WO2017041599A1 - 业务处理方法及电子设备 - Google Patents
业务处理方法及电子设备 Download PDFInfo
- Publication number
- WO2017041599A1 WO2017041599A1 PCT/CN2016/092434 CN2016092434W WO2017041599A1 WO 2017041599 A1 WO2017041599 A1 WO 2017041599A1 CN 2016092434 W CN2016092434 W CN 2016092434W WO 2017041599 A1 WO2017041599 A1 WO 2017041599A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- electronic device
- information
- public key
- original text
- certificate
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/16—Constructional details or arrangements
- G06F1/1613—Constructional details or arrangements for portable computers
- G06F1/163—Wearable computers, e.g. on a belt
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/72—Signcrypting, i.e. digital signing and encrypting simultaneously
Definitions
- the present invention relates to the field of terminal technologies, and in particular, to a service processing method and an electronic device.
- the verification process of the identity of the user who is currently performing the operation is involved.
- the wearable device can be used to interact with the payment terminal, and the wearable device provides a unique identifier for identifying the user to verify that the current payment operation is performed by the user himself.
- the payment process can be implemented securely without entering a password.
- the wearable device can only function to provide the user identity, and is used to verify that the user currently performing the operation is indeed the user himself, and has a single function, less application scenarios, and poor applicability.
- the embodiments of the present invention provide a service processing method and an electronic device.
- the technical solution is as follows:
- an embodiment of the present invention provides a service processing method, which is applied to a second electronic device, where the method includes:
- an embodiment of the present invention provides a service processing method, which is applied to a first electronic device, where the method includes:
- the business processing is performed based on the original text of the information.
- an embodiment of the present invention provides a service processing apparatus, where the apparatus includes:
- a receiving module configured to receive a service request of the first electronic device
- a first encryption module configured to encrypt, by using a public key of the first electronic device, an original text of the information corresponding to the service request, to obtain first ciphertext information
- a summary obtaining module configured to obtain a summary of information of the original text of the information
- a second encryption module configured to encrypt the information digest by using a private key of the device, to obtain a digital signature of the device itself;
- a processing module configured to add the digital signature to the first ciphertext information to obtain a second ciphertext information
- a sending module configured to send the second ciphertext information and the digital certificate of the second electronic device to the first electronic device, so that the first electronic device is configured according to the second ciphertext information and a digital certificate Obtaining the original text of the information, and performing business processing based on the original text of the information, the digital certificate being acquired by the device itself based on the original text of the information.
- an embodiment of the present invention provides a service processing apparatus, where the apparatus includes:
- a sending module configured to send a service request to the second electronic device, and receive the digital certificate and the second ciphertext information returned by the second electronic device, where the second ciphertext information includes the first ciphertext information and the digital signature;
- a first verification module configured to verify a digital certificate of the second electronic device
- a first decryption module configured to decrypt the first ciphertext information by using a private key of the device itself to obtain an original text of the information when the digital certificate of the second electronic device is legally determined by verification;
- a second decrypting module configured to decrypt the digital signature by using a public key of the second electronic device to obtain a message digest
- a second verification module configured to verify the original information according to the information digest
- the service processing module is configured to perform service processing based on the original information when the original text of the information is correct by verification.
- an electronic device comprising:
- One or more processors are One or more processors; and,
- the memory stores one or more programs, the one or more programs being configured to be executed by the one or more processors, the one or more programs including instructions for:
- an electronic device comprising:
- One or more processors are One or more processors; and,
- the memory stores one or more programs, the one or more programs being configured to be executed by the one or more processors, the one or more programs including instructions for:
- the first ciphertext information is decrypted by using the private key of the electronic device itself to obtain an original text of the information;
- the business processing is performed based on the original text of the information.
- the encrypted information can be obtained by the first electronic device through the encrypted transmission with the second electronic device.
- the original information of the information so that the business processing based on the original information, does not involve any key interaction in the interaction, the private key of the electronic device itself is not exported to the device, therefore, in the process, the information security is ensured.
- the device application scenario is greatly expanded.
- FIG. 1 is a flowchart of a service processing method according to an embodiment of the present invention
- FIG. 2 is a flowchart of a service processing method according to an embodiment of the present invention.
- FIG. 3 is a flowchart of a service processing method according to an embodiment of the present invention.
- FIG. 4 is a schematic structural diagram of a service processing apparatus according to an embodiment of the present invention.
- FIG. 5 is a schematic structural diagram of a service processing apparatus according to an embodiment of the present invention.
- FIG. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
- PKI Public Key Infrastructure
- PKI Public Key Infrastructure
- a suitable security infrastructure includes digital certificates, asymmetric key cryptography, authentication centers, management of certificates and keys, security agent software, non-repudiation services, time stamp services, related information standards, and operational specifications.
- PKI is a universally applicable network security infrastructure.
- PKI provides security services for a variety of applications, including authentication, identification, digital signatures, encryption, etc., through interfaces that extend to the user's locality.
- PKI is separate from the application system using PKI, so it has the characteristics of "public"; on the other hand, leaving the PKI application system, PKI itself has no use. It is this infrastructure that makes the design and development of PKI systems much more efficient, because the design, development, production, and management of PKI systems can be performed independently, regardless of the specificity of the application.
- the components of the PKI also include a certification authority (CA) that signs these certificates, a registration authority (RA) that registers and approves certificates, and an electronic catalog that stores and publishes these certificates.
- CA certification authority
- RA registration authority
- the PKI also includes certificate policies, certificate paths, and users of certificates. All of these are the basic components of PKI, and they are organically combined to form a PKI.
- the most needed security guarantees include four aspects: identity and authentication, confidentiality or privacy, data integrity and undeniability.
- the most needed security assurance includes four aspects: identity and authentication, confidentiality or privacy, data integrity and non-repudiation.
- PKI security includes too many aspects, including device security, operational security, protocol security, and so on. Among them, algorithm security is the most concerned because it is the theoretical basis of PKI security.
- PKI relies on an asymmetric algorithm.
- an asymmetric algorithm if a public key is known, the private key can be theoretically found.
- FIG. 1 is a flowchart of a service processing method according to an embodiment of the present invention.
- the service processing method can be applied to the second electronic device, and the method includes:
- Encrypt the information digest by using a private key of the second electronic device to obtain a digital signature of the second electronic device.
- the method further includes: receiving, by using a public key of the first electronic device, the original text of the information corresponding to the service request to obtain the first ciphertext information, the method further comprising: receiving the signature sent by the first electronic device And the signature email carries the public key of the first electronic device, and obtains the public key of the first electronic device from the signed email; or queries and acquires the first electronic device from the certificate issuing system.
- the public key of the first electronic device is obtained by a key exchange protocol agreed with the first electronic device in advance.
- the original text includes at least one of the following: identity information; or, financial information; or, authentication information; or address information.
- the identity information includes at least one of the following: a social application account, a mobile phone number, a mailbox information, a network ID card, an ID card, a driver's license, a passport; or the financial information includes at least one of the following: a credit card, The financial card or the network account; or the authentication information includes at least one of the following: a secret key, a unique identifier, a password, a time stamp, or a random number; or the address information includes at least one of the following: a house number, an address, and Family information.
- the service request is an authentication request, a financial information access request, a payment request, or an information acquisition request.
- FIG. 2 is a flowchart of a service processing method according to an embodiment of the present invention.
- the service processing method can be applied to the first electronic device, and the method includes:
- the first ciphertext information is decrypted by using a private key of the first electronic device to obtain an original text.
- the service processing is performed based on the original information.
- verifying the digital certificate of the second electronic device includes:
- Extracting a certificate issuing system signature in the digital certificate decrypting a certificate issuing system signature in the digital certificate by using a public key of the certificate issuing system, obtaining a first information digest, performing a digest operation on the digital certificate, and obtaining a a second information digest, comparing the first information digest with the second information digest, if the same, the digital certificate is legal; and/or, downloading a certificate invalidation list from the certificate issuance system, if the second electronic device The digital certificate is in the certificate invalidation list, and then the digital certificate is determined to be illegal.
- the method further includes: receiving a signature email sent by the second electronic device, where the signature email carries the a public key of the second electronic device, the public key of the second electronic device is obtained from the signed email; or the public key of the second electronic device is queried from the certificate issuing system; or Deriving a key exchange protocol agreed between the second electronic devices to obtain a public key of the second electronic device.
- the industry is based on the original information.
- the processing includes: displaying an operation option interface when the information is determined to be correct by verification, the operation option interface is configured to provide a service processing termination option and a business processing continuation option; and selecting an option according to the user selected in the operation option interface Perform business processing with the original text of the information.
- performing service processing based on the original information includes: displaying an operation prompt interface when the information is determined to be correct by verification, the operation prompt interface is used to prompt the user
- the business process is continued by the shaking operation; if the shaking operation is detected, the business process is performed based on the original text of the information.
- FIG. 3 is a flowchart of a service processing method according to an embodiment of the present invention.
- the interaction side of the embodiment may be a first electronic device and a second electronic device, and the method specifically includes:
- the first electronic device sends a service request to the second electronic device.
- the first electronic device may be a wearable device or a mobile terminal
- the second electronic device may also be a wearable device or a mobile terminal.
- the electronic device as the service requester may be a wearable device or a mobile terminal
- the electronic device of the service request object may also be a wearable device or The mobile terminal
- the service request process may occur between two mobile terminals or wearable devices of the same type, and may also occur between the mobile terminal and the wearable device, since the device type of the requester and the request object is not limited
- the application scenario of business processing is expanded.
- the wearable device can be a Bluetooth headset, a smart bracelet, and the like.
- the service request is an authentication request, a financial information access request, a payment request, or an information acquisition request.
- the authentication request can be triggered by any usage scenario that requires the use of user identity information, such as account login, device authentication, and the like.
- the financial information access request can be triggered by any use scenario that requires the use of financial related information, and needs to be triggered, provided by mortgage, property certificate, bank account opening and the like.
- the payment request may be triggered by any usage scenario such as online payment or offline payment.
- the information acquisition request can be triggered by any information acquisition scenario, such as filling out a delivery address, an authentication scenario, and the like.
- the second electronic device receives the service request of the first electronic device, encrypting, by using the public key of the first electronic device, the original text of the information corresponding to the service request to obtain the first ciphertext information.
- the second electronic device When receiving the service request of the first electronic device, the second electronic device may be requested according to the service
- the specific service type determines the original text of the information corresponding to the service request.
- multiple types of information original texts may be stored to expand the actual application scenario of the second electronic device.
- the original text of the information includes at least one of the following:
- Identity information includes at least one of the following: a social application account, a mobile phone number, a mailbox information, a network ID card, an ID card, a driver's license, and a passport.
- Financial information including at least one of the following: a credit card, a financial card, and a network account.
- Authentication information the authentication information includes at least one of the following: a secret key, a unique identifier, a password, a time stamp, or a random number.
- Address information includes at least one of the following: a house number, an address, and family information.
- the first electronic device has its own key pair
- the key pair includes a public key and a private key
- the second electronic device may acquire the public key of the first electronic device before the step 302, based on the
- the public key is encrypted and transmitted with the first electronic device, and the obtaining process may include any one of the following methods:
- the first method is to receive a signature email sent by the first electronic device, where the signature email carries the public key of the first electronic device, and obtains the public key of the first electronic device from the signature email.
- the second way is to query and obtain the public key of the first electronic device from the certificate issuing system.
- the public key of the first electronic device is obtained through a key exchange protocol agreed with the first electronic device.
- the obtaining, by the second electronic device, the public key of the first electronic device may be acquired in the second electronic device initialization process and stored in the second electronic device for use in a subsequent process, or may be received by the first electronic device.
- the embodiment of the present invention does not specifically limit this.
- the second electronic device acquires a message digest of the original information of the information.
- the process of obtaining the information digest includes: using a SHA (Secure Hash Algorithm), a Message Digest Algorithm (MD5), and a SM3 (Hybrid Algorithm) to extract the original information. Compression, the information digest of the original information is obtained, and the hash digest algorithm can be set by the manufacturer, which is not limited by the embodiment of the present invention.
- SHA Secure Hash Algorithm
- MD5 Message Digest Algorithm
- SM3 Hybrid Algorithm
- a digital certificate can be an X.509v3 certificate with the following data structure:
- Issuer Unique Identifier (Optional) Issuer Unique ID
- its extension field can be used to load the original text of the message.
- the second electronic device encrypts the information digest by using a private key of the second electronic device to obtain a digital signature of the second electronic device.
- the private key of the first electronic device and the private key of the second electronic device are all stored in the secure encryption chip of the device. Based on the asymmetric algorithm system, in order to ensure its security, the private key can never be exported. For the device itself, Its private key can only be used in the encryption process and cannot be read by other devices.
- the second electronic device adds the digital signature to the first ciphertext information to obtain second ciphertext information.
- the process of adding the digital signature to the first ciphertext information can be regarded as a packaging process, which is not specifically limited in the embodiment of the present invention.
- the second electronic device sends the second ciphertext information and the digital certificate of the second electronic device to the first electronic device.
- the second ciphertext information is subjected to multiple encryption. Due to the unexportable characteristics of the private keys of the first electronic device and the second electronic device, even if the second ciphertext information is intercepted by other devices, the second ciphertext information cannot be intercepted. Decryption greatly improves the security of information transmission.
- the second electronic device may provide a basic device letter to the certificate issuing system when acquiring the digital certificate.
- the certificate issuing system issues a digital certificate to the second electronic device according to the basic information of the device, where the digital certificate includes a certificate issuing system signature, and the certificate issuing system signature may be information that uses the private key of the certificate issuing system to the basic information of the device.
- the abstract is encrypted.
- the first electronic device receives the digital certificate and the second ciphertext information returned by the second electronic device, where the second ciphertext information includes the first ciphertext information and the digital signature.
- the first electronic device verifies the digital certificate of the second electronic device.
- the verifying the digital certificate of the second electronic device includes any one of the following methods:
- the first electronic device may obtain the public key of the certificate issuing system from the certificate issuing system in advance to prove whether the digital certificate of the second electronic device is a certificate issued by the certificate issuing system.
- the specific process includes: extracting a certificate issuing system signature in the digital certificate, decrypting a certificate issuing system signature in the digital certificate by using a public key of the certificate issuing system, obtaining a first information digest, and summarizing the digital certificate
- the operation obtains the second information digest, and compares the first information digest with the second information digest. If they are consistent, the digital certificate is legal. If not, the digital certificate is invalid.
- the illegality can refer to the condition that the certificate expires or is revoked.
- the certificate is invalidated from the certificate issuance system, and if the digital certificate of the second electronic device is in the certificate invalidation list, it is determined that the digital certificate is invalid.
- the certificate issuing system provides a certificate invalidation list for registering the invalidated digital certificate.
- the certificate can also be deleted by downloading the certificate to know the current business. Whether the digital certificate of the requested second electronic device is legal.
- the verification of the validity of the digital certificate is mainly for verifying the legality and authenticity of the second electronic device. After the legality and authenticity are determined, the first electronic device can perform the subsequent business process.
- the first electronic device decrypts the first ciphertext information by using a private key of the first electronic device to obtain an original text.
- the first electronic device can decrypt the first ciphertext information by using its own secret key, if decrypted. If it is unsuccessful, it can be considered that the transmission is in error and an error is reported, and if the decryption is successful, the original text of the information provided by the second electronic device can be obtained.
- the first electronic device decrypts the digital signature by using a public key of the second electronic device to obtain a message digest.
- the first electronic device acquires the public key of the second electronic device
- the following method may be adopted: (1) receiving a signed email sent by the second electronic device, where the signed email carries the second electronic
- the public key of the device obtains the public key of the second electronic device from the signed email.
- (2) Querying and obtaining the public key of the second electronic device from the certificate issuing system.
- (3) acquiring a public key of the second electronic device by using a key exchange protocol agreed in advance with the second electronic device.
- the specific acquisition timing may be performed after the service request is sent, or may be performed in any stage of the initialization or operation process of the first electronic device, which is not limited by the embodiment of the present invention.
- the first electronic device verifies the original text according to the information digest.
- the above steps 310 and 311 are to verify the integrity and accuracy of the original text of the information. After verifying the legality and authenticity, it is also necessary to verify whether the original text is complete or falsified, and the verification can pass the information.
- the verification of the abstract is carried out. Since the digital signature is obtained according to the information digest, the information digest of the original information provided by the second electronic device can be obtained by decrypting the digital signature, so as to verify the original information of the first electronic device by decrypting according to the information digest. .
- the process may include: the first electronic device adopts a hash digest algorithm, obtains a digest of the information of the decrypted information original, and compares the obtained information digest with the digest of the information obtained by decrypting the digital signature. The original text of the information is verified. If the information is inconsistent, the original text of the information is not verified, no further processing is performed, and the second electronic device user can be notified.
- the first electronic device When it is determined by verification that the original information is correct, the first electronic device performs service processing based on the original information.
- the user can also be provided with the option of whether to continue the business process to avoid the wrong operation caused by some influencing factors.
- one of the following methods can be provided:
- performing service processing based on the original information includes: displaying an operation option interface when the information is determined to be correct by verification, the operation option interface is used to provide The business process termination option and the business process continuation option; the business process is performed according to the option selected by the user in the operation option interface and the original information of the information.
- the operation option interface may also include specific information of the current service processing, for example, specific information of the service request: What is the current business, the identity information of both parties to the business transaction, the interaction data (transaction amount, identity information) involved in the business, etc., only when the user confirms that the next step of processing is allowed through the option, the business processing is performed to ensure that the business is processed. That is, signed, guaranteed Information and property security. Specifically, if the confirmation operation of the service processing termination option by the user is detected, the service processing is terminated, and if the confirmation operation of the user's business processing continuation option is detected, the service processing is continued based on the original information.
- an operation prompt interface is displayed, where the operation prompt interface is used to prompt the user to continue the business processing by the shaking operation; if the shaking operation is detected, the original information is based on the information. Conduct business processing.
- the second method differs from the first method in that it does not provide specific processing options, but rather indicates what operations can be used to trigger further processing, since either the wearable device or the mobile terminal is usually configured for The dynamic sensor is detected. Therefore, the simple operation can be triggered by the shaking operation, and the next business process is triggered. If the shaking operation is not detected within the preset time period, the user may not think that the user does not want to perform the next processing. Business processing can be terminated.
- the encrypted information can be obtained by the first electronic device through the encrypted transmission with the second electronic device.
- the original information of the information so that the business processing based on the original information, does not involve any key interaction in the interaction, the private key of the electronic device itself is not exported to the device, therefore, in the process, the information security is ensured.
- the device application scenario is greatly expanded.
- the embodiment of the present invention adopts a security encryption chip of national secret authentication to save a private key, ensures the security of the private key, and can store multiple types of information original text in one electronic device for multiple usage scenarios.
- the invention realizes the diversification of the use scenarios of the electronic device, and provides an interface display mode for whether to continue the business process, avoids the error processing caused by the scenes such as misoperation or false triggering, and improves the controllability of the user for the business process. .
- FIG. 4 is a schematic structural diagram of a service processing apparatus according to an embodiment of the present invention.
- the apparatus includes:
- the receiving module 401 is configured to receive a service request of the first electronic device.
- the first encryption module 402 is configured to encrypt the original information of the service request by using the public key of the first electronic device to obtain first ciphertext information;
- a summary obtaining module 403, configured to obtain a message digest of the original text of the information
- a second encryption module 404 configured to encrypt the information digest by using a private key of the device to obtain a digital signature of the device itself;
- the processing module 405 is configured to add the digital signature to the first ciphertext information to obtain second ciphertext information;
- a sending module 406 configured to send the second ciphertext information and the digital certificate of the second electronic device to the first electronic device, so that the first electronic device is configured according to the second ciphertext information and a number a certificate, obtaining the original text of the information, and performing business processing based on the original text of the information, the digital certificate being acquired by the device itself based on the original text of the information.
- the device further includes: a public key obtaining module, configured to: receive a signed email sent by the first electronic device, where the signed email carries a public key of the first electronic device, Obtaining the public key of the first electronic device in the signed email; or querying and obtaining the public key of the first electronic device from the certificate issuing system; or, by prior agreement with the first electronic device And a key exchange protocol, acquiring a public key of the first electronic device.
- a public key obtaining module configured to: receive a signed email sent by the first electronic device, where the signed email carries a public key of the first electronic device, Obtaining the public key of the first electronic device in the signed email; or querying and obtaining the public key of the first electronic device from the certificate issuing system; or, by prior agreement with the first electronic device And a key exchange protocol, acquiring a public key of the first electronic device.
- the original text includes at least one of the following: identity information; or, financial information; or, authentication information; or address information.
- the identity information includes at least one of the following: a social application account, a mobile phone number, a mailbox information, a network ID card, an ID card, a driver's license, a passport; or the financial information includes at least one of the following: a credit card, The financial card or the network account; or the authentication information includes at least one of the following: a secret key, a unique identifier, a password, a time stamp, or a random number; or the address information includes at least one of the following: a house number, an address, and Family information.
- the service request is an authentication request, a financial information access request, a payment request, or an information acquisition request.
- FIG. 5 is a schematic structural diagram of a service processing apparatus according to an embodiment of the present invention.
- the apparatus includes:
- the sending module 501 is configured to send a service request to the second electronic device, and receive the digital certificate and the second ciphertext information returned by the second electronic device, where the second ciphertext information includes the first ciphertext information and the digital signature. ;
- the first verification module 502 is configured to verify the digital certificate of the second electronic device
- a first decryption module 503 configured to decrypt the first ciphertext information by using a private key of the device itself to obtain an original text of the information when it is determined that the digital certificate of the second electronic device is legal by verification;
- the second decryption module 504 is configured to decrypt the digital signature by using a public key of the second electronic device to obtain a message digest
- a second verification module 505, configured to verify the original information according to the information digest
- the service processing module 506 is configured to perform service processing based on the original information when the information is determined to be correct by verification.
- the first verification module 502 is configured to:
- Extracting a certificate issuing system signature in the digital certificate decrypting a certificate issuing system signature in the digital certificate by using a public key of the certificate issuing system, obtaining a first information digest, performing a digest operation on the digital certificate, and obtaining a The second information digest compares the first information digest with the second information digest, and if they are consistent, the digital certificate is legal;
- the device further includes a public key obtaining module, where the public key obtaining module is configured to:
- the device further includes:
- a first display module configured to: when determining that the original text of the information is correct by verification, displaying an operation option interface, where the operation option interface is configured to provide a service processing termination option and a service processing continuation option;
- the service processing module is configured to perform service processing according to an option selected by the user in the operation option interface and the original information of the information.
- the device further includes:
- a second display module configured to: when the information is correct by the verification, the operation prompt interface is displayed, where the operation prompt interface is used to prompt the user to continue the service processing by using a shaking operation;
- the service processing module is configured to perform service processing based on the original information if the shaking operation is detected.
- the service processing device provided by the foregoing embodiment is only illustrated by the division of each functional module. In actual applications, the function distribution may be completed by different functional modules as needed. The internal structure of the device is divided into different functional modules to complete All or part of the functions described above.
- the service processing device and the service processing method embodiment provided in the foregoing embodiments are in the same concept, and the specific implementation process is described in detail in the method embodiment, and details are not described herein again.
- the electronic device 600 includes:
- the electronic device 600 may include an RF (Radio Frequency) circuit 110, a memory 120 including one or more computer readable storage media, an input unit 130, a display unit 140, a sensor 150, an audio circuit 160, and a WiFi (Wireless Fidelity,
- the Wireless Fidelity module 170 includes a processor 180 having one or more processing cores, and a power supply 190 and the like. It will be understood by those skilled in the art that the electronic device structure illustrated in FIG. 6 does not constitute a limitation on the electronic device, and may include more or less components than those illustrated, or a combination of certain components, or different component arrangements. among them:
- the RF circuit 110 can be used for transmitting and receiving information or during a call, and receiving and transmitting signals. Specifically, after receiving downlink information of the base station, the downlink information is processed by one or more processors 180. In addition, the data related to the uplink is sent to the base station. .
- the RF circuit 110 includes, but is not limited to, an antenna, at least one amplifier, a tuner, one or more oscillators, a Subscriber Identity Module (SIM) card, a transceiver, a coupler, an LNA (Low Noise Amplifier). , duplexer, etc.
- RF circuitry 110 can also communicate with the network and other devices via wireless communication.
- the wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System of Mobile communication), GPRS (General Packet Radio Service), CDMA (Code Division Multiple Access). , Code Division Multiple Access), WCDMA (Wideband Code Division Multiple Access), LTE (Long Term Evolution), e-mail, SMS (Short Messaging Service), and the like.
- GSM Global System of Mobile communication
- GPRS General Packet Radio Service
- CDMA Code Division Multiple Access
- WCDMA Wideband Code Division Multiple Access
- LTE Long Term Evolution
- e-mail Short Messaging Service
- the memory 120 can be used to store software programs and modules, and the processor 180 executes various functional applications and data processing by running software programs and modules stored in the memory 120.
- the memory 120 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to The data created by the use of the electronic device 600 (such as audio data, phone book, etc.) and the like.
- the memory 120 may include a high speed random access memory, and may also include non-easy Loss memory, such as at least one disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, memory 120 may also include a memory controller to provide access to memory 120 by processor 180 and input unit 130.
- the input unit 130 can be configured to receive input numeric or character information and to generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function controls.
- input unit 130 can include touch-sensitive surface 131 as well as other input devices 132.
- Touch-sensitive surface 131 also referred to as a touch display or trackpad, can collect touch operations on or near the user (such as a user using a finger, stylus, etc., on any suitable object or accessory on touch-sensitive surface 131 or The operation near the touch-sensitive surface 131) and driving the corresponding connecting device according to a preset program.
- the touch-sensitive surface 131 can include two portions of a touch detection device and a touch controller.
- the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
- the processor 180 is provided and can receive commands from the processor 180 and execute them.
- the touch-sensitive surface 131 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves.
- the input unit 130 can also include other input devices 132.
- other input devices 132 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
- the display unit 140 can be used to display information entered by the user or information provided to the user and various graphical user interfaces of the electronic device 600, which can be composed of graphics, text, icons, video, and any combination thereof.
- the display unit 140 may include a display panel 141.
- the display panel 141 may be configured in the form of an LCD (Liquid Crystal Display), an OLED (Organic Light-Emitting Diode), or the like.
- the touch-sensitive surface 131 may cover the display panel 141, and when the touch-sensitive surface 131 detects a touch operation thereon or nearby, it is transmitted to the processor 180 to determine the type of the touch event, and then the processor 180 according to the touch event The type provides a corresponding visual output on display panel 141.
- touch-sensitive surface 131 and display panel 141 are implemented as two separate components to implement input and input functions, in some embodiments, touch-sensitive surface 131 can be integrated with display panel 141 for input. And output function.
- Electronic device 600 may also include at least one type of sensor 150, such as a light sensor, motion sensor, and other sensors.
- the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 141 according to the brightness of the ambient light, and the proximity sensor may close the display panel 141 when the electronic device 600 moves to the ear.
- Motion sensing A kind of gravity accelerometer can detect the acceleration of each direction (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity.
- the electronic device 600 can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
- the audio circuit 160, the speaker 161, and the microphone 162 can provide an audio interface between the user and the electronic device 600.
- the audio circuit 160 can transmit the converted electrical data of the received audio data to the speaker 161 for conversion to the sound signal output by the speaker 161; on the other hand, the microphone 162 converts the collected sound signal into an electrical signal by the audio circuit 160. After receiving, it is converted into audio data, and then processed by the audio data output processor 180, transmitted to the electronic device, for example, by the RF circuit 110, or outputted to the memory 120 for further processing.
- the audio circuit 160 may also include an earbud jack to provide communication of the peripheral earphones with the electronic device 600.
- WiFi is a short-range wireless transmission technology
- the electronic device 600 can help users to send and receive emails, browse web pages, and access streaming media through the WiFi module 170, which provides wireless broadband Internet access for users.
- FIG. 6 shows the WiFi module 170, it can be understood that it does not belong to the essential configuration of the electronic device 600, and may be omitted as needed within the scope of not changing the essence of the invention.
- the processor 180 is a control center of the electronic device 600 that connects various portions of the entire handset with various interfaces and lines, by running or executing software programs and/or modules stored in the memory 120, and recalling data stored in the memory 120.
- the various functions and processing data of the electronic device 600 are executed to perform overall monitoring of the mobile phone.
- the processor 180 may include one or more processing cores; preferably, the processor 180 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, and the like.
- the modem processor primarily handles wireless communications. It can be understood that the above modem processor may not be integrated into the processor 180.
- the electronic device 600 also includes a power source 190 (such as a battery) for powering various components.
- the power source can be logically coupled to the processor 180 through a power management system to manage functions such as charging, discharging, and power management through the power management system.
- Power supply 190 may also include any one or more of a DC or AC power source, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like.
- the electronic device 600 may further include a camera, a Bluetooth module, and the like, and details are not described herein.
- the display unit of the electronic device is a touch screen display, and the electronic device further includes A memory is included, and one or more programs, one or more of which are stored in a memory and configured to be executed by one or more processors.
- the one or more programs include instructions for performing operations performed by the first electronic device or the second electronic device described above.
- a person skilled in the art may understand that all or part of the steps of implementing the above embodiments may be completed by hardware, or may be instructed by a program to execute related hardware, and the program may be stored in a computer readable storage medium.
- the storage medium mentioned may be a read only memory, a magnetic disk or an optical disk or the like.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephone Function (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
本发明公开了一种业务处理方法及电子设备,属于终端技术领域。本发明通过在第二电子设备中提供用于执行业务操作的信息原文,使得在第一电子设备需要进行业务处理时,可以通过与第二电子设备之间的加密传输,获取到由第一电子设备提供的信息原文,从而基于信息原文进行业务处理,在交互中不涉及任何密钥的交互,电子设备自身的私钥不会导出到设备外,因此,在该过程中,在保证了信息安全性的同时,大大扩展了设备应用场景。
Description
本申请要求于2015年9月8日提交中国专利局、申请号为2015105679545、发明名称为“业务处理方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本发明涉及终端技术领域,特别涉及一种业务处理方法及电子设备。
随着终端技术的发展,终端上能够实现的功能越来越多,用户可以使用终端进行各种日常活动,其中最重要的一项是涉及到金融业务的移动支付,随着全民抢红包等业务的开展,手机等终端作为一种随身随时的付款收款工具已经为大众所广为接受。
在移动支付等业务处理过程中,为了保证用户隐私和财产的安全性,涉及到对当前执行操作的用户身份的验证过程。例如,利用可穿戴设备的便携特性,可以采用可穿戴设备与支付终端进行信息交互,由可穿戴设备提供一个用于标识用户的唯一标识,以验证当前执行支付操作的确实为用户本人,从而在无需输入密码的前提下,即可以安全的实现支付过程。
在实现本发明的过程中,发明人发现上述技术至少存在以下问题:
上述业务处理过程中,可穿戴设备仅能够起到提供用户身份的功能,用以验证当前执行操作的用户确实为用户本人,其实现功能单一,应用场景较少,适用性差。
发明内容
为了解决上述技术所存在的问题,本发明实施例提供了一种业务处理方法及电子设备。所述技术方案如下:
第一方面,本发明实施例提供了一种业务处理方法,应用于第二电子设备中,所述方法包括:
接收第一电子设备的业务请求;
采用所述第一电子设备的公钥对所述业务请求对应的信息原文进行加密,得到第一密文信息;
获取所述信息原文的信息摘要;
采用所述第二电子设备的私钥对所述信息摘要进行加密,得到所述第二电子设备的数字签名;
将所述数字签名加入至所述第一密文信息,得到第二密文信息;
将所述第二密文信息和所述第二电子设备的数字证书发送至所述第一电子设备,使得所述第一电子设备根据所述第二密文信息和数字证书,获取所述第二电子设备的信息原文,并基于所述信息原文进行业务处理,所述数字证书由所述第二电子设备基于所述信息原文获取。
第二方面,本发明实施例提供了一种业务处理方法,应用于第一电子设备中,所述方法包括:
向第二电子设备发送业务请求,并接收所述第二电子设备返回的数字证书和第二密文信息,所述第二密文信息包括第一密文信息和数字签名;
对所述第二电子设备的数字证书进行验证;
当通过验证确定所述第二电子设备的数字证书合法时,采用所述第一电子设备的私钥对所述第一密文信息进行解密,得到信息原文;
采用所述第二电子设备的公钥对所述数字签名进行解密,得到信息摘要;
根据所述信息摘要对所述信息原文进行验证;
当通过验证确定所述信息原文正确时,基于所述信息原文进行业务处理。
第三方面,本发明实施例提供了一种业务处理装置,所述装置包括:
接收模块,用于接收第一电子设备的业务请求;
第一加密模块,用于采用所述第一电子设备的公钥对所述业务请求对应的信息原文进行加密,得到第一密文信息;
摘要获取模块,用于获取所述信息原文的信息摘要;
第二加密模块,用于采用设备自身的私钥对所述信息摘要进行加密,得到所述设备自身的数字签名;
处理模块,用于将所述数字签名加入至所述第一密文信息,得到第二密文
信息;
发送模块,用于将所述第二密文信息和所述第二电子设备的数字证书发送至所述第一电子设备,使得所述第一电子设备根据所述第二密文信息和数字证书,获取所述信息原文,并基于所述信息原文进行业务处理,所述数字证书由所述设备自身基于所述信息原文获取。
第四方面,本发明实施例提供了一种业务处理装置,所述装置包括:
发送模块,用于向第二电子设备发送业务请求,并接收所述第二电子设备返回的数字证书和第二密文信息,所述第二密文信息包括第一密文信息和数字签名;
第一验证模块,用于对所述第二电子设备的数字证书进行验证;
第一解密模块,用于当通过验证确定所述第二电子设备的数字证书合法时,采用设备自身的私钥对所述第一密文信息进行解密,得到信息原文;
第二解密模块,用于采用所述第二电子设备的公钥对所述数字签名进行解密,得到信息摘要;
第二验证模块,用于根据所述信息摘要对所述信息原文进行验证;
业务处理模块,用于当通过验证确定所述信息原文正确时,基于所述信息原文进行业务处理。
第五方面,提供了一种电子设备,所述电子设备包括:
一个或多个处理器;和,
存储器;
所述存储器存储有一个或多个程序,所述一个或多个程序被配置成由所述一个或多个处理器执行,所述一个或多个程序包含用于进行以下操作的指令:
接收第一电子设备的业务请求;
采用所述第一电子设备的公钥对所述业务请求对应的信息原文进行加密,得到第一密文信息;
获取所述信息原文的信息摘要;
采用电子设备自身的私钥对所述信息摘要进行加密,得到所述电子设备自身的数字签名;
将所述数字签名加入至所述第一密文信息,得到第二密文信息;
将所述第二密文信息和所述电子设备自身的数字证书发送至所述第一电子设备,使得所述第一电子设备根据所述第二密文信息和数字证书,获取所述
第二电子设备的信息原文,并基于所述信息原文进行业务处理,所述数字证书由证书颁发系统颁发。
第六方面,提供了一种电子设备,所述电子设备包括:
一个或多个处理器;和,
存储器;
所述存储器存储有一个或多个程序,所述一个或多个程序被配置成由所述一个或多个处理器执行,所述一个或多个程序包含用于进行以下操作的指令:
向第二电子设备发送业务请求,并接收所述第二电子设备返回的数字证书和第二密文信息,所述第二密文信息包括第一密文信息和数字签名;
对所述第二电子设备的数字证书进行验证;
当通过验证确定所述第二电子设备的数字证书合法时,采用电子设备自身的私钥对所述第一密文信息进行解密,得到信息原文;
采用所述第二电子设备的公钥对所述数字签名进行解密,得到信息摘要;
根据所述信息摘要对所述信息原文进行验证;
当通过验证确定所述信息原文正确时,基于所述信息原文进行业务处理。
本发明实施例提供的技术方案带来的有益效果是:
通过在第二电子设备中提供用于执行业务操作的信息原文,使得在第一电子设备需要进行业务处理时,可以通过与第二电子设备之间的加密传输,获取到由第一电子设备提供的信息原文,从而基于信息原文进行业务处理,在交互中不涉及任何密钥的交互,电子设备自身的私钥不会导出到设备外,因此,在该过程中,在保证了信息安全性的同时,大大扩展了设备应用场景。
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本发明实施例提供的一种业务处理方法的流程图;
图2是本发明实施例提供的一种业务处理方法的流程图;
图3是本发明实施例提供的一种业务处理方法的流程图;
图4是本发明实施例提供的一种业务处理装置的结构示意图;
图5是本发明实施例提供的一种业务处理装置的结构示意图;
图6是本发明实施例提供的一种电子设备的结构示意图。
为使本发明的目的、技术方案和优点更加清楚,下面将结合附图对本发明实施方式作进一步地详细描述。
下面对本发明实施例的使用场景进行介绍:
PKI(公钥基础设施,Public Key Infrastructure)是以非对称密匙加密技术为基础,以数据机密性、完整性、身份认证和行为不可抵赖性为安全目的,来实施和提供安全服务的具有普适性的安全基础设施。其内容包括数字证书、非对称密钥密码技术、认证中心、证书和密钥的管理、安全代理软件、不可否认性服务、时间戳服务、相关信息标准、操作规范等。PKI是一种普遍适用的网络安全基础设施。一些美国学者把提供全面安全服务的基础设施,包括软件、硬件、人和策略的集合叫做PKI。
1、技术特征。PKI通过延伸到用户本地的接口为各种应用提供安全服务,包括认证、身份识别、数字签名、加密等。一方面,作为基础设施,PKI与使用PKI的应用系统是分离的,因此具有“公用”的特性;另一方面,离开PKI应用系统,PKI本身没有任何用处。正是这种基础设施的特性使PKI系统的设计和开发效率大大提高,因为PKI系统的设计、开发、生产及管理都可以独立地进行,不需要考虑应用的特殊性。
2、结构体系。数字证书是PKI中最基本的元素,所有安全操作都主要通过证书来实现。PKI的部件还包括签署这些证书的认证机构(CA)、登记和批准证书签署的登记机构(RA)以及存储和发布这些证书的电子目录。除此之外,PKI中还包括证书策略、证书路径、证书的使用者等。所有这些都是PKI的基本部件,它们有机地结合在一起就构成了PKI。在网络通信和网络交易中,特别是在电子商务和电子政务业务中,最需要的安全保证包括四个方面:身份标识和认证、保密或隐私、数据完整性与不可否认。
3、服务体系。它所提供的服务主要包括以下几方面:
(1)在网络通信和网络交易中,特别是在电子商务和电子政务业务中,最需要的安全保证包括四个方面:身份标识和认证、保密或隐私、数据完整性与不可否认。
(2)PKI的安全包括太多的方面,包括设备安全、运行安全、协议安全等。其中,算法安全最受关注,因为它是PKI安全的理论基础。
(3)PKI所依赖的是非对称算法。在非对称算法中,如果已知公钥(Public Key),那么在理论上就可以求出私钥(Private Key)。
图1是本发明实施例提供的一种业务处理方法的流程图。该业务处理方法可以应用于第二电子设备中,所述方法包括:
101、接收第一电子设备的业务请求。
102、采用所述第一电子设备的公钥对所述业务请求对应的信息原文进行加密,得到第一密文信息。
103、获取所述信息原文的信息摘要。
104、采用所述第二电子设备的私钥对所述信息摘要进行加密,得到所述第二电子设备的数字签名。
105、将所述数字签名加入至所述第一密文信息,得到第二密文信息。
106、将所述第二密文信息和所述第二电子设备的数字证书发送至所述第一电子设备,使得所述第一电子设备根据所述第二密文信息和数字证书,获取所述第二电子设备的信息原文,并基于所述信息原文进行业务处理,所述数字证书由所述第二电子设备基于所述信息原文获取。
可选地,所述采用所述第一电子设备的公钥对所述业务请求对应的信息原文进行加密,得到第一密文信息之前,所述方法还包括:接收第一电子设备发送的签名邮件,所述签名邮件携带所述第一电子设备的公钥,从所述签名邮件中获取所述第一电子设备的公钥;或,从证书颁发系统上查询并获取所述第一电子设备的公钥;或,通过与所述第一电子设备之间事先约定的密钥交换协议,获取所述第一电子设备的公钥。
可选地,所述信息原文包括以下至少一项:身份信息;或,金融信息;或,认证信息;或,地址信息。
可选地,所述身份信息包括以下至少一项:社交应用账号、手机号码、邮箱信息、网络身份证、身份证、驾驶证、护照;或,所述金融信息包括以下至少一项:信用卡、金融卡、网络账户;或,所述认证信息包括以下至少一项:秘钥、唯一标识、口令、时间戳或随机数等;或,所述地址信息包括以下至少一项:门牌号、地址和家庭信息。
可选地,所述业务请求为身份验证请求、金融信息访问请求、支付请求或信息获取请求。
上述所有可选技术方案,可以采用任意结合形成本公开的可选实施例,在此不再一一赘述。
图2是本发明实施例提供的一种业务处理方法的流程图。该业务处理方法可以应用于第一电子设备中,所述方法包括:
201、向第二电子设备发送业务请求,并接收所述第二电子设备返回的数字证书和第二密文信息,所述第二密文信息包括第一密文信息和数字签名。
202、对所述第二电子设备的数字证书进行验证。
203、当通过验证确定所述第二电子设备的数字证书合法时,采用所述第一电子设备的私钥对所述第一密文信息进行解密,得到信息原文。
204、采用所述第二电子设备的公钥对所述数字签名进行解密,得到信息摘要。
205、根据所述信息摘要对所述信息原文进行验证。
206、当通过验证确定所述信息原文正确时,基于所述信息原文进行业务处理。
可选地,对所述第二电子设备的数字证书进行验证包括:
提取所述数字证书中的证书颁发系统签名,通过证书颁发系统的公钥,对所述数字证书中证书颁发系统签名进行解密,得到第一信息摘要,对所述数字证书进行摘要运算,得到第二信息摘要,将所述第一信息摘要与第二信息摘要进行比对,如果一致,则所述数字证书合法;和/或,从证书颁发系统下载证书作废列表,如果所述第二电子设备的数字证书在所述证书作废列表中,则确定所述数字证书不合法。
可选地,采用所述第二电子设备的公钥对所述数字签名进行解密,得到信息摘要之前,所述方法还包括:接收第二电子设备发送的签名邮件,所述签名邮件携带所述第二电子设备的公钥,从所述签名邮件中获取所述第二电子设备的公钥;或,从证书颁发系统上查询并获取所述第二电子设备的公钥;或,通过与所述第二电子设备之间事先约定的密钥交换协议,获取所述第二电子设备的公钥。
可选地,当通过验证确定所述信息原文正确时,基于所述信息原文进行业
务处理包括:当通过验证确定所述信息原文正确时,显示操作选项界面,所述操作选项界面用于提供业务处理终止选项和业务处理继续选项;根据用户在所述操作选项界面所选中的选项和所述信息原文进行业务处理。
可选地,当通过验证确定所述信息原文正确时,基于所述信息原文进行业务处理包括:当通过验证确定所述信息原文正确时,显示操作提示界面,所述操作提示界面用于提示用户通过摇晃操作继续进行业务处理;如果检测到摇晃操作,则基于所述信息原文进行业务处理。
上述所有可选技术方案,可以采用任意结合形成本公开的可选实施例,在此不再一一赘述。
图3是本发明实施例提供的一种业务处理方法的流程图。参见图3,该实施例的交互侧可以为第一电子设备、第二电子设备,该方法具体包括:
301、第一电子设备向第二电子设备发送业务请求。
对于本发明实施例来说,第一电子设备即可以为可穿戴设备,也可以为移动终端,而第二电子设备也可以为可穿戴设备或移动终端,本发明实施例对电子设备的具体类型不作限定。也即是,本发明实施例所提供的技术方案中,作为业务请求方的电子设备即可以为可穿戴设备,也可以为移动终端,而其业务请求对象的电子设备也可以为可穿戴设备或移动终端,该业务请求过程可发生于两个相同类型的移动终端或可穿戴设备之间,还可以发生于移动终端和可穿戴设备之间,由于不限制请求方和请求对象的设备类型,大大扩展了业务处理的应用场景。其中,该可穿戴设备可以为蓝牙耳机、智能手环等设备。
需要说明的是,该业务请求为身份验证请求、金融信息访问请求、支付请求或信息获取请求。(1)身份验证请求可以由任一需要使用用户身份信息的使用场景触发,例如,账号登录、设备身份验证等等。(2)金融信息访问请求可以由任一需要使用金融相关信息的使用场景触发,需要支付、提供抵押、财产证明、银行开户等使用场景触发。(3)该支付请求可以由线上支付或线下支付等任一使用场景触发。(4)信息获取请求可以由任一种信息获取场景触发,如需要填写收货地址、认证场景等等。
302、当第二电子设备接收到第一电子设备的业务请求,采用该第一电子设备的公钥对该业务请求对应的信息原文进行加密,得到第一密文信息。
第二电子设备在接收到第一电子设备的业务请求时,可以根据业务请求的
具体业务类型,确定该业务请求对应的信息原文。对于第二电子设备来说,可以存储有多种类型的信息原文,以扩展该第二电子设备的实际应用场景。可选地,该信息原文包括以下至少一项:
(1)身份信息,该身份信息包括以下至少一项:社交应用账号、手机号码、邮箱信息、网络身份证、身份证、驾驶证、护照。(2)金融信息,该金融信息包括以下至少一项:信用卡、金融卡、网络账户。(3)认证信息,该认证信息包括以下至少一项:秘钥、唯一标识、口令、时间戳或随机数等。(4)地址信息。该地址信息包括以下至少一项:门牌号、地址和家庭信息。
需要说明的是,第一电子设备具有自身的密钥对,该密钥对包括公钥和私钥,而第二电子设备可以在该步骤302之前获取第一电子设备的公钥,以基于该公钥与第一电子设备进行加密传输,其获取过程可以包括下述任一种方式:
第一种方式、接收第一电子设备发送的签名邮件,该签名邮件携带该第一电子设备的公钥,从该签名邮件中获取该第一电子设备的公钥。
第二种方式、从证书颁发系统上查询并获取该第一电子设备的公钥。
第三种方式、通过与该第一电子设备之间事先约定的密钥交换协议,获取该第一电子设备的公钥。
第二电子设备获取该第一电子设备的公钥可以是在第二电子设备初始化过程中获取并存储于第二电子设备中,以在后续过程中直接使用,也可以是在接收到第一电子设备的业务请求后实时获取,本发明实施例对此不作具体限定。
303、第二电子设备获取该信息原文的信息摘要。
其中,该获取信息摘要的过程包括:采用SHA(Secure Hash Algorithm,安全哈希算法)、MD5(Message Digest Algorithm,消息摘要算法第五版)、SM3(杂凑算法)等哈希摘要算法对信息原文压缩,得到信息原文的信息摘要,具体采用哪种哈希摘要算法可以由厂商设置,本发明实施例对此不做限定。
另外,需要说明的是,该信息原文可以加载于数字证书的附加字段中,也可以在设备的指定安全区域中单独存储。例如,数字证书可以为X.509v3证书,其数据结构如下:
Certificate证书
Version版本
Serial Number序列号
Algorithm ID算法标识
Issuer颁发者
Validity有效期
Not Before有效起始日期
NotAfter有效终止日期
Subject使用者
Subject Public Key Info使用者公钥信息
Public Key Algorithm公钥算法
Subject Public Key公钥
Issuer Unique Identifier(Optional)颁发者唯一标识
Subject Unique Identifier(Optional)使用者唯一标识
Extensions(Optional)扩展
...
Certificate Signature Algorithm证书签名算法
Certificate Signature证书签名
相应地,基于上述数据结构,其扩展字段可以用于加载信息原文。
304、第二电子设备采用该第二电子设备的私钥对该信息摘要进行加密,得到该第二电子设备的数字签名。
该第一电子设备的私钥以及第二电子设备的私钥均存储于设备的安全加密芯片中,基于非对称算法体系,为了保证其安全性,私钥永不可导出,对于设备自身来说,其私钥也仅能够在加密过程中使用,而不能够被其他设备读取。
305、第二电子设备将该数字签名加入至该第一密文信息,得到第二密文信息。
该将数字签名加入第一密文信息的过程可以看做是一个打包过程,本发明实施例对此不作具体限定。
306、第二电子设备将该第二密文信息和该第二电子设备的数字证书发送至该第一电子设备。
此时,该第二密文信息经过了多重加密,由于第一电子设备和第二电子设备的私钥的不可导出的特性,使得即使该第二密文信息被其他设备截取,也无法对其进行解密,大大提高了信息传输的安全性。
第二电子设备在获取数字证书时,可以向证书颁发系统提供设备基本信
息,由证书颁发系统根据该设备基本信息为第二电子设备颁发数字证书,该数字证书中包括证书颁发系统签名,该证书颁发系统签名可以是采用证书颁发系统的私钥对设备基本信息的信息摘要进行加密得到。
307、第一电子设备接收该第二电子设备返回的数字证书和第二密文信息,该第二密文信息包括第一密文信息和数字签名。
308、第一电子设备对该第二电子设备的数字证书进行验证。
具体地,该对所述第二电子设备的数字证书进行验证包括以下任一种方式:
第一种方式、第一电子设备可以从证书颁发系统事先获取该证书颁发系统的公钥,以证明第二电子设备的数字证书是否为该证书颁发系统所颁发的证书。具体过程包括:提取所述数字证书中的证书颁发系统签名,通过证书颁发系统的公钥,对所述数字证书中证书颁发系统签名进行解密,得到第一信息摘要,对所述数字证书进行摘要运算,得到第二信息摘要,将所述第一信息摘要与第二信息摘要进行比对,如果一致,则所述数字证书合法,如果不一致,则该数字证书不合法。该不合法可以是指证书过期或是被吊销等情况。
第二种方式、从证书颁发系统下载证书作废列表,如果所述第二电子设备的数字证书在所述证书作废列表中,则确定所述数字证书不合法。
而对于一些证书颁发系统来说,该证书颁发系统会提供证书作废列表,用于登记已作废的数字证书,则对于第一电子设备来说,还可以通过下载证书作废列表,以获知当前进行业务请求的第二电子设备的数字证书是否合法。
上述对数字证书合法与否的验证,主要是为了验证第二电子设备的合法性与真实性,在合法性和真实性均得以确定后,则第一电子设备可以进行后续的业务处理过程。
309、当通过验证确定该第二电子设备的数字证书合法时,第一电子设备采用该第一电子设备的私钥对该第一密文信息进行解密,得到信息原文。
由于第一密文信息在第二电子设备侧进行加密时所使用的是第一电子设备的公钥,因此,第一电子设备可以采用自身的秘钥对第一密文信息进行解密,如果解密不成功,可以认为传输出错并进行报错,而如果解密成功,则可以得到第二电子设备所提供的信息原文。
310、第一电子设备采用该第二电子设备的公钥对该数字签名进行解密,得到信息摘要。
需要说明的是,第一电子设备获取第二电子设备的公钥时,可以采用以下任一种方式:(1)接收第二电子设备发送的签名邮件,所述签名邮件携带所述第二电子设备的公钥,从所述签名邮件中获取所述第二电子设备的公钥。(2)从证书颁发系统上查询并获取所述第二电子设备的公钥。(3)通过与所述第二电子设备之间事先约定的密钥交换协议,获取所述第二电子设备的公钥。其具体获取时机可以在发送业务请求之后进行,也可以在第一电子设备初始化或运行过程的任一个阶段中进行,本发明实施例对此不做限定。
311、第一电子设备根据该信息摘要对该信息原文进行验证。
上述步骤310和311是对信息原文的完整性和准确性进行验证,在进行了合法性和真实性的验证后,还需要对信息原文是否完整或是否被篡改进行验证,该验证可以通过对信息摘要的验证进行。由于数字签名是根据信息摘要获取到的,因此,可以通过解密数字签名,得到第二电子设备提供的信息原文的信息摘要,从而根据该信息摘要对第一电子设备通过解密得到的信息原文进行验证。具体地,该过程可以包括:第一电子设备采用哈希摘要算法,获取解密得到的信息原文的信息摘要,将所得信息摘要和通过数字签名解密得到的信息摘要进行比对,如果一致,则该信息原文验证通过,如果不一致,则该信息原文验证不通过,不再进行后续处理,并可以对第二电子设备用户进行报错。
312、当通过验证确定该信息原文正确时,第一电子设备基于该信息原文进行业务处理。
为了提高业务处理的安全性和可控性,还可以为用户提供是否继续进行业务处理的选择,以避免由于一些影响因素造成的错误操作,为此,可以提供以下任一种方式:
第一种方式、当通过验证确定所述信息原文正确时,基于所述信息原文进行业务处理包括:当通过验证确定所述信息原文正确时,显示操作选项界面,所述操作选项界面用于提供业务处理终止选项和业务处理继续选项;根据用户在所述操作选项界面所选中的选项和所述信息原文进行业务处理。
在实际场景中,为了避免对数据的恶意篡改,需要在执行实际业务处理之前,为用户提供操作选项界面,该操作选项界面还可以包括当前业务处理的具体信息,例如,业务请求的具体信息:当前是什么业务,业务交易双方的身份信息、业务涉及到的交互数据(交易金额、身份信息)等,仅在用户通过选项确认了允许继续下一步处理时,才进行业务处理,以保证所见即所签,保证了
信息和财产的安全。具体地,如果检测到用户对业务处理终止选项的确认操作,则终止业务处理,如果检测到用户的业务处理继续选项的确认操作,则继续基于该信息原文进行业务处理。
第二种方式、当通过验证确定所述信息原文正确时,显示操作提示界面,所述操作提示界面用于提示用户通过摇晃操作继续进行业务处理;如果检测到摇晃操作,则基于所述信息原文进行业务处理。
该第二种方式与第一种方式的不同之处在于,并未提供具体处理选项,而是提示了可以采用什么操作触发进一步处理,由于无论是可穿戴设备还是移动终端,通常都配置有用于检测动态的传感器,因此,可以通过摇晃操作这种简单易行的操作,触发下一步业务处理,如果在预设时长内未检测到摇晃操作,也可以认为用户不希望进行下一步的处理,则可以终止业务处理。
通过在第二电子设备中提供用于执行业务操作的信息原文,使得在第一电子设备需要进行业务处理时,可以通过与第二电子设备之间的加密传输,获取到由第一电子设备提供的信息原文,从而基于信息原文进行业务处理,在交互中不涉及任何密钥的交互,电子设备自身的私钥不会导出到设备外,因此,在该过程中,在保证了信息安全性的同时,大大扩展了设备应用场景。进一步地,本发明实施例采用了国密认证的安全加密芯片以保存私钥,保证了私钥的安全性,且可以在一个电子设备中存储多个类型的信息原文,用于多种使用场景,实现了电子设备使用场景的多样化,并且,提供了是否继续进行业务处理的界面显示方式,避免由于误操作或误触发等场景造成的错误处理,也提高了用户对业务处理的可控性。
图4是本发明实施例提供的一种业务处理装置的结构示意图,参见图4,所述装置包括:
接收模块401,用于接收第一电子设备的业务请求;
第一加密模块402,用于采用所述第一电子设备的公钥对所述业务请求对应的信息原文进行加密,得到第一密文信息;
摘要获取模块403,用于获取所述信息原文的信息摘要;
第二加密模块404,用于采用设备自身的私钥对所述信息摘要进行加密,得到所述设备自身的数字签名;
处理模块405,用于将所述数字签名加入至所述第一密文信息,得到第二密文信息;
发送模块406,用于将所述第二密文信息和所述第二电子设备的数字证书发送至所述第一电子设备,使得所述第一电子设备根据所述第二密文信息和数字证书,获取所述信息原文,并基于所述信息原文进行业务处理,所述数字证书由所述设备自身基于所述信息原文获取。
可选地,所述装置还包括公钥获取模块,所述公钥获取模块用于:接收第一电子设备发送的签名邮件,所述签名邮件携带所述第一电子设备的公钥,从所述签名邮件中获取所述第一电子设备的公钥;或,从证书颁发系统上查询并获取所述第一电子设备的公钥;或,通过与所述第一电子设备之间事先约定的密钥交换协议,获取所述第一电子设备的公钥。
可选地,所述信息原文包括以下至少一项:身份信息;或,金融信息;或,认证信息;或,地址信息。
可选地,所述身份信息包括以下至少一项:社交应用账号、手机号码、邮箱信息、网络身份证、身份证、驾驶证、护照;或,所述金融信息包括以下至少一项:信用卡、金融卡、网络账户;或,所述认证信息包括以下至少一项:秘钥、唯一标识、口令、时间戳或随机数等;或,所述地址信息包括以下至少一项:门牌号、地址和家庭信息。
可选地,所述业务请求为身份验证请求、金融信息访问请求、支付请求或信息获取请求。
上述所有可选技术方案,可以采用任意结合形成本公开的可选实施例,在此不再一一赘述。
图5是本发明实施例提供的一种业务处理装置的结构示意图。参见图5,所述装置包括:
发送模块501,用于向第二电子设备发送业务请求,并接收所述第二电子设备返回的数字证书和第二密文信息,所述第二密文信息包括第一密文信息和数字签名;
第一验证模块502,用于对所述第二电子设备的数字证书进行验证;
第一解密模块503,用于当通过验证确定所述第二电子设备的数字证书合法时,采用设备自身的私钥对所述第一密文信息进行解密,得到信息原文;
第二解密模块504,用于采用所述第二电子设备的公钥对所述数字签名进行解密,得到信息摘要;
第二验证模块505,用于根据所述信息摘要对所述信息原文进行验证;
业务处理模块506,用于当通过验证确定所述信息原文正确时,基于所述信息原文进行业务处理。
可选地,所述第一验证模块502用于:
提取所述数字证书中的证书颁发系统签名,通过证书颁发系统的公钥,对所述数字证书中证书颁发系统签名进行解密,得到第一信息摘要,对所述数字证书进行摘要运算,得到第二信息摘要,将所述第一信息摘要与第二信息摘要进行比对,如果一致,则所述数字证书合法;
和/或,
从证书颁发系统下载证书作废列表,如果所述第二电子设备的数字证书在所述证书作废列表中,则确定所述数字证书不合法。
可选地,所述装置还包括公钥获取模块,所述公钥获取模块用于:
接收第二电子设备发送的签名邮件,所述签名邮件携带所述第二电子设备的公钥,从所述签名邮件中获取所述第二电子设备的公钥;或,
从证书颁发系统上查询并获取所述第二电子设备的公钥;或,
通过与所述第二电子设备之间事先约定的密钥交换协议,获取所述第二电子设备的公钥。
可选地,所述装置还包括:
第一显示模块,用于当通过验证确定所述信息原文正确时,显示操作选项界面,所述操作选项界面用于提供业务处理终止选项和业务处理继续选项;
所述业务处理模块用于根据用户在所述操作选项界面所选中的选项和所述信息原文进行业务处理。
可选地,所述装置还包括:
第二显示模块,用于当通过验证确定所述信息原文正确时,显示操作提示界面,所述操作提示界面用于提示用户通过摇晃操作继续进行业务处理;
所述业务处理模块用于如果检测到摇晃操作,则基于所述信息原文进行业务处理。
上述所有可选技术方案,可以采用任意结合形成本公开的可选实施例,在此不再一一赘述。
需要说明的是:上述实施例提供的业务处理装置在业务处理时,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将设备的内部结构划分成不同的功能模块,以完
成以上描述的全部或者部分功能。另外,上述实施例提供的业务处理装置与业务处理方法实施例属于同一构思,其具体实现过程详见方法实施例,这里不再赘述。
本实施例提供了一种电子设备,该电子设备可以用于执行上述各个实施例中提供的业务处理方法。参见图6,该电子设备600包括:
电子设备600可以包括RF(Radio Frequency,射频)电路110、包括有一个或一个以上计算机可读存储介质的存储器120、输入单元130、显示单元140、传感器150、音频电路160、WiFi(Wireless Fidelity,无线保真)模块170、包括有一个或者一个以上处理核心的处理器180、以及电源190等部件。本领域技术人员可以理解,图6中示出的电子设备结构并不构成对电子设备的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。其中:
RF电路110可用于收发信息或通话过程中,信号的接收和发送,特别地,将基站的下行信息接收后,交由一个或者一个以上处理器180处理;另外,将涉及上行的数据发送给基站。通常,RF电路110包括但不限于天线、至少一个放大器、调谐器、一个或多个振荡器、用户身份模块(SIM)卡、收发信机、耦合器、LNA(Low Noise Amplifier,低噪声放大器)、双工器等。此外,RF电路110还可以通过无线通信与网络和其他设备通信。所述无线通信可以使用任一通信标准或协议,包括但不限于GSM(Global System of Mobile communication,全球移动通讯系统)、GPRS(General Packet Radio Service,通用分组无线服务)、CDMA(Code Division Multiple Access,码分多址)、WCDMA(Wideband Code Division Multiple Access,宽带码分多址)、LTE(Long Term Evolution,长期演进)、电子邮件、SMS(Short Messaging Service,短消息服务)等。
存储器120可用于存储软件程序以及模块,处理器180通过运行存储在存储器120的软件程序以及模块,从而执行各种功能应用以及数据处理。存储器120可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据电子设备600的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器120可以包括高速随机存取存储器,还可以包括非易
失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。相应地,存储器120还可以包括存储器控制器,以提供处理器180和输入单元130对存储器120的访问。
输入单元130可用于接收输入的数字或字符信息,以及产生与用户设置以及功能控制有关的键盘、鼠标、操作杆、光学或者轨迹球信号输入。具体地,输入单元130可包括触敏表面131以及其他输入设备132。触敏表面131,也称为触摸显示屏或者触控板,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触敏表面131上或在触敏表面131附近的操作),并根据预先设定的程式驱动相应的连接装置。可选的,触敏表面131可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器180,并能接收处理器180发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触敏表面131。除了触敏表面131,输入单元130还可以包括其他输入设备132。具体地,其他输入设备132可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。
显示单元140可用于显示由用户输入的信息或提供给用户的信息以及电子设备600的各种图形用户接口,这些图形用户接口可以由图形、文本、图标、视频和其任意组合来构成。显示单元140可包括显示面板141,可选的,可以采用LCD(Liquid Crystal Display,液晶显示器)、OLED(Organic Light-Emitting Diode,有机发光二极管)等形式来配置显示面板141。进一步的,触敏表面131可覆盖显示面板141,当触敏表面131检测到在其上或附近的触摸操作后,传送给处理器180以确定触摸事件的类型,随后处理器180根据触摸事件的类型在显示面板141上提供相应的视觉输出。虽然在图6中,触敏表面131与显示面板141是作为两个独立的部件来实现输入和输入功能,但是在某些实施例中,可以将触敏表面131与显示面板141集成而实现输入和输出功能。
电子设备600还可包括至少一种传感器150,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板141的亮度,接近传感器可在电子设备600移动到耳边时,关闭显示面板141和/或背光。作为运动传感
器的一种,重力加速度传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;至于电子设备600还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。
音频电路160、扬声器161,传声器162可提供用户与电子设备600之间的音频接口。音频电路160可将接收到的音频数据转换后的电信号,传输到扬声器161,由扬声器161转换为声音信号输出;另一方面,传声器162将收集的声音信号转换为电信号,由音频电路160接收后转换为音频数据,再将音频数据输出处理器180处理后,经RF电路110以发送给比如另一电子设备,或者将音频数据输出至存储器120以便进一步处理。音频电路160还可能包括耳塞插孔,以提供外设耳机与电子设备600的通信。
WiFi属于短距离无线传输技术,电子设备600通过WiFi模块170可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图6示出了WiFi模块170,但是可以理解的是,其并不属于电子设备600的必须构成,完全可以根据需要在不改变发明的本质的范围内而省略。
处理器180是电子设备600的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器120内的软件程序和/或模块,以及调用存储在存储器120内的数据,执行电子设备600的各种功能和处理数据,从而对手机进行整体监控。可选的,处理器180可包括一个或多个处理核心;优选的,处理器180可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器180中。
电子设备600还包括给各个部件供电的电源190(比如电池),优选的,电源可以通过电源管理系统与处理器180逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。电源190还可以包括一个或一个以上的直流或交流电源、再充电系统、电源故障检测电路、电源转换器或者逆变器、电源状态指示器等任意组件。
尽管未示出,电子设备600还可以包括摄像头、蓝牙模块等,在此不再赘述。具体在本实施例中,电子设备的显示单元是触摸屏显示器,电子设备还包
括有存储器,以及一个或者一个以上的程序,其中一个或者一个以上程序存储于存储器中,且经配置以由一个或者一个以上处理器执行。所述一个或者一个以上程序包含用于执行上述第一电子设备或第二电子设备所执行操作的指令。
本领域普通技术人员可以理解实现上述实施例的全部或部分步骤可以通过硬件来完成,也可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可读存储介质中,上述提到的存储介质可以是只读存储器,磁盘或光盘等。
以上所述仅为本发明的较佳实施例,并不用以限制本发明,凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。
Claims (20)
- 一种业务处理方法,其特征在于,应用于第二电子设备中,所述方法包括:接收第一电子设备的业务请求;采用所述第一电子设备的公钥对所述业务请求对应的信息原文进行加密,得到第一密文信息;获取所述信息原文的信息摘要;采用所述第二电子设备的私钥对所述信息摘要进行加密,得到所述第二电子设备的数字签名;将所述数字签名加入至所述第一密文信息,得到第二密文信息;将所述第二密文信息和所述第二电子设备的数字证书发送至所述第一电子设备,使得所述第一电子设备根据所述第二密文信息和数字证书,获取所述第二电子设备的信息原文,并基于所述信息原文进行业务处理,所述数字证书由证书颁发系统颁发。
- 根据权利要求1所述的方法,其特征在于,所述采用所述第一电子设备的公钥对所述业务请求对应的信息原文进行加密,得到第一密文信息之前,所述方法还包括:接收第一电子设备发送的签名邮件,所述签名邮件携带所述第一电子设备的公钥,从所述签名邮件中获取所述第一电子设备的公钥;或,从证书颁发系统上查询并获取所述第一电子设备的公钥;或,通过与所述第一电子设备之间事先约定的密钥交换协议,获取所述第一电子设备的公钥。
- 根据权利要求1所述的方法,其特征在于,所述信息原文包括以下至少一项:身份信息;或,金融信息;或,认证信息;或,地址信息。
- 根据权利要求1所述的方法,其特征在于,所述身份信息包括以下至少一项:社交应用账号、手机号码、邮箱信息、网络身份证、身份证、驾驶证、护照;或,所述金融信息包括以下至少一项:信用卡、金融卡、网络账户;或,所述认证信息包括以下至少一项:秘钥、唯一标识、口令、时间戳或随机数等;或,所述地址信息包括以下至少一项:门牌号、地址和家庭信息。
- 根据权利要求1所述的方法,其特征在于,所述业务请求为身份验证请求、金融信息访问请求、支付请求或信息获取请求。
- 一种业务处理方法,其特征在于,应用于第一电子设备中,所述方法包括:向第二电子设备发送业务请求,并接收所述第二电子设备返回的数字证书和第二密文信息,所述第二密文信息包括第一密文信息和数字签名;对所述第二电子设备的数字证书进行验证;当通过验证确定所述第二电子设备的数字证书合法时,采用所述第一电子设备的私钥对所述第一密文信息进行解密,得到信息原文;采用所述第二电子设备的公钥对所述数字签名进行解密,得到信息摘要;根据所述信息摘要对所述信息原文进行验证;当通过验证确定所述信息原文正确时,基于所述信息原文进行业务处理。
- 根据权利要求6所述的方法,其特征在于,对所述第二电子设备的数字证书进行验证包括:提取所述数字证书中的证书颁发系统签名,通过证书颁发系统的公钥,对所述数字证书中证书颁发系统签名进行解密,得到第一信息摘要,对所述数字证书进行摘要运算,得到第二信息摘要,将所述第一信息摘要与第二信息摘要进行比对,如果一致,则所述数字证书合法;和/或,从证书颁发系统下载证书作废列表,如果所述第二电子设备的数字证书在所述证书作废列表中,则确定所述数字证书不合法。
- 根据权利要求6所述的方法,其特征在于,采用所述第二电子设备的公钥对所述数字签名进行解密,得到信息摘要之前,所述方法还包括:接收第二电子设备发送的签名邮件,所述签名邮件携带所述第二电子设备的公钥,从所述签名邮件中获取所述第二电子设备的公钥;或,从证书颁发系统上查询并获取所述第二电子设备的公钥;或,通过与所述第二电子设备之间事先约定的密钥交换协议,获取所述第二电子设备的公钥。
- 根据权利要求6所述的方法,其特征在于,当通过验证确定所述信息原文正确时,基于所述信息原文进行业务处理包括:当通过验证确定所述信息原文正确时,显示操作选项界面,所述操作选项界面用于提供业务处理终止选项和业务处理继续选项;根据用户在所述操作选项界面所选中的选项和所述信息原文进行业务处理。
- 根据权利要求6所述的方法,其特征在于,当通过验证确定所述信息原文正确时,基于所述信息原文进行业务处理包括:当通过验证确定所述信息原文正确时,显示操作提示界面,所述操作提示界面用于提示用户通过摇晃操作继续进行业务处理;如果检测到摇晃操作,则基于所述信息原文进行业务处理。
- 一种电子设备,其特征在于,所述电子设备包括:一个或多个处理器;和,存储器;所述存储器存储有一个或多个程序,所述一个或多个程序被配置成由所述一个或多个处理器执行,所述一个或多个程序包含用于进行以下操作的指令:接收第一电子设备的业务请求;采用所述第一电子设备的公钥对所述业务请求对应的信息原文进行加密,得到第一密文信息;获取所述信息原文的信息摘要;采用电子设备自身的私钥对所述信息摘要进行加密,得到所述电子设备自 身的数字签名;将所述数字签名加入至所述第一密文信息,得到第二密文信息;将所述第二密文信息和所述电子设备自身的数字证书发送至所述第一电子设备,使得所述第一电子设备根据所述第二密文信息和数字证书,获取所述第二电子设备的信息原文,并基于所述信息原文进行业务处理,所述数字证书由证书颁发系统颁发。
- 根据权利要求11所述的电子设备,其特征在于,所述一个或多个程序包含用于进行以下操作的指令:接收第一电子设备发送的签名邮件,所述签名邮件携带所述第一电子设备的公钥,从所述签名邮件中获取所述第一电子设备的公钥;或,从证书颁发系统上查询并获取所述第一电子设备的公钥;或,通过与所述第一电子设备之间事先约定的密钥交换协议,获取所述第一电子设备的公钥。
- 根据权利要求11所述的电子设备,其特征在于,所述信息原文包括以下至少一项:身份信息;或,金融信息;或,认证信息;或,地址信息。
- 根据权利要求11所述的电子设备,其特征在于,所述身份信息包括以下至少一项:社交应用账号、手机号码、邮箱信息、网络身份证、身份证、驾驶证、护照;或,所述金融信息包括以下至少一项:信用卡、金融卡、网络账户;或,所述认证信息包括以下至少一项:秘钥、唯一标识、口令、时间戳或随机数等;或,所述地址信息包括以下至少一项:门牌号、地址和家庭信息。
- 根据权利要求11所述的电子设备,其特征在于,所述业务请求为身份验证请求、金融信息访问请求、支付请求或信息获取请求。
- 一种电子设备,其特征在于,所述电子设备包括:一个或多个处理器;和,存储器;所述存储器存储有一个或多个程序,所述一个或多个程序被配置成由所述一个或多个处理器执行,所述一个或多个程序包含用于进行以下操作的指令:向第二电子设备发送业务请求,并接收所述第二电子设备返回的数字证书和第二密文信息,所述第二密文信息包括第一密文信息和数字签名;对所述第二电子设备的数字证书进行验证;当通过验证确定所述第二电子设备的数字证书合法时,采用电子设备自身的私钥对所述第一密文信息进行解密,得到信息原文;采用所述第二电子设备的公钥对所述数字签名进行解密,得到信息摘要;根据所述信息摘要对所述信息原文进行验证;当通过验证确定所述信息原文正确时,基于所述信息原文进行业务处理。
- 根据权利要求16所述的电子设备,其特征在于,所述一个或多个程序包含用于进行以下操作的指令:提取所述数字证书中的证书颁发系统签名,通过证书颁发系统的公钥,对所述数字证书中证书颁发系统签名进行解密,得到第一信息摘要,对所述数字证书进行摘要运算,得到第二信息摘要,将所述第一信息摘要与第二信息摘要进行比对,如果一致,则所述数字证书合法;和/或,从证书颁发系统下载证书作废列表,如果所述第二电子设备的数字证书在所述证书作废列表中,则确定所述数字证书不合法。
- 根据权利要求16所述的电子设备,其特征在于,所述一个或多个程序包含用于进行以下操作的指令:接收第二电子设备发送的签名邮件,所述签名邮件携带所述第二电子设备的公钥,从所述签名邮件中获取所述第二电子设备的公钥;或,从证书颁发系统上查询并获取所述第二电子设备的公钥;或,通过与所述第二电子设备之间事先约定的密钥交换协议,获取所述第二电子设备的公钥。
- 根据权利要求16所述的电子设备,其特征在于,所述一个或多个程序包含用于进行以下操作的指令:当通过验证确定所述信息原文正确时,显示操作选项界面,所述操作选项界面用于提供业务处理终止选项和业务处理继续选项;根据用户在所述操作选项界面所选中的选项和所述信息原文进行业务处理。
- 根据权利要求16所述的电子设备,其特征在于,所述一个或多个程序包含用于进行以下操作的指令:当通过验证确定所述信息原文正确时,显示操作提示界面,所述操作提示界面用于提示用户通过摇晃操作继续进行业务处理;如果检测到摇晃操作,则基于所述信息原文进行业务处理。
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US15/820,014 US10601795B2 (en) | 2015-09-08 | 2017-11-21 | Service processing method and electronic device |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510567954.5 | 2015-09-08 | ||
| CN201510567954.5A CN105721413B (zh) | 2015-09-08 | 2015-09-08 | 业务处理方法及装置 |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US15/820,014 Continuation US10601795B2 (en) | 2015-09-08 | 2017-11-21 | Service processing method and electronic device |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2017041599A1 true WO2017041599A1 (zh) | 2017-03-16 |
Family
ID=56144884
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2016/092434 Ceased WO2017041599A1 (zh) | 2015-09-08 | 2016-07-29 | 业务处理方法及电子设备 |
Country Status (3)
| Country | Link |
|---|---|
| US (1) | US10601795B2 (zh) |
| CN (1) | CN105721413B (zh) |
| WO (1) | WO2017041599A1 (zh) |
Cited By (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108989347A (zh) * | 2018-08-30 | 2018-12-11 | 汉能移动能源控股集团有限公司 | 账号生成方法和装置、系统、介质、设备 |
| CN109213686A (zh) * | 2018-10-22 | 2019-01-15 | 网易(杭州)网络有限公司 | 应用包体检查方法、装置、存储介质、处理器及服务器 |
| CN112073399A (zh) * | 2020-08-28 | 2020-12-11 | 华迪计算机集团有限公司 | 基于双向消息队列的数据交换系统 |
| CN113810364A (zh) * | 2021-07-29 | 2021-12-17 | 北京中交国通智能交通系统技术有限公司 | 一种信息展示方法、装置、设备及存储介质 |
| CN114584299A (zh) * | 2022-03-02 | 2022-06-03 | 中国建设银行股份有限公司 | 数据处理方法、装置、电子设备和存储介质 |
Families Citing this family (23)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN105721413B (zh) * | 2015-09-08 | 2018-05-29 | 腾讯科技(深圳)有限公司 | 业务处理方法及装置 |
| WO2018090499A1 (zh) * | 2016-11-21 | 2018-05-24 | 华为技术有限公司 | 交易方法、支付设备、校验设备和服务器 |
| CN106685945B (zh) * | 2016-12-21 | 2020-12-22 | 深圳市金立通信设备有限公司 | 业务请求处理方法、业务办理号码的验证方法及其终端 |
| CN107133512B (zh) * | 2017-03-14 | 2020-07-28 | 万达百汇科技(深圳)有限公司 | Pos终端控制方法和装置 |
| CN107358441B (zh) * | 2017-06-26 | 2020-12-18 | 北京明华联盟科技有限公司 | 支付验证的方法、系统及移动设备和安全认证设备 |
| CN110971414B (zh) * | 2017-11-10 | 2021-05-04 | 财付通支付科技有限公司 | 生成签名的方法、装置、终端及服务器 |
| CN108337264B (zh) * | 2018-02-13 | 2020-10-27 | 福州外语外贸学院 | 一种具有高安全性的在线教育数据传输方法及终端 |
| TWI677805B (zh) * | 2018-04-24 | 2019-11-21 | 大陸商物聯智慧科技(深圳)有限公司 | 資料加解密方法及系統與連網裝置及其資料加解密方法 |
| CN108810017B (zh) * | 2018-07-12 | 2021-03-12 | 中国工商银行股份有限公司 | 业务处理安全验证方法及装置 |
| CN109472166B (zh) * | 2018-11-01 | 2021-05-07 | 恒生电子股份有限公司 | 一种电子签章方法、装置、设备及介质 |
| IT201900009165A1 (it) * | 2019-06-17 | 2020-12-17 | St Microelectronics Srl | Dispositivo elettronico e corrispondente procedimento di funzionamento |
| CN111865607B (zh) * | 2020-06-16 | 2022-02-11 | 郑州信大捷安信息技术股份有限公司 | 用于v2x的加密证书状态在线查询方法、通信方法及系统 |
| TWI770676B (zh) * | 2020-11-17 | 2022-07-11 | 玉山商業銀行股份有限公司 | 線上交易處理系統及方法 |
| CN112966305B (zh) * | 2021-03-24 | 2022-09-27 | 中国科学院自动化研究所 | 基于区块链的信息传递方法、装置、电子设备和存储介质 |
| CN115442061B (zh) * | 2021-06-04 | 2025-04-04 | 华为技术有限公司 | 安全认证方法、可读介质和电子设备 |
| CN113706299B (zh) * | 2021-09-10 | 2024-07-19 | 京东科技控股股份有限公司 | 数据处理的方法、装置、电子设备及介质 |
| CN114266062B (zh) * | 2021-12-28 | 2025-02-18 | 中国电信股份有限公司 | 结构化信息加密系统、方法、装置、介质及设备 |
| CN114819936A (zh) * | 2022-04-01 | 2022-07-29 | 维沃移动通信有限公司 | 转账信息的获取方法、装置、电子设备及存储介质 |
| CN115329315A (zh) * | 2022-08-16 | 2022-11-11 | 亿咖通(湖北)技术有限公司 | 服务鉴权方法,装置,存储介质以及电子设备 |
| CN115630377B (zh) * | 2022-10-10 | 2023-06-06 | 广州市金其利信息科技有限公司 | 外部设备的接入方法、装置、计算机设备及外部设备 |
| CN115442807B (zh) * | 2022-11-10 | 2023-02-07 | 之江实验室 | 一种用于5g系统的用户安全性提升方法及装置 |
| CN116346431A (zh) * | 2023-03-06 | 2023-06-27 | 西安电子科技大学 | 基于浏览器插件的电子邮件加解密方法 |
| CN121098519A (zh) * | 2025-11-05 | 2025-12-09 | 北京迪科远望科技有限公司 | 嵌入式水控终端的预约码验证方法和系统 |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101197674A (zh) * | 2007-12-10 | 2008-06-11 | 华为技术有限公司 | 加密通信方法、服务器及加密通信系统 |
| CN201315597Y (zh) * | 2008-10-10 | 2009-09-23 | 东莞广州中医药大学中医药数理工程研究院 | 一种便携式无线电子密钥装置 |
| CN101631022A (zh) * | 2009-08-04 | 2010-01-20 | 北京飞天诚信科技有限公司 | 一种签名方法和系统 |
| CN105721413A (zh) * | 2015-09-08 | 2016-06-29 | 腾讯科技(深圳)有限公司 | 业务处理方法及装置 |
Family Cites Families (34)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5809144A (en) * | 1995-08-24 | 1998-09-15 | Carnegie Mellon University | Method and apparatus for purchasing and delivering digital goods over a network |
| JP3540511B2 (ja) * | 1996-06-18 | 2004-07-07 | 株式会社東芝 | 電子署名検証装置 |
| US6351812B1 (en) * | 1998-09-04 | 2002-02-26 | At&T Corp | Method and apparatus for authenticating participants in electronic commerce |
| US20030078880A1 (en) * | 1999-10-08 | 2003-04-24 | Nancy Alley | Method and system for electronically signing and processing digital documents |
| JP2002141895A (ja) * | 2000-11-01 | 2002-05-17 | Sony Corp | コンテンツ配信システムおよびコンテンツ配信方法 |
| WO2003001339A2 (en) * | 2001-06-22 | 2003-01-03 | Wonderware Corporation | A security architecture for a process control platform executing applications |
| US7512785B2 (en) * | 2003-07-18 | 2009-03-31 | Intel Corporation | Revocation distribution |
| US7581105B2 (en) * | 2003-12-16 | 2009-08-25 | Sap Aktiengesellschaft | Electronic signing apparatus and methods |
| US8024779B2 (en) * | 2004-02-26 | 2011-09-20 | Packetmotion, Inc. | Verifying user authentication |
| US9003548B2 (en) * | 2004-04-13 | 2015-04-07 | Nl Systems, Llc | Method and system for digital rights management of documents |
| US20050268327A1 (en) * | 2004-05-14 | 2005-12-01 | Secure Communications Technology, Llc | Enhanced electronic mail security system and method |
| JP4448800B2 (ja) * | 2005-07-07 | 2010-04-14 | 株式会社ソニー・コンピュータエンタテインメント | デバイス制御装置 |
| US20070156836A1 (en) * | 2006-01-05 | 2007-07-05 | Lenovo(Singapore) Pte. Ltd. | System and method for electronic chat identity validation |
| JP5034498B2 (ja) * | 2006-02-20 | 2012-09-26 | 株式会社日立製作所 | ディジタルコンテンツの暗号化,復号方法,及び,ディジタルコンテンツを利用した業務フローシステム |
| US20080091936A1 (en) * | 2006-10-11 | 2008-04-17 | Ikkanzaka Hiroaki | Communication apparatus, control method for communication apparatus and computer-readable storage medium |
| US8271788B2 (en) * | 2006-10-17 | 2012-09-18 | Trend Micro Incorporated | Software registration system |
| CN101471776A (zh) * | 2007-12-29 | 2009-07-01 | 航天信息股份有限公司 | 基于用户身份标识防止pkg伪造签名的方法 |
| US20100290627A1 (en) * | 2008-02-29 | 2010-11-18 | Mitsubishi Electric Corporation | Key management server, terminal, key sharing system, key delivery program, key reception program, key delivery method, and key reception method |
| US8782607B2 (en) * | 2009-02-20 | 2014-07-15 | Microsoft Corporation | Contract failure behavior with escalation policy |
| CN102609841B (zh) * | 2012-01-13 | 2015-02-25 | 东北大学 | 一种基于数字证书的远程移动支付系统及支付方法 |
| AU2013248815B2 (en) * | 2012-04-16 | 2016-08-25 | Tencent Technology (Shenzhen) Company Limited | Instruction triggering method and device, user information acquisition method and system, terminal, and server |
| WO2014066559A1 (en) * | 2012-10-23 | 2014-05-01 | Visa International Service Association | Transaction initiation determination system utilizing transaction data elements |
| US9179270B2 (en) * | 2012-12-17 | 2015-11-03 | Tecent Technology (Shenzhen) Company Limited | Intercommunication methods and devices based on digital networks |
| US8851370B2 (en) * | 2013-01-02 | 2014-10-07 | Jpmorgan Chase Bank, N.A. | System and method for secure card with on-board verification |
| CN104142791A (zh) * | 2013-05-09 | 2014-11-12 | 腾讯科技(深圳)有限公司 | 资源更换方法、装置及终端 |
| EP3035155A4 (en) * | 2013-08-14 | 2017-04-19 | Yulong Computer Telecommunication Scientific (Shenzhen) Co. Ltd. | Wearable device and data transmission method |
| DE102014201234A1 (de) * | 2014-01-23 | 2015-07-23 | Siemens Aktiengesellschaft | Verfahren, Verwaltungsvorrichtung und Gerät zur Zertifikat-basierten Authentifizierung von Kommunikationspartnern in einem Gerät |
| US9826400B2 (en) * | 2014-04-04 | 2017-11-21 | Qualcomm Incorporated | Method and apparatus that facilitates a wearable identity manager |
| JP2016025628A (ja) * | 2014-07-24 | 2016-02-08 | 株式会社リコー | 情報処理システム、および電子機器 |
| JP2016063233A (ja) * | 2014-09-12 | 2016-04-25 | 株式会社東芝 | 通信制御装置 |
| US9342153B2 (en) * | 2014-10-14 | 2016-05-17 | Sony Corporation | Terminal device and method for controlling operations |
| CN104320257B (zh) * | 2014-10-22 | 2015-10-28 | 李名选 | 电子档案验证方法及装置 |
| US20160253651A1 (en) * | 2015-02-27 | 2016-09-01 | Samsung Electronics Co., Ltd. | Electronic device including electronic payment system and operating method thereof |
| US9651944B2 (en) * | 2015-03-22 | 2017-05-16 | Microsoft Technology Licensing, Llc | Unmanned aerial vehicle piloting authorization |
-
2015
- 2015-09-08 CN CN201510567954.5A patent/CN105721413B/zh active Active
-
2016
- 2016-07-29 WO PCT/CN2016/092434 patent/WO2017041599A1/zh not_active Ceased
-
2017
- 2017-11-21 US US15/820,014 patent/US10601795B2/en active Active
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101197674A (zh) * | 2007-12-10 | 2008-06-11 | 华为技术有限公司 | 加密通信方法、服务器及加密通信系统 |
| CN201315597Y (zh) * | 2008-10-10 | 2009-09-23 | 东莞广州中医药大学中医药数理工程研究院 | 一种便携式无线电子密钥装置 |
| CN101631022A (zh) * | 2009-08-04 | 2010-01-20 | 北京飞天诚信科技有限公司 | 一种签名方法和系统 |
| CN105721413A (zh) * | 2015-09-08 | 2016-06-29 | 腾讯科技(深圳)有限公司 | 业务处理方法及装置 |
Cited By (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108989347A (zh) * | 2018-08-30 | 2018-12-11 | 汉能移动能源控股集团有限公司 | 账号生成方法和装置、系统、介质、设备 |
| CN109213686A (zh) * | 2018-10-22 | 2019-01-15 | 网易(杭州)网络有限公司 | 应用包体检查方法、装置、存储介质、处理器及服务器 |
| CN112073399A (zh) * | 2020-08-28 | 2020-12-11 | 华迪计算机集团有限公司 | 基于双向消息队列的数据交换系统 |
| CN113810364A (zh) * | 2021-07-29 | 2021-12-17 | 北京中交国通智能交通系统技术有限公司 | 一种信息展示方法、装置、设备及存储介质 |
| CN114584299A (zh) * | 2022-03-02 | 2022-06-03 | 中国建设银行股份有限公司 | 数据处理方法、装置、电子设备和存储介质 |
| CN114584299B (zh) * | 2022-03-02 | 2024-04-26 | 中国建设银行股份有限公司 | 数据处理方法、装置、电子设备和存储介质 |
Also Published As
| Publication number | Publication date |
|---|---|
| US20180103017A1 (en) | 2018-04-12 |
| US10601795B2 (en) | 2020-03-24 |
| CN105721413A (zh) | 2016-06-29 |
| CN105721413B (zh) | 2018-05-29 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10601795B2 (en) | Service processing method and electronic device | |
| CN109600223B (zh) | 验证方法、激活方法、装置、设备及存储介质 | |
| CN112733107B (zh) | 一种信息验证的方法、相关装置、设备以及存储介质 | |
| CN109472166B (zh) | 一种电子签章方法、装置、设备及介质 | |
| TWI713855B (zh) | 憑證管理方法及系統 | |
| US11488234B2 (en) | Method, apparatus, and system for processing order information | |
| CN105515768B (zh) | 一种更新密钥的方法、装置和系统 | |
| ES2836114T3 (es) | Método de envío de información, método de recepción de información, aparato y sistema | |
| CN111193695B (zh) | 一种第三方账号登录的加密方法、装置及存储介质 | |
| WO2018157858A1 (zh) | 信息存储方法、装置及计算机可读存储介质 | |
| WO2017186100A1 (zh) | 身份认证方法、系统及设备 | |
| WO2015101273A1 (zh) | 一种安全验证方法、相关设备和系统 | |
| CN105681032B (zh) | 密钥存储方法、密钥管理方法及装置 | |
| WO2018201991A1 (zh) | 数据处理方法、系统、装置、存储介质及设备 | |
| WO2017084288A1 (zh) | 身份验证方法及装置 | |
| CN107154935B (zh) | 业务请求方法及装置 | |
| CN106845177A (zh) | 密码管理方法及系统 | |
| WO2018108123A1 (zh) | 身份验证方法、装置与系统 | |
| WO2018108062A1 (zh) | 身份验证方法、装置及存储介质 | |
| CN117240475B (zh) | 一种智能门锁的通信方法、系统、设备及介质 | |
| CN110474864A (zh) | 一种注册、登录移动应用程序的方法及电子设备 | |
| WO2024160055A1 (zh) | 一种设备解密控制方法、装置、电子设备和存储介质 | |
| CN105488433B (zh) | 终端密钥生成方法及装置 | |
| CN108737341B (zh) | 业务处理方法、终端及服务器 | |
| CN118709205A (zh) | 数据共享方法及相关设备 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16843537 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 16843537 Country of ref document: EP Kind code of ref document: A1 |