted, obtains described second key;
First key updating module, for being described second key by the first corresponding for described first terminal key updating.
13. devices according to claim 10, is characterized in that, when described device is server, described device also comprises:
Information receiving module, for receiving the second cipher-text information, described second cipher-text information be the second wearable device use the second terminal corresponding the 4th double secret key described in appointed information be encrypted and obtain, described 4th key is that described second wearable device generates according to the cipher instruction of the mark of described second Intelligent bracelet and user's input, and described 4th key is the key used in symmetry algorithm;
Decrypts information module, for using the second cipher-text information described in described 4th double secret key to be decrypted, obtains described appointed information.
14. devices according to claim 13, is characterized in that, described device also comprises:
Second key reception module, for receiving the 5th key of ciphertext form, 5th key of described ciphertext form is that described second wearable device uses described 4th double secret key the 5th key to be encrypted to obtain, and described 5th key is that described second wearable device generates according to the cipher instruction of the mark of described second wearable device and user's input;
Second cipher key decryption block, for using the 5th key of ciphertext form described in described 4th double secret key to be decrypted, obtains described 5th key;
Second key updating module, for being described 5th key by the 4th corresponding for described second terminal key updating.
15. devices according to claim 10, is characterized in that, when described device is the second terminal, described Key Acquisition Module comprises:
Request sends submodule, and for sending key request to server, described key request is for obtaining described first key;
Key reception submodule, for receiving described first key, described first key is that described server obtains according to the corresponding relation of the terminal stored and key.
16. devices according to claim 10, is characterized in that, when described device is the second terminal, described information encryption module comprises:
Information sends submodule, for sending described first key and described appointed information to the second wearable device;
Receives information submodule, for receiving described first cipher-text information, described first cipher-text information is that described second wearable device uses appointed information described in described first double secret key to be encrypted to obtain.
The device of 17. 1 kinds of transmission informations, is characterized in that, comprising:
First receiver module, for receiving the first cipher-text information, described first cipher-text information uses the first double secret key appointed information corresponding to first terminal to be encrypted to obtain, and described first key is that the first wearable device generates according to the cipher instruction of the mark of described first wearable device and user's input;
First sending module, for sending described first cipher-text information to described first wearable device;
Second receiver module, for receiving described appointed information, described appointed information is that described first wearable device uses the first cipher-text information described in the 3rd double secret key to be decrypted to obtain, described 3rd key is that described first wearable device generates according to the cipher instruction of the mark of described first wearable device and user's input, and described 3rd key and described first key are the same key used in the pair of secret keys or symmetric encipherment algorithm used in rivest, shamir, adelman.
18. devices according to claim 17, is characterized in that, described device also comprises:
3rd receiver module, for receiving the second key of ciphertext form, second key of described ciphertext form is that described first wearable device uses described 3rd double secret key second key to be encrypted to obtain, and described second key is that described first wearable device generates according to the cipher instruction of the mark of described first wearable device and user's input;
Second sending module, for sending the second key of described ciphertext form to server, the second key of ciphertext form described in described first double secret key is used to be decrypted to make described server, obtain described second key, and be described second key by the first corresponding for described first terminal key updating.
The device of 19. 1 kinds of transmission informations, is characterized in that, comprising:
Processor;
For the memory of storage of processor executable instruction;
Wherein, described processor is configured to:
Obtain the first key that first terminal is corresponding, described first key is that the first wearable device generates according to the cipher instruction of the mark of described first wearable device and user's input;
Use described first double secret key appointed information to be encrypted, obtain the first cipher-text information;
Send described first cipher-text information to described first terminal, described first terminal is decrypted described first cipher-text information for adopting described first wearable device.
The device of 20. 1 kinds of transmission informations, is characterized in that, comprising:
Processor;
For the memory of storage of processor executable instruction;
Wherein, described processor is configured to:
Receive the first cipher-text information, described first cipher-text information uses the first double secret key appointed information corresponding to first terminal to be encrypted to obtain, and described first key is that the first wearable device generates according to the cipher instruction of the mark of described first wearable device and user's input;
Described first cipher-text information is sent to described first wearable device;
Receive described appointed information, described appointed information is that described first wearable device uses the first cipher-text information described in the 3rd double secret key to be decrypted to obtain, described 3rd key is that described first wearable device generates according to the cipher instruction of the mark of described first wearable device and user's input, and described 3rd key and described first key are the same key used in the pair of secret keys or symmetric encipherment algorithm used in rivest, shamir, adelman.
The system of 21. 1 kinds of transmission informations, is characterized in that, comprising:
First wearable device, for generating the first key corresponding to first terminal and the 3rd key according to the mark of described first wearable device and the cipher instruction of user's input, described 3rd key and described first key are the same key used in the pair of secret keys or symmetric encipherment algorithm used in rivest, shamir, adelman;
Server, for obtaining described first key; Use described first double secret key appointed information to be encrypted, obtain the first cipher-text information; Described first cipher-text information is sent to described first terminal;
Described first terminal, for receiving described first cipher-text information; Described first cipher-text information is sent to described first wearable device;
Described first wearable device also for, receive described first cipher-text information; Use the first cipher-text information described in described 3rd double secret key to be decrypted, obtain described appointed information; Described appointed information is sent to described first terminal;
Described first terminal also for, receive described appointed information.
The system of 22. 1 kinds of transmission informations, is characterized in that, comprising:
First wearable device, for generating the first key corresponding to first terminal and the 3rd key according to the mark of described first wearable device and the cipher instruction of user's input, described 3rd key and described first key are the same key used in the pair of secret keys or symmetric encipherment algorithm used in rivest, shamir, adelman;
Second terminal, for sending key request to server, described key request is for obtaining described first key;
Described server, for receiving described key request; According to the terminal of storage and the corresponding relation of key, obtain described first key; Described first key is sent to described second terminal;
Described second terminal also for, receive described first key; Described first key is sent to the second wearable device;
Described second wearable device, for receiving described first key; Use described first double secret key appointed information to be encrypted, obtain the first cipher-text information; Described first cipher-text information is sent to described second terminal;
Described second terminal also for, receive described first cipher-text information; Described first cipher-text information is sent to described first terminal;
Described first terminal, for receiving described first cipher-text information; Described first cipher-text information is sent to described first wearable device;
Described first wearable device also for, receive described first cipher-text information; Use the first cipher-text information described in described 3rd double secret key to be decrypted, obtain described appointed information; Described appointed information is sent to described first terminal;
Described first terminal also for, receive described appointed information.
The system of 23. 1 kinds of transmission informations, is characterized in that, comprising:
First wearable device, for generating the first key corresponding to first terminal and the 3rd key according to the mark of described first wearable device and the cipher instruction of user's input, described 3rd key and described first key are the same key used in the pair of secret keys or symmetric encipherment algorithm used in rivest, shamir, adelman;
Second wearable device, for generating the 4th key corresponding to the second terminal according to the mark of described second wearable device and the cipher instruction of user's input, described 4th key is the key used in symmetry algorithm; Use described 4th double secret key appointed information to be encrypted, obtain the second cipher-text information; Described second cipher-text information is sent to described second terminal;
Described second terminal, for receiving described second cipher-text information; Described second cipher-text information is sent to server;
Described server, for receiving described second cipher-text information; Use the second cipher-text information described in described 4th double secret key to be decrypted, obtain described appointed information; Obtain described first key; Use appointed information described in described first double secret key to be encrypted, obtain the first cipher-text information; Described first cipher-text information is sent to described first terminal;
Described first terminal, for receiving described first cipher-text information; Described first cipher-text information is sent to described first wearable device;
Described first wearable device also for, receive described first cipher-text information; Use the first cipher-text information described in described 3rd double secret key to be decrypted, obtain described appointed information; Described appointed information is sent to described first terminal;
Described first terminal also for, receive described appointed information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510373613.4A CN105120452B (en) | 2015-06-30 | 2015-06-30 | Transmit the method, apparatus and system of information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510373613.4A CN105120452B (en) | 2015-06-30 | 2015-06-30 | Transmit the method, apparatus and system of information |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105120452A true CN105120452A (en) | 2015-12-02 |
CN105120452B CN105120452B (en) | 2018-11-23 |
Family
ID=54668287
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510373613.4A Active CN105120452B (en) | 2015-06-30 | 2015-06-30 | Transmit the method, apparatus and system of information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105120452B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106804062A (en) * | 2015-12-03 | 2017-06-06 | 青岛海信移动通信技术股份有限公司 | A kind of method and apparatus of networking |
CN107743063A (en) * | 2017-10-31 | 2018-02-27 | 北京小米移动软件有限公司 | Data processing method and device |
CN109787955A (en) * | 2018-12-12 | 2019-05-21 | 东软集团股份有限公司 | The method, apparatus and storage medium of information transmission |
CN110012447A (en) * | 2019-04-28 | 2019-07-12 | 国网新疆电力有限公司 | The system and method for network security control function is realized in substation based on wireless sensor |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102497465A (en) * | 2011-10-26 | 2012-06-13 | 潘铁军 | High-secrecy mobile information safety system and safety method for distributed secret keys |
US20130166456A1 (en) * | 2010-09-07 | 2013-06-27 | Zte Corporation | System and Method for Remote Payment Based on Mobile Terminal |
CN103473514A (en) * | 2013-09-06 | 2013-12-25 | 宇龙计算机通信科技(深圳)有限公司 | Data storage access method and device |
CN104144049A (en) * | 2014-03-11 | 2014-11-12 | 腾讯科技(深圳)有限公司 | Encryption communication method, system and device |
CN104243484A (en) * | 2014-09-25 | 2014-12-24 | 小米科技有限责任公司 | Information interaction method and device and electronic equipment |
CN104510132A (en) * | 2013-09-30 | 2015-04-15 | 大连民族学院 | Portable pencil-box capable of being clamped onto book |
-
2015
- 2015-06-30 CN CN201510373613.4A patent/CN105120452B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130166456A1 (en) * | 2010-09-07 | 2013-06-27 | Zte Corporation | System and Method for Remote Payment Based on Mobile Terminal |
CN102497465A (en) * | 2011-10-26 | 2012-06-13 | 潘铁军 | High-secrecy mobile information safety system and safety method for distributed secret keys |
CN103473514A (en) * | 2013-09-06 | 2013-12-25 | 宇龙计算机通信科技(深圳)有限公司 | Data storage access method and device |
CN104510132A (en) * | 2013-09-30 | 2015-04-15 | 大连民族学院 | Portable pencil-box capable of being clamped onto book |
CN104144049A (en) * | 2014-03-11 | 2014-11-12 | 腾讯科技(深圳)有限公司 | Encryption communication method, system and device |
CN104243484A (en) * | 2014-09-25 | 2014-12-24 | 小米科技有限责任公司 | Information interaction method and device and electronic equipment |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106804062A (en) * | 2015-12-03 | 2017-06-06 | 青岛海信移动通信技术股份有限公司 | A kind of method and apparatus of networking |
CN107743063A (en) * | 2017-10-31 | 2018-02-27 | 北京小米移动软件有限公司 | Data processing method and device |
CN109787955A (en) * | 2018-12-12 | 2019-05-21 | 东软集团股份有限公司 | The method, apparatus and storage medium of information transmission |
CN110012447A (en) * | 2019-04-28 | 2019-07-12 | 国网新疆电力有限公司 | The system and method for network security control function is realized in substation based on wireless sensor |
Also Published As
Publication number | Publication date |
---|---|
CN105120452B (en) | 2018-11-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104243484B (en) | Information interacting method and device, electronic equipment | |
CN104869612B (en) | Access the method and device of network | |
WO2016050037A1 (en) | Operation authorization method and device | |
CN104955031A (en) | Information transmission method and device | |
CN104219058A (en) | Identity authentication and authorization method and device | |
CN104852911A (en) | Safety verification method, device and system | |
CN105282158A (en) | Intelligent equipment networking method, routing equipment, intelligent equipment and system | |
KR101639147B1 (en) | Method, device, program and storage medium for sending information in voice service | |
EP3182746A1 (en) | Method and apparatus for transmitting routing information | |
CN105119888A (en) | Plug-in installation package uploading method, plug-in installation package installing method and plug-in installation package uploading device | |
CN105471814A (en) | Account number management method and account number management device | |
CN110738778B (en) | Access control method and device, equipment and storage medium | |
CN109246110B (en) | Data sharing method and device and computer readable storage medium | |
CN113868505A (en) | Data processing method and device, electronic equipment, server and storage medium | |
CN104869001A (en) | Short message authentication method and device | |
CN105120452A (en) | Information transmission method, device and system | |
CN104852800A (en) | Data transmission method and device | |
CN105282162A (en) | Processing method and device for account management business | |
CN115333813A (en) | Data encryption transmission method and device, electronic equipment and storage medium | |
CN104540115A (en) | Communication method and device | |
CN105306567A (en) | Method and device for terminal connection | |
CN109104361B (en) | Instant messaging method, instant messaging device, electronic equipment and storage medium | |
WO2018018636A1 (en) | Information writing method and device | |
CN105812339A (en) | Encryption and decryption method and device | |
CN104954344A (en) | Data exchange method and device thereof based on HTTP protocol |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20180821 Address after: 100176 Beijing Beijing economic and Technological Development Zone, Chuang Chuang fourteen Street 99, 33 D Building 2 level 2243 (centralized office area) Applicant after: Beijing millet Payment Technology Co., Ltd. Address before: 100085 Beijing Haidian District Qinghe middle street 68 Huarun colorful shopping mall two phase 13 level. Applicant before: Xiaomi Technology Co., Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |